CFP
CYSE-SDC-1: 1st Cyber Security Engineering Department Senior Design Competition Fairfax, VA, United States, April 28, 2026 |
| Submission link | https://easychair.org/conferences/?conf=cysesdc1 |
| Abstract registration deadline | April 17, 2026 |
| Submission deadline | April 17, 2026 |
Paper submission:
- Each team only need one student to register an account. When submitting the paper, list all group members as the author, including your mentor.
- Only the final paper should be submitted here. PPT, Poster, and brochure should be submitted in Canvas.
Schedule:Schedule:
Location: The Hub, 10423 Rivanna River Way Fairfax, VA 22030
Time:
- Morning Track: 9:30 - 12:00
- Afternoon Track: 1:30 - 4:00
- Dinner/celebration: 5:00 - 7:00
Tracks:
- Morning Track: 9:30 - 12:00
- VIP Room I: GenAI / LLM Security, Safety & Secure AI Engineering
- VIP Room II: AI‑Enabled Vulnerability Research, Reverse Engineering & Offensive Testing
- Hub Meeting Room 1: Threat Intelligence, OSINT & Knowledge/Data Fusion
- Hub Meeting Room 2: Security Operations Enablement: Visibility, IR Readiness & Threat Hunting
- Afternoon Track: 1:30 - 4:00
- VIP Room II: Trust, Identity, Authorization & Anti‑Abuse
- Hub Meeting Room 1: Cyber‑Physical / Embedded / Automotive / OT & Robotics Security
- Hub Meeting Room 2: SCENT: SCenario -> Entity -> Network -> Threat
Presentation:
- Each team has 30 minutes for the presentation, and should prepare a presentation about 22-24 minutes, leaving 6-8 minutes for judge questions. All group members must present. Please rehearse with your mentor and sponsor before the event.
Projects-tracks assignment, presentation will follow the order as listed in the table:
| Project | Sponsor | Project title | Track |
| 4 | BlueCloak | AetherCoder | AI‑Enabled Vulnerability Research, Reverse Engineering & Offensive Testing |
| 14 | CYSE-Arafin-4 | GLeNN2.0 | AI‑Enabled Vulnerability Research, Reverse Engineering & Offensive Testing |
| 19 | AVINT | Adaptive Risk Enumeration of Uncatalogued vulnerabilities using Deep Learning Techniques | AI‑Enabled Vulnerability Research, Reverse Engineering & Offensive Testing |
| 22 | CYSE-Wang | Agentic AI Penetration Testing Framework | AI‑Enabled Vulnerability Research, Reverse Engineering & Offensive Testing |
| 12 | CYSE-Arafin-2 | Accelerating Towers over Binary Fields for Secure Robotics | Cyber‑Physical / Embedded / Automotive / OT & Robotics Security |
| 13 | CYSE-Arafin-3 | Snoopy STARFish | Cyber‑Physical / Embedded / Automotive / OT & Robotics Security |
| 15 | CYSE-Arafin-5 | Securing EdgeRobots in Dynamic Environments | Cyber‑Physical / Embedded / Automotive / OT & Robotics Security |
| 17 | CYSE-Ferrari | Using industrial automation equipment for cybersecurity learning Project | Cyber‑Physical / Embedded / Automotive / OT & Robotics Security |
| 1 | UMW | Use of Vector Database Methods to Fine Tune Large Language Models | GenAI / LLM Security, Safety & Secure AI Engineering |
| 5 | MITRE-1 | AI Security Analysis Team A | GenAI / LLM Security, Safety & Secure AI Engineering |
| 6 | MITRE-2 | AI Security Analysis Team Z | GenAI / LLM Security, Safety & Secure AI Engineering |
| 11 | CYSE-Arafin-1 | Agent Overfit Insecure Embodied LLM Agents | GenAI / LLM Security, Safety & Secure AI Engineering |
| 7 | Veritus Labs-1 | AI Enhanced Asset & Network Topology Builder | SCENT: SCenario -> Entity -> Network -> Threat |
| 8 | Veritus Labs-2 | AI Enhanced Incident Tabletop Scenario Generator | SCENT: SCenario -> Entity -> Network -> Threat |
| 9 | Veritus Labs-3 | AI Automated Adversary Modeling Diamond | SCENT: SCenario -> Entity -> Network -> Threat |
| 10 | Veritus Labs-4 | AI Based Network Node Simulation for Cyber Exercises | SCENT: SCenario -> Entity -> Network -> Threat |
| 18 | CYSE-Barreto | Cyber ARGUS Testbed | Security Operations Enablement: Visibility, IR Readiness & Threat Hunting |
| 25 | CGI-1 | AI Based Role Authorization Prototype | Security Operations Enablement: Visibility, IR Readiness & Threat Hunting |
| 26 | CGI-2 | Containerized DevSecOps Solution | Security Operations Enablement: Visibility, IR Readiness & Threat Hunting |
| 27 | CGI-3 | Standardized Threat Hunting and Automation | Security Operations Enablement: Visibility, IR Readiness & Threat Hunting |
| 2 | Hilton | OSINT Exercise with Curated RECON Tool | Threat Intelligence, OSINT & Knowledge/Data Fusion |
| 20 | AVINT | ML NLP based Threat Intel Gathering | Threat Intelligence, OSINT & Knowledge/Data Fusion |
| 21 | Cypfer | OpenCTI for Aggregation Correlation and Analysis of Threat Intelligence Feeds | Threat Intelligence, OSINT & Knowledge/Data Fusion |
| 28 | Ram | Master Data Management | Threat Intelligence, OSINT & Knowledge/Data Fusion |
| 3 | LabsDAO | TrustChain Cyber Secure Tokenization of Real World Assets Prototype | Trust, Identity, Authorization & Anti‑Abuse |
| 16 | CYSE-Moiunl- | Radio Frequency Based Fingerprinting | Trust, Identity, Authorization & Anti‑Abuse |
| 23 | CYSE-Wei | Invisible CAPTCHA blue team | Trust, Identity, Authorization & Anti‑Abuse |
| 24 | CYSE-Wei | Invisible CAPTCHA red team | Trust, Identity, Authorization & Anti‑Abuse |
