An Assessment of the Usability of Machine Learning Based Tools for the Security Operations Center
IEEE Cyber, Physical and Social Computing (CPSCom)
Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield
Publisher's website Sean Oesch, Robert Bridges, Jared Smith, Justin Beaver, John Goodall, Kelly Huffer, Craig Miles, Dan Scofield
Flexsealing BGP Against Route Leaks: Peerlock Active Measurement and Analysis
Network and Distributed Systems Security Symposium (NDSS)
Tyler McDaniel, Jared M. Smith, Max Schuchard
Tyler McDaniel, Jared M. Smith, Max Schuchard
Control Logic Forensics Framework using Built-in Decompiler of Engineering Software in Industrial Control Systems
Digital Investigation (DFWRS 2020)
Syed Ali Qasim, Jared Smith, and Irfan Ahmed
Publisher's website Syed Ali Qasim, Jared Smith, and Irfan Ahmed
PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems
Proceedings of the 29th USENIX Security Symposium
Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard
Joseph Connor, Tyler McDaniel, Jared M. Smith, Max Schuchard
Withdrawing the BGP Re-Routing Curtain: Understanding and Analyzing the Security Impact of BGP Poisoning through Real-World Measurements
Network and Distributed Systems Security Symposium (NDSS)
Jared M. Smith, Kyle Birkeland, Tyler McDaniel, and Max Schuchard
Publisher's website Jared M. Smith, Kyle Birkeland, Tyler McDaniel, and Max Schuchard
The Maestro Attack: Orchestrating Malicious Flows with BGP
SecureComm 2020
Tyler McDaniel, Jared M. Smith, and Max Schuchard
Publisher's website Tyler McDaniel, Jared M. Smith, and Max Schuchard
Network Resiliency via Reactive Routing
Network and Distributed Systems Security Symposium (ISOC NDSS)
Jared M. Smith and Max Schuchard
Jared M. Smith and Max Schuchard
Towards Architecture and OS-Independent Malware Detection via Memory Forensics
ACM Conference on Computer and Communications Security (ACM CCS)
Rachel Petrik, Berat Arik, and Jared M. Smith
Publisher's website Rachel Petrik, Berat Arik, and Jared M. Smith
Overshadow PLC to Detect Remote Control-Logic Injection Attacks
16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
Hyunguk Yoo, S. Kalle, Jared M. Smith, Irfan Ahmed
Hyunguk Yoo, S. Kalle, Jared M. Smith, Irfan Ahmed
Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems
Industrial Control System Security Workshop at the 34th Annual Computer Security Applications Conference (ACSAC)
Rima A. Awad, Saeed Beztchi, Jared M. Smith, J. Bryan Lyles, Stacy Prowell
Publisher's website Rima A. Awad, Saeed Beztchi, Jared M. Smith, J. Bryan Lyles, Stacy Prowell