Posters

file

Visible to the public Accelerating Block Propogation in PoW Blockchain Networks with Pipelining and Chunking (PiChu)

Kaushik Ayinala is a Ph.D. student of Computer Networks and Communication Systems department at the University of Missouri - Kansas City.
file

Visible to the public Vulnerability Trends in Web Servers and Browsers

Raghu Kacker is a mathematical statistician in the Mathematical and Computational Sciences Division (MCSD) of the Information Technology Laboratory (ITL) of the National Institute of Standards and Technology (NIST). He received his Ph.D. in statistics from the Iowa State University in 1979. Dr.
file

Visible to the public How to Swap Instructions Midstream: An Embedding Algorithm for Program Steganography

Ryan Gabrys is a scientist at the Naval Information Warfare Center Pacific. His research interests include theoretical computers science with applications to cyber security and information storage. 
file

Visible to the public Improving Architectures for Automating Network Security Using Specification-Based Protocols

Khir Henderson is a Doctor of Engineering candidate (D.Eng) at Morgan State Univesity located in Baltimore Maryland under the guidance of his advisor Kevin Kornegay.
file

Visible to the public Building a Conceptual Framework for Ethical Hacking

Rebecca Labitt, Asher Rodriguez and Daniel Alexandre are computer science students at Simmons University in Boston. All three students are currently working on undergraduate research opportunities with the CyberBits Ethical Hacking Research Group at Simmons University with Dr. Lauren E.
file

Visible to the public Time Series Anomaly Detection in Medical Break The Glass

Qais Tasali is a Ph.D candidate at Kansas State University. His doctoral research is focused on access control in medical cyber-physical systems. He is also interested in computer communications (networks), distributed computing and information security.
file

Visible to the public An Infrastructure for Faithful Execution of Remote Attestation Protocols

Adam Petz is a PhD student in Computer Science at the University of Kansas under the guidance of his advisor, Dr. Perry Alexander.  Adam's broad research interests include formal methods, programming language semantics, functional programming, trusted computing, and computer security.
file

Visible to the public Using Intel SGX to Improve Private Neural Network Training and Inference

Ryan Karl is a 3rd year graduate student in the Department of Computer Science and Engineering at The University of Notre Dame.  He is broadly interested in Theoretic/Applied Cryptography and Computer Security, and focuses on leveraging trusted computing platforms to provide practical s
file

Visible to the public Decentralized Backup and Recovery of TOTP Secrets

Conor Gilsenan, is doctoral student in Computer Science at the University of California, Berkeley. His research encompasses usable security and privacy and he is specifically interested in building tools to help people overcome the inherent usability challenges in authentication and account recovery systems.
file

Visible to the public An seL4-based Architecture for Layered Attestation

Grant Jurgensen is a Master's student at the University of Kansas, working under Dr. Perry Alexander. His research interests include formal methods, secure systems, and programming languages.