Follow
Daryl Johnson
Daryl Johnson
Associate Professor in Computing Security, Rochester Institute of Technology
Verified email at rit.edu
Title
Cited by
Cited by
Year
Third Party Application Forensics on Apple Mobile Devices
A Levinson, B Stackpole, D Johnson
System Sciences (HICSS), 2011 44th Hawaii International Conference on, 1-9, 2011
592011
Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks
D Johnson, B Yuan, P Lutz, E Brown
58*2010
Covert channels in the HTTP network protocol: Channel characterization and detecting Man-in-the-Middle attacks
E Brown, B Yuan, D Johnson, P Lutz
The Proceedings of the 5th International Conference on Information Warfare …, 2010
462010
Forensic Acquisition and Analysis of VMware Virtual Hard Disks
M Hirwani, Y Pan, B Stackpole, D Johnson
The 2012 International Conference on Security and Management, 2012
282012
Behavior-based covert channel in cyberspace
D Johnson, P Lutz, B Yuan
Intelligent decision making systems, 311-318, 2010
232010
Developing Small Team-based Cyber Security Exercises
B Mauer, W Stackpole, D Johnson
Proceedings of the International Conference on Security and Management (SAM), 1, 2012
202012
Covert Channel over Network Time Protocol
A Ameri, D Johnson
International Conference on Cryptography, Security, and Privacy Proceedings …, 2017
192017
MODBUS Covert channel
C Leonardo, D Johnson
Proceedings of the International Conference on Security and Management (SAM), 1, 2014
122014
Covert Channel in the BitTorrent Tracker Protocol
J Desimone, D Johnson, B Yuan, P Lutz
The 2012 International Conference on Security and Management (SAM'12), 2012
112012
Covert Channel in the BitTorrent Tracker Protocol
J Desimone, D Johnson, B Yuan, P Lutz
The 2012 International Conference on Security and Management, 2012
112012
A HTTP cookie covert channel
W Huba, B Yuan, D Johnson, P Lutz
Proceedings of the 4th international conference on Security of information …, 2011
112011
A New Covert Channel over Cellular Voice Channel in Smartphones
B Aloraini, D Johnson, B Stackpole, S Mishra
arXiv preprint arXiv:1504.05647, 2015
102015
Crowdsourcing Computer Security Attack Trees
M Tentilucci, N Roberts, S Kandari, D Johnson, D Bogaard, B Stackpole, ...
10th Annual Symposium on Information Assurance (ASIA’15), 19, 2015
92015
Covert Channels in SSL Session Negotiation Headers
J Merrill, D Johnson
Proceedings of the International Conference on Security and Management (SAM), 70, 2015
92015
ICMP covert channel resiliency
K Stokes, B Yuan, D Johnson, P Lutz
Technological Developments in Networking, Education and Automation, 503-506, 2010
92010
Covert Channel using Man-In-The-Middle over HTTPS
M Johnson, P Lutz, D Johnson
The 2016 International Conference on Computational Science and Computational …, 2016
82016
Client-initiated HTTP covert channels using relays
G Daneault, D Johnson
2016 4th International Symposium on Digital Forensic and Security (ISDFS), 32-37, 2016
82016
Covert Channel using the IP Timestamp Option of an IPv4 Packet
H Alsaffar, D Johnson
The International Conference on Electrical and Bio-medical Engineering …, 2015
72015
A Covert Channel in TTL Field of DNS Packets
C Hoffman, D Johnson, B Yuan, P Lutz
The 2012 International Conference on Security and Management, 2012
72012
Audio Steganography Using High Frequency Noise Introduction
D Wheeler, D Johnson, B Yuan, P Lutz
The 2012 International Conference on Security and Management, 2012
72012
The system can't perform the operation now. Try again later.
Articles 1–20