Skip to main content

Showing 1–22 of 22 results for author: Glisson, W B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.06869  [pdf

    cs.CR

    Digital Footprints of Streaming Devices

    Authors: Sundar Krishnan, William Bradley Glisson

    Abstract: These days, there are many ways to watch streaming videos on television. When compared to a standalone smart television, streaming devices such as Roku and Amazon Fire Stick have a plethora of app selections. While these devices are platform agnostic and compatible with smartphones, they can still leave behind crumbs of sensitive data that can cause privacy, security, and forensic issues. In this… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

  2. arXiv:2109.05518  [pdf, other

    cs.CR cs.CY

    A Digital Forensics Investigation of a Smart Scale IoT Ecosystem

    Authors: George Grispos, Frank Tursi, Raymond Choo, William Mahoney, William Bradley Glisson

    Abstract: The introduction of Internet of Things (IoT) ecosystems into personal homes and businesses prompts the idea that such ecosystems contain residual data, which can be used as digital evidence in court proceedings. However, the forensic examination of IoT ecosystems introduces a number of investigative problems for the digital forensics community. One of these problems is the limited availability of… ▽ More

    Submitted 12 September, 2021; originally announced September 2021.

    Comments: Preprint version of paper accepted at the 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2021)

  3. arXiv:1901.07507  [pdf

    cs.CR

    Investigating 3D Printer Residual Data

    Authors: Daniel Bradford Miller, Jacob Gatlin, William Bradley Glisson, Mark Yampolskiy, Jeffrey Todd McDonald

    Abstract: The continued adoption of Additive Manufacturing technologies is raising concerns in the security, forensics, and intelligence gathering communities. These concerns range from identifying and mitigating compromised devices, to theft of intellectual property, to sabotage, to the production of prohibited objects. Previous research has provided insight into the retrieval of configuration information… ▽ More

    Submitted 22 January, 2019; originally announced January 2019.

    Comments: Presented at the 52nd Hawaii International Conference on System Sciences. Jan 8-11, 2019. Wailea, HI, USA. 10 pages, 3 figures. Persistent link https://hdl.handle.net/10125/60154

  4. arXiv:1901.03724  [pdf

    cs.CR cs.CY

    A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices

    Authors: George Grispos, William Bradley Glisson, Peter Cooper

    Abstract: The integration of medical devices in everyday life prompts the idea that these devices will increasingly have evidential value in civil and criminal proceedings. However, the investigation of these devices presents new challenges for the digital forensics community. Previous research has shown that mobile devices provide investigators with a wealth of information. Hence, mobile devices that are u… ▽ More

    Submitted 11 January, 2019; originally announced January 2019.

    Comments: George Grispos, William Bradley Glisson, Peter Cooper (2019). A Bleeding Digital Heart: Identifying Residual Data Generation from Smartphone Applications Interacting with Medical Devices. The 52nd Hawaii International Conference on System Sciences (HICSS-52), Maui, HI, USA

  5. arXiv:1901.03723  [pdf

    cs.CR cs.CY

    How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations

    Authors: George Grispos, William Bradley Glisson, Tim Storer

    Abstract: An increasing number of cybersecurity incidents prompts organizations to explore alternative security solutions, such as threat intelligence programs. For such programs to succeed, data needs to be collected, validated, and recorded in relevant datastores. One potential source supplying these datastores is an organization's security incident response team. However, researchers have argued that the… ▽ More

    Submitted 11 January, 2019; originally announced January 2019.

    Comments: George Grispos, William Bradley Glisson, Tim Storer (2019). How Good is Your Data? Investigating the Quality of Data Generated During Security Incident Response Investigations. The 52nd Hawaii International Conference on System Sciences (HICSS-52), Maui, HI, USA

  6. arXiv:1808.02153  [pdf

    cs.CY cs.CR

    Digital Blues: An Investigation into the Use of Bluetooth Protocols

    Authors: William Ledbetter, William Bradley Glisson, Todd McDonald, Todd Andel, George Grispos, Kim-Kwang Raymond Choo

    Abstract: The proliferation of Bluetooth mobile device communications into all aspects of modern society raises security questions by both academicians and practitioners. This environment prompted an investigation into the real-world use of Bluetooth protocols along with an analysis of documented security attacks. The experiment discussed in this paper collected data for one week in a local coffee shop. The… ▽ More

    Submitted 6 August, 2018; originally announced August 2018.

    Comments: Presented at the 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18) July 31th - August 3rd, 2018, New York, USA

  7. Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices

    Authors: Patrick Luckett, J Todd McDonald, William Bradley Glisson

    Abstract: The continued integration of technology into all aspects of society stresses the need to identify and understand the risk associated with assimilating new technologies. This necessity is heightened when technology is used for medical purposes like ambulatory devices that monitor a patient's vital signs. This integration creates environments that are conducive to malicious activities. The potential… ▽ More

    Submitted 14 September, 2017; originally announced September 2017.

