• Feature Selection for Malware Classification

    Mitchell Mays, Noah Drabinsky, Dr. Stefan Brandle · Apr 2017
    28th Modern Artificial Intelligence and Cognitive Science Conference (MAICS)
    thumbnail In applying machine learning to malware identification, different types of features have proven to be successful. These features have also been tested with different kinds of classification methodologies and have had varying degrees of success. Every time a new machine learning methodology is introduced for classifying malware, there is the...
  • Improved User Security Through Graphical Feedback

    Justice Juraschek, Dannie M. Stanley · Jul 2016
    thumbnail A plethora of methods of being secure are available to end-users. However, there is a lack of adoption of those methods. We argue that one of the primary reasons for this is the absence of proper feedback within security-sensitive situations. We believe that a graphical representation of security-related consequences can positively influence...
  • Improved Kernel Security Through Memory Layout Randomization

    Dannie M. Stanley, Dongyan Xu, Eugene H. Spafford · Dec 2013
    32nd International Performance Computing and Communications Conference (IPCCC)
    thumbnail The vast majority of hosts on the Internet, including mobile clients, are running on one of three major operating system families. Malicious operating system kernel software, such as the code introduced by a kernel rootkit, is strongly dependent on the organization of the victim operating system. Due to the lack of diversity of operating systems,...
  • Ensuring the Minimality of Included Kernel Components

    Dannie M. Stanley · Dec 2013
    Improved Kernel Security Through Code Validation, Diversification, and Minimization pp. 79-90 (Open Access Dissertations)
    thumbnail Kernels shipped with general-purpose operating systems often contain extraneous code. The unnecessary kernel code is a security liability. The code may contain exploitable vulnerabilities or may be pieced together using return/jump-oriented programming to attack the system. Run-time kernel minimization can be used to improve the security of an...
  • Guest-Transparent Instruction Authentication for Self-Patching Kernels

    Dannie Stanley, Zhui Deng, Dongyan Xu, Rick Porter, Shane Snyder · Oct 2012
    Proceedings of Military Communications Conference (MILCOM)
    thumbnail Attackers can exploit vulnerable programs that are running with elevated permissions to insert kernel rootkits into a system. Security mechanisms have been created to prevent kernel rootkit implantation by relocating the vulnerable physical system to a guest virtual machine and enforcing a W ⊕ KX memory access control policy from the host virtual...
  • Exploiting Stateful Firewalls

    Dannie M. Stanley · Mar 2011
    thumbnail Firewalls attempt to provide network access control. However, we describe a vulnerability that allows an outside attacker in collaboration with a mole to access UDP and TCP services running on an internal “protected” network. The End-to-End Argument in system design states that functions which depend on applications running on the end...
  • High-Granularity Network Artifacts for Cyber Testing

    Jonathan Geisler, Stefan Brandle, Arthur White · Sep 2009
    Proprietary research (details intentionally withheld) for Lockheed-Martin Advanced Technology Laboratories in the area of high-granularity network artifacts for cyber testing: Fall 2009 (1 faculty, 1 student researcher) Spring 2010 (2 faculty, 2 student researchers) Summer 2010 (1 faculty, 1 student researcher) Fall 2010 (3 faculty, 5 student...

236 W. Reade Ave., Upland, IN 46989 · 765-998-5162 ·
Copyright © 2016 Taylor University Computer Science and Engineering