ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
Check sheet 2
2
3
Team member 1Team member 2Topic
4
5
Anonymity
6
Livia SeibertRachel LuriaTor protocol
7
Jack SchiffmanLucas FaganAttacks on Tor
8
9
Authentication/Authorization
10
Min Soo KimAndy JuOAuth
11
Nico CrinoJames RumseyHoneypots
12
Saloni BulchandaniJay PatelEffectiveness of password managers
13
Cole Spector
Melissa Sweetwood
Authentication without using passwords, e.g., using biometrics
14
15
Blockchains
16
Manmit SinghAnkit JajooEthereum
17
Lorne ZhangEdgardy ReyesScaling blockchain protocols
18
19
Security and nation states
20
Jessica YangJaidha RosenblattCensorship resistance
21
Vivian KirbyEmily QinUse of threat intelligence
22
Achintya KumarJay Don ScottElection security - end to end verifiability in elections and homomorphic encryption
23
Noah Karpel Taylor ShabaniChina security laws
24
25
H/W security
26
Michelle ZhangWilliam YuSpectre attacks
27
28
29
Phone security
30
Zhichen GuoJianchao GengCamera-based attacks on mobile phones
31
Christine WangShane WangPhone security: virtual memory and process isolation
32
Thomas ButlerLancer LiPhone security: tracking by Apple, Google, and permission management
33
Jake CimerbergJeremy SpieraSMS phishing
34
Aissatu BahRackeb MaredSecurity of data in mobile apps (Tic-Toc)
35
36
Other topics
37
Maverick Chung (mc608)Qiaoyi Fang (qf30)Reinforcement learning in automating exploits
38
Yalu CaiNoneAnti-fuzzing techniques
39
Callista ScholerSerafina TurnerPrivate information retrieval
40
Sam ChanJaiveer KatariyaCloud computing security
41
Sara BehnJordan ShapiroQuantum Computing on Cybersecurity
42
Mitchell Fleszar-Friedman Yuval MedinaSpam
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100