Applied computing professionals develop, create and modify computer applications and specialized utility programs. They often analyze user needs and develop software solutions to meet those needs, analyze and design databases within an application area and contribute to web development. Graduates will obtain positions as software developers, web developers, software engineers and android engineers.
MEMBERS: Irvin Caro, Kavya Verma, Quentin Nelson, Jacob Allen, Dao Hoang Linh Quan Nguyen
ADVISOR: Dr. Huabo Lu
Keyloggers on computers are great for any red team, but they can be easily detected through a virus scan. With GhostWriter, one can obtain video feed and use it to extract the target's keystrokes. Red Teams need to have an undetectable device to obtain credentials in a way that they will not get caught. Red team operators will use GhostWriter because of its ability to assist them in gaining key information so that they can help improve the security of their target. The approach is to develop software that is capable of taking in a video and analyzing what keys are likely being typed. Red team operators will make use of a hidden camera to record footage of the keyboard when the Raspberry Pi senses movement. The video will then be encrypted and sent to the Red Team via a peer-to-peer connection where they can decrypt the video and then run the footage through the GhostWriter software. The prototype should be able to make predictions of keys that have been pressed. GhostWriter has the potential to alter how businesses view security. It could take almost any video feed and run it through the software, leaving no one safe or secure.
MEMBERS: Jacob Colton Schonhoff, Jimmy Le, William Grossjung
ADVISOR: Dr. Huabo Lu
The rise of cyber-attacks has led businesses and organizations to seek innovative ways to protect their data, and Red Teams have emerged as a critical solution. These teams simulate multi-layered attacks that mimic real-world threats and help organizations identify vulnerabilities in their security systems. As the global red teaming market is expected to grow from $10.8 billion to $19.1 billion by 2026, our team, The Homelanders, is contributing to this industry by developing a secret camera device disguised as a smoke detector. This hidden camera smoke detector can exfiltrate the data of displays within secure facilities and transmit it back without detection. By mimicking an everyday device found in public buildings, this innovative technology provides a valuable tool for Red Teams to test and improve an organization's data security procedures. Utilizing imaging and light detection technology, this device efficiently captures data when potential terminals are in use, and through secure, hidden transmission and encryption techniques this data is covertly transmitted. Moreover, this product is profitable when marketed to Red Teams, as it offers a new, effective way to identify vulnerabilities in organizations' data security systems. With the yearly global cost of cybercrime estimated at some 8.4 trillion dollars, The Homelanders' secret camera device aims to aid Red Teaming in further strengthening cyber capabilities and helping companies enhance their cybersecurity measures.
MEMBERS: Annie Wilson, Sam Benz, Trent Parsons
ADVISOR: John Harrison
This device will allow anglers to retro fit their current trolling motors with GPS anchoring technology. The retro fit GPS anchor offers an alternative to current "Spot Lock" GPS anchoring technology, which is cost prohibitive for many amateur anglers and requires purchasing a complete trolling motor unit compatible with the technology. Our device will offer a reasonably priced alternative for amateur fresh water anglers who use foot pedal controlled trolling motors. The device will integrate with current foot pedal set ups to maintain a designated stationary position.
MEMBERS: Nehme El Ters, Hemil Mehul Shah, Tri Dang, Andrew Huynh
ADVISOR: Joe Jabara
Our project has developed the design of a Multi-Factor Authentication (MFA) system for Wichita State University (WSU) that leverages the WSU ID to enable secure authentication for students and faculty members. Currently, there is no authentication system in place, leaving the students’ accounts vulnerable to unauthorized access. To address this, our system requires students to sign into an authentication app on their mobile device using their WSU ID and password once a day. To sign into a computer on campus, the student or faculty member would need to swipe their ID card on a scanner connected to the computer, which would then trigger an OTP sent to their phone. The system offers several advantages over traditional password-based systems, including reducing the risk of someone stealing the user's WSU ID or password by eliminating the need for keyboard and mouse input. In addition, unauthorized access is highly unlikely, as an intruder would need not only the ID card of the user but also their unlocked mobile phone. Overall, the proposed MFA system provides a secure and convenient method for WSU students and faculty members to access their accounts on campus. It significantly enhances the security of student and faculty member accounts while reducing the risk of unauthorized access. Additionally, this system can be used as a framework for other universities or organizations to implement a similar authentication system leveraging existing ID cards.
MEMBERS: Garrett Wahlstedt, Garrett Wahlstedt, Peter Upton, Harvey Ly, Jonathan Vosecek
ADVISOR: Sergio Salinas
Our device allows red team operators to take advantage of a known vulnerability in wireless computer peripherals which operate on the 2.4Ghz frequency. This vulnerability makes it possible to decode signals sent from the peripheral (commonly keystrokes from keyboards) as well as inject our own signals. This device will be deployed in a leave-behind scenario allowing red team operators to drop the device in a target location and station themselves in a less vulnerable position in order to gather sensitive information from the target. The design consists of a Raspberry PI, a 2.4Ghz receiver, and a battery to power both allowing it to be placed away from an outlet. Once the information has been gathered the device will utilize the 2.4Ghz receiver to transmit it to the operator.
MEMBERS: Kyle Dodson, Joseph Boley, Andrew McLeod, Guoyao Yue, Katelyn Tran
ADVISOR: Tom McGuire
SPONSOR: Pastor Bryce (Timberlake, SD)
Because of the continuous loss of church members caused by the pandemic and other factors, small and medium-sized churches must look for an easy-to-use program to attract more people participating in churches and reduce office costs and time. However, the existing solutions on the market, which have overmuch unnecessary functions, complicated interfaces, and expensive prices, are more suitable for large churches, but cannot meet their needs and are hard to afford. Through interviews with multiple churches, communications and advice from customers, and the analysis of other applications we developed Tracer. Tracer is a web-based application providing features for assisting work like automatic statistical yearly tax reports for donations, analysis of current members, and tracking and storage for customizable information such as attendance and donations. The UI design of Tracer is straightforward and clear, making its interface easy to get started, and users can access the frequently used features quickly. It offers the design of modular functions, which allows the churches to only choose the required functions based on their scale and gives an affordable expense. Additionally, its cloud storage makes churches no longer need to worry about the costs of maintenance or hardware and provide reliable security. The web-based development also allows users to access the application anytime and anywhere simply though the Internet. Based on these functions, Tracer can not only help members better understand the operation situation of the church, but also can help to find a way for attracting more young people to join.