top of page
Books

1. O'Connor, T.J. Violent Python: A Cookbook for Hackers. Syngress Press, November 2012. [bib]

Book Chapters

  1. Mohamed, R., O'Connor, T.J., Miettinen, M., Enck, W., Sadeghi, A.-R. "HONEYSCOPE: IoT Device Protection with Deceptive Network Views." In Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, Springer, 2019. [bib]

Journal Articles

  1. Namukasa, M., Chaparro Osman, M., Ficke, C., Piasecki, I., O'Connor, T.J., Carroll, M. "Evaluation of an Internet of Things Device-Based Educational Approach to Engage a More Diverse Cybersecurity Workforce." International Journal of Human-Computer Interaction, January 2024. [bib] [pdf]

  2. O'Connor, T.J., Brown, D., Jackson, J., Schmeelk, S., Payne, B. "Compete to Learn: Toward Cybersecurity As A Sport." The Journal of Cybersecurity Education Research and Practice (JCERP), Kennesaw, GA, 2023. [bib][pdf]

  3. Chaparro Osman, M., Namukasa, M., Ficke, C., Piasecki, I., O'Connor, T.J., Carroll, M. "Understanding how to diversify the cybersecurity workforce: A qualitative analysis." The Journal of Cybersecurity Education Research and Practice (JCERP), Kennesaw, GA, 2023. [bib] [pdf]

Conferences And Workshops

  1. Suarez, L., Alshubrumi, D., O'Connor, T.J., Sudhakaran, S. "Unsafe at any Bandwidth: Towards Understanding Risk Factors for Ransomware in Higher Education." Workshop on Data-Driven Security (DDWS 2024), Hasselt, Belgium, April 2024. [pdf]

  2. O'Connor, T.J., Schmith, A., Stricklan, C., Carvalho, M., Sudhakaran, S. "Pwn Lessons Made Easy With Docker: Toward an Undergraduate Vulnerability Research Cybersecurity Class." Technical Symposium on Computer Science Education (SIGCSE TS 24), Portland, OR, March 2024. [bib] [pdf]

  3. Gough, C., Mann, C., Ficke, C., Namukasa, M., Carroll, M., O'Connor, T.J. "Remote Controlled Cyber: Toward Engaging and Educating a Diverse Cybersecurity Workforce." Technical Symposium on Computer Science Education (SIGCSE TS 24), Portland, OR, March 2024. [bib] [pdf]

  4. Fernalld, K., O'Connor, T.J., Sudhakaran, S., Nur, N. "Lightweight Symphony: Towards Reducing Computer Science Student Anxiety with Standardized Docker Environments." Special Interest Group on Information Technology Education (SIGITE 23), Marietta, GA, October 2023. [bib] [pdf]

  5. O'Connor, T.J., Jessee, D., Campos, D. "Towards Examining The Security Cost of Inexpensive Smart Home IoT Devices." IEEE International Workshop on Consumer Devices, Systems, and Services (CDS 2023), Torino, Italy, June 2023. [bib] [pdf]

  6. Olsen, S., O'Connor, T.J. "Toward a Labeled Dataset of IoT Malware Features." IEEE Computers, Software, and Applications Conference (COMPSAC 2023), Torino, Italy, June 2023. [bib] [pdf]

  7. Ganeriwala, P., Gupta, A., Campos, D., Bhattacharyya, S., O'Connor, T.J., Dcosta, A. "Modeling Internet-of-Things (IoT) Behavior for Enforcing Security and Privacy Policies." Computing Conference 2023, London, UK, June 2023. [bib] [pdf]

  8. Alhazm, A., Alawaji, K., O'Connor, T.J. "MPO: MQTT-Based Privacy Orchestrator for Smart Home Users." IEEE Computers, Software, and Applications Conference (COMPSAC 2022), Virtual Event, July 2022. IEEE. [bib][pdf]

  9. O'Connor, T.J., Mann, C., Petersen, T., Thomas, I., Stricklan, C. "Toward an Automatic Exploit Generation Competition for an Undergraduate Binary Reverse Engineering Course." Innovation and Technology in Computer Science Education (ITiCSE 2022), Dublin, Ireland, July 2022. ACM. [bib] [pdf]

  10. O'Connor, T.J. "Helo darkside: Breaking free from katas and embracing the adversarial mindset in cybersecurity education." Technical Symposium on Computer Science Education (SIGCSE TS 2022), Providence, RI, March 2022. ACM. [bib] [pdf]

  11. Alhazm, A., Kilani, G., Allen, W., O'Connor, T.J. "A replication study for IoT privacy preferences." Conference on Omni-Layer Intelligent Systems (COINS 2021), Virtual Event, August 2021. IEEE. [bib] [pdf]

  12. Campos, D., O'Connor, T.J. "Towards labeling on-demand IoT traffic." Cyber Security Experimentation and Test (CSET 2021), Virtual Event, August 2021. USENIX. [bib] [pdf]

