Skip to main content

Spring 2023 Guest Speakers in Cybersecurity Technologies


Spring 2023 Guest Speakers in Cybersecurity Technologies:
hosted by Dr. Carter Yagemann

The Ohio State University Cybersecurity Lecture Series offers one-hour virtual presentations throughout the semester, featuring experts from across the field of cybersecurity. See and hear from university faculty, industry and federal researchers, and students as they share their latest findings in securing cyberspace and establishing digital trust. Lectures are free and open to everyone, but registration is required.


February 1

The Bot Reveals Its Master: Exposing and Infiltrating Command and Control Servers via Malware Logic Reuse with Research Scientist Major John Fuller of the Army Cyber Institute.

February 10

Securing Open Source Systems with Doctor Kangjie Lu of the University of Minnesota. 

February 17

Defeating Logic Bugs in Robotic Vehicles with Mr. Hyungsub Kim of Purdue University 

March 3

Modern Approach to Human-Centered Decompilation with Mr. Zion L Basque of Arizona State University

March 24

Advancing the Fuzzing Frontier with Dr. Stefan Nagy of the University of Utah

March 31

Sometimes, You Aren’t What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems with Ph.D. Candidate Akul Goyal from the University of Illinois Urbana-Champaign


Recordings of past events found at

Not all events have recordings publicly available.   


Prof. Carter Yagemann is an Assistant Professor of Computer Science and Engineering at The Ohio State University. His research experience spans both academia and industry, having received his Ph.D. in Computer Science from the Georgia Institute of Technology, and previously working in ethical hacking and cyber-threat intelligence for JPMorgan Chase. By creating the OSU Cybersecurity Lecture Series, Prof. Yagemann hopes to bring awareness to and disseminate the latest breakthroughs across academia, industry, and government for solving the biggest cybersecurity problems faced by security researchers and practitioners.

*This page will be updated as additional details become available.*