Comparing Ransomware using TLSH and @DisCo Analysis Frameworks
2020-12-15
Multiple families of malware were compared together using fuzzy hashes and custom binary analysis programs.
Stealing Machine Learning Parameters via Side Channel Power Attacks.
???
Research project performing side channel analysis and attacks on neural network and linear regression models running on a microcontroller.
Integrated Outreach: Increasing Engagement in Computer Science and Cybersecurity
2020-11-26
Research on innovative, integrated outreach programs guided three separate week-long outreach camps held across two summers...
Secure and Decentralized Swarm Behavior with Autonomous Agents for Smart Cities
2020-06-05
The SHARKS protocol tolerates the loss of agents and continues to surround a target with as few as three individuals...
Adversarial Impacts on Autonomous Decentralized Lightweight Swarms.
2019-10-14
Attacking the SHARKS swarming protocol with another swarm of similar drones in an attempt to compromise the desired swarming behavior.
Blockchain-Based Election Infrastructures
2018-09-16
Students at the University of Wyoming designed two blockchain-based voting systems during a class offered only once at the University...
Secure and Decentralized Swarm Behavior with Autonomous Agents for Smart Cities
2018-9-16
Enabling drones to circle a target without centralized control or selecting lead agents, the SHARKS protocol performs organized movement among agents without creating a central point of vulnerability...
S-CHIRP: Securing Communications in Lightweight Peer-to-Peer Networks in IoT
2018-12-28
Advanced secure version of the CHIRP protocol.
EVO-SCHIRP: Evolved Secure Swarm Communications
2018-9-16
Expanding the S-CHIRP protocol using evolutionary algorithms.
Designing for Security Within and Between IoT Devices
2018-7-8
Secure intra-device and inter-device communications.