Each year RSA Conference Security Scholar hosts scholars from select universities. Many of these select scholars will share their current research with attendees at a poster board exhibition on Wednesday, June 8 from 12:25 - 1:15 PM.
Drop by, provide feedback and meet the RSAC Security Scholar Class of 2022!
|Maxwell Bland||University of Illinois, Urbana Champaign||The ability to execute code in an emulator is a fundamental part of modern vulnerability testing. Unfortunately, this process often has a significant reverse engineering overhead; to address this, we present Jetset, a system for automatically generating hardware peripherals models and booting closed-source embedded systems in an emulator (QEMU).||View Abstract||View Poster|
||North Carolina Agricultural and Technical State University||Will Examining Internet of Medical Things (IoMT) devices in the smart home environment reveal new privacy threats?||View Abstract||View Poster|
|Yunfei Ge||New York University||Towards Strategic Zero-Trust With Dynamic Game Theory: A Quantitative Approach
||View Abstract||View Poster|
|Shinelle Hutchinson||Purdue University||Recent wearable technology have been shown to leak more than just users’ heart rates. The recovery of Personal Internet-of-Things (PIoT) data during forensic investigations can lead to fine-grained user attribution.||View Abstract||View Poster|
|Annabelle Klosterman||Dakota State University||Influencing Underserved Communities While Building Our Cybersecurity Workforce||View Abstract||View Poster|
|Mohammad Meraj Mirza||Purdue University||Integrating Cybersecurity, Cyber Forensics, Cyber Threat Intelligence and Geospatial technologies and techniques into a multidisciplinary approach allowed us to better understand the present gaps and limitations of defense systems against emerging air-breathing threats||View Abstract||View Poster|
|Danielle Murad Waiss||Columbia University||Cyber norm creation is driven by the major alliance blocks that often pose opposing visions for the cyber domain. As a result smaller cyber powers hedge their bets by toeing the line between both blocks.||View Abstract||View Poster|
|Meghna Pancholi||Columbia University||Crafting security policies is tedious and error-prone. Timeloops generates security policies automatically.||View Abstract||View Poster|
|Taylor Rainey||University of California, Berkeley||Surveillance Technology Used In Modern Communication Devices Potentially Infringes on Vulnerable Incarcerated Prison Population’s Privacy & Poses Security Risk||View Abstract||View Poster|
|Vivek Rajan||Rutgers University||Cybersecurity Dashboards Utilizing Chronicle, Looker, and BigQuery for New Jersey Cybersecurity and Communications Integration Cell||View Abstract||View Poster|
|Emma Van Hoogmoed||University of California, Davis||Comparing network obfuscation methods for Moving Target Defense (MTD) show significant performance impact on applications depending on the size of the network and the traffic demand on the network.||View Abstract||View Poster|
|Daniel Wallace||University of California, Berkeley||Artificial Intelligence Is Poised to Have Destabilizing Effects on the Cybersecurity Landscape.
||View Abstract||View Poster|