top of page

Special 
Sessions

We are excited to feature a technical presentation by students, researchers, and industry professionals actively working in cybersecurity

Multimedia

Six Special Sessions at SVCC 2025

Session 1: Poster and Demo Competition on 6/23 (Monday)

Session 2: Industry Speaker Presentation and Industry Expo on 6/24 (Tuesday)

Session 3: Adobe CTF Challenge on 6/24 (Tuesday)

Session 4: Google Gemini Tutorial on 6/24 (Tuesday)

Session 5: AI Cybersecurity on 6/25 (Wednesday) - Check below!

Session 6: Post-Quantum Cryptography on 6/25 (Wednesday) - Check below!

Session 1: Poster and Demo Competition on Monday (6/23) 

Poster Chairs: 
Junggab Son, University of Nevada, Las Vegas

Sean Choi, Santa Clara University​

​​

Demo Chairs: CyberWarrior 2025 - CTF & LLM Challenge
Sang-Yoon Chang, University of Colorado, Colorado Springs

Kelei (Jackie) Zhang, University of Colorado, Colorado Springs/For Hays State University

 

Judges will be announced on June 10, 2025
 

Session 2: Industry Speakers on Tuesday (6/24) 

Session Chairs: 
Nima Karimian, West Virginia University 

Vikrant Nanda, Google
 

We are excited to feature a technical presentation by industry professionals actively working in cybersecurity. During the industry booth session, companies will showcase their security solutions to the audience. Additionally, industry experts will take the stage to share their insights and experiences in cybersecurity. The detailed information will be available through the conference brochure. 
 

Session 5: AI Security on Wed. (6/25) 

Session Chairs: 
Sara Tehranipoor, West Virginia University

Younghee Park, SVCSI/San Jose State University

Session 6: Post-quantum Cryptography on Wed. (6/25)

Session Chairs:
Sang-Yoon Chang, Professor in CS, University of Colorado, Colorado Springs
Manohar Raavi, Assistant Professor in CS, Kennesaw State University

Talk Title #1:

Overview of Post-Quantum Cryptography and Hands-on Demonstration

Speaker Name: Manohar Raavi, Assistant Professor in CS, Kennesaw State University
Abstract: Public-key cryptography is widely used to ensure the confidentiality and integrity of digital networking communications. Recent advancements in quantum computing and the availability of Shor’s algorithm require transitioning to adopting post-quantum cryptography (PQC) and replacing classical public-key algorithms. This talk will focus on two PQC sessions. In the first session, we will explore the motivation behind PQC, its foundational concepts, and an overview of the current landscape. Then, in the second session, we will give a demo/hands-on experience using open-source libraries. Whether new to PQC or looking to deepen your understanding, this talk aims to provide valuable insights and practical knowledge!
Short Bio: Manohar Raavi is currently working as an Assistant Professor at the Department of Computer Science at Kennesaw State University. His research interests include Post-Quantum Cryptography, Applied Cryptography, Security & Privacy, and Wireless Security. He received his Bachelor’s degree from JNTUK-UCEV in 2015, his Master’s degree from Oklahoma State University in 2017, and his Ph.D. from the University of Colorado at Colorado Springs in 2023. He has industry experience as a Network Engineer at enterprise and global-level companies.

Talk Title #3:

NIST Post-Quantum Cryptography Standardization

Speaker Name: Lily Chen, NIST
Abstract: Quantum computers will undermine current cryptographic defenses. This presentation introduces the NIST Post-Quantum Cryptography (PQC) Standardization project. It reviews the progress made in the past eight years and provides an update on the status. The presentation highlights the importance of standardizing post-quantum cryptography and discusses strategies for achieving cybersecurity in the quantum era.
Short Bio: Dr. Lily Lidong Chen is a mathematician and NIST fellow. She served as the manager of Cryptographic Technology Group for more than a decade before she was selected as a NIST fellow in 2023. She is a pioneer in developing post-quantum cryptography standards. Her research interests include cryptography, network security, and security in communications. Dr. Chen has actively contributed to cryptographic and security standards development by IEEE-SA, ISO, and other standards organizations. Her co-authored book “Communication System Security” was published in 2012 by CRC Press, Taylor & Francis Group, and used as a textbook for relevant undergraduate and graduate courses.
​​​​​​​​​​​​​​

Talk Title #5:

