Posters

file

Visible to the public Resilient Multi Robot Target Pursuit

Jiani Li is currently working toward the Ph.D. degree with the Electrical Engineering and Computer Science Department, Vanderbilt University, Nashville, TN, USA.
file

Visible to the public Exploiting DRAM Bank Mapping and HugePages for Effective Denial-of-Service Attacks on Shared Cache in Multicore

Michael Bechtel is a Computer Science Ph.D. student at the University of Kansas. His current research interests include embedded real-time systems, microarchitectural security and machine learning applications.
file

Visible to the public An Uncertain Graph-based Approach for Cyber-security Risk Assessment

Hoang Hai Nguyen (Frank) is a Ph.D. candidate in the Department of Electrical and Computer Engineering at the University of Illinois at Urbana-Champaign (UIUC). He also holds a research assistantship at the Coordinated Science Laboratory, UIUC, under the direction of professor David M. Nicol.
file

Visible to the public Do Configuration Management Tools Make Systems More Secure? An Empirical Research Plan

Md Rayhanur Rahman has started his Ph.D. program in the department of Computer Science at North Carolina State University. His research interest is in the area of Software Engineering and Software Security. He works under the supervision of Dr. Laurie Williams.
file

Visible to the public Toward Just-in-Time Patching for Containerized Applications

Olufogorehan (Fogo) Tunde-Onadele is a PhD student at North Carolina State University with research interests in Machine Learning and Security.
file

Visible to the public A Raspberry Pi Sensor Network for Wildlife Conservation

Authors

Andrew Arnold is a cadet at the United States Military Academy. He is earning his undergraduate degree in Computer Science. He has branched Medical Service and will serve as a medical evacuation pilot.

file

Visible to the public Application of the Armament Cyber Assessment Framework

 

Aidan McCarthy is a senior at the United States Military Academy from Lexington, Massachusetts. He is majoring in Computer Science with a focus in cybersecurity. He is an OSCP and leads the Cadet Competitive Cyber Team. After graduation, Aidan will commission as an officer in the United States Army Cyber Corps. 
 

 

 

file

Visible to the public A Curated Dataset of Security Defects in Scientific Software Projects

Justin Murphy is a senior fast-track student at Tennessee Tech University majoring in Computer Science concentrating in Cybersecurity. He is actively involved with CEROC at Tennessee Tech and serves as the lead for the Capture the Flag (CTF) Cyber Interest Group.
file

Visible to the public Tokens Of Interaction: Psycho-physiological Signals, A Potential Source of Evidence of Digital Incidents

Nancy Mogire is a PhD candidate at UH Manoa’s information and computer sciences department, affiliated with the Hawaii Interdisciplinary Neurobehavioral & Technology Lab(HINTLab) and the Adaptive Security and Economics Lab(ASECOLab).

file

Visible to the public A Preliminary Taxonomy of Techniques Used in Software Fuzzing

Raunak Shakya is a graduate student at the Department of Computer Science at Tennessee Tech University. He graduated from Institute of Engineering at Tribhuvan University, Nepal with a bachelors degree in Engineering in 2013.