DeepOne
LSA Function Hook
LSA Function Hook
ISTS Red Team Password Filter
ISTS Red Team AppCert DLL Implant
DLL Injection without DLLmain()
Published in Journal 1, 2009
This paper is about the number 1. The number 2 is left for future work.
Recommended citation: Your Name, You. (2009). "Paper Title Number 1." Journal 1. 1(1). http://academicpages.github.io/files/paper1.pdf
Published in Journal 1, 2010
This paper is about the number 2. The number 3 is left for future work.
Recommended citation: Your Name, You. (2010). "Paper Title Number 2." Journal 1. 1(2). http://academicpages.github.io/files/paper2.pdf
Published in Journal 1, 2015
This paper is about the number 3. The number 4 is left for future work.
Recommended citation: Your Name, You. (2015). "Paper Title Number 3." Journal 1. 1(3). http://academicpages.github.io/files/paper3.pdf
Published:
Cellular networks are becoming most prevalent network. Different applications are being deployed on them due to their ubiquity and reliability. We have been working on designing an emergency medical data transmission system named MEDTOC that would carry aggregated patient data on cellular network to the hospital. In this paper, we present an efficient scheme which implements the transfer of moving patient’s vital signs to hospital via GSM network. This scheme was implemented and tested by writing a Java based client-server application to transfer patients’ vital sign information. Post-transmission operations include archiving, classifying and presenting the vital signs data on demand. We have investigated the problem of classifying patients based on their condition, as assessed through vital signs. With that information, patients can be assigned to the appropriate physician for remote monitoring.
Published:
Although educational data mining is a well-established field, it has not yet sought to provide serious, actionable intelligence that can be used by teachers to address bullying in a reasonable amount of time. This paper seeks to propose a system that will streamline the processing and storage of bullying data in social graph form so that it will be available to be mined by expert systems that can help educators in the classroom. In addition, one such expert system will be proposed demonstrating how this data may be used to automate a common classroom management task that may improve students’ classroom experiences.
Published:
In this paper, we describe the development of a software framework and its guiding principles for patient handling and processing in emergencies and disasters. The MEDTOC system developed earlier is modified and enhanced to include a complete object oriented software model for patient classification, patient handling and patient data processing. The client and server side processing is specified, the patient clustering considerations are discussed and initial results are outlined in terms of software models, algorithms and medical guidelines for effective collaboration.
Published:
(See 2016-DC)
Published:
See 2016-DC
Published:
DEF CON isn’t just for hardened hackers with 5up3r 3l173 hacking skills. As DEF CON has grown, more and more attendees are looking for knowledge that will help them get started in the world of hacking. If that’s what you’re looking for, this training workshop is for you!
Published:
Security is hard but security education may be harder. Few academic institutions have the skills or resources to dedicate solely to security education. Rather, most security programs in higher education have grown out of or have been welded on to other technology programs. The resulting fractured educational ecosystem has created a disparity in the skill sets of graduating students and has it challenging to develop standards to ensure consistency across educational programs. This talk will take a look at how security curricula have traditionally been developed and continued to be shaped by a variety of forces. We will examine some of the proposed solutions for accrediting programs and analyze their strengths and weaknesses. Subsequently we will try to determine which type of student each model designed to produce and provide our own recommendations about how to standardize security education.
Published:
Penetration testing is a challenge for higher education. Students are demanding this course in increasing numbers and faculty are scrambling to meet the demand. This talk will explore some of the curricular factors that influence why, where, and how higher education teaches penetration testing. Approaches to teaching this content can be wildly different, though, and can range from the theoretical to intensely technical. The strengths and weaknesses of these approaches will be discussed and some suggestions will be presented for how higher education can modernize their approach to teaching penetration testing.
Published:
Security is hard, but security education may be harder. Few academic institutions have the skills or resources to dedicate solely to security education. Rather, most security programs in higher education have grown out of or have been welded on to other technology programs. The resulting fractured educational ecosystem has created a disparity in the skill sets of graduating students and has made it challenging to develop standards to ensure consistency across educational programs. This talk will take a look at how security curricula have traditionally been developed and continued to be shaped by a variety of forces. We will examine some of the proposed solutions for accrediting programs and analyze their strengths and weaknesses. Subsequently, we will try to determine which type of student each model is designed to produce and provide our own recommendations about how to standardize security education.
Published:
Penetration testing is a challenge for higher education. Students are demanding this course in increasing numbers and faculty are scrambling to meet the demand. This talk will explore some of the curricular factors that influence why, where, and how higher education teaches penetration testing. Approaches to teaching this content can be wildly different, though, and can range from the theoretical to intensely technical. The strengths and weaknesses of these approaches will be discussed and some suggestions will be presented for how higher education can modernize their approach to teaching penetration testing.
Published:
Penetration testing is a challenge for higher education. Students are demanding this course in increasing numbers and faculty are scrambling to meet the demand. This talk will explore some of the curricular factors that influence why, where, and how higher education teaches penetration testing. Approaches to teaching this content can be wildly different, though, and can range from the theoretical to intensely technical. The strengths and weaknesses of these approaches will be discussed and some suggestions will be presented for how higher education can modernize their approach to teaching penetration testing.
