Site-wide links

Scholarly Works

Daryl Johnson
Associate Professor

2015 Submissions

Published Conference Proceedings

Ackerman, Geoffrey, Johnson, Daryl, and Stackpole, Bill. "Covert Channel Using ICMPv6 and IPv6 Addressing." Proceedings of the The 2015 International Conference on Security and Management. Ed. Hamid R. Arabnia. Las Vegas, NV: n.p., 2015. Print. *

Merrill, Justin and Johnson, Daryl. "Covert Channels in SSL Session Negotiation Headers." Proceedings of the The 2015 International Conference on Security and Management. Ed. Hamid R. Arabnia. Las Vegas, NV: n.p., 2015. Print. *

Harmat, Bryan, et al. "The Security Implications of IMSI Catchers." Proceedings of the The 2015 International Conference on Security and Management. Ed. Hamid R. Arabnia. Las Vegas, NV: n.p., 2015. Print. *

Harmat, Bryan, Stroud, Jared, and Johnson, Daryl. "A Covert Channel in the Worldwide Public Switched Telephone Network Dial Plan." Proceedings of the 10th ANNUAL SYMPOSIUM ON INFORMATION ASSURANCE. Ed. Sanjay Goel. Albany, NY: n.p., 2015. Print. *

Priest, Joseph and Johnson, Daryl. "Covert Channel over Apple iBeacon." Proceedings of the The 2015 International Conference on Security and Management. Ed. Hamid R. Arabnia. Las Vegas, NV: n.p., 2015. Print. *

Alsaffar, Hassan and Daryl G Johnson. "Covert Channel Using the IP Timestamp Option of an IPv4 Packet." Proceedings of the International Conference on Electrical and Bio-medical Engineering, Clean Energy and Green Computing (EBECEGC 2015). Ed. Mohammad V. Malakooti. Dubai, UAE: n.p., 2015. Print. *

Tentilucci, Matthew, et al. "Crowdsourcing Computer Security Attack Trees." Proceedings of the 10th ANNUAL SYMPOSIUM ON INFORMATION ASSURANCE. Ed. Sanjay Goel. Albany, NY: n.p., 2015. Print. *

Heard, Timothy, Johnson, Daryl, and Stackpole, Bill. "Exploring a High-Capacity Covert Channel on the Android Operating System." Proceedings of the The 8 th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. Ed. Anatoly Sachenko. Warsaw, Poland: n.p., 2015. Print. *

Markowsky, G., et al. "The Benefits of Hosting the NECCDC at Your Institution." Proceedings of the The 2015 International Conference on Security and Management. Ed. Hamid R. Arabnia. Las Vegas, NV: n.p., 2015. Print. *

2014 Submissions

Journal Paper

Sharma, Kuhu, et al. "Performance of Meshed Tree Protocols for Loop Avoidance in Switched Networks." The International Journal on Advances in Networks and Services 7. 3&4 (2014): 228-239. Web. ∆

Published Conference Proceedings

Assayari, Hashem and Daryl G Johnson. "A Channel for Exchanging Information Covertly using Game Save File in Prison Architect." Proceedings of the 9th Annual Symposium on Information Assurance (ASIA 14). Ed. Sanjay Goel. Albany, NY: n.p., 2014. Print. *

Sabernick, Allen and Daryl G Johnson. "Google Maps KML Covert Channel." Proceedings of the 9th Annual Symposium on Information Assurance (ASIA 14). Ed. Sanja Goel. Albany, NY: n.p., 2014. Print. *

Leonardo, Carlos and Daryl G Johnson. "MODBUS Covert Channel." Proceedings of the The 2014 International Conference on Security and Management (SAM'14). Ed. Kevin Daimi. Las Vegas, NV: n.p., 2014. Print. *

Sharma, Kuhu, et al. "Meshed Tree Protocol for Faster Convergence in Switched Networks." Proceedings of the The Tenth International Conference on Networking and Services (The Tenth International Conference on Networking and Services (The Tenth International Conference on Networking and Services. Ed. Sasha Pan. Shanghai, China: n.p., 2014. Print. *

