Network Access Control

We focus our investigation on adding context to empower fine-grained network access control for elaborate attacks. To this end, we examine the introduction of software designed networking (SDN) and the new opportunities it offers for network defense systems. SDN offers flexibility, transparency, and distributed control to enable novel security mechanisms not feasible in traditional networks. Our work examines if network-based access control can evolve to prevent elaborate attacks and application behaviors under varying context. To this end, we examine the various design and telemetry decisions for IoT devices as they offer an emerging and complex threat.

Related Publications

1. TJ OConnor, William Enck, and Bradley Reaves. Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May, 2019. Miami, FL. (Best Paper WiSec 2019)

2. TJ OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, and Ahmad-Reza Sadeghi. HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May, 2019. Miami, FL.

3. O'Connor, T.J., Enck. W, Petullo W.M, and Verma A, "PivotWall: SDN-Based Information Flow Control", SoSR 2018, Symposium on SDN Research, March 2018.

4. O'Connor, T.J., and Enck. W, "Code-Stop: Code-Reuse Prevention by Context-Aware Traffic Proxying"

ICIMP 2016, The Eleventh International Conference on Internet Monitoring and Protection, May 2016.

Bluetooth Security

Bluetooth, a protocol designed to replace peripheral cables, has grown steadily and includes a variety of applications. In near ubiquity now, the Bluetooth protocol operates on a wide variety of mobile and wireless devices. Several attacks exist that successfully target and exploit Bluetooth enabled devices. Our research implements a network intrusion detection system for discovering malicious Bluetooth traffic. 

 

Related Publications

 

1. O'Connor, T.J., "Bluetooth Intrusion Detection," (Graduate Thesis)

2. O’Connor, T.J., and Sangster, B., “honeyM: A Framework for Implementing Virtual Honeyclients for Mobile Devices,” WISEC 2010 Conference Proceedings, 2010 ACM Conference on Wireless Network Security, March 2010.

 

3. O’Connor, T.J., and Reeves, D., “Bluetooth Network-Based Misuse Detection,” ACSAC 2008 Conference Proceedings, pp. 377–391, 2008 Annual Computer Security Applications Conference, December 2008. 

 

 

Information Security Education

 

The combination of competitive security exercises and hands-on learning represents a powerful approach for teaching information system security. Although creating and maintaining such a course can be difficult, the benefits to learning are worthwhile. Our research explores countering enrollment decline via a curriculum that carefully exposes students to computer security as a means of teaching core computer science concepts, including algorithms, networks, compilers, programming languages, and operating systems. 

 

Related Publications

 

1. Fanelli, R., and O’Connor, T.J., “Experiences with Practice-Focused Undergraduate Security Education”, 3rd Workshop on Cyber Security Experimentation and Test, USENIX, August 2010.

 

2. O’Connor, T.J., Sangster, B., and Dean, E., “Using Hacking to Teach Computer Science Fundamentals,” American Society for Engineering Education (ASEE) Presentation, March 2010.

 

3. Sangster, B., O’Connor T.J., Cook, T., Fanelli, R., Dean, E., Adams, W., Morrell, C., and Conti, G., “Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets,” 2nd Workshop on Cyber Security Experimentation and Test, USENIX, August 2009.