Published:
The MITRE ATT&CK framework is all the rage these days. Many are looking at this as a research framework that can help standardize many aspects of information security, particularly with respect to offensive methodology. This talk will look at the MITRE ATT&CK framework from a different angle aby examining how the information MITRE has organized can improve penetration testing and, based on preliminary results, defensive posture. I will provide an overview of the ATT&CK framework, discuss the techniques that are useful for penetration testing, and present a case study of homebrew malware written to be aligned with the ATT&CK Framework. The talk will conclude with a discussion of using existing tools aligned with MITRE’s ATT&CK Framework for detection and automating analysis of log data generated by those tools. It is important to note that this talk as supported by a significant amount of student work through both undergraduate and graduate capstone projects.
Published:
This talk with address how to get started with using the MITRE ATT&CK Framework to develop offensive tooling for Windows enviroments. The talk with introduce the ATT&CK framework, provide some examples demonstrating how to work with the Windows API, and will provide a overview of popular tools that make use the of the ATT&CK framework. Finally, some preliminary research related to calibrating existing publicly available offensive tools oriented ot the ATT&CK framework to publicy available defensive tooling.
Published:
This talk will cover the basics of building custom Windows malware, from constructing your environment to achieving code execution. Unfortunately, content around the Windows API is often relatively inaccessible to those new to the industry. Security talks in this area are often directed towards experienced practitioners rather that novices. The intent of this talk is to demonstrate that, with a little bit of C and some Windows API documentation, you can do some real damage. Specific techniques covered will include AppCertDLLs (T1546.009), droppers, and Process Injection (T1055.002). This talk will also attempt to present custom malware development as a software engineering process that has very real challenges and real costs to adversaries. The target audience is one that is familiar with C, memory management, and concepts typically taught in an Operating Systems course.
Undergraduate Course, State University of New York at Fredonia, Department of Computing and Information Science, 2016
Offered frequently between Fall 2009 and Spring 2016.
Undergraduate Course, State University of New York at Fredonia, Department of Computing and Information Science, 2016
Offered occasionally between Fall 2009 and Spring 2016.
Undergraduate Course, State University of New York at Fredonia, Department of Computing and Information Science, 2016
Offered occasionally between Fall 2009 and Spring 2016.
Undergraduate Course, State University of New York at Fredonia, Department of Computing and Information Science, 2016
Offered rarely between Fall 2009 and Spring 2016.
Undergraduate Course, State University of New York at Fredonia, Department of Computing and Information Science, 2016
Offered regularly between Fall 2009 and Spring 2016.
Undergraduate Course, State University of New York at Fredonia, Department of Computing and Information Science, 2016
Offered regularly between Fall 2009 and Spring 2016.
Undergraduate Course, State University of New York at Fredonia, Department of Computing and Information Science, 2016
Offered regularly between Fall 2009 and Spring 2016.
Workshop, State University of New York at Fredonia, Department of Computing and Information Science, 2016
Offered regularly between Spring 2011 and Spring 2016. Created in Spring 2011.
Undergraduate Course, Rochester Institute of Technology, Department of Computer Science, 2016
Current Course Content - Offered in Fall 2016 and Spring 2017. Course content developed by RIT Department of Computer Science.
Undergraduate Course, Rochester Institute of Technology, Department of Computer Science, 2017
Current Course Content - Offered in Spring 2017. Course content developed by RIT Department of Computer Science.
Undergraduate Course, Rochester Institute of Technology, Department of Computing Security, 2019
Sample Syllabus - Course taught between Fall 2017 and Spring 2019, involved course redesign. Major revision in Spring 2018, in conjunction with Dr. Bo Yuan.
Undergraduate Course, Rochester Institute of Technology, Department of Computing Security, 2019
Sample Syllabus - Regularly offered between Fall 2017 and Spring 2019. Major revision in Spring 2018.
Graduate Course, Rochester Institute of Technology, Department of Computing Security, 2020
Sample Syllabus - New seminar course taught spring semesters between 2018 and 2020.
Undergraduate Course, Rochester Institute of Technology, Department of Computing Security, 2021
Sample Syllabus - Offered in Fall 2020 and Spring 2021. New class in Fall 2020.
Undergraduate Course, Rochester Institute of Technology, Department of Computing Security, 2021
Sample Syllabus - Regular fall course, offered regularly between 2016 and present. Major revisions in 2016 and 2021.
Undergraduate Course, Rochester Institute of Technology, Department of Computing Security, 2021
Sample Syllabus - Sample Slides - Regularly offered course between Spring 2019 and present. Created in Spring 2019.
Graduate Course, Rochester Institute of Technology, Department of Computing Security, 2022
Sample Syllabus - Regular spring semester course, taught 2017 to present. Major course revisions in 2017 and 2019.
Hybrid Undergraduate/Graduate Course, Rochester Institute of Technology, Department of Computing Security, 2022
Sample Syllabus - New seminar course, first offered Spring 2022.
Undergraduate Course, Rochester Institute of Technology, Department of Computing Security, 2022
Sample Syllabus - Regularly offered course, starting in Spring 2022.
Hybrid Undergraduate/Graduate Course, Rochester Institute of Technology, Department of Computing Security, 2022
Capstones supervised between Spring 2017 and Spring 2022