Menu

RSAC Security Scholar Poster Exhibition

RSA Conference Security Scholar connects the brightest up-and-coming cybersecurity students to leading experts, peers and conference attendees. To further enhance the conversation, we are offering the RSAC Security Scholars the opportunity to demonstrate their work at a poster board session on Wednesday, March 6 from 2:00 to 3:00 PM in Moscone West, Level 2.

Add this session to your schedule, then drop by, provide feedback and meet the RSAC Security Scholar Class of 2019!

RSAC 2019 Security Scholar Poster Boards and Abstracts

Statistical Learning of APT TTP Chains from MITRE ATT&CK
Rawan Al-Shaer
University of North Carolina, Charlotte
Poster Board | Abstract

Data-Driven Security Operations Center
Nicholas Amon
Carnegie Mellon University
Poster Board | Abstract

Protecting Sensitive Health Information
Christiane Brown
University of Maryland, University College
Poster Board | Abstract

Cybersecurity Reflex
Daren Childers
University of California, Berkeley (MICS)
Poster Board | Abstract

Your Heart is in a Good Place: Blockchain Authorization for Implanted Medical Devices
Allison Gibson
University of Washington, Bothell
Poster Board | Abstract

Profiling a Software Developer & Policies for Distributing Trust in Global Anonymity Systems
Morgan Giraud
United States Naval Academy
Poster Board | Abstract

The Mice that Roar: National Defense in Cyberspace
Melissa Griffith
University of California, Berkeley (CLTC)
Poster Board | Abstract

Surveillance of Physical Space Through IoT and Machine Learning
Patrick Hines
North Carolina A&T State University 
Poster Board | Abstract

On Evaluation of the Effectiveness of the HoneyBot: A Case Study
Celine Irvene
Georgia Institute of Technology
Poster Board | Abstract

Privacy Preserving Yet Verifiable IoT Devices
Ankit Jena
Carnegie Mellon University
Poster Board | Abstract

Using Deep Learning Techniques for Presentation Attack Mitigation
John Jenkins
North Carolina A&T State University 
Poster Board | Abstract

Anticipating Cyber Threats: Geopolitical Conflicts and Cyberattacks
Eliot Jung
University of Maryland, University College
Poster Board | Abstract

Needlestack: An Obfuscation Framework for Protecting Browsing Privacy
Elizabeth Krizay
Georgia Institute of Technology
Poster Board | Abstract

Key Mail
Cordell Maas
United States Naval Academy
Poster Board | Abstract

Lightweight Session Key Derivation for Internet of Things Devices
Jason McGinthy
Virginia Polytechnic Institute and State University
Poster Board | Abstract

The CrashSimulator Project
Preston Moore
New York University
Poster Board | Abstract

Improved Static Vulnerability Detection Techniques for use in Large Code Bases
Robert Morrison
University of Maryland, College Park (UMCP)
Poster Board | Abstract

Are You a Journalist and Don't Even Know It?
J.M. Porup
University of California, Berkeley (MICS)
Poster Board | Abstract

Keystroke Inference Using Ambient Light Sensor on Wrist-Wearables
Mohd Amjad Sabra
University of Texas, San Antonio
Poster Board | Abstract

Taint-Driven Embedded Software Fuzzing
Melisa (Mel) Savich
New York University
Poster Board | Abstract

Subtractive Hardware Trojans
Mohamed Tarek
Columbia University
Poster Board | Abstract

Modeling Network Efficieny and Resilience
Jamie Thorpe
Carnegie Mellon University
Poster Board | Abstract

Fingerprinting Wi-Fi Devices Using Software Defined Radios
Tien Vo-Huu
Northeastern University
Poster Board | Abstract

Hacking Home IoT Devices
Era Vuksani
Carnegie Mellon University
Poster Board | Abstract

This document was retrieved from http://www.rsaconference.com/about/rsac-security-scholar/poster-exhibition on Fri, 22 Feb 2019 23:41:55 -0500.