Books

O’Connor, T.J., Violent Python: A Cookbook for Hackers, Syngress Press, November 2012. 

Book Chapters

Rehah Mohamed, Terrence O’Connor, Markus Miettinen, William Enck, and Ahmad-Reza Sadeghi.HONEYSCOPE: IoT Device Protection with Deceptive Network ViewsAutonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings Springer, Editor: Al-Shaer, Ehab and Wei, Jinpeng and Hamlen, Kevin W. and Wang, Cliff, 2019. 

Conference Publications

1. TJ OConnor, William Enck, and Bradley Reaves. Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May, 2019. Miami, FL. (WiSec 19 Best Paper Award)

2. TJ OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, and Ahmad-Reza Sadeghi. HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May, 2019. Miami, FL.

3. O'Connor, T.J., Enck. W, Petullo W.M, and Verma A, "PivotWall: SDN-Based Information Flow Control", SoSR 2018, Symposium on SDN Research, March 2018.

4. O'Connor, T.J., and Enck. W, "Code-Stop: Code-Reuse Prevention by Context-Aware Traffic Proxying"

ICIMP 2016, The Eleventh International Conference on Internet Monitoring and Protection, May 2016.

6. Fanelli, R., and O’Connor, T.J., “Experiences with Practice-Focused Undergraduate Security Education”, 3rd Workshop on Cyber Security Experimentation and Test, USENIX, August 2010.

7. O’Connor, T.J., and Sangster, B., “honeyM: A Framework for Implementing Virtual Honeyclients for Mobile Devices,” WISEC 2010 Conference Proceedings, 2010 ACM Conference on Wireless Network Security, March 2010.

8. Sangster, B., O’Connor T.J., Cook, T., Fanelli, R., Dean, E., Adams, W., Morrell, C., and Conti, G., “Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets,” 2nd Workshop on Cyber Security Experimentation and Test, USENIX, August 2009.

9. O’Connor, T.J., and Reeves, D., “Bluetooth Network-Based Misuse Detection,” ACSAC 2008 Conference Proceedings, pp. 377–391, 2008 Annual Computer Security Applications Conference, December 2008. 

 

Tech Reports

 

1. O’Connor, T.J., “The Hacker Always Gets Through,” SANS Information Security Reading Room, 15 April 2014.

 

2. O’Connor, T.J., “The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare,” SANS Information Security Reading Room, 30 December 2011.

 

3. O’Connor, T.J., McRee, R., and Binde, B., “Assessing Outbound Traffic to Uncover Advanced Persistent Threat,” SANS Information Reading Room, 1 May 2011.

 

4. O’Connor, T.J., “Animal Farm: Protection from Client-Side Attacks by Rendering Content with Python and Squid,” SANS Information Security Reading Room, 21 February 2011.

 

5. O’Connor, T.J., “About Face: Defending Your Organization Against Penetration Testing Teams,” SANS Information Security Reading Room, 6 December 2010.

 

6. O’Connor, T.J., “Detecting and Responding to Data Link Layer Attacks,” SANS Information Security Reading Room, 15 October 2010.

 

7. O’Connor, T.J., “Grow Your Own Tools: A Taxonomy of Python Libraries Helpful for Forensic Analysis,” SANS Information Security Reading Room, 13 September 2010. 

 

Miscellaneous

 

1. O’Connor, T.J., Hand, R., and McDougall, M., “Studying Offensive Computing is Essential,” Army Communicator, Fall 2012.

 

2. O’Connor, T.J., and Doty, J., “We Need Teams of Cyber Warriors,” Army Magazine, January 2010.

 

3. Doty, J., O’Connor, T.J., and Gelineau, J., “Technology’s Limits: The Best Leader is a Human, Not a Machine,” Armed Forces Journal, September 2009.

 

4. Doty, J., and O’Connor, T.J., “Leadership versus Information Technology Management—Where Do We Go from Here?” Army Magazine, pp. 20–22, February 2009.