Skip to content Skip to navigation

Three Stanford students attending the RSA conference this week as RSA Security Scholars

Andreas Pavlou, Rachel Hirshman, and Maggie Engler are RSA Security Scholars at the 2017 RSA Conference. The Conference runs from February 13-17, at the Moscone Center & Marriott in San Francisco. The program for security scholars includes networking experiences with leading experts, preferred seating at Tuesday keynotes, and an opportunity to present their current research to the conference’s 40,000 attendees.

RSA Conference Security Scholar Program aims to bring students with diverse backgrounds and interests to help discover innovative approaches from academia and learn from best practices from industry.

Maggie Engler is a senior in the EE and MCS departments who has worked in cybersecurity over the past three summers. She is interested in applying machine learning and advanced statistical techniques to automated malware detection platforms. Her current research involves finding optimal fuzzing inputs for faster penetration testing.

Rachel Hirshman is a junior in the Political Science department. Rachel’s interest in cybersecurity grew after spending a summer immersed in dialogue about governmental cybersecurity policy, and her thesis covers the key differences between cybersecurity best practices for industrial control systems (ICS) compared to cybersecurity best practices for traditional information systems.

Andreas Pavlou is a Master’s degree candidate in International Policy Studies. He is interested in the intersection of cybersecurity with other traditional strategic technologies - i.e., satellites and nuclear weapons - as well as other emerging strategic technologies such as drones or other autonomous weapons platforms. This past summer, Andreas analyzed the cyber threat to nuclear command and control infrastructure, the laws and norms influencing cyberwarfare, and the existing literature on cyberdeterrence.

More information about the RSA Security Scholars program is available here: