Books

TJ OConnor. Violent Python: A Cookbook for Hackers, November 2012. Syngress Press.

Book Chapters

Rehah Mohamed, TJ OConnor, Markus Miettinen, William Enck, and Ahmad-Reza Sadeghi. HONEYSCOPE: IoT Device Protection with Deceptive Network Views. In Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, 2019. Springer.

Conferences And Workshops

TJ OConnor. Helo darkside: Breaking free from katas and embracing the adversarial mindset in cybersecurity education. In Special Interest Group on Cyber Security Education (SIGCSE), Virtual Event, March 2022. ACM.

 

Ahmed Alhazmi, Ghassen Kilani, William Allen, and TJ OConnor. A replication study for iot privacy preferences. In Conference on Omni-Layer Intelligent Systems (COINS), Virtual Event, August 2021. IEEE.

 

Daniel Campos and TJ OConnor. Towards labeling on-demand iot traffic. In Cyber Security Experimentation and Test (CSET), Virtual Event, August 2021. USENIX.

 

TJ OConnor, Dylan Jesse, and Daniel Camps. Through the spyglass: Toward iot companion app man-in-the-middle attacks. In Cyber Security Experimentation and Test (CSET), Virtual Event, August 2021. USENIX.

 

TJ OConnor and Chris Stricklan. Teaching a hands-on mobile and wireless cybersecurity course. In Innovation and Technology in Computer Science Education (ITiCSE), Virtual Event, June 2021. ACM.

 

Chris Stricklan and TJ OConnor. Towards binary diversified challenges for a hands-on reverse engineering course. In Innovation and Technology in Computer Science Education (ITiCSE), Virtual Event, June 2021. ACM.

 

Blake Janes, Heather Crawford, and TJ OConnor. Never ending story: Authentication and access control design flaws in shared iot devices. In Security and Privacy SafeThings Workshop (SafeThings), Virtual Event, May 2020. IEEE.

 

TJ OConnor, William Enck, and Bradley Reaves. Blinded and confused: Uncovering systemic flaws in device telemetry for smart-home internet of things. In Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami,FL, May 2019. ACM.

 

TJ OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, and Ahmad-Reza Sadeghi.  Homesnitch: Behavior transparency and control for smart home iot devices.  In Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Miami,FL, May 2019. ACM.

 

TJ OConnor, William Enck, W.M. Petullo, and Akash Verma. Pivotwall: Sdn-based information flow control. In Symposium on SDN Research (SoSR), San Francisco, CA, March 2018. ACM.

 

TJ OConnor and William Enck. Code-stop: Code-reuse prevention by context-aware traffic proxying. In Conference on Internet Monitoring and Protection (ICIMP), Barcelona, Spain, May 2016. IARIA.

 

Robert Fanelli and TJ OConnor. Experiences with practice-focused undergraduate security education.  In Cyber Security Experimentation and Test (CSET), Washington, DC, August 2010. USENIX.

 

TJ OConnor and Ben Sangster. honeym: A framework for implementing virtual honey clients for mobile devices. In Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Hoboken, NJ, March 2010. ACM.

 

TJ OConnor, Ben Sangster, and Erik Dean. Using hacking to teach computer science fundamentals. In American Society for Engineering Education. ASEE, March 2010.

 

Ben Sangster, TJ OConnor, Thomas Cook, and Robert Fanelli. Toward instrumenting network warfare competitions to generate labeled datasets. In Cyber Security Experimentation and Test (CSET), Montreal, CA, August 2009. USENIX.

 

TJ OConnor and Doug Reeves. Bluetooth network-based misuse detection. In Annual Computer Security Applications Conference (ACSAC), Anaheim, CA, December 2008. ACSAC.

Tech Reports

 

TJ OConnor. The Hacker Always Gets Through. In SANS Information Security Reading Room, April 2014. SANS.

 

TJ OConnor. The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare. In SANS Information Security Reading Room, December 2011. SANS.

 

TJ OConnor, Russ McRee, and Beth Binde. ssessing Outbound Traffic to Uncover Advanced Persistent Threat. In SANS Information Security Reading Room, May 2011. SANS.

 

TJ OConnor. Animal Farm: Protection from Client-Side Attacks by Rendering Content with Python and Squid. In SANS Information Security Reading Room, February 2011. SANS.

 

TJ OConnor. About Face: Defending Your Organization Against Penetration Testing Teams. In SANS Information Security Reading Room, December 2010. SANS.

 

TJ OConnor. Detecting and Responding to Data Link Layer Attacks. In SANS Information Security Reading Room, October 2010. SANS.

 

TJ OConnor. Grow Your Own Tools: A Taxonomy of Python Libraries Helpful for Forensic Analysis. In SANS Information Security Reading Room, October 2010. SANS.

 

Miscellaneous

 

TJ OConnor, Ryan Hand, and Matt McDougall. Studying Offensive Computing is Essential. In Army Communicator, Fall 2012. 

 

TJ OConnor and Joseph Doty. We Need Teams of Cyber Warriors. In Army Magazine, January 2010. 

 

Joe Doty, TJ OConnor, and Joe Gelineau. Technology’s Limits: The Best Leader is a Human, Not a Machine. Armed Forces Journal, September 2009. 

 

Joe Doty and TJ OConnor. Leadership versus Information Technology Management—Where Do We Go from Here? In Army Magazine, February 2009.