Students

CCT Research Students

placeholder

Ibrahim Alam

artificial intelligence, software engineering, algorithm optimization

ruba alsmadi

Ruba Alsmadi

cybersecurity, privacy, digital forensics

peyton

Peyton Andras

cybersecurity, machine learning, neuromorphic computing

placeholder

Babangida Bappah

program analysis, memory forensics, binary analysis

bibhushita

Bibhushita Baral

artificial intelligence

placeholder

Sideeq Bello

user and measurement studies of privacy, security, and safety

placeholder

Matiwos Birbo

adversarial machine learning, privacy-preserving machine learning, AI

Christopher Bowen

Christopher Bowen

reverse engineering, memory forensics, malware analysis

laurenbristol

Lauren Bristol

digital forensics, vulnerability analysis, AI security

placeholder

Colton Bruni

molten salt electrochemistry, nuclear fuel cycles, nano-optics

Jacques Comeaux

Jacques Comeaux

type theory, compilers, asynchronous circuits

matheus

Matheus Costa

software engineering, HCI, VR

daltondiez

Dalton Diez

neuromorphic computing, artificial intelligence, algorithm design

Daniel Donze

Daniel Donze

memory forensics, red teaming, artificial intelligence

placeholder

Aidan Eiler

ICS/OT security, machine learning & AI, digital twinning

christianf

Christian Facundus

memory forensics

taha

Taha Gharaibeh

memory forensics

ronald gibson

Ronald Gibson

malware and exploit development, vulnerability analysis

samgoodwin

Sam Goodwin

file carving, digital forensics

placeholder

Ahmad Hadi

3D data processing, robotics, vision-language-action systems

georgehendricks

George Hendricks

digital forensics, file carving

samhildebrandt

Sam Hildebrand

artificial intelligence, software vulnerability testing, industrial control systems security

placeholder

Linta Islam

CS education, human-computer interaction

placeholder

Eric Jones

hardware hacking, electrical engineering

Marcellina Kazigati

Marcellina Kazigati

industrial control systems, artificial intelligence, threat intelligence

eshita

Mst Eshita Khatun

cybersecurity, user privacy, LLM

placeholder

Chloe Kinsley

software development, large language models

placeholder

Erich C Kruger

code vulnerability detection, artificial intelligence

Brandon Lara

Brandon Lara

compilers, exploit development, reverse engineering

placeholder

Kim Nguyen

privacy analysis, mobile applications, artificial intelligence

placeholder

Nurjahan Nipa

security and privacy, vulnerability management, machine learning

placeholder

Aidan O'Donnell

artificial intelligence, nuclear nonproliferation

Lauren Pace

Lauren Pace

malware analysis, memory forensics

placeholder

Catherine Rodriquez

neuromorphic computing, artificial intelligence, large language models

tyler saizan

Tyler Saizan

digital forensics, file carving

koosha

Koosha Sharifani

ML security, adversarial attack

placeholder

Maxwell Shroyer

artificial intelligence, large language models, software development

spinosa

Trevor Spinosa

tba

placeholder

Zhiyong Sui

malware analysis, artificial intelligence

Karley Waguespack

Karley Waguespack

digital forensics, file carving



placeholder

Justin Woodring

quantum security, artificial intelligence