University Research Conference 2020 | Page 7

UNDERGRADUATE POSTER PRESENTATIONS Computer Information Science Shawn DeSantis & Erik Askerov Hacking Social Media with JavaScript Embedded Photos A staggering 300 million photos are uploaded to Facebook daily, while another 95 million are posted to Instagram. People love to share pictures of their pets, food, vacations and more with family, friends, and coworkers. However, how safe are these pictures? This research looks at how the photos you “like” might be embedded with malicious JavaScript. Valentin Semenyuk Elevator Vulnerabilities – Hacking from the Ground Floor Up By gaining unauthorized access to an elevator’s controls, a hacker could block use of the elevator by parking it between floors, gaining access to prohibited floors, or rendering the system totally useless. This research examines elevator vulnerabilities and exploits. After learning how elevator hacks are performed, suggestions will be made on how to secure these vulnerable systems from cybercriminals and cyberterrorists. Eric Shaheen TikTok: National Security Concerns, Censorship, and Privacy With more than 1.4 million downloads, TikTok is one of the most popular social media apps today. However, the U.S. government is currently investigating TikTok due to its ties to China. Investigators fear that user data is being shared with the Chinese Government. An overview of recent concerns regarding TikTok, and the greater context of data privacy, will be analyzed. Sydney Robinson Mitigating Web Vulnerabilities: A Programmer’s Perspective This research examines current and emerging code vulnerabilities web developers are faced with in order to determine how to minimize exploits preemptively. Cross-site scripting (XSS), buffer overflows, cross-site request forgery (CSRF), and SQL injection attacks will be discussed. Steps programmers might implement during the planning and development phases to reduce the likelihood of becoming a target will be recommended. 5