University of Cincinnati Logo
 

20-CS-5155 - Cyber Defense Overview
Electrical Engineering and Computer Science

Midterm Videos and CDX Results
    DLL Injection - Moon, Rossi, Meeks, Hunt
        https://www.youtube.com/watch?v=rcWzx3VA5LY&feature=youtu.be
    Daniel Moon, Ricki Rossi, Jonathon Meeks, Ben Hunt (19/20 - Grand Prize Winner)
        Sons of Moon     eval
 
    How Can Data Mining be Applied to Cyber Security? - Kuchta
        https://www.youtube.com/watch?v=jic8xdiRDaU
    Alain Kuchta, Nathan Ashcraft, Behrad Bagheri, Jeff Nainaparampil (18.7/20 - close 2nd)
        Security Porcupine     eval
 
    Virtual Private Networks - Lindberg, Davis, Do, Romie
        https://www.youtube.com/watch?v=3bUapMTg0I8
        https://www.youtube.com/watch?v=JXhKHpyEZ8o
    CDX report - Lindberg, Davis, Do, Romie (17.84/20)
        Crouching Davis Sleeping Bao     eval
 
    HEARTBLeD - McPhillips, Drake, Henderson, Broderick
        https://www.youtube.com/watch?v=CzC7L_ME9Xk&feature=youtu.be
    Christopher Broderick, Angela Drake, Kyle Henderson, Cory McPhillips (16.4/20)
        The Metapods     eval
 
    Wi-Fi Security - Tuchfarber, Washburn
        https://www.youtube.com/watch?v=r7-vn8udc4k&feature=youtu.be
    David Washburn, Matthew Flowers, Matthew Tuchfarber, Chad Whaley (16/20)
        The Brew Crew     eval
 
    Cyber Security of the Internet of Things - Chesley, Brisbin, Hedge, Rose
        https://www.youtube.com/watch?v=61lwk-_QKqQ
    Tyler Brisbin, Jacob Chesley, Suprabha Hegde, and Andrew Rose (12.9/20)
        Blue Angels     eval
 
    Securing a MySQL Database - Taylor, Suppakitjarak, Park, Crowell
        https://www.youtube.com/watch?v=9o72Ixzp04g&feature=youtu.be
    Nuthapol Suppakitjarak, Elijah Park, Daniel Taylor, Christopher Crowell (6.6/20)
        SQL Sequins     eval
 
    Man in the Middle - Thalapaneni, Chapman
        https://www.youtube.com/watch?v=sZRqMzkJK8w
    Devisha Srivastava, Snehesh Thalapaneni, Jacob Chapman, Sanjay Kalla (5.3/20)
        Devisha's Devels     eval
 
    Malicious Code in PDFs - Whaley, Flowers
        https://www.youtube.com/watch?v=AKrChlPRj6g&feature=youtu.be
 
    Social Engineering in Cyber Security - Bagheri, Kalla, Srivastava
        https://www.youtube.com/watch?v=jPJKt3chKaY&feature=youtu.be
 
    Homomorphic Encryption - Nainaparampil, Ashcraft
        https://www.youtube.com/watch?v=t31C6CXJ-fE
 
Note: The final report was used to evaluate the conduct of the CDX and its completeness and clarity were judged as well. A score on a scale of 0-10 was given to the final report. The uptime score was normalized to a scale of 0-10 where the highest score was given 10 and all other scores were proportionally lower. The total score is the sum of the report score and the uptime score.
ERC
MainStreet
Paul Erdos
NIT
Ladies on Campus
Oscar Robinson