Each year RSA Conference Security Scholar hosts scholars from select universities. Scholars have the chance to share their own insights and research at the RSAC Security Scholar poster board exhibition.
Scholar | University | Presentation | |
---|---|---|---|
Kshitiz Aryal | Tennessee Tech University | Enhancing Adversarial Evasion Strategies in Windows PE Malware: A Novel Code-Cave Injection Approach | View Poster & Abstract |
Jacob Blindenbach | Columbia University | SQUiD: Ultra-Secure Storage and Analysis of Genetic Data for the Advancement of Precision Medicine | View Poster & Abstract |
Trinity Chung | UC Berkeley | The Medium is the Message: Secure Messaging Apps Leak Sensitive Data to Push Notification Services | View Poster & Abstract |
Elizabeth Chwialkowski | Embry-Riddle Aeronautical University | Measuring the Impact a Cyberattack on Air Traffic Control Systems has to Airspace Safety and Air Traffic Controllers | View Poster & Abstract |
Aditya Desai | Carnegie Mellon University | MITRE Embedded CTF 2023 Design and Highlights | View Poster & Abstract |
Jiin Jeong | Carnegie Mellon University | What Elite Hackers Do Differently: A Cross-Cultural Study of Cybersecurity Education in Korea, China, and the USA | View Poster & Abstract |
Deep Inder Mohan | School of Cybersecurity & Privacy, Georgia Institute of Technology | Brute-Force Resistant Biometric Cryptosystem: Achieving Memory-less Authentication and Secure File Storage with Fuzzy Vaults & OPRFs | View Poster & Abstract |
Marko Morrison | University of Washington Bothell | The Blueprint For An Aggressive, Innovative Cyber Deception Operation | View Poster & Abstract |
Justin Mott | Brigham Young University | Evaluating Blue Team Training Exercises Using MITRE ATT&CK | View Poster & Abstract |
Lucien (Ka Lok) Ng | Georgia Institute of Technology | Garbled Circuit Lookup Tables: Garbling a Truth Table without Garbling its Rows | View Poster & Abstract |
Tahseen Rabbani | University of Maryland, College Park | Watermarks for Generative Imagery Can be Defeated using Open-Source AI | View Poster & Abstract |
Ansuv Sikka | University of California - Berkeley | Environmental Impact Study: The effects of Crypto-mining malware on our environment | View Poster & Abstract |
Rose Stanphill | Virginia Polytechnic Institute and State University | Hybrid Optimization Algorithm for the Selection of Interplanetary Free-Return Gravity Assists | View Poster & Abstract |
Uma Vatsa | School of Political and International Affairs, Columbia University | Behavioral Science Based Framework to Reduce Human Error in Cyberspace | View Poster & Abstract |
Scholar | University | Presentation | |
---|---|---|---|
Kestrel Carlough | Embry-Riddle Aeronautical University | Assessing Aviation Cyber Security: General Aviation Crew Aids | View Poster & Abstract |
Medha Durisheti |
Virginia Tech |
Being Able to Compute Information Securely on Dishonest and Colluding Servers | View Poster & Abstract |
Ekzhin Ear |
University of Colorado, Colorado Springs |
TEMPS: Enhancing Decision-making in Cyber Operations | View Poster & Abstract |
Julio Poveda |
University of Maryland |
English Smishers Are More “Creative” Than Spanish Smishers | View Poster & Abstract |
Lopamudra Praharaj |
Tennessee Technological University |
Offline Reinforcement Learning for Effective Access Control | View Poster & Abstract |
Jarrod Ragsdale |
University of Texas at San Antonio |
Live Threat Engagement and Data Collection using Honeynets | View Poster & Abstract |
Pratik Sarkar | Boston University |
PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries with Full Security | View Poster & Abstract |
Miloš Stanković |
Purdue University |
Ring of Knowledge | View Poster & Abstract |
Maryna Veksler |
Florida International University |
Using CNN Ensemble Network Based on Positional Patches | View Poster & Abstract |
Weijia Yan |
Carnegie Mellon University |
Breaking Barriers: Increasing Diversity in CTF Competitions |
View Poster & Abstract |