  8. Medical Cyber-Physical Systems Development: A Forensics-Driven Approach

    Authors: George Grispos, William Bradley Glisson, Kim-Kwang Raymond Choo

    Abstract: The synthesis of technology and the medical industry has partly contributed to the increasing interest in Medical Cyber-Physical Systems (MCPS). While these systems provide benefits to patients and professionals, they also introduce new attack vectors for malicious actors (e.g. financially-and/or criminally-motivated actors). A successful breach involving a MCPS can impact patient data and system… ▽ More

    Submitted 17 August, 2017; originally announced August 2017.

    Comments: This is the pre-print version of a paper presented at the 2nd International Workshop on Security, Privacy, and Trustworthiness in Medical Cyber-Physical Systems (MedSPT 2017)

  9. arXiv:1706.06818  [pdf

    cs.CR

    Security Incident Recognition and Reporting (SIRR): An Industrial Perspective

    Authors: George Grispos, William Bradley Glisson, David Bourrie, Tim Storer, Stacy Miller

    Abstract: Reports and press releases highlight that security incidents continue to plague organizations. While researchers and practitioners' alike endeavor to identify and implement realistic security solutions to prevent incidents from occurring, the ability to initially identify a security incident is paramount when researching a security incident lifecycle. Hence, this research investigates the ability… ▽ More

    Submitted 21 June, 2017; originally announced June 2017.

    Comments: 2017 Americas Conference on Information Systems (AMCIS 2017), Boston, Massachusetts, United States

  10. arXiv:1610.03229  [pdf

    cs.CY

    In The Wild Residual Data Research and Privacy

    Authors: William Bradley Glisson, Tim Storer, Andrew Blyth, George Grispos, Matt Campbell

    Abstract: As the world becomes increasingly dependent on technology, researchers in both industry and academia endeavor to understand how technology is used, the impact it has on everyday life, the artifact life-cycle and overall integrations of digital information. In doing so, researchers are increasingly gathering 'real-world' or 'in-the-wild' residual data, obtained from a variety of sources, without th… ▽ More

    Submitted 11 October, 2016; originally announced October 2016.

    Comments: Residual Data, In-the-wild, Digital Forensics, Privacy

    Journal ref: Journal of Digital Forensics, Security and Law, 11(1), pp. 77-98 (2016)

  11. arXiv:1602.07536  [pdf

    cs.CR

    Towards Security of Additive Layer Manufacturing

    Authors: Mark Yampolskiy, Todd R. Andel, J. Todd McDonald, William B. Glisson, Alec Yasinsac

    Abstract: Additive Layer Manufacturing (ALM), also broadly known as 3D printing, is a new technology to produce 3D objects. As an opposite approach to the conventional subtractive manufacturing process, 3D objects are created by adding thin material layers over layers. Until recently, they have been used, mainly, for plastic models. However, the technology has evolved making it possible to use high-quality… ▽ More

    Submitted 13 January, 2015; originally announced February 2016.

  12. arXiv:1509.00065  [pdf

    cs.CY

    Compromising a Medical Mannequin

    Authors: William Bradley Glisson, Todd Andel, Todd McDonald, Mike Jacobs, Matt Campbell, Johnny Mayr

    Abstract: Medical training devices are becoming increasingly dependent on technology, creating opportunities that are inherently conducive to security breaches. Previous medical device research has focused on individual device security breaches and the technical aspects involved with these breaches. This research examines the viability of breaching a production-deployed medical training mannequin. The resul… ▽ More

    Submitted 31 August, 2015; originally announced September 2015.

    Comments: http://aisel.aisnet.org/amcis2015/HealthIS/GeneralPresentations/5/

  13. arXiv:1508.02526  [pdf

    cs.CR cs.CY

    Security Incident Response Criteria: A Practitioner's Perspective

    Authors: George Grispos, William Bradley Glisson, Tim Storer

    Abstract: Industrial reports indicate that security incidents continue to inflict large financial losses on organizations. Researchers and industrial analysts contend that there are fundamental problems with existing security incident response process solutions. This paper presents the Security Incident Response Criteria (SIRC) which can be applied to a variety of security incident response approaches. The… ▽ More

    Submitted 11 August, 2015; originally announced August 2015.

    Comments: The 21st Americas Conference on Information Systems (AMCIS 2015), Puerto Rico, USA. http://aisel.aisnet.org/amcis2015/ISSecurity/GeneralPresentations/35/. August 13-15, 2015

  14. Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers

    Authors: George Grispos, William Bradley Glisson, Tim Storer

    Abstract: There is a growing demand for cloud storage services such as Dropbox, Box, Syncplicity and SugarSync. These public cloud storage services can store gigabytes of corporate and personal data in remote data centres around the world, which can then be synchronized to multiple devices. This creates an environment which is potentially conducive to security incidents, data breaches and other malicious ac… ▽ More

    Submitted 7 June, 2015; originally announced June 2015.

