Security Scholar Poster Boards

Each year RSA Conference Security Scholar hosts scholars from select universities. Many of these select scholars will share their current research with attendees at a poster board exhibition on Wednesday, June 8 from 12:25 - 1:15 PM.

Drop by, provide feedback and meet the RSAC Security Scholar Class of 2022!

Scholar University Presentation  
Maxwell Bland University of Illinois, Urbana Champaign The ability to execute code in an emulator is a fundamental part of modern vulnerability testing. Unfortunately, this process often has a significant reverse engineering overhead; to address this, we present Jetset, a system for automatically generating hardware peripherals models and booting closed-source embedded systems in an emulator (QEMU). View Abstract View Poster
Nyteisha Bookert
North Carolina Agricultural and Technical State University  Will Examining Internet of Medical Things (IoMT) devices in the smart home environment reveal new privacy threats?  View Abstract  View Poster
Yunfei Ge  New York University  Towards Strategic Zero-Trust With Dynamic Game Theory: A Quantitative Approach
View Abstract View Poster
Shinelle Hutchinson  Purdue University  Recent wearable technology have been shown to leak more than just users’ heart rates. The recovery of Personal Internet-of-Things (PIoT) data during forensic investigations can lead to fine-grained user attribution.  View Abstract View Poster
Annabelle Klosterman  Dakota State University  Influencing Underserved Communities While Building Our Cybersecurity Workforce  View Abstract View Poster
Mohammad Meraj Mirza Purdue University  Integrating Cybersecurity, Cyber Forensics, Cyber Threat Intelligence and Geospatial technologies and techniques into a multidisciplinary approach allowed us to better understand the present gaps and limitations of defense systems against emerging air-breathing threats  View Abstract View Poster
Danielle Murad Waiss  Columbia University  Cyber norm creation is driven by the major alliance blocks that often pose opposing visions for the cyber domain. As a result smaller cyber powers hedge their bets by toeing the line between both blocks.  View Abstract View Poster
Meghna Pancholi  Columbia University  Crafting security policies is tedious and error-prone. Timeloops generates security policies automatically.  View Abstract View Poster
Taylor Rainey University of California, Berkeley  Surveillance Technology Used In Modern Communication Devices Potentially Infringes on Vulnerable Incarcerated Prison Population’s Privacy & Poses Security Risk  View Abstract  View Poster
Vivek Rajan  Rutgers University  Cybersecurity Dashboards Utilizing Chronicle, Looker, and BigQuery for New Jersey Cybersecurity and Communications Integration Cell  View Abstract View Poster 
Emma Van Hoogmoed   University of California, Davis  Comparing network obfuscation methods for Moving Target Defense (MTD) show significant performance impact on applications depending on the size of the network and the traffic demand on the network.  View Abstract View Poster 
Daniel Wallace  University of California, Berkeley  Artificial Intelligence Is Poised to Have Destabilizing Effects on the Cybersecurity Landscape.
View Abstract View Poster