RSAC Security Scholar Poster Exhibition

We invite all attendees to join us in the Viewing Point on Wednesday, February 15th from 2:45  3:30 PM. Scholars will hold a Poster Exhibition where they will discuss and demo their innovative approaches to cybersecurity. The Poster Board Session is open to all attendees and we encourage you to come meet these future thought leaders.  

Zachary Ducker University of Maryland, University College A Historical Based Approach to Email Threat Prevention
Adrian Tang Columbia University A Silicon Anti-Virus Engine
Haadi Jafarian  University of North Carolina, Charlotte Adversary-aware IP Address Randomization for Proactive Agility against Sophisticated Attackers
Nikolas Roby University of Maryland, University College Application of Blockchain Technology in Online Voting
Hossein Siadati New York University APT-Hunter Detecting Malicious Logins in Networks
Adedayo Odesile University of Washington Autonomous Agent Based Intrusion Detection for WBANs
Dan Zhang University of Massachusetts, Amherst Challenges of Visualizing Differentially Private Data
Ryan Dellana North Carolina A&T State University  Computer Vison-Based Makerspace Access Control System
Christian Johnson University of Maryland, College Park Dynamic Reconfiguration: A Model for Cyber Subterfuge and Active Defense
Miguel Angel Arroyo IV Columbia University FIRE: Frequent Inertial Resets for Cyber-Physical Systems
Jun Xu Pennsylvania State University FlashGuard: Hardware-Assisted Recovery Against Encryption Ransomware
Andreas Pavlou Stanford University Hacking the Bomb: Analyzing the Cyber Threat to Nuclear Command & Control
Amirali Sanatinia Northeastern University HOnions: Exposing Snooping Tor HSDirs
Omid Rajaee Pennsylvania State University IoT, Resource Constrained Devices, Security
Jennifer Burns Carnegie Mellon University Is My Charger Hacking Me?
Keen Sung University of Massachusetts, Amherst Mobility Privacy in an Untrustworthy World
Adam Pridgen Rice University Picking up the Trash: Exploiting Generational Garbage Collection in the HotSpot JVM
Shuyuan Luo New York University PolyPasswordHasher: Protecting Passwords in The Event of A Password File Disclosure
Manideep Konakandla Carnegie Mellon University Security Analysis of Docker
Shiven Chawla University of Washington Smart Security Service for IoT
Nick Merrill University of California, Berkeley Think Your Password: Passthought Authentication with In-Ear EEG
George Argyros Columbia University Towards Scalable Symbolic Execution in Interpreted Languages
Rima Tanash Rice University Twitter Censorship, Detection, and Analysis: Case Study in Turkey
David Formby Georgia Institute of Technology Under Control: Techniques for Securing Industrial Control Systems
Prakhar Pandey New York University Undermining Cybercrime: A Case Study on User Response to Unregulated Payment Systems
Amin Kharraz Northeastern University UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
Shivani Singhal Carnegie Mellon University USB - Ultimately Sinister Power Block

This document was retrieved from on Mon, 18 Dec 2017 11:25:52 -0500.
© 2017 EMC Corporation. All rights reserved.