Accepted Posters & Demo Papers
The list will continue to be updated until the end of May.
​
-
#0498: Victor Escuerdo (University of Illinois Chicago), Sergio Talavera (San Jose State University), Gautam Santhanu Thampy (San Jose State University), Ivan Torres (University of Illinois Chicago), Daniel Vega Lojo (San Jose State University), Chris Kanich (University of Illinois Chicago), and Magdalini Eirinaki (San Jose State University) , "Poster: Cloudsweeper: Leveraging Large Language Models to
Personalize Sensitive Archive Search"
​​
-
#0667: Simone Mainardi (Network Security Salesforce, Inc.), Kaushal Bansal (Network Security Salesforce, Inc.), and Prabhat Singh (Network Security Salesforce, Inc.) , "Poster: Entropy and MinHash Fingerprints for Layer-7
Traffic Classification"
​​
-
#1289: M Fatima (Sagar Institute Of Research And Technology), Kalpana Rai (Sagar Institute Of Research And Technology), and Alfiya Jahan (Sagar Institute Of Research And Technology) , "Poster: Cloud AI- Data Breach Detection"
​​
-
#1920:Kelei Zhang (University of Colorado, Fort Hays State University), Amanul Islam (University of Colorado), and Sang-Yoon Chang (University of Colorado) , "Poster: Reinforcement Learning on Tor: Prioritizing Performance
COmpromises Anonymity"
​​
-
#2689: Luciano Maldonado (West Virginia University), Sara Tehranipoor (West Virginia University), and Nima Karimian (West Virginia University), "Poster: A Deep-Learning Approach for ECG-Based Cryptographic Key Generation"
​​
-
#3317: Shaunak Galvankar (Santa Clara University) and Sean Choi (Santa Clara University), "Poster: FortNIC: Secure Container Image Registry on SmartNICs"
​​
-
#3407: Ishan Routray (Bellarmine College Preparatory) and Ashish Kundu (Cisco Research), "Poster: BlinkSecure: Risk-aware Continuous Authentication using
Blink-based CAPTCHA and Face Recognition"
-
#3864: Woorim Han (Seoul National University), Miseon Yu (Seoul National University), Younghan Lee (Sungshin Women’s University), Hyungon Moon (UNIST), and Yunheung Paek (Seoul National University), "Poster: A Case Study on Automated Vulnerability Repair Using Pre-Trained Language Models"
-
#4003: Eva Wilson (Washington University), Cody Ourique (San Jose State University), and Bernardo Flores (San Jose State University), "Poster: Threat Intelligence & Modeling Practices for IoMT
Devices using Wi-Fi Communications"
-
#5202: David Schuster (San José State University), Crystal Fausett (San José State University), Maiyi Huang (San José State University), Sabina M. Patel (Embry-Riddle Aeronautical University), Jenna Korentsides (Embry-Riddle Aeronautical University), Joseph R. Keebler (Embry-Riddle Aeronautical University), and Elizabeth H. Lazzara (Embry-Riddle Aeronautical University), "Poster: Development of Situation Awareness Measurement for Cybersecurity Professionals"
-
#5297: Austin Erwin-Martinetti (San Jose State University) and Amith Kamath Belman (San Jose State University), "Poster: RTOS Security Risks in Telecommunications Hardware"
-
#6136: Joshua Honig (Loyola University), Madeline Moran (Loyola University) , Eric Chan-Tin (Loyola University), and Mohammed Abuhamad (Loyola University) , "Poster: On Website Fingerprinting Defenses and User Tolerances"
-
#7099: Sai Ram Motupalli (Santa Clara University) and Sean Choi (Santa Clara University) , "AI-Driven Security: Investigating LLMs for Automated Vulnerability Detection in Code Contributions"
-
