UNDERGRADUATE POSTER PRESENTATIONS
Computer Information Science
Shawn DeSantis & Erik Askerov
Hacking Social Media with JavaScript Embedded Photos
A staggering 300 million photos are uploaded to Facebook daily,
while another 95 million are posted to Instagram. People love
to share pictures of their pets, food, vacations and more with
family, friends, and coworkers. However, how safe are these pictures? This
research looks at how the photos you “like” might be embedded with malicious
JavaScript.
Valentin Semenyuk
Elevator Vulnerabilities – Hacking from the Ground Floor Up
By gaining unauthorized access to an elevator’s controls, a hacker
could block use of the elevator by parking it between floors,
gaining access to prohibited floors, or rendering the system totally
useless. This research examines elevator vulnerabilities and exploits. After
learning how elevator hacks are performed, suggestions will be made on how to
secure these vulnerable systems from cybercriminals and cyberterrorists.
Eric Shaheen
TikTok: National Security Concerns, Censorship, and Privacy
With more than 1.4 million downloads, TikTok is one of the most
popular social media apps today. However, the U.S. government
is currently investigating TikTok due to its ties to China.
Investigators fear that user data is being shared with the Chinese Government.
An overview of recent concerns regarding TikTok, and the greater context of
data privacy, will be analyzed.
Sydney Robinson
Mitigating Web Vulnerabilities: A Programmer’s Perspective
This research examines current and emerging code vulnerabilities
web developers are faced with in order to determine how to
minimize exploits preemptively. Cross-site scripting (XSS), buffer
overflows, cross-site request forgery (CSRF), and SQL injection attacks will
be discussed. Steps programmers might implement during the planning and
development phases to reduce the likelihood of becoming a target will be
recommended.
5