Press Release: ACSC Announces Winners of Cybersecurity Student Competition

November 24, 2014

National Cybersecurity Experts Vote to Select Cybersecurity’s “Next Big Thing”

Boston, MA (November 24, 2014) Winning students from Northeastern University and University of Massachusetts Amherst have been awarded Best Cyber Security Solution after selection by some of the top cyber experts from across the nation who participated in the Advanced Cyber Security Center’s annual meeting on November 5th. An annual highlight of the conference, the ACSC Student Poster Session is presented by leading venture capital firm .406 Ventures, and is designed to showcase our region’s pipeline of cybersecurity talent and innovation. Submissions include solutions to address data protection, cyber risk analysis and knowledge-based authentication approaches.

“This event showcases the students at some of our nation's top universities who continue to drive innovation and provide the potential to discover the ‘next big thing’ in cybersecurity,” said Greg Dracon, partner at .406 Ventures and co-head of the firm's cybersecurity practice. “Even more directly, the event connects emerging technology talent with top cybersecurity industry leaders and influencers.”

Selected by experts from the conference, the winner of Best Cybersecurity Solution receives a cash prize and the platform to present their ideas and entrepreneurship among some of the leading cybersecurity experts who attend the event. This year, the competition was hosted by Howard Shrobe, associate director and principal research scientist at MIT’s Computer Science and Artificial Intelligence Laboratory, and featured graduate, doctoral, and post-doc students from the ACSC’s member universities including MIT, Harvard University, Northeastern University, University of Massachusetts, Boston University, and Worcester Polytechnic Institute, all working to develop next-generation cybersecurity solutions.

2014 WINNERS:

FIRST PLACE 

Scalable Open-source Side-channel Evaluation Platform for Cryptographic Devices 

Neel Shah, Tushar Swamy, Harrison Dimmig, Yunsi Fei and David Kaeli 

Department of Electrical and Computer Engineering, Northeastern University 

RUNNER UP 

Authentication using Embedded Logical Queries 

Shweta Singh 

Department of Electrical and Computer Engineering, Northeastern University 

RUNNER UP

Optimizing Cybersecurity Investments with Risk: Insights for Resource Allocation 

Yueran Zhuo and Senay Solak

Isenberg School of Management, University of Massachusetts Amherst 

ALL OTHER SUBMISSIONS:

A Selfishness-aware Coexistence Scheme for 802.22 and 802.11af Networks

Shuai Yuan , Lei Li and Tricia Chigan

Department of Electrical and Computer Engineering, University of Massachusetts Lowell

A Web-based Security Analysis Tool for Android Applications

Nebiyu Feleke, Tandhy Simanjuntak, Wenjie Shi, Yuting Zhang and Lou Chitkushev

Department of Computer Science, Boston University

Aroma: A New Data Protection Method with Good Privacy and Utility Properties

Chunyao Song and Tingjian Ge

Department of Computer Science, University of Massachusetts Lowell

Assured High-Throughput Wireless Networking in the Presence of Heterogeneous Cross-layer Attacks

Liyang Zhang and Tommaso Melodia

Department of Electrical and Computer Engineering, Northeastern University

Detecting Sensor Compromise using Physiological Signal Correlation in Mobile Health Monitoring System

Hang Cai

Department of Computer Science, Worcester Polytechnic Institute

FEC Driven Network Coding Based Pollution Attack Defense in Cognitive Radio Networks

Ibrahim Demirdogen, Lei Li and Tricia Chigan

Department of Electrical and Computer Engineering, University of Massachusetts Lowell

From the Consent of the Routed: Improving the Transparency of the RPKI

Ethan Heilman

Department of Computer Science, Boston University

My Google Glass and Drone See Your Password!

Qinggang Yue and presented by Zupei Li

Department of Computer Science, University of Massachusetts Lowell

Obfuscation Tool Flow based on Dopant Changes to Prevent Reverse Engineering

Shweta Malik, Georg T Becker (Ruhr-University of Bochum), Christof Paar (Ruhr-University of Bochum) and Wayne P Burleson

Department of Electrical and Computer Engineering, University of Massachusetts, Amherst

RPKI vs ROVER

Comparing the Risks of BGP Security Solutions

Aanchal Malhotra and Sharon Goldberg

Department of Computer Science, Boston University

Security-oriented DSA for Network Access Control in Cognitive Radio Networks

Lei Li and Chunxiao Chigan

Department of Electrical and Computer Engineering, University of Massachusetts Lowell

Single-stroke Language-Agnostic Keylogging using Stereo-Microphones and Domain Specific Machine Learning

Sashank Narain & Amirali Sanatinia

College of Computer and Information Science, Northeastern University