Publications

Overshadow PLC to Detect Remote Control-Logic Injection Attacks

16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA)
Hyunguk Yoo, S. Kalle, Jared M. Smith, Irfan Ahmed
BibTeX

Measuring Irregular Geographic Exposure on the Internet

Arxiv.org
Jordan Holland, Jared M. Smith, and Max Schuchard
Publisher's website BibTeX

The Maestro Attack: Orchestrating Malicious Flows with BGP

Arxiv.org
Tyler McDaniel, Jared M. Smith, and Max Schuchard
Publisher's website BibTeX

Not So Predictable Mining Pools: Attacking Solo Mining Pools by Bagging Blocks and Conning Competitors

22nd International Conference on Financial Cryptography and Data Security (FC)
Jordan Holland, R. Joseph Connor, J. Parker Diamond, Jared M. Smith, and Max Schuchard
BibTeX

Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems

Industrial Control System Security Workshop at the 34th Annual Computer Security Applications Conference (ACSAC)
Rima A. Awad, Saeed Beztchi, Jared M. Smith, J. Bryan Lyles, Stacy Prowell
Publisher's website BibTeX

Towards Architecture and OS-Independent Malware Detection via Memory Forensics

ACM Conference on Computer and Communications Security (ACM CCS)
Rachel Petrik, Berat Arik, and Jared M. Smith
Publisher's website BibTeX

An Internet-Scale Feasibility Study of BGP Poisoning as a Security Primitive

Arxiv.org
Jared M. Smith, Kyle Birkeland, Tyler McDaniel, and Max Schuchard
Publisher's website BibTeX

Akatosh: Automated Cyber Incident Verification and Impact Analysis

ACM Conference on Computer and Communications Security (CCS)
Smith, Jared M., Greenlee, Elliot, Ferber, Aaron
BibTeX

Network Resiliency via Reactive Routing

Network and Distributed Systems Security Symposium (ISOC NDSS)
Jared M. Smith and Max Schuchard
BibTeX