Each year RSA Conference Security Scholar hosts scholars from select universities. Many of these select scholars will share their current research with attendees at a poster board exhibition on Wednesday, June 8 from 12:25 - 1:15 PM PT.
Drop by, provide feedback and meet the RSAC Security Scholar Class of 2022!
Scholar | University | Presentation | ||
---|---|---|---|---|
Maxwell Bland | University of Illinois, Urbana Champaign | The ability to execute code in an emulator is a fundamental part of modern vulnerability testing. Unfortunately, this process often has a significant reverse engineering overhead; to address this, we present Jetset, a system for automatically generating hardware peripherals models and booting closed-source embedded systems in an emulator (QEMU). | View Abstract | View Poster |
Nyteisha Bookert |
North Carolina Agricultural and Technical State University | Will Examining Internet of Medical Things (IoMT) devices in the smart home environment reveal new privacy threats? | View Abstract | View Poster |
Arshi Chadha | Carnegie Mellon University | Security CTF Problems for Beginning Developers of Low-Resource Real-Time Embedded Systems Software Thesis Advisor- Maverick Woo (CyLab) | View Poster | |
Yunfei Ge | New York University | Towards Strategic Zero-Trust With Dynamic Game Theory: A Quantitative Approach |
View Abstract | View Poster |
Shinelle Hutchinson | Purdue University | Recent wearable technology have been shown to leak more than just users’ heart rates. The recovery of Personal Internet-of-Things (PIoT) data during forensic investigations can lead to fine-grained user attribution. | View Abstract | View Poster |
Annabelle Klosterman | Dakota State University | Influencing Underserved Communities While Building Our Cybersecurity Workforce | View Abstract | View Poster |
William Luca | Carnegie Mellon University | Observing Tor traffic can provide insights into impending cyber campaigns. The collection infrastructure provides a base for a predictive model and proactive security solution for organizations. | View Abstract | View Poster |
Mohammad Meraj Mirza | Purdue University | Integrating Cybersecurity, Cyber Forensics, Cyber Threat Intelligence and Geospatial technologies and techniques into a multidisciplinary approach allowed us to better understand the present gaps and limitations of defense systems against emerging air-breathing threats | View Abstract | View Poster |
Danielle Murad Waiss | Columbia University | Cyber norm creation is driven by the major alliance blocks that often pose opposing visions for the cyber domain. As a result smaller cyber powers hedge their bets by toeing the line between both blocks. | View Abstract | View Poster |
Meghna Pancholi | Columbia University | Crafting security policies is tedious and error-prone. Timeloops generates security policies automatically. | View Abstract | View Poster |
Taylor Rainey | University of California, Berkeley | Surveillance Technology Used In Modern Communication Devices Potentially Infringes on Vulnerable Incarcerated Prison Population’s Privacy & Poses Security Risk | View Abstract | View Poster |
Vivek Rajan | Rutgers University | Cybersecurity Dashboards Utilizing Chronicle, Looker, and BigQuery for New Jersey Cybersecurity and Communications Integration Cell | View Abstract | View Poster |
Emma Van Hoogmoed | University of California, Davis | Comparing network obfuscation methods for Moving Target Defense (MTD) show significant performance impact on applications depending on the size of the network and the traffic demand on the network. | View Abstract | View Poster |
Daniel Wallace | University of California, Berkeley | Artificial Intelligence Is Poised to Have Destabilizing Effects on the Cybersecurity Landscape. |
View Abstract | View Poster |