Each year RSAC™ Security Scholar hosts scholars from select universities. Scholars have the chance to share their own insights and research at the RSAC™ Security Scholar poster board exhibition.
Scholar | University | Presentation | |
Varoon Bashyakarla | University of California, Berkeley | QR Code Phishing Safety Checks May Improve Security Outcomes, but Positive Reinforcement Messaging Does Not | View Poster & Abstract |
Rohil Chaudhry | Carnegie Mellon University | Identification and Analysis of Emerging Propagation Techniques Utilized by Malware | View Poster & Abstract |
Megan Chen | Boston University | An Efficient Straight-line Compiler for Sigma Protocols that enables Universal Composability | View Poster & Abstract |
Kexin Cui | Michigan State University | Playing it Safe: Comparing Cyber Hygiene Behaviors of Cybercrime Offenders & Victims | View Poster & Abstract |
Stavros Dimou | Northeastern University | Passive and Active Attacks on 5G Lower Layers — O-RAN Compliant Intrusion Detection Framework | View Poster & Abstract |
Tarang Jain | School of International & Public Affairs, Columbia University | Building Cyber Resilience in Digitally Emerging Economies in the Global South – Lessons from India and Brazil | View Poster & Abstract |
Andreas Kellas | Columbia University | PICKLEBALL: Securely Loading Pickle-based Machine Learning Models | View Poster & Abstract |
Justin La Zare | Embry-Riddle Aeronautical University | Safety & Security Risks in Aerospace AI: Evaluating LLM Vulnerabilities in RAG Systems | View Poster & Abstract |
Martin Makaryan | Johns Hopkins School of Advanced International Studies (SAIS) | Securing Our Quantum Future: Protecting Quantum Startups from Cyber Espionage | View Poster & Abstract |
Jean Menard | University of Maryland, Global Campus | Securing the Supply Chain Against Cyber-Physical Threats: Preventing Sabotage & Tampering in National Security | View Poster & Abstract |
Katherine Rackliffe | Brigham Young University | Cloned Voice Messages as Effective as Real Voice Messages in a Phishing Context | View Poster & Abstract |
Pragathi Durga Rajarajan | University of Texas at San Antonio | Fast Attack Detection in Internet of Things (IoT) Devices Utilizing Machine Learning & Network Traffic Data | View Poster & Abstract |
Jose Luis Castanon Remy | University of Colorado, Colorado Springs | Space Cybersecurity Testbed: Fidelity Framework, Example Implementation & Characterization | View Poster & Abstract |
Ramamurthy Sundar | Rutgers University | Formalizing Digital Trust: Evolutionary Reputational Power Dynamics & Probabilistic Game Theory for Governing Decentralized Security | View Poster & Abstract |
Rohan Viswanathan | Carnegie Mellon University | Cybersecurity Education Through Capture the Flag (CTF) Competitions | View Poster & Abstract |
Ya-Ting Yang | New York University | Understanding, Modeling, and Designing Cognitive Vulnerabilities for Strategic Defense against Advanced Persistent Threats | View Poster & Abstract |
Scholar | University | Presentation | |
---|---|---|---|
Kshitiz Aryal | Tennessee Tech University | Enhancing Adversarial Evasion Strategies in Windows PE Malware: A Novel Code-Cave Injection Approach | View Poster & Abstract |
Jacob Blindenbach | Columbia University | SQUiD: Ultra-Secure Storage and Analysis of Genetic Data for the Advancement of Precision Medicine | View Poster & Abstract |
Trinity Chung | UC Berkeley | The Medium is the Message: Secure Messaging Apps Leak Sensitive Data to Push Notification Services | View Poster & Abstract |
Elizabeth Chwialkowski | Embry-Riddle Aeronautical University | Measuring the Impact a Cyberattack on Air Traffic Control Systems has to Airspace Safety and Air Traffic Controllers | View Poster & Abstract |
Aditya Desai | Carnegie Mellon University | MITRE Embedded CTF 2023 Design and Highlights | View Poster & Abstract |
Jiin Jeong | Carnegie Mellon University | What Elite Hackers Do Differently: A Cross-Cultural Study of Cybersecurity Education in Korea, China, and the USA | View Poster & Abstract |
Deep Inder Mohan | School of Cybersecurity & Privacy, Georgia Institute of Technology | Brute-Force Resistant Biometric Cryptosystem: Achieving Memory-less Authentication and Secure File Storage with Fuzzy Vaults & OPRFs | View Poster & Abstract |
Marko Morrison | University of Washington Bothell | The Blueprint For An Aggressive, Innovative Cyber Deception Operation | View Poster & Abstract |
Justin Mott | Brigham Young University | Evaluating Blue Team Training Exercises Using MITRE ATT&CK | View Poster & Abstract |
Lucien (Ka Lok) Ng | Georgia Institute of Technology | Garbled Circuit Lookup Tables: Garbling a Truth Table without Garbling its Rows | View Poster & Abstract |
Tahseen Rabbani | University of Maryland, College Park | Watermarks for Generative Imagery Can be Defeated using Open-Source AI | View Poster & Abstract |
Ansuv Sikka | University of California - Berkeley | Environmental Impact Study: The effects of Crypto-mining malware on our environment | View Poster & Abstract |
Rose Stanphill | Virginia Polytechnic Institute and State University | Hybrid Optimization Algorithm for the Selection of Interplanetary Free-Return Gravity Assists | View Poster & Abstract |
Uma Vatsa | School of Political and International Affairs, Columbia University | Behavioral Science Based Framework to Reduce Human Error in Cyberspace | View Poster & Abstract |
Scholar | University | Presentation | |
---|---|---|---|
Kestrel Carlough | Embry-Riddle Aeronautical University | Assessing Aviation Cyber Security: General Aviation Crew Aids | View Poster & Abstract |
Medha Durisheti |
Virginia Tech |
Being Able to Compute Information Securely on Dishonest and Colluding Servers | View Poster & Abstract |
Ekzhin Ear |
University of Colorado, Colorado Springs |
TEMPS: Enhancing Decision-making in Cyber Operations | View Poster & Abstract |
Julio Poveda |
University of Maryland |
English Smishers Are More “Creative” Than Spanish Smishers | View Poster & Abstract |
Lopamudra Praharaj |
Tennessee Technological University |
Offline Reinforcement Learning for Effective Access Control | View Poster & Abstract |
Jarrod Ragsdale |
University of Texas at San Antonio |
Live Threat Engagement and Data Collection using Honeynets | View Poster & Abstract |
Pratik Sarkar | Boston University |
PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries with Full Security | View Poster & Abstract |
Miloš Stanković |
Purdue University |
Ring of Knowledge | View Poster & Abstract |
Maryna Veksler |
Florida International University |
Using CNN Ensemble Network Based on Positional Patches | View Poster & Abstract |
Weijia Yan |
Carnegie Mellon University |
Breaking Barriers: Increasing Diversity in CTF Competitions |
View Poster & Abstract |