top of page

Accepted Papers  

 
The list will continue to be updated until the end of May.
​
  • #0192: Chaitanya Rahalkar (Georgia Institute of Technology) and Anushka Virgaonkar (Georgia Institute of Technology) , "Summarizing and Analyzing the Privacy-Preserving Techniques in Bitcoin and other Cryptocurrencies"

​​

  • #0927: Moses Ndebugre (North Carolina A&T State University), Mahmoud Nabil (North Carolina A&T State University), Ahmad Patooghy (North Carolina A&T State University), and Abdolhossein Sarrafzadeh (North Carolina A&T State University), "A Comprehensive Software Vulnerability Dataset Based on OWASP Top Ten Standard"

​​​

  • #1275: Madeline Moran (Loyola University Chicago), Joshua Honig (Loyola University Chicago), Nathan Ferrell (Loyola University Chicago), Shreena Soni (Loyola University Chicago), Sophia Homan(Loyola University Chicago), Eric Chan-Tin(Loyola University Chicago) and Mohammed Abuhamad (Loyola University Chicago), "Encrypted Network Traffic Analysis: To Website Fingerprinting and Beyond"

​​​

  • #1625: Banafsheh Adami (West Virginia University) and Nima Karimian (West Virginia University), "GRU-AUNet: A Domain Adaptation Framework for Contactless Fingerprint Presentation Attack Detection"

​​

  • #2184:  Arjun Sudheer (San Jose State University), Ayesha Ahmed (University of Michigan), Fabio Di Troia (San Jose State University), and Younghee Park (San Jose State University) , "Improving Zero-Day Malware Detection with Diffusion"

​​

  • #2414: Sebastian Alexis (Northwood High School), "A Novel Approach to the Detection and Isolation of Stegomalware in PDFs Using Kolmogorov Complexity"

​​

  • #2780: Austin Erwin-Martinetti (San Jose State University) and Amith Kamath Belman (San Jose State University), "Inter-Device User Keystroke Analysis"

 

  • #3088: Wael Alsabbagh (University of Technology Cottbus-Senftenberg, Leibniz-Institut für innovative Mikroelektronik), Chaerin Kim (University of Technology Cottbus-Senftenberg, Leibniz-Institut für innovative Mikroelektronik), Bahij Sayegh (University of Technology Cottbus-Senftenberg), and Peter Langendoerfer (University of Technology Cottbus-Senftenberg, Leibniz-Institut für innovative Mikroelektronik) , "FeatNet-IDS: Anomaly Detection based-Features for Industrial Internet of Things Systems"

 

  • #3180: Helen Liu (University of Washington), Summer McCune (University of Kentucky), Quang Duy Tran (San Jose State University), Fabio Di Troia (San Jose State University), and Younghee Park (San Jose State University), "Extending Natural Language Processing Tokenization Methods for Malware Detection with Context Extraction"

 

  • #3263: Arnold Spantzel (Brigham Young University) and Adelheid Spantzel (Folsom Lake College), "Specialized Language Models for Combating Audio and Video"

 

  • #3617: Reza Soosahabi (Keysight Technologies Inc.) and Rakesh Seal (Keysight Technologies Inc.) , "Helol Tunnel: Covert Channel Exploitation of TLS Extensibility & Privacy Features"

 

  • #3693: Oladele Afolalu (Durban University of Technology) and Mohohlo Tsoeu (Durban University of Technology) , "A Novel Security Solution for Efficient Connectivity in Software-Defined Wide Area Network (SD-WAN)"

 

  • #3998: Saleh Darzi (University of South Florida) and Attila Yavuz (University of South Florida), "SLAP: Secure Location-proof and Anonymous Privacy-preserving Spectrum Access"

 

  • #4788: Chaitanya Rahalkar and Anushka Virgaonkar, "Evolution of the Tor Network: An Empirical Analysis of Usage Patterns and Infrastructure

 

  • #6073: Saleh Darzi (University of South Florida) and Attila Yavuz (University of South Florida), "SyntheticPop: Attacking Speaker Verification Systems With Synthetic VoicePops"

 

  • #6550: Hrishikesh Dahale, "Investigating UXSS Vulnerabilities in Modern Web Browsers"

 

  • #7041: Aidan Jones (San Jose State University), Ankita Jaswal (San Jose State University), Regenel Anastacio (San Jose State University), Arpitha Srinivas (San Jose State University), and Mahima Agumbe Suresh (San Jose State University), "Cyber-Security Dashboard: An Extensible Intrusion Detection System for Distributed Controls Systems"

 

  • #7077: Dipankar Saha (Independent Researcher), Bhushan Bhimrao Chavan (Independent Researcher), and Vishalkumar Langaliya (SSR College of Arts) , "Clickjacking in the Modern Era: Analyzing Emerging Attack Vectors and Advanced Defense Strategies

 

  • #7230: Noah Loke (Cal Poly Pomona) , Vaibhav Bajpai (Independent Researcher), and Tingting Chen (Cal Poly Pomona), "CELS (Crystalline Encryption Layered Security): A Security Extension of Messaging Applications using Post-Quantum Cryptography"

 

  • #7603: Pranav Gangwani (Florida International University), Alexander Perez-Pons (Florida International University), and Himanshu Upadhyay (Florida International University), "A Comparative Study of Trust Management Models for Security Enhancement in Wireless Sensor Networks"

 

  • #8360: Umesh Yadav (The University of Toledo), Suman Niroula (Youngstown State University), Gaurav Kumar Gupta (Youngstown State University), and Bicky Yadav (Islington College) , "Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50"

 

  • #8721: Dianne Lopez (Cal Poly Pomona), Michael Tang (Cal Poly Pomona), Nathan Lee (Cal Poly Pomona), and Mohammad Iftekhar Husain (Cal Poly Pomona) , "UAV/Drone Detection and Classification Using Radio Frequency Machine Learning"

 

  • #9115: Qaiser Khan (University of Colorado), Sourav Purification (University of Colorado), Rono Cheruiyot (University of Colorado), Jinoh Kim (Texas A&M University), Ikkyun Kim, (Electronics and Telecommunications Research Institute), and Sang-Yoon Chang (University of Colorado) , "Post-Quantum Digital Signature and Authentication for eSIM in 5G Mobile Networking"

 

  • #9819: Nathan Armstrong (University of Wolverhampton) and Thomas Hartley (University of Wolverhampton), "Artificially Insecure: Examining GitHub Copilot’s AI-based Vulnerability Prevention System"

​​

  • #5213: Kiarash Ahi and Saeed Valizadeh, "Large Language Models (LLMs) and Generative AI in Cybersecurity and Privacy: A Survey of Dual-Use Risks, AI-Generated Malware, Explainability, and Defensive Strategies"

Sponsorship 

Please contact at event.manager AT svcsi.org if your company is interested in supporting the events.

GOLD SPONSORS 
SILVER SPONSORS
Juniper_Networks-rgb-black.png
BRONZE SPONSORS 
adobe.png
PARTNERS
MetaCTFpng.png

SVCSI is a 501(c)(3) non-profit organization (Public Charity).

Donate today!

golden-svcsi.webp
bottom of page