    Journal ref: 2015. In The Cloud Security Ecosystem, edited by Ryan Ko and Kim-Kwang Raymond Choo, Syngress, Boston, Pages 347-382

  15. arXiv:1503.00364  [pdf

    cs.CY

    Investigating the Impact of Global Positioning System Evidence

    Authors: Kiyoshi J Berman, William Bradley Glisson, L. Milton Glisson

    Abstract: The continued amalgamation of Global Positioning Systems (GPS) into everyday activities stimulates the idea that these devices will increasingly contribute evidential importance in digital forensics cases. This study investigates the extent to which GPS devices are being used in criminal and civil court cases in the United Kingdom through the inspection of Lexis Nexis, Westlaw, and the British and… ▽ More

    Submitted 1 March, 2015; originally announced March 2015.

    Comments: This article was published at: http://www.hicss.hawaii.edu/hicss_48/apahome48.htm

  16. arXiv:1411.2132  [pdf

    cs.CR cs.CY

    Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps

    Authors: George Grispos, William Bradley Glisson, J. Harold Pardue, Mike Dickson

    Abstract: As the distinction between personal and organizational device usage continues to blur, the combination of applications that interact increases the need to investigate potential security issues. Although security and forensic researchers have been able to recover a variety of artifacts, empirical research has not examined a suite of application artifacts from the perspective of high-level pattern i… ▽ More

    Submitted 8 November, 2014; originally announced November 2014.

    Comments: Please cite this paper as: G. Grispos, W.B. Glisson, J.H. Pardue and M. Dickson (2014). Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps. Conference on Information Systems Applied Research (CONISAR 2014), 6-9 November 2014, Baltimore Maryland, USA

  17. Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics

    Authors: George Grispos, Tim Storer, William Bradley Glisson

    Abstract: Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic invest… ▽ More

    Submitted 8 October, 2014; originally announced October 2014.

    Journal ref: G. Grispos, T. Storer, and W.B. Glisson (2012). Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. International Journal of Digital Crime and Forensics, Volume 4, Issue 2, Pages 28-48

  18. arXiv:1408.2431  [pdf

    cs.CR cs.SE

    Rethinking Security Incident Response: The Integration of Agile Principles

    Authors: George Grispos, William Bradley Glisson, Tim Storer

    Abstract: In today's globally networked environment, information security incidents can inflict staggering financial losses on organizations. Industry reports indicate that fundamental problems exist with the application of current linear plan-driven security incident response approaches being applied in many organizations. Researchers argue that traditional approaches value containment and eradication over… ▽ More

    Submitted 11 August, 2014; originally announced August 2014.

    Comments: Paper presented at the 20th Americas Conference on Information Systems (AMCIS 2014), Savannah, Georgia

  19. Android Anti-forensics: Modifying CyanogenMod

    Authors: Karl-Johan Karlsson, William Bradley Glisson

    Abstract: Mobile devices implementing Android operating systems inherently create opportunities to present environments that are conducive to anti-forensic activities. Previous mobile forensics research focused on applications and data hiding anti-forensics solutions. In this work, a set of modifications were developed and implemented on a CyanogenMod community distribution of the Android operating system.… ▽ More

    Submitted 24 January, 2014; originally announced January 2014.

    Comments: Karlsson, K.-J. and W.B. Glisson, Android Anti-forensics: Modifying CyanogenMod in Hawaii International Conference on System Sciences (HICSS-47). 2014, IEEE Computer Society Press: Hawaii

  20. arXiv:1309.0521  [pdf

    cs.CR cs.CY

    Investigating Information Security Risks of Mobile Device Use within Organizations

    Authors: William Bradley Glisson, Tim Storer

    Abstract: Mobile devices, such as phones, tablets and laptops, expose businesses and governments to a multitude of information security risks. While Information Systems research has focused on the security and privacy aspects from the end-user perspective regarding mobile devices, very little research has been conducted within corporate environments. In this work, thirty-two mobile devices were returned by… ▽ More

    Submitted 21 August, 2013; originally announced September 2013.

    Comments: Published in AMCIS 2013

  21. arXiv:1306.2477  [pdf

    cs.CR cs.CY

    Cloud Security Challenges: Investigating Policies, Standards, and Guidelines in a Fortune 500 Organization

    Authors: George Grispos, William Bradley Glisson, Tim Storer

    Abstract: Cloud computing is quickly becoming pervasive in today's globally integrated networks. The cloud offers organizations opportunities to potentially deploy software and data solutions that are accessible through numerous mechanisms, in a multitude of settings, at a reduced cost with increased reliability and scalability. The increasingly pervasive and ubiquitous nature of the cloud creates an enviro… ▽ More

    Submitted 11 June, 2013; originally announced June 2013.

  22. arXiv:1303.4078  [pdf

    cs.CR

    Using Smartphones as a Proxy for Forensic Evidence contained in Cloud Storage Services

    Authors: George Grispos, William Bradley Glisson, Tim Storer

    Abstract: Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities. The investigation of these cloud environments presents new challenges for the digital forensics community. It is anticipated that smartphone devices will retain data from these st… ▽ More

    Submitted 17 March, 2013; originally announced March 2013.

    Comments: Paper appeared at the 46th Hawaii International Conference on System Sciences (HICSS-46), 2013