Cybersecurity Visiting Student Research (CyberVSR) Program 2020

* Sponsored by Global Cybersecurity Institute and RIT Global

Purpose: Provide undergraduate and graduate students in the United States and internationally to

  • gain research experiences in the broad area of cybersecurity with RIT faculty and peers of complementary skillsets and experiences, and
  • immerse in an inclusive and culturally enriched and diverse environment for personal and professional development.

Program: Summer 2020 was held virtually (June 1 to August 7, 2020) due to COVID-19

  • Research Mentorship with Faculty Advisor(s)
  • Weekly CyberVSR Research Seminar:
    • Student-led panel presentations, break-out discussions, and critical analysis summary.
  • Weekly CyberVSR Tiger Tea Hour:
    • Social hour for students to share local cultures (arts, food, music, traditions, stories, games, etc.) and to explore common interest groups.
  • RIT Tiger Enrichment Workshops:
    • Professional and personal enrichment opportunities, such as personal branding, diversity from different cultural perspectives, and soft skills

CyberVSR Class of 2020:

  • Konrad Sniatala (Poznan University of Technology, Poland): Data Security for Wearable Health Devices Monitoring Vital Signs
  • Azqa Nadeem (TU Delft, Netherlands): Characterizing and Comparing Attacker Strategies in IDS Alert Sequences
  • Martin Kinkead (Queen’s University Belfast, United Kingdom):  Deep Learning Obfuscation in Android
  • Andrea Corsini (Universit`a di Modena e Reggio Emilia, Italy): Exploring the use of RNN to Identify Malicious Network Flows
  • Sudheendra Raghav Neela (Mahindra Ecole Centrale, India): Evaluating the DyanFlow defense with Website Fingerprinting
  • Marcus Chang (National Taiwan University, Taiwan): Introduction and demo about SparkFHE
  • Sahil Gogna (Rochester Institute of Technology, USA): An investigation of security aspects of CNNs in PIM-related architectures
  • Daman Morris (Rochester Institute of Technology, USA): Private Evaluation of Encrypted IDS Rules
  • Yu-Ting Hsu (National Taiwan University, Taiwan): Prioritize Attack Models with Active Learning? A Preliminary Study
  • Adisree Ankolekar (Rochester Institute of Technology, USA): Zeek: Overview and ML Use-cases
  • Rohan Russel Nedungadi (Mahindra Ecole Centrale, India): Zeek: A Demo and Lessons Learned
  • Arisa Cowe (Harvey Mudd College, USA): Dynamic Analysis of Malware Using Cuckoo Sandbox
     

Class of 2020 Zoom image  ​

Questions and Inquires: