Books

O’Connor, T.J., Violent Python: A Cookbook for Hackers, Syngress Press, November 2012. 

Book Chapters

Rehah Mohamed, Terrence O’Connor, Markus Miettinen, William Enck, and Ahmad-Reza Sadeghi.HONEYSCOPE: IoT Device Protection with Deceptive Network ViewsAutonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings Springer, Editor: Al-Shaer, Ehab and Wei, Jinpeng and Hamlen, Kevin W. and Wang, Cliff, 2019. 

Conference Publications

TJ OConnor, Chris Stricklan. Teaching a Hands-On Mobile and Wireless Cybersecurity Course. ACM Innovation and Technology in Computer Science Education (ITiCSE). June 2021. (acceptance rate=31%) [pdf]

 

Chris Stricklan, TJ OConnor. Towards Binary Diversified Challenges For A Hands-On Reverse Engineering Course. ACM Innovation and Technology in Computer Science Education (ITiCSE). June 2021. (acceptance rate=31%) [pdf]

Blake Janes, Heather Crawford, and TJ OConnor. Never Ending Story: Authentication and Access Control Design Flaws in Shared IoT Devices. IEEE Security and Privacy SafeThings Workshop (SafeThings). May, 2020. [pdf]

 

TJ OConnor, William Enck, and Bradley Reaves. Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May, 2019.  (acceptance rate=25.6%, Best Paper) 

TJ OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, and Ahmad-Reza Sadeghi. HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May, 2019. (acceptance rate=25.6%)

TJ OConnor, William Enck, W.M. Petullo, and Akash Verma. "PivotWall: SDN-Based Information Flow Control", Symposium on SDN Research (SoSR), March 2018. (acceptance rate=28.6%)

TJ OConnor, William Enck. "Code-Stop: Code-Reuse Prevention by Context-Aware Traffic Proxying"

The Eleventh International Conference on Internet Monitoring and Protection (ICIMP), May 2016. (acceptance rate=28%)

R. Fanelli, TJ OConnor. “Experiences with Practice-Focused Undergraduate Security Education”, 3rd Workshop on Cyber Security Experimentation and Test (CSET), USENIX, August 2010.

TJ OConnor, Ben Sangster. “honeyM: A Framework for Implementing Virtual Honeyclients for Mobile Devices,” Proceedings of the ACM Conference on Wireless Network Security (WiSec), March 2010.

TJ OConnor, Ben Sangster, and Erik Dean. “Using Hacking to Teach Computer Science Fundamentals,” American Society for Engineering Education (ASEE), March 2010.

Ben Sangster, TJ OConnor, et. al  Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets,” 2nd Workshop on Cyber Security Experimentation and Test, USENIX, August 2009.

TJ OConnor, Doug Reeves, “Bluetooth Network-Based Misuse Detection,” Annual Computer Security Applications Conference (ACSAC), December 2008. (acceptance rate=24%)

Tech Reports

 

O’Connor, T.J., “The Hacker Always Gets Through,” SANS Information Security Reading Room, 15 April 2014.

O’Connor, T.J., “The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare,” SANS Information Security Reading Room, 30 December 2011.

O’Connor, T.J., McRee, R., and Binde, B., “Assessing Outbound Traffic to Uncover Advanced Persistent Threat,” SANS Information Reading Room, 1 May 2011.

O’Connor, T.J., “Animal Farm: Protection from Client-Side Attacks by Rendering Content with Python and Squid,” SANS Information Security Reading Room, 21 February 2011.

O’Connor, T.J., “About Face: Defending Your Organization Against Penetration Testing Teams,” SANS Information Security Reading Room, 6 December 2010.

O’Connor, T.J., “Detecting and Responding to Data Link Layer Attacks,” SANS Information Security Reading Room, 15 October 2010.

O’Connor, T.J., “Grow Your Own Tools: A Taxonomy of Python Libraries Helpful for Forensic Analysis,” SANS Information Security Reading Room, 13 September 2010. 

 

Miscellaneous

 

1. O’Connor, T.J., Hand, R., and McDougall, M., “Studying Offensive Computing is Essential,” Army Communicator, Fall 2012.

 

2. O’Connor, T.J., and Doty, J., “We Need Teams of Cyber Warriors,” Army Magazine, January 2010.

 

3. Doty, J., O’Connor, T.J., and Gelineau, J., “Technology’s Limits: The Best Leader is a Human, Not a Machine,” Armed Forces Journal, September 2009.

 

4. Doty, J., and O’Connor, T.J., “Leadership versus Information Technology Management—Where Do We Go from Here?” Army Magazine, pp. 20–22, February 2009.