The final deliverable will be a presentation.

Schedule

I’ve tried to group your presentations together thematically within the two lab slots (Wednesday 12–3 and Friday 2–5). Please attend the entire slot that you are scheduled for, with the exception of undergraduates on Wednesday (since there’s a DSP tutorial from 2–3). I will ask you to evaluate your peers' presentations via a Google Form (also accessible using the QR code at the right). You will need to sign in using your Memorial MUNMail credentials when you fill out the form.

Tip

The presentations will occur in EN-4002 (main Engineering boardroom). You may not bring food or drink apart from water into this newly-renovated room.

Wednesday, July 31st

This session will be predominantly for graduate presentations, but not exclusively. All undergrads should be done before the DSP tutorial at 2pm.

Time Topic Presenter(s) Theme Course

12:00

WannaCry

Benjamin Chislett

Ransomware

ECE 7420

12:10

NotPetya

Aabir Basu and Nicholas Lai

ECE 7420

12:20

MOVEit Incident

Trong Nguyen

ENGI 9823

12:35

ML in Malware

Anna Behm and Alan George

Machine learning

ECE 7420

12:45

Deepfakes

Anuj Sevak and Tanya Vaidya

ECE 7420

12:55

Training LLM on CVEs

Faiaz Halim

ENGI 9823

13:10

Break

13:25

Log4Shell

Camron Mullins and Ian Gerow

Attacks

ECE 7420

13:35

Log4Shell

Pingan Luo and Shichao Li

ENGI 9823

13:50

Clickjacking

Mohamed Amine Darani

ENGI 9823

14:05

Hive ransomware

Dakota Mazerolle

Health privacy

ECE 7420

14:15

Differential Privacy in Healthcare

Oshin Oshin

ENGI 9823

14:30

Metasploit

Sahil Vashisht and Muhammad Ahmad

Tools

ENGI 9823

Friday, August 2nd

This session will be predominantly for undergraduate presentations, but not exclusively.

Time Topic Presenter(s) Theme Course

14:00

Pass-the-Hash

Melody Robateau and Miles Fryett

Authentication

ECE 7420

14:10

OTP Rate Limiting

Syed Anwer

ENGI 9823

14:25

Zero-Day Exploit Market

Prince Singha and Jubaira Ayeshe

Markets

ECE 7420

14:35

Supply Chain Attacks

Noah Spencer

ECE 7420

14:45

Mitigating Supply Chain Attacks

Adaugo Okezie

ENGI 9823

15:00

Break

15:15

RowHammer

Jason Lomond

Hardware

ECE 7420

15:25

DPA on AES

Grace Pearcey and Michael McCarthy

ECE 7420

15:35

RFID Attacks

Matthew Grouchy and Youssef Aref

ECE 7420

15:45

Mirai

Sadman Sameer and Karthik Kumar

Embedded systems

ECE 7420

15:55

Stuxnet

David Anton Guaman and Fares Khalil

ECE 7420

16:05

Break

16:20

Code Red

Savitaj Singh

Worms

ECE 7420

16:30

Morris Worm

Joshua Baker

ECE 7420

16:40

ILoveYou

Amr Kabel

ECE 7420

Evaluation

I will be looking for the following characteristics when I evaluate your presentation.

Content

Claims

truth claims are stated

Demo (ENGI 9823 only)

demonstration highlights key aspects of methodology and results

Detail

relevant details are present

Explanation

important details are explained clearly and correctly

Organization

talk outline is clear and logical

Summarization

detail is summarized appropriately

Support

evidence is presented or summarized to support claims

Targeting

talk is targeted at an ECE 7420 / ENGI 9823 audience

Delivery

Clarity

clear, easy to understand

Connection

engages audience with eye contact and/or questions

Ending

talk ends clearly with opportunities for applause and questions

Pacing

finishes within targeted timeframe, leaving time for questions

Poise

at ease, confident, natural

Q&A

able to respond effectively to questions

Variation

varies pitch, speed and volume to maintain interest

Visual aids

visuals support the story with readable text and legible figures