Students

CCT Research Students

Abdullah Alshaya

Abdullah Alshaya

security in software-defined networks

placeholder

Arabelle Betzwieser

memory forensics

Christopher Bowen

Christopher Bowen

reverse engineering, memory forensics, malware analysis

placeholder

Joseph Brown

tba

 

Sarah Buckley

Sarah Buckley

penetration testing, incident response

George Buras

George Buras

election security, malware analysis, exploit development

Brennen Calato

Brennen Calato

reverse engineering, memory forensics, malware analysis

Jacques Comeaux

Jacques Comeaux

type theory, compilers, asynchronous circuits

 

John Luke Denny

John Luke Denny

cryptography, pentesting, and memory forensics

josh dufrechou

Joshua Thomas Dufrechou

hardware memory acquisition

placeholder

Taha Gharaibeh

memory forensics

ronald gibson

Ronald Gibson

reverse engineering, malware analysis

 

Connor Hummel

Connor Hummel

tba

placeholder

Linta Islam

tba

Adam Kardoff

Adam Kardorff

reverse engineering, memory forensics, malware analysis

Marcellina Kazigati

Marcellina Kazigati

penetration testing

 

Brandon Lara

Brandon Lara

exploit development, malware analysis, reverse engineering

Darrin Lea

Darrin Lea

reverse engineering, pentesting, memory forensics

placeholder

Abdel R. Mansour

software engineering, application security, and penetration testing

Elizabeth Melvin

Olame Akim Muliri

penetration testing, hardware hacking, malware analysis

 

placeholder

Abdur Onik

tba

August Orgah

August Orgah

memory forensics, machine learning, and IoT security

Lauren Pace

Lauren Pace

malware analysis, memory forensics

Katherine Perez

Katherine Perez

tba

 

desmond prince

Desmond Prince

tba

Ethan Riley

Ethan Riley

memory forensics, reverse engineering, malware analysis

Joshua Rovira

Joshua Rovira

malware analysis, reverse engineering

LaSean Salmon

LaSean Salmon

malware analysis, memory forensics

 

placeholder

Steven Seiden

tba

kaitlyn smith

Kaitlyn Smith

machine learning, malware analysis

Nathalia Soares

Nathalia Soares

penetration testing, incident response

tanzila

Tanzila Tabassum

privacy policy analysis, computational social science

 

nick tanet

Nicholas Ryan Tanet

memory forensics, penetration testing, reverse engineering

Karley Waguespack

Karley Waguespack

malware analysis, embedded systems

placeholder

Clinton Walker

machine learning, software security

kyle mccleary

Kyle McCleary

malware analysis, cryptography, software engineering