Site-wide links

Scholarly Works

Daryl Johnson
Associate Professor

2012 Submissions

Published Conference Proceedings

Johnson, Daryl, Dan Bogaard, and Robert Parody. "Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. *

Johnson, Daryl, et al. "Forensic Acquisition and Analysis of VMware Virtual Hard Disks." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. *

Johnson, Daryl, et al. "Employing Entropy in the Detection and Monitoring of Network Covert Channels." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "A Covert Channel Over Transport Layer Source Ports." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "A Physical Channel in a Digital World." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "A Covert Channel in TTL Field of DNS Packets." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "Covert Channel in the BitTorrent Tracker Protocol." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "Audio Steganography Using High Frequency Noise Introduction." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "UPnP Port Manipulation as a Covert Channel." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "Webpage Source Based Covert Channel." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, Brandon Mauer, and Bill Stackpole. "Developing Small Team-based Cyber Security Exercises." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "A Behavior Based Covert Channel within Anti-Virus Updates." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