Rafer Cooley's Portfolio

Comparing Ransomware using TLSH and @DisCo Analysis Frameworks

2020-12-15
Multiple families of malware were compared together using fuzzy hashes and custom binary analysis programs.

Stealing Machine Learning Parameters via Side Channel Power Attacks.

???
Research project performing side channel analysis and attacks on neural network and linear regression models running on a microcontroller.

Integrated Outreach: Increasing Engagement in Computer Science and Cybersecurity

2020-11-26
Research on innovative, integrated outreach programs guided three separate week-long outreach camps held across two summers...

Secure and Decentralized Swarm Behavior with Autonomous Agents for Smart Cities

2020-06-05
The SHARKS protocol tolerates the loss of agents and continues to surround a target with as few as three individuals...

Adversarial Impacts on Autonomous Decentralized Lightweight Swarms.

2019-10-14
Attacking the SHARKS swarming protocol with another swarm of similar drones in an attempt to compromise the desired swarming behavior.

Blockchain-Based Election Infrastructures

2018-09-16
Students at the University of Wyoming designed two blockchain-based voting systems during a class offered only once at the University...

Secure and Decentralized Swarm Behavior with Autonomous Agents for Smart Cities

2018-9-16
Enabling drones to circle a target without centralized control or selecting lead agents, the SHARKS protocol performs organized movement among agents without creating a central point of vulnerability...

S-CHIRP: Securing Communications in Lightweight Peer-to-Peer Networks in IoT

2018-12-28
Advanced secure version of the CHIRP protocol.

EVO-SCHIRP: Evolved Secure Swarm Communications

2018-9-16
Expanding the S-CHIRP protocol using evolutionary algorithms.

Designing for Security Within and Between IoT Devices

2018-7-8
Secure intra-device and inter-device communications.