Now showing items 1-13 of 13

    • Attack Modeling and Mitigation Strategies for Risk-Based Analysis of Networked Medical Devices 

      Hodges, Bronwyn J.; McDonald, J. Todd; Glisson, William Bradley; Jacobs, Michael; Van Devender, Maureen; Pardue, J. Harold (Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020-01)
      The escalating integration of network-enabled medical devices raises concerns for both practitioners and academics in terms of introducing new vulnerabilities and attack vectors. This prompts the idea that combining medical ...
    • A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices 

      Grispos, George; Glisson, William Bradley; Cooper, Peter (Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019-01)
      The integration of medical devices in everyday life prompts the idea that these devices will increasingly have evidential value in civil and criminal proceedings. However, the investigation of these devices presents new ...
    • CDBFIP: Common Database Forensic Investigation Processes for Internet of Things 

      Al-Dhaqm, Arafat; Razak, Shukor; Othman, Siti Hajar; Choo, Kim-Kwang Raymond; Glisson, William Bradley; Ali, Abulalem; Abrar, Mohammad (IEEE Access, 2017-10)
      Database forensics is a domain that uses database content and metadata to reveal malicious activities on database systems in an Internet of Things environment. Although the concept of database forensics has been around for ...
    • Cloud Forecasting: Legal Visibility Issues in Saturated Environments 

      Brown, Adam J.; Glisson, William Bradley; Andel, Todd R.; Choo, Kim-Kwang Raymond (Computer Law & Security Review, 2018)
      The advent of cloud computing has brought the computing power of corporate data pro- cessing and storage centers to lightweight devices. Software-as-a-service cloud subscribers enjoy the convenience of personal devices ...
    • Detecting Deception Using Machine Learning 

      Ceballos Delgado, Alberto Alejandro; Glisson, William Bradley; Shashidhar, Narasimha; McDonald, J. Todd; Grispos, George; Benton, Ryan (Proceedings of the 54th Hawaii International Conference on System Sciences, 2021-01)
      Today’s digital society creates an environment potentially conducive to the exchange of deceptive information. The dissemination of misleading information can have severe consequences on society. This research investigates ...
    • Detecting Repackaged Android Applications Using Perceptual Hashing 

      Nguyen, Thanh; McDonald, J. Todd; Glisson, William Bradley; Andel, Todd R. (Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020-01)
      The last decade has shown a steady rate of Android device dominance in market share and the emergence of hundreds of thousands of apps available to the public. Because of the ease of reverse engineering Android applications, ...
    • Exploitation and Detection of a Malicious Mobile Application 

      Nguyen, Thanh; McDonald, J. Todd; Glisson, William Bradley (Proceedings of the 50th Hawaii International Conference on System Sciences, 2017-01)
      Mobile devices are increasingly being embraced by both organizations and individuals in today’s society. Specifically, Android devices have been the prominent mobile device OS for several years. This continued amalgamation ...
    • How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations 

      Grispos, George; Glisson, William Bradley; Storer, Tim (Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019-01)
      An increasing number of cybersecurity incidents prompts organizations to explore alternative security solutions, such as threat intelligence programs. For such programs to succeed, data needs to be collected, validated, ...
    • Identifying stealth malware using CPU power consumption and learning algorithms 

      Lucket, Patrick; McDonald, J. Todd; Glisson, William Bradley; Benton, Ryan; Dawson, Joel; Doyle, Blair A. (Journal of Computer Security, 2018)
      With the increased assimilation of technology into all aspects of everyday life, rootkits pose a credible threat to individuals, corporations, and governments. Using various techniques, rootkits can infect systems and ...
    • In-The-Wild Residual Data Research and Privacy 

      Glisson, William Bradley; Storer, Tim; Blyth, Andrew; Grispos, George; Campbell, Matt (Journal of Digital Forensics, Security and Law, 2016)
      As the world becomes increasingly dependent on technology, researchers in industry and academia endeavor to understand how technology is used, the impact it has on everyday life, the artifact life-cycle and overall ...
    • Insight from a Docker Container Introspection 

      Watts, Thomas; Benton, Ryan G.; Glisson, William Bradley; Shropshire, Jordan (2019-01)
      Large-scale adoption of virtual containers has stimulated concerns by practitioners and academics about the viability of data acquisition and reliability due to the decreasing window to gather relevant data points. These ...
    • Investigating 3D Printer Residual Data 

      Miller, Daniel Bradford; Gatlin, Jacob; Glisson, William Bradley; Yampolskiy, Mark; McDonald, Jeffery Todd (Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019-01)
      The continued adoption of Additive Manufacturing (AM) technologies is raising concerns in the security, forensics, and intelligence gathering communities. These concerns range from identifying and mitigating compromised ...
    • Knock! Knock! Who is There? Investigating Data Leakage from a Medical Internet of Things Hijacking Attack 

      Flynn, Talon; Grispos, George; Glisson, William Bradley; Mahoney, William (Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020-01)
      The amalgamation of Medical Internet of Things (MIoT) devices into everyday life is influencing the landscape of modern medicine. The implementation of these devices potentially alleviates the pressures and physical demands ...