contentVerticalPosition: , overrideVerticalAlignment: , contentHorizontalPosition: , overrideHorizontalAlignment:
contentVerticalPosition: , overrideVerticalAlignment: bottom, contentHorizontalPosition: , overrideHorizontalAlignment: right
contentVerticalPosition: , overrideVerticalAlignment: , contentHorizontalPosition: , overrideHorizontalAlignment:
contentVerticalPosition: , overrideVerticalAlignment: bottom, contentHorizontalPosition: , overrideHorizontalAlignment: right
TAKE A TOUR
Witness the exciting world of circuits, cybersecurity, coding, and robotics up close, opening doors to endless possibilities in the digital age.
Department News
Dr. Lundrigan's research team impresses at Underwater Networking Conference in Croatia
Dr. Phil Lundrigan, PhD student Bryson Schiel, and undergraduate Joshua Montierth recently returned from the ACM International Conference on Underwater Networks & Systems (WUWNet) in Croatia. There, they presented their recent paper, Using Orthogonal Chirps Underwater for In-Band, Full-Duplex Communication with Minimal Self-Interference Cancellation. Dr. Tracianne Neilsen, Physics Professor, and BYU students Eli Blattner and Corey Dobbs are also part of the research team and coauthors on the paper.
BYU Cybersecurity Shines at SaintCon with Hacking, Voice Cloning, and Smarter Training Solutions
BYU students and alumni recently presented their research at SaintCon, a Utah Cybersecurity conference. Macen Bird, a student from our department, won the annual Hackers Challenge at the conference. This challenge involves solving technology, logical, and security related puzzles and challenges.
BYU Students Expose Critical Router Vulnerabilities at DEF CON
A prototype of any software or technology will have vulnerabilities, however companies try to make them as secure as possible before their new product is distributed. The unfortunate reality is that there are still many products on the market or in use that have vulnerabilities, large or small, sometimes putting user information or safety at risk. These vulnerabilities that developers or vendors are unaware of after release are called Zero Days (0days).