The Quantum Buffer

Speaker Names: Anna Johnston & Puru Kulkarni, Juniper Networks Inc. 
Abstract: The threat of a Cryptographically Relevant Quantum Computer (CRQC) has been driving governments and industry to replace classical public key algorithms with Shor- resistant algorithms. These algorithms come with their own set of threats. Their underlying problems have not been analyzed as extensively as classical public key foundations, therefore, the probability of unforeseen catastrophic attacks is much higher. This talk introduces the concept of a “Quantum Buffer”. A Quantum Buffer modifies the most agile of classical algorithms to increase their security, giving the research community more time to study both quantum and classical threats, giving the research community more time before settling for costly and potentially weak alternatives.
Short Bios: Anna Johnston is a cryptographic researcher at Juniper Networks with over 30 years of experience in government (NSA), academia (Washington State University, Johns Hopkins University, Dublin City University), national laboratories (Sandia National Labs, Institute for Defense Analyses, Claude Shannon Institute) and industry (Raytheon, Juniper), in the US and overseas. Throughout her career, she worked in the mathematical and computer science areas of cryptography. Her research includes finding and proving new hard problems for the foundations of cryptographic algorithms, designing new techniques for generating and exchanging 'provable primes', and creating new algorithms for error correction. She is particularly interested in the interaction of error correction codes and data compression on encryption. Dr. Johnston holds a PhD in information security from the University of London (RHUL) and an MS in Operations Research from George Washington University.
Purushottam “Puru” Kulkarni is a Staff Engineer with the Cybersecurity Research & Development group at Juniper Networks, Inc. Puru has worked extensively in the development and implementation of custom cryptographic modules, randomizers, algorithms, and protocols. Puru holds a Master’s degree in Security Informatics (2018) from the Johns Hopkins University Information Security Institute. Puru also holds a patent in Cryptographic Random Data Generation, and has led Juniper Networks’ efforts to achieve FIPS 140 certifications for their Linux cryptographic module.

Talk Title #2: 

Lattice-Based Standards -- An Introduction

​Speaker Name: Jonathan Katz, Senior Staff Research Scientist, Google
Abstract: This tutorial will provide an introduction to two recent "post-quantum cryptography" standards issued by NIST. The primary focus will be on the public-key encryption core of FIPS 203 (Kyber). As time permits, the digital signature scheme defined in FIPS 204 (Dilithium) will also be discussed.
Short Bio: Jonathan Katz recently joined Google as a Senior Staff Research Scientist, after more than 20 years as a professor at the University of Maryland, where he also served as director of the Maryland Cybersecurity Center. He is a co-author of the widely used textbook “Introduction to Modern Cryptography” (now in its third edition) and also offers a free online course on cryptography through Coursera. Katz has received an Alexander von Humboldt Research Award, a UMD Distinguished Scholar-Teacher Award, and an ACM SIGSAC Outstanding Contribution Award. He is a fellow of the IACR and the ACM.
​​​​​​​​​​​​​​​​​​​​​​​​​

Talk Title #4:

Challenges and Strategies for Enabling Quantum-Resistant Network Protocols

Speaker Name: Hanif Rahbar, Assistant Professor, Computing and Information Science, Rochester Institute of Technology

Abstract: With quantum computers on the horizon, governments and standardization agencies are pushing for a transition to quantum-resistant cryptography (QRC) to safeguard against quantum attacks. However, QRC is often not a plug-and-play solution. We reveal, through protocol analysis and measurement studies, that even the latest network protocols face impeding hurdles in adopting standardized QRC protocols without substantial degradation in latency, reliability, and even security. This talk will break down the practical challenges of integrating QRC into safety-critical wireless and Internet protocols, particularly in constrained connected vehicle (C-V2X) and IP-based ecosystems. To address these challenges, we will explore system refinement techniques and approaches, including partially hybrid protocols and intelligent scheduling adaptation, to balance security and performance during a transition toward quantum-resistant ecosystems.

Short Bio: Hanif Rahbari is an Assistant Professor in the College of Computing and Information Sciences at Rochester Institute of Technology (RIT). He is also an affiliated faculty member of the ESL Global Cybersecurity Institute and the Department of Computer Engineering (College of Engineering) at RIT. His research focuses on enhancing the security of wireless and networked ecosystems, specifically in areas such as connected vehicles, wireless transmission attributes at the physical layer, spectrum coexistence, quantum resistance, and AI-driven games and digital twins for testbeds. He is a co-inventor on three US patents, a co-author of more than 30 peer-reviewed papers, and the recipient of the NSF CAREER Award in 2023.

Sponsorship 

Please contact at event.manager AT svcsi.org if your company is interested in supporting the events.

GOLD SPONSORS 
SILVER SPONSORS
Juniper_Networks-Logo.wine.png
BRONZE SPONSORS 
adobe.png
PARTNERS
MetaCTFpng.png

SVCSI is a 501(c)(3) non-profit organization (Public Charity).

Donate today!

golden-svcsi.webp
bottom of page