| Date | Name(s) | Topic | ||
| Wed 29 Apr 2015 | DiMotto, J. | Differential cryptanalysis | ||
| Cook, E. | Steganography | |||
| Spaeth, K. | Wireless security: WEP, WPAv1, and WPAv2 and Notes | |||
| Thu 30 Apr 2015 | Ault, J. | Moore, A. | ARP Spoofing | |
| Dorn, J. | DDoS/DoS attacks | |||
| Fri 1 May 2015 | ||||
| Hoffmann, B. | Heartbleed bug | |||
| Ramirez, B. | Ubiquitous encryption | |||
| Wed 6 May 2015 | Bitz, S. | SQL Injection | ||
| Overboe, N. | Security in Distributed Systems | |||
| Almatrudi, A. | Cloud storage (e.g., Dropbox, iCloud) | |||
| Thu 7 May 2015 | Krytkowski, A. | Automotive RFID Ignition Systems | ||
| Jackson, B. | Wittman, E. | Android security | ||
| Fri 8 May 2015 | Bartels, B. | Kimpel, C. | Loberger, N. | Mobile platform security (Android, iOS, ...) |
| Wed 13 May 2015 | Pettigrew, T. | Apple Pay | ||
| Frasier, N. | Multi-factor authentication | |||
| Durante, M. | Multi-level security | |||
| Thu 14 May 2015 | Suckow, M. | Zvarych, R. | Hacktivism | |
| Donohew, E. | Sparks, J. | Social Engineering | ||
| Fri 15 May 2015 | Maki, J. | Vogel, M. | Cyberphysical security in networked control systems | |
| Voller, J. | NSA asking corporations to insert backdoors | |||
| Herman, M. | Cyber warfare |