The combination of competitive security exercises and hands-on learning represents a powerful approach to teaching information system security. Although creating and maintaining such a course can be difficult, the benefits of learning are worthwhile. Our research explores countering enrollment decline via a curriculum that carefully exposes students to computer security as a means of teaching core computer science concepts, including algorithms, networks, compilers, programming languages, and operating systems.
TJ OConnor, Dane Brown, Jasmine Jackson, Suzaan Schmeelk, Bryson Payne. Compete to Learn: Toward Cybersecurity As A Sport. In The Journal of Cybersecurity Education Research and Practice (JCERP), Kennesaw, GA, June 2023 [bib] [pdf]
TJ OConnor, Carl Mann, Tiffanie Petersen, Isaiah Thomas, and Chris Stricklan. Toward an Automatic Exploit Generation Competition for an Undergraduate Binary Reverse Engineering Course. In Innovation and Technology in Computer Science Education (ITiCSE), Dublin, Ireland, July 2022. ACM. [bib] [pdf]
TJ OConnor. HELO DarkSide: Breaking free from katas and embracing the adversarial mindset in cybersecurity education. In Special Interest Group on Computer Science Education (SIGCSE), Providence, RI, March 2022. ACM. [bib] [pdf]
Chris Stricklan, TJ OConnor. Towards Binary Diversified Challenges For A Hands-On Reverse Engineering Course. ACM Innovation and Technology in Computer Science Education (ITiCSE). June 2021. [bib] [pdf]
Robert Fanelli and TJ OConnor. Experiences with Practice-Focused Undergraduate Security Education. 3rd Workshop on Cyber Security Experimentation and Test (CSET), USENIX, August 2010. [bib] [pdf]
TJ OConnor, Ben Sangster and Erik Dean. Using Hacking to Teach Computer Science Fundamentals. American Society for Engineering Education (ASEE), March 2010. [bib] [pdf]
Internet of Things Security and Privacy
Smart-home devices' always-on, always-connected nature complicates Internet-of-Things (IoT) security and privacy. Unlike traditional hosts, IoT devices constantly send sensor, state, and heartbeat data to cloud-based servers. These data channels require reliable, routine communication, often at odds with an IoT device's storage and power constraints. Although recent efforts such as pervasive encryption have addressed protecting data in transit, there remains little insight into designing mechanisms for protecting integrity and availability for always-connected devices. We seek to better understand smart-home security by studying vendor and design decision IoT telemetry messaging protocols and behaviors.
TJ OConnor, Dylan Jessee, and Daniel Campos. Towards Examining The Security Cost of Inexpensive Smart Home IoT Devices. IEEE International Workshop on Consumer Devices, Systems, and Services (CDS 2023), Torino, Italy, June 2023.
Stian Olsen and TJ OConnor. Toward a Labeled Dataset of IoT Malware Features. IEEE Computers, Software, and Applications Conference (COMPSAC 2023), Torino, Italy, June 2023.
Parth Ganeriwala, Anubhav Gupta, Daniel Campos, Siddhartha Bhattacharyya, TJ OConnor, Adolf Dcosta, Modeling Internet-of-Things (IoT) Behavior for Enforcing Security and Privacy Policies. In Computing Conference 2023, London, UK, June 2023. [pdf]
Ahmed Alhazm, Khulud Alawaji, and TJ OConnor. MPO: MQTT-Based Privacy Orchestrator for Smart Home Users. In Computers, Software, and Applications Conference (COMPSAC), Virtual Event, July 2022. IEEE. [bib] [pdf]
Ahmed Alhazmi, Ghassen Kilani, William Allen, and TJ OConnor. A replication study for IoT privacy preferences. In Conference on Omni-Layer Intelligent Systems (COINS), Virtual Event, August 2021. IEEE. [bib] [pdf]
TJ OConnor, Dylan Jesse, and Daniel Camps. Through the spyglass: Toward IoT companion app man-in-the-middle attacks. In Cyber Security Experimentation and Test (CSET), Virtual Event, August 2021. USENIX. [bib] [pdf]
Blake Janes, Heather Crawford, and TJ OConnor. Never-ending story: Authentication and access control design flaws in shared IoT devices. In Security and Privacy SafeThings Workshop (SafeThings), Virtual Event, May 2020. IEEE. [bib] [pdf]
Network Access Control
We focus our investigation on adding context to empower fine-grained network access control for elaborate attacks. To this end, we examine the introduction of software-designed networking (SDN) and its new opportunities for network defense systems. SDN offers flexibility, transparency, and distributed control to enable novel security mechanisms not feasible in traditional networks. Our work examines if network-based access control can evolve to prevent elaborate attacks and application behaviors under varying contexts. To this end, we examine the various design and telemetry decisions for IoT devices as they offer an emerging and complex threat.
TJ OConnor, William Enck, and Bradley Reaves. Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May, 2019. Miami, FL. (Best Paper WiSec 2019) [bib] [pdf]
TJ OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, and Ahmad-Reza Sadeghi. HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May 2019. Miami, FL. [bib] [pdf]
TJ OConnor, William Enck, W.M. Petullo, and Akash Verma. Pivotwall: Sdn-based information flow control. In Symposium on SDN Research (SoSR), San Francisco, CA, March 2018. ACM. [bib] [pdf]
Bluetooth, a protocol designed to replace peripheral cables, has grown steadily and includes a variety of applications. In near ubiquity now, the Bluetooth protocol operates on various mobile and wireless devices. Several attacks exist that successfully target and exploit Bluetooth-enabled devices. Our research implements a network intrusion detection system for discovering malicious Bluetooth traffic.
O'Connor, T.J., "Bluetooth Intrusion Detection," (Graduate Thesis)
O’Connor, T.J., and Sangster, B., “honeyM: A Framework for Implementing Virtual Honeyclients for Mobile Devices,” WISEC 2010 Conference Proceedings, 2010 ACM Conference on Wireless Network Security, March 2010. [bib] [pdf]
O’Connor, T.J., and Reeves, D., “Bluetooth Network-Based Misuse Detection,” ACSAC 2008 Conference Proceedings, pp. 377–391, 2008 Annual Computer Security Applications Conference, December 2008. [bib] [pdf]