Terrence (TJ) OConnor

Lieutenant Colonel (Retired), US Army

Education

North Carolina State University, Raleigh, NC

Ph.D., Computer Science, May 2019

Dissertation: Network Access Control through Host and Application Analysis

Advisor: Dr. William Enck

North Carolina State University, Raleigh, NC

M.S., Computer Science, May 2008

Thesis: Bluetooth Misuse Detection

Advisor: Dr. Douglas Reeves

 

SANS Technology Institute, Bethesda, MD

M.S., Information Security Engineering, 2012

Focus: Digital Forensics

Advisor: Dr. Ray Davidson

 

US Military Academy, West Point, NY

B.S., Computer Science, May 1999

Thesis: Denial of Service Prevention

Advisor: MAJ Jim Jensen

 

Academic and Research Appointments

 

Program Chair, Information Assurance and Cybersecurity, Florida Tech, 2019-Present

Assistant Professor, Computer Sciences and. Cybersecurity, Florida Tech, 2019-Present

Department Head, Army ROTC, Military Studies, Florida Tech, 2015-2019

Assistant Professor, US Military Academy, Dept. of Electrical Engineering and Computer Science, 2010-2011

Instructor, US Military Academy, Dept. of Electrical Engineering and Computer Science, 2008-2010

 

Military Assignments

 

Asst. Chief of Staff, G6 Communications, 1st Special Forces Command, 2014-2015

Directorate Signal Officer, Office of Special Warfare, 2013-2014

Group Signal Officer, 10th Special Forces Group, 2011-2013

Battalion Signal Officer, 1/7 Special Forces Battalion, 2003-2006

Battalion Signal Officer, 1/2 Attack Helicopter Battalion, 2000-2002

Platoon Leader, 57th Signal Battalion, 1999-2000

Selected Publications

 

1. TJ OConnor, William Enck, and Bradley Reaves. Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May, 2019. Miami, FL. (Best Paper WiSec 2019)

2. TJ OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, and Ahmad-Reza Sadeghi. HomeSnitch: Behavior Transparency and Control for Smart Home IoT Devices, Proceedings of the ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), May, 2019. Miami, FL.

3. O'Connor, T.J., Enck. W, Petullo W.M, and Verma A, "PivotWall: SDN-Based Information Flow Control", SoSR 2018, Symposium on SDN Research, March 2018.

4. O'Connor, T.J., and Enck. W, "Code-Stop: Code-Reuse Prevention by Context-Aware Traffic Proxying"

ICIMP 2016, The Eleventh International Conference on Internet Monitoring and Protection, May 2016.

5. Fanelli, R., and O’Connor, T.J., “Experiences with Practice-Focused Undergraduate Security Education”, 3rd Workshop on Cyber Security Experimentation and Test, USENIX, August 2010.

6. O’Connor, T.J., and Sangster, B., “honeyM: A Framework for Implementing Virtual Honeyclients for Mobile Devices,” WISEC 2010 Conference Proceedings, 2010 ACM Conference on Wireless Network Security, March 2010.

7. Sangster, B., O’Connor T.J., Cook, T., Fanelli, R., Dean, E., Adams, W., Morrell, C., and Conti, G., “Toward Instrumenting Network Warfare Competitions to Generate Labeled Datasets,” 2nd Workshop on Cyber Security Experimentation and Test, USENIX, August 2009.

8. O’Connor, T.J., and Reeves, D., “Bluetooth Network-Based Misuse Detection,” ACSAC 2008 Conference Proceedings, 2008 Annual Computer Security Applications Conference, December 2008. 

 

Honors

 

  • Best Paper Award, ACM WiSec, 2019. 

  • National Cybersecurity Innovation Award, March 2013

  • Ray C. Clark Award, US Military Academy D/EECS, May 2010

  • Bronze Star, Operation Enduring Freedom, US Army, June 2004

  • Bronze Order of Mercury, US Army Signal Regiment, May 2010

  • Cyber Challenge Champion, National Defense University, 2009

  • NSA Cyber Defense Exercise Winning Co-Coach, 2009, 2011

  • SANS Netwars Competition Record High Score, 2012

 

Affiliations

 

 

Professional Activities

 

Public Speaking

 

1. O'Connor, T.J., and Enck W, "Classifying and Enforcing Network Profiles of Smart Home IoT Devices", SELIoT: SEcuring Lifecycle of Internet of Things, Aalto University, Finland, September 2017.

2. O'Connor, T.J. "Ethical and Technical Considerations of the FBI's iPhone Writ", US Military Academy Cyber Defense Laboratory Invited Guest Speaker, March 2016. 

3. O'Connor, T.J., and Burhop David, "The Hacker Always Gets Through," American Association of Motor Vehicle Administrators, Louisville, KY, June 2016. (Slides)

4. O’Connor, T.J., “Why Every Defender Should Know How To Write Exploits,” B-Sides Augusta Security Conference, Augusta, GA, September 2013.

5. O’Connor, T.J., “Don’t Pull Your Goalie: The Role of an Active Defense,” ForenSecure Security Conference, Wheaton, IL, April 2013.

6. O’Connor, T.J., and Tomes, T., “Hide and Seek: Post-Exploitation Style,” ShmooCon Security Conference, Washington DC, February 2013. (Video)

7. O’Connor, T.J., Wertheimer, M., DiGiovanni, F., Papay, M., Brown, J., and Mahaffey, K., “Cyber Security Training,” I/ITSEC 2013, Orlando, FL, December 2012.

8. O’Connor, T.J., Bassel, E., Carroll, O, Denman, B., Fanelli, R., and Runyan, S., “Keys to Fighting and Winning a Cyber War,” AFCEA Homeland Security Conference 2012, Washington DC, February 2012.

9. O’Connor, T.J., Sangster, B., and Dean, E., “Using Hacking to Teach Computer Science Fundamentals,” American Society for Engineering Education (ASEE) Presentation, March 2010.

10. O’Connor, T.J., Grunzweig, N., and Brasefield, D., “honeyM: A Framework for Implementing Virtual Honeyclients for Mobile Devices,” ShmooCon Security Conference, Washington DC, February 2010.