Security Scholar Poster Boards


Each year RSAC™ Security Scholar hosts scholars from select universities. Scholars have the chance to share their own insights and research at the RSAC™ Security Scholar poster board exhibition.
Scholar University Presentation  
Varoon Bashyakarla University of California, Berkeley QR Code Phishing Safety Checks May Improve Security Outcomes, but Positive Reinforcement Messaging Does Not View Poster & Abstract
Rohil Chaudhry Carnegie Mellon University Identification and Analysis of Emerging Propagation Techniques Utilized by Malware View Poster & Abstract
Megan Chen Boston University An Efficient Straight-line Compiler for Sigma Protocols that enables Universal Composability View Poster & Abstract
Kexin Cui Michigan State University Playing it Safe: Comparing Cyber Hygiene Behaviors of Cybercrime Offenders & Victims View Poster & Abstract
Stavros Dimou Northeastern University Passive and Active Attacks on 5G Lower Layers — O-RAN Compliant Intrusion Detection Framework View Poster & Abstract
Tarang Jain School of International & Public Affairs, Columbia University Building Cyber Resilience in Digitally Emerging Economies in the Global South – Lessons from India and Brazil View Poster & Abstract
Andreas Kellas Columbia University PICKLEBALL: Securely Loading Pickle-based Machine Learning Models View Poster & Abstract
Justin La Zare Embry-Riddle Aeronautical University Safety & Security Risks in Aerospace AI: Evaluating LLM Vulnerabilities in RAG Systems View Poster & Abstract
Martin Makaryan Johns Hopkins School of Advanced International Studies (SAIS) Securing Our Quantum Future: Protecting Quantum Startups from Cyber Espionage View Poster & Abstract
Jean Menard University of Maryland, Global Campus Securing the Supply Chain Against Cyber-Physical Threats: Preventing Sabotage & Tampering in National Security View Poster & Abstract
Katherine Rackliffe Brigham Young University Cloned Voice Messages as Effective as Real Voice Messages in a Phishing Context View Poster & Abstract
Pragathi Durga Rajarajan University of Texas at San Antonio Fast Attack Detection in Internet of Things (IoT) Devices Utilizing Machine Learning & Network Traffic Data View Poster & Abstract
Jose Luis Castanon Remy University of Colorado, Colorado Springs Space Cybersecurity Testbed: Fidelity Framework, Example Implementation & Characterization View Poster & Abstract
Ramamurthy Sundar Rutgers University Formalizing Digital Trust: Evolutionary Reputational Power Dynamics & Probabilistic Game Theory for Governing Decentralized Security View Poster & Abstract
Rohan Viswanathan Carnegie Mellon University Cybersecurity Education Through Capture the Flag (CTF) Competitions View Poster & Abstract
Ya-Ting Yang New York University Understanding, Modeling, and Designing Cognitive Vulnerabilities for Strategic Defense against Advanced Persistent Threats View Poster & Abstract

Scholar University Presentation  
Kshitiz Aryal Tennessee Tech University Enhancing Adversarial Evasion Strategies in Windows PE Malware: A Novel Code-Cave Injection Approach View Poster & Abstract
Jacob Blindenbach Columbia University SQUiD: Ultra-Secure Storage and Analysis of Genetic Data for the Advancement of Precision Medicine View Poster & Abstract
Trinity Chung UC Berkeley The Medium is the Message: Secure Messaging Apps Leak Sensitive Data to Push Notification Services View Poster & Abstract
Elizabeth Chwialkowski Embry-Riddle Aeronautical University Measuring the Impact a Cyberattack on Air Traffic Control Systems has to Airspace Safety and Air Traffic Controllers View Poster & Abstract
Aditya Desai Carnegie Mellon University MITRE Embedded CTF 2023 Design and Highlights View Poster & Abstract
Jiin Jeong Carnegie Mellon University What Elite Hackers Do Differently: A Cross-Cultural Study of Cybersecurity Education in Korea, China, and the USA View Poster & Abstract
Deep Inder Mohan School of Cybersecurity & Privacy, Georgia Institute of Technology Brute-Force Resistant Biometric Cryptosystem: Achieving Memory-less Authentication and Secure File Storage with Fuzzy Vaults & OPRFs View Poster & Abstract
Marko Morrison University of Washington Bothell The Blueprint For An Aggressive, Innovative Cyber Deception Operation View Poster & Abstract
Justin Mott Brigham Young University Evaluating Blue Team Training Exercises Using MITRE ATT&CK View Poster & Abstract
Lucien (Ka Lok) Ng Georgia Institute of Technology Garbled Circuit Lookup Tables: Garbling a Truth Table without Garbling its Rows View Poster & Abstract
Tahseen Rabbani University of Maryland, College Park Watermarks for Generative Imagery Can be Defeated using Open-Source AI View Poster & Abstract
Ansuv Sikka University of California - Berkeley Environmental Impact Study: The effects of Crypto-mining malware on our environment View Poster & Abstract
Rose Stanphill Virginia Polytechnic Institute and State University Hybrid Optimization Algorithm for the Selection of Interplanetary Free-Return Gravity Assists View Poster & Abstract
Uma Vatsa School of Political and International Affairs, Columbia University Behavioral Science Based Framework to Reduce Human Error in Cyberspace View Poster & Abstract
Scholar University Presentation  
Kestrel Carlough Embry-Riddle Aeronautical University Assessing Aviation Cyber Security: General Aviation Crew Aids  View Poster & Abstract
Medha Durisheti

Virginia Tech

Being Able to Compute Information Securely on Dishonest and Colluding Servers View Poster & Abstract

Ekzhin Ear

University of Colorado, Colorado Springs

TEMPS: Enhancing Decision-making in Cyber Operations View Poster & Abstract

Julio Poveda

University of Maryland

English Smishers Are More “Creative” Than Spanish Smishers View Poster & Abstract

Lopamudra Praharaj

Tennessee Technological University

Offline Reinforcement Learning for Effective Access Control View Poster & Abstract

Jarrod Ragsdale

University of Texas at San Antonio

Live Threat Engagement and Data Collection using Honeynets View Poster & Abstract
Pratik Sarkar  Boston University  PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries with Full Security View Poster & Abstract 

Miloš Stanković

Purdue University

Ring of Knowledge View Poster & Abstract

Maryna Veksler

Florida International University

Using CNN Ensemble Network Based on Positional Patches View Poster & Abstract

Weijia Yan

Carnegie Mellon University

Breaking Barriers: Increasing Diversity in CTF Competitions

View Poster & Abstract