top of page

GLC Student Achievements

AI Cybersecurity Research

GLC students have conducted research on AI prompt injection vulnerabilities, a cutting-edge area in AI and cybersecurity. Students have developed techniques to identify weaknesses in large language models (LLMs) including ChatGPT and Gemini. They have reported findings to both OpenAI and Google. Created a GPT focused on evaluating industrial control systems (ICS) cybersecurity risk. 

Cybersecurity Conference Papers

GLC students co-authored groundbreaking cybersecurity conference papers, including one on Reconnaissance Techniques Modeling, which used statistical algorithms were used to analyze relationships between reconnaissance techniques. Another paper focuses on Industrial Control Systems (ICS) Reconnaissance and shows how reconnaissance tactics affect ICS security.

Bug Bounty Recognition

GLC students earned recognition in Drexel University's Bug Bounty Hall of Fame for three consecutive years (2022-2024). Search for E. Cohen, E. Deitz, and Jordana W.  Students have also received private recognition for ethically hacking systems such as data center cooling systems, autonomous shipping vessels, network-attached storage devices, and satellite communication terminals. 

Google Hacks

GLC students created innovative Google Hacks, unique search strings designed to find ethical hacking targets. A complete list of GLC's Google Hacks is available here.

Penetration Testing Modules with AI

Using ChatGPT, GLC students developed Python-based penetration testing modules to automate cybersecurity tasks. Explore a student's penetration testing modules here.

CVE Entry in the National Vulnerability Database

GLC students authored a critical Common Vulnerabilities and Exposures (CVE) entry now listed in the National Vulnerability Database (NVD). This entry addresses a vulnerability in software used to manage network-connected key boxes. The NVD is a globally recognized resource, widely referenced by cybersecurity professionals. 

Exploit Focused on Printers

GLC students created an exploit that automates the reading of directories, print logs, and system logs of Ricoh printers. The exploit is found in ExploitDB, a globally recognized database of public exploits. 

bottom of page