Our research projects are generously supported by federal and other agencies/institutions. We list them as follows to acknowledge their support.

  • National Science Foundation (NSF)
  • National Security Agency (NSA)
  • Army Research Office (ARO)
  • Office of Naval Research (ONR)
  • Louisiana State Board of Regents (LA-BoR)
  • University of New Orleans (UNO)
  • Oak Ridge Associated Universities (ORAU)

We are involved in a number of research areas in cybersecurity. Their references to our published work are mentioned here:

Digital Forensics
Industrial Control System (ICS) Security and Forensics
System Security
Malware
Human Aspects of Cybersecurity
Cybersecurity Education


Digital Forensics

Memory Forensics

  • Kernel Pool Monitoring and the Integrity Checking of Function Pointers
  • Fast, Scalable and Lightweight Process Heap Analyzer
  • Compressed RAM and Live Forensics
  • Integrity Checking of OS Kernel Data Structures such as Interrupt Descriptor Table
  • Kernel Module Integrity Checking

Code Fingerprinting

  • Leveraging Relocations in Kernel ELF-binaries for Linux Kernel Version Identification
  • Robust Fingerprinting for Relocatable Code
  • Android Malware Fingerprinting
  • Image-Based Kernel Fingerprinting using Similarity Hashing

Cloud Forensics

  • Cloud Forensics - A True Game Changer
  • Analysis of Cloud Digital Evidence
  • Cloud Forensics-Tool Development Studies & Future Outlook
  • Forensic Acquisition of Cloud Drives

File Type/Encoding Identification

  • Content-based File-type Identification using Cosine Similarity and a Divide-and-Conquer approach
  • Fast Content-based File-type Identification
  • Fast File-type Identification
  • On Improving the Accuracy and Performance of Content-based File-type Identification

Industrial Control System (ICS) Security and Forensics

Exploring New Attack Vectors and Vulnerabilities

  • Control Logic Injection Attacks on Industrial Control Systems
  • Attacking Control Logic with Decompilation and Virtual PLC
  • Denial of Engineering Operations Attacks in Industrial Control Systems
  • [ICS-CERT] ICS Advisory (ICSA-18-240-01) Schneider Electric Modicon M221

Attack Detection, Analysis, and Recovery

  • Overshadow PLC to Detect Remote Control-Logic Injection Attacks
  • Gap Analysis of Intrusion Detection in Smart Grids

Digital Forensics Readiness, Tools and Techniques

  • Automated Reconstruction of Control Logic for Programmable Logic Controller Forensics
  • Denial of Engineering Operations Attacks in Industrial Control Systems
  • Programmable Logic Controller Forensics
  • SCADA Network Forensics of the PCCC Protocol
  • A SCADA System Testbed for Cybersecurity and Forensic Research and Pedagogy
  • SCADA Systems: Challenges for Forensic Investigators

System Security

Hypervisor and Virtual Machine Introspection

  • Automatic Mitigation of Kernel Rootkits in Cloud Environments
  • Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection
  • Integrity Checking of Interrupt Descriptor Table in Cloud Environments
  • ModChecker: Kernel Module Integrity Checking in the Cloud Environment

Malware

Software/Protocol Reverse Engineering

  • Automated Reconstruction of Control Logic for Programmable Logic Controller Forensics
  • CLIK on PLCs! Attacking Control Logic with Decompilation and Virtual PLC
  • Denial of Engineering Operations Attacks in Industrial Control Systems

Malware Detection, Analysis, and Characterization

  • Distributed Denial of Service Attacks and Defense Mechanism: Current Landscape and Future Directions
  • Automatic Mitigation of Kernel Rootkits in Cloud Environments
  • Portable, Fine-Grained Access Control for Android’s Native Content Providers
  • Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection
  • Integrity Checking of Interrupt Descriptor Table in Cloud Environments
  • ModChecker: Kernel Module Integrity Checking in the Cloud Environment
  • Classification of Packet Contents for Malware Detection

Human Aspects of Cybersecurity

Studying and Improving (In)secure Cyber Behavior of End Users

  • Susceptibility and Resilience to Cyber Threat: Findings from a Scenario Decision Program to Measure Secure and Insecure Computing Behavior
  • Self-reported secure and insecure cyber behaviour: factor structure and associations with personality factors
  • SPICE: A Software Tool for Bridging the Gap Between End-user’s Insecure CyberBehavior and Personality Traits “https://github.com/ahmirf/Susceptibility-and-Resilience-to-Cyber-Threat-SRCTtarget”

Cybersecurity Education

Pedagogical Techniques

  • Evaluation of Peer Instruction for Cybersecurity Education
  • Topological Scoring of Concept Maps for Cybersecurity Education
  • Peer Instruction Teaching Methodology for Cybersecurity Education
  • Using Virtual MachineIntrospection for OS Kernel Security Education
  • Peer Instruction for Digital Forensics
  • Development of Peer Instruction Questions for Cybersecurity Education