Farmer, Douglas and Daryl G Johnson. "Audio Steganography Using Stereo Wav Channels." Proceedings of the The 2014 International Conference on Security and Management(SAM'14). Ed. Kevin Daimi. Las Vegas, NV: n.p., 2014. Print. *

Rowe, Brian and Daryl G Johnson. "A Behavior-Based Covert Channel in a MMQ." Proceedings of the 2014 International Conference on Security and Management (SAM'14). Ed. Kevin Daimi. Las Vegas, NV: n.p., 2014. Print. *

Dearstyne, Steven and Daryl G Johnson. "Leveraging Public Posts and Comments as Covert Channels." Proceedings of the Systems, Signals and Image Processing (IWSSIP), 2014 International Conference. Ed. Mislav Grgic. Dubrovnik, Croatia: n.p., 2014. Print. *

Madiraju, Tarun, et al. "Passwords in Public: Dictionary Attacks, Password Selection and Password Meters." Proceedings of the Proceedings of the International Joint Conference on Computer, Information, and Systems Sciences and Engineering (CISSE 14). Ed. Srinivas Ramaswamy. San Diego, CA: n.p., 2014. Print. *

2013 Submissions

Published Conference Proceedings

Hartpence, Bruce, et al. "Natural Selection in Virtualization Environments: A Decade of Lessons from Academia." Proceedings of the EISTA'13: The 11th International Conference on Education and Information Systems, Technologies and Applications. Orlando, FL: n.p., 2013. Print. *

Johnson, Daryl, et al. "Designing, Constructing and Implementing a Low-Cost Virtualization Cluster for Education." Proceedings of the EISTA'13: The 11th International Conference on Education and Information Systems, Technologies and Applications. Orlando, FL: n.p., 2013. Print. *

Markowsky, George, et al. "The 2013 NECCDC - Lessons Learned." Proceedings of the SAM'13 - The 2013 International Conference on Security and Management. Las Vegas, NV: n.p., 2013. Print. *

Feeney, Kyle and Daryl Johnson. "XSS Cookie Injection Covert Channel." Proceedings of the SAM'13 - The 2013 International Conference on Security and Management. Las Vegas, NV: n.p., 2013. Print. *

Radford, Ross and Daryl Johnson. "Composite Covert Channels through EVE Online." Proceedings of the SAM'13 - The 2013 International Conference on Security and Management. Las Vegas, NV: n.p., 2013. Print. *

Delva, Wesley and Daryl Johnson. "SSDP Covert Channel." Proceedings of the SAM'13 - The 2013 International Conference on Security and Management. Las Vegas, NV: n.p., 2013. Print. *

2012 Submissions

Published Conference Proceedings

Johnson, Daryl, Dan Bogaard, and Robert Parody. "Browser Web Storage Vulnerability Investigation: HTML5 localStorage Object." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. *

Johnson, Daryl, et al. "Forensic Acquisition and Analysis of VMware Virtual Hard Disks." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. *

Johnson, Daryl, et al. "Employing Entropy in the Detection and Monitoring of Network Covert Channels." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "A Covert Channel Over Transport Layer Source Ports." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "A Physical Channel in a Digital World." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "A Covert Channel in TTL Field of DNS Packets." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "Covert Channel in the BitTorrent Tracker Protocol." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "Audio Steganography Using High Frequency Noise Introduction." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "UPnP Port Manipulation as a Covert Channel." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "Webpage Source Based Covert Channel." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, Brandon Mauer, and Bill Stackpole. "Developing Small Team-based Cyber Security Exercises." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "A Behavior Based Covert Channel within Anti-Virus Updates." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜

Johnson, Daryl, et al. "NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms." Proceedings of the SAM'12 - The 2012 International Conference on Security and Management (Las Vegas, NV, USA, July 2012). Ed. Kevin Daimi and Hamid R. Arabnia. Las Vegas, NV: n.p., 2012. Print. ˜