#7483:Tiffany Bao (Boston University), Kylie Trousil (University of Wisconsin), Quang Duy Tran (San Jose State University), Younghee Park (San Jose State University,Silicon Valley Cybersecurity Institute), and Fabio Di Troia (San Jose State University, Silicon Valley Cybersecurity Institute), "Poster: Synthetic Malware Generation using Generative Models"
-
#8911: Emily Wayne (San Jose State University) and Narges Zare (University of North Carolina) "Poster: The Necessity of Designing Effective Trust Indicators for Mobile Communication Applications to Enhance User Security and Confidence"
-
#6550: Hrishikesh Dahale, "Investigating UXSS Vulnerabilities in Modern Web Browsers"
-
#7041: Aidan Jones, Ankita Jaswal, Regenel Anastacio, Arpitha Srinivas and Mahima Agumbe Suresh, "Cyber-Security Dashboard: An Extensible Intrusion Detection System for Distributed Controls Systems"
-
#7077: Dipankar Saha, Bhushan Bhimrao Chavan and Vishalkumar Langaliya, "Clickjacking in the Modern Era: Analyzing Emerging Attack Vectors and Advanced Defense Strategies
-
#7230: Noah Loke, Vaibhav Bajpai and Tingting Chen, "CELS (Crystalline Encryption Layered Security): A Security Extension of Messaging Applications using Post-Quantum Cryptography"
-
#7603: Pranav Gangwani, Alexander Perez-Pons and Himanshu Upadhyay, "A Comparative Study of Trust Management Models for Security Enhancement in Wireless Sensor Networks"
-
#8360: Umesh Yadav, Suman Niroula, Gaurav Kumar Gupta and Bicky Yadav, "Exploring Secure Machine Learning Through Payload Injection and FGSM Attacks on ResNet-50"
-
#8721: Dianne Lopez, Michael Tang, Nathan Lee and Mohammad Iftekhar Husain, "UAV/Drone Detection and Classification Using Radio Frequency Machine Learning"
-
#9115: Qaiser Khan, Sourav Purification, Rono Cheruiyot, Jinoh Kim, Ikkyun Kim and Sang-Yoon Chang, "Post-Quantum Digital Signature and Authentication for eSIM in 5G Mobile Networking"
-
#9819: Nathan Armstrong and Thomas Hartley, "Artificially Insecure: Examining GitHub Copilot’s AI-based Vulnerability Prevention System"
​
-
#9840: Qiwen Xiong (Northeastern University), Yin Sun (Northeastern University), "Poster: Exploring Reinforcement Learning-Based Training Adaptation for Graph Neural Networks"
​​
-
#9990: Shubham Joshi and Junggab Son (University of Nevada Las Vegas) "Interactive Smart Contracts for Trustworthy and Transparent Online Content Consumption Tracking"
​​
-
#2000: Kicho Yu (University of Southern California), "How to detect encrypted vs clear network traffic?"
​
Here is the demo paper list for CyberWarrior 2025 LLM Challenges:
​
-
Lisa Thiongo ,Cassidie Grogan and Christopher Forrester-Jack (Kennesaw State University) "Detecting Malicious QR Codes with LLMs"
​
-
Jianwei Huang (Texas A&M University) "Dynamic Defense Deployment with LLM-assissted Client-side Fuzzing in Web Applications"
​
-
Joseph Gerani, Hei Lam, and Ngoc Minh Chau Ho (SJSU) "Fixing C/C++ Vulnerabilities with LLMs"
​​
-
LLM-Based Browser Extension for Phishing Detection
​
-
Alan Park, Britney Jaculina, and Dimitar Dimitrov (SJSU) " LLM-Based Social Engineering Detection System (LSED)"
​​
-
Arjun Sudheer ,Chia-Hong Chou, Younghee Park (SJSU) and Shubham Kumar(Amazon) "Multi-Agent Network Attack Incident Response System"
​
-
NetLingo : A Protocol-Aware LLM Powered Network Intrusion Detection System
​
-
Tiffany Bao and Tingxuan Tang (Boston University) "PhishSense: A LLM-Enhanced Multimodal Framework for Phishing Website Detection"
​
-
Software Vulnerability Scanner and Remediation Recommender
​
-
Tam n. Nguyen (GSA - FedRAMP) "ViolentUTF as An Accessible Platform for Generative AI Red Teaming"
​