Security Scholar Poster Boards


Each year RSA Conference Security Scholar hosts scholars from select universities. Scholars have the chance to share their own insights and research at the RSAC Security Scholar poster board exhibition.
Scholar University Presentation  
Kshitiz Aryal Tennessee Tech University Enhancing Adversarial Evasion Strategies in Windows PE Malware: A Novel Code-Cave Injection Approach View Poster & Abstract
Jacob Blindenbach Columbia University SQUiD: Ultra-Secure Storage and Analysis of Genetic Data for the Advancement of Precision Medicine View Poster & Abstract
Trinity Chung UC Berkeley The Medium is the Message: Secure Messaging Apps Leak Sensitive Data to Push Notification Services View Poster & Abstract
Elizabeth Chwialkowski Embry-Riddle Aeronautical University Measuring the Impact a Cyberattack on Air Traffic Control Systems has to Airspace Safety and Air Traffic Controllers View Poster & Abstract
Aditya Desai Carnegie Mellon University MITRE Embedded CTF 2023 Design and Highlights View Poster & Abstract
Jiin Jeong Carnegie Mellon University What Elite Hackers Do Differently: A Cross-Cultural Study of Cybersecurity Education in Korea, China, and the USA View Poster & Abstract
Deep Inder Mohan School of Cybersecurity & Privacy, Georgia Institute of Technology Brute-Force Resistant Biometric Cryptosystem: Achieving Memory-less Authentication and Secure File Storage with Fuzzy Vaults & OPRFs View Poster & Abstract
Marko Morrison University of Washington Bothell The Blueprint For An Aggressive, Innovative Cyber Deception Operation View Poster & Abstract
Justin Mott Brigham Young University Evaluating Blue Team Training Exercises Using MITRE ATT&CK View Poster & Abstract
Lucien (Ka Lok) Ng Georgia Institute of Technology Garbled Circuit Lookup Tables: Garbling a Truth Table without Garbling its Rows View Poster & Abstract
Tahseen Rabbani University of Maryland, College Park Watermarks for Generative Imagery Can be Defeated using Open-Source AI View Poster & Abstract
Ansuv Sikka University of California - Berkeley Environmental Impact Study: The effects of Crypto-mining malware on our environment View Poster & Abstract
Rose Stanphill Virginia Polytechnic Institute and State University Hybrid Optimization Algorithm for the Selection of Interplanetary Free-Return Gravity Assists View Poster & Abstract
Uma Vatsa School of Political and International Affairs, Columbia University Behavioral Science Based Framework to Reduce Human Error in Cyberspace View Poster & Abstract
Scholar University Presentation  
Kestrel Carlough Embry-Riddle Aeronautical University Assessing Aviation Cyber Security: General Aviation Crew Aids  View Poster & Abstract
Medha Durisheti

Virginia Tech

Being Able to Compute Information Securely on Dishonest and Colluding Servers View Poster & Abstract

Ekzhin Ear

University of Colorado, Colorado Springs

TEMPS: Enhancing Decision-making in Cyber Operations View Poster & Abstract

Julio Poveda

University of Maryland

English Smishers Are More “Creative” Than Spanish Smishers View Poster & Abstract

Lopamudra Praharaj

Tennessee Technological University

Offline Reinforcement Learning for Effective Access Control View Poster & Abstract

Jarrod Ragsdale

University of Texas at San Antonio

Live Threat Engagement and Data Collection using Honeynets View Poster & Abstract
Pratik Sarkar  Boston University  PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries with Full Security View Poster & Abstract 

Miloš Stanković

Purdue University

Ring of Knowledge View Poster & Abstract

Maryna Veksler

Florida International University

Using CNN Ensemble Network Based on Positional Patches View Poster & Abstract

Weijia Yan

Carnegie Mellon University

Breaking Barriers: Increasing Diversity in CTF Competitions

View Poster & Abstract