facebook

Campus Address

Lawrence Technological University
21000 West Ten Mile Road
Southfield, MI 48075-1058

Important Phone Numbers

Toll-free
1.800.CALL.LTU


Campus Hotline
248.204.2222


Campus Operator / Directory Assistance
248.204.4000

ltu
ltu

College of Arts + Sciences

Cybersecurity from A Scientist’s Perspective: Learning to Defend by Knowing How to Attack

Image Description

Kim Lam, BSCS ’23, and Sidney Ross, BSCS ’23, present their poster regarding Dark Patterns at LTU’s Research Day 2023.

In a world where computers reign, cybersecurity scientists hold the keys to the kingdom. The increasing number and sophistication of cyberattacks require vigilant and creative computer science professionals who are adept at devising and deploying protective measures.

Tao Liu , an assistant professor in the College of Arts and Sciences, is one such professional whose job is to train the next generation of cybersecurity gurus and to research ways to protect cyber systems and prevent cyberattacks.

LTU offers Bachelor and a Master of Science degrees in computer science with a cybersecurity concentration because, as Liu explained, “It’s critical to fully understand how and why the attack happened from a technical point of view.” Liu came to Lawrence Tech in fall 2020 because “Dr. Nelson, interim dean of the College of Arts and Sciences, wanted to create a more solid computer science program,” he said. “We already had a good start with ‘Robofest’, machine learning, and traditional courses like cryptography, but we have great potential in the cybersecurity field. Cybersecurity is always a hot topic in computer science teaching and research.”

“Combining book learning with hands-on experience puts students in a more comprehensive learning environment and prepares them to make a positive difference when they leave the university.”

– TAO LIU, ASSISTANT PROFESSOR OF COMPUTER SCIENCE

In 2021, 2022, and 2023, Liu created several courses in cybersecurity combining that with hands-on experience for students. Unique for LTU cybersecurity students is the opportunity to generate their own malware (malicious software) and cryptographic breaker “to understand the working mechanisms of the computing system, the hardware, software, and networks, and, by knowing how to carry out a realistic attack, then build the defense that can mitigate or prevent the attack,” Liu explained.

In keeping with LTU’s motto of “Theory and Practice,” combining book learning with hands-on experience puts students in a more comprehensive learning environment and prepares them to make a positive difference when they leave the university. Liu said, “It’s very interdisciplinary, combining math, software, hardware, and networks with some knowledge of psychology, communications, social media, and social engineering.”

Liu spends more than 40 percent of his time on research that’s at the intersection of machine learning, cybersecurity, and IoT (Internet of Things, which refers to a network of devices, vehicles, appliances, and other physical objects that are embedded with sensors, software, and network connectivity). Liu’s research can be found at: https://scholar.google.com

Image Description

Tao Liu presents the special Future Women Scientist in Intelligent Computing award to Kim Lam, BSCS ’23.

Image Description

Tao Liu presents the special Future Women Scientist in Intelligent Computing award to Sidney Ross, BSCS ’23.

Over his three years with LTU, Liu has involved students in important research projects. Kim Lam and Sydney Ross who both graduated last year identified and proposed countermeasures to what is called “dark patterns.” They presented their study titled “Protecting the User: Smart Detection of UI (user interface) Dark Patterns” on Research Day ’23. They wrote, “In the rise of e-commerce, social media, and digitized news, the importance of security and privacy on the internet is more relevant than ever. In conjunction with this growth, an emerging threat named “Dark Patterns” (DPs) have become increasingly prevalent. DPs are the design choices that influence users to take actions they may not want to take, when it is clear that those actions will jeopardize the user’s interests.” Dark patterns show up in advertising or online check-out pages when, for example, a message pops up stating that "421 customers have ordered this item in the last 2 hours." However, this is actually a fake message that tricks customers into spending money by taking advantage of their herd mentality.

Nathan Pham, who graduated with a BSCS last May and will graduate with an MSCS in July ’24, is also conducting cybersecurity research with Liu on how to leverage machine learning to improve IT security. He is currently working with Liu on research titled “Enhancing the TARA (Threat Analysis and Risk Assessment) and IDS Model (intrusion detection system).” Pham explained that “this research aims to find and enhance ways to improve the vehicle's security in terms of its current technology with IDS and also while improving the TARA model to better assess cyber risks.”

pham-photo

Nathan Pham, BSCS '23 MSCS ’24

On March 9, Pham and fellow student Percy Fowler, who call themselves the Blue Devil Byte Brawlers, took second place in the 10th Annual ISACA Detroit Chapter Scholarship Competition. Teams received a cybersecurity case study to solve.

Pham described the case: “It involves Securely Yours LLC, where an anonymous tip about credentials being leaked on the dark web leads to an investigation. Chief Mobility Officer Richard Cozart enlists security officer Michael Staley, who in turn hires us, the consultants, to use TOR (a web browser with extra security measures) and Hydra tools to verify leaked credentials and investigate the server for additional information or evidence.”

Pham and Fowler applied various malware counter measures, found the culprit, and presented their methodology and findings to win the $2,500 second-place award, which they collected at the ISACA Detroit Chapter meeting in April.

“A computer scientist is a scientist after all.”

– NATHAN PHAM, BSCS ’23, MSCS ‘24

Pham came to LTU because of the “small class size, the opportunity to meet new friends, and have better connections with professors like Liu, whom he describes as “a great teacher, who provides one-on-ones and goes out of his way to help his students.” Following graduation from LTU, he wants to get a certificate in ethical hacking and an MBA in management as his goal is to one day lead a “blue team” at a company, “the team that protects and defends their company from malicious hackers.”

Little did Pham know that when he started hacking video games in high school that he’d be the scientist that asks questions and tests hypotheses. “A computer scientist is a scientist after all,” he says.

by Renée Ahee

TABLE OF CONTENTS

Questions or Comments about this story?  We'd like to hear from you.