  13. O'Connor, T.J., Jesse, D., Campos, D. "Through the spyglass: Toward IoT companion app man-in-the-middle attacks." Cyber Security Experimentation and Test (CSET 2021), Virtual Event, August 2021. USENIX. [bib][pdf]

  14. O'Connor, T.J., Stricklan, C. "Teaching a hands-on mobile and wireless cybersecurity course." Innovation and Technology in Computer Science Education (ITiCSE 2021), Virtual Event, June 2021. ACM. [bib] [pdf]

  15. Stricklan, C., O'Connor, T.J. "Towards binary diversified challenges for a hands-on reverse engineering course." Innovation and Technology in Computer Science Education (ITiCSE 2021), Virtual Event, June 2021. ACM. [bib] [pdf]

  16. Janes, B., Crawford, H., O'Connor, T.J. "Never ending story: Authentication and access control design flaws in shared IoT devices." Security and Privacy SafeThings Workshop (SafeThings 2020), Virtual Event, May 2020. IEEE. [bib] [pdf]

  17. O'Connor, T.J., Enck, W., Reaves, B. "Blinded and confused: Uncovering systemic flaws in device telemetry for smart-home internet of things." Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2019), Miami, FL, May 2019. ACM. [bib] [pdf]

  18. O'Connor, T.J., Mohamed, R., Miettinen, M., Enck, W., Reaves, B., Sadeghi, A.-R. "Homesnitch: Behavior transparency and control for smart home IoT devices." Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2019), Miami, FL, May 2019. ACM. [bib] [pdf]

  19. O'Connor, T.J., Enck, W., Petullo, W.M., Verma, A. "Pivotwall: SDN-based information flow control." Symposium on SDN Research (SoSR 2018), San Francisco, CA, March 2018. ACM. [bib] [pdf]

  20. O'Connor, T.J., Enck, W. "Code-stop: Code-reuse prevention by context-aware traffic proxying." Conference on Internet Monitoring and Protection (ICIMP 2016), Barcelona, Spain, May 2016. IARIA. [bib] [pdf]

  21. Fanelli, R., O'Connor, T.J. "Experiences with practice-focused undergraduate security education." Cyber Security Experimentation and Test (CSET 2010), Washington, DC, August 2010. USENIX. [bib] [pdf]

  22. O'Connor, T.J., Sangster, B. "honeym: A framework for implementing virtual honey clients for mobile devices." Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2010), Hoboken, NJ, March 2010. ACM. [bib] [pdf]

  23. Sangster, B., O'Connor, T.J., Cook, T., Fanelli, R. "Toward instrumenting network warfare competitions to generate labeled datasets." Cyber Security Experimentation and Test (CSET 2009), Montreal, CA, August 2009. USENIX. [bib] [pdf]

  24. O'Connor, T.J., Reeves, D. "Bluetooth network-based misuse detection." Annual Computer Security Applications Conference (ACSAC 2008), Anaheim, CA, December 2008. ACSAC. [bib] [pdf]

Tech Reports

  1. O'Connor, T.J. "The Hacker Always Gets Through." SANS Information Security Reading Room, April 2014. SANS. [pdf]

  2. O'Connor, T.J. "The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare." SANS Information Security Reading Room, December 2011. SANS. [pdf]

  3. O'Connor, T.J., McRee, R., Binde, B. "Assessing Outbound Traffic to Uncover Advanced Persistent Threat." SANS Information Security Reading Room, May 2011. SANS.

  4. O'Connor, T.J. "Animal Farm: Protection from Client-Side Attacks by Rendering Content with Python and Squid." SANS Information Security Reading Room, February 2011. SANS. [pdf]

  5. O'Connor, T.J. "About Face: Defending Your Organization Against Penetration Testing Teams." SANS Information Security Reading Room, December 2010. SANS. [pdf]

  6. O'Connor, T.J. "Detecting and Responding to Data Link Layer Attacks." SANS Information Security Reading Room, October 2010. SANS. [pdf]

  7. O'Connor, T.J. "Grow Your Own Tools: A Taxonomy of Python Libraries Helpful for Forensic Analysis." SANS Information Security Reading Room, October 2010. SANS. [pdf]

Miscellaneous

 

  1. O'Connor, T.J., Hand, R., McDougall, M. "Studying Offensive Computing is Essential." Army Communicator, Fall 2012. [bib] [pdf]

  2. O'Connor, T.J., Doty, J. "Building Teams of Cyber Warriors." Army Magazine, January 2010. [pdf]

  3. Doty, J., O'Connor, T.J., Gelineau, J. "Technology’s Limits: The Best Leader is a Human, Not a Machine." Armed Forces Journal, September 2009.

  4. Doty, J., O'Connor, T.J. "Leadership versus Information Technology Management—Where Do We Go from Here?" Army Magazine, February 2009. [pdf]

bottom of page