Housed in the B. Thomas Golisano College of Computing and Information Sciences, the Department of Computing Security offers bachelor's and master's degrees in computing security.

History

In 2007 RIT became the first university in the US to offer a BS degree in computing security through its Department of Networking, Security and Systems Administration department. The department changed its name to Department of Computing Security in 2012.

Dates of Existence

2007-present

Previous Names

Department of Networking, Security and Systems Administration (2006-2012)

Follow

Documents from 2022

PDF

The Pentest Method for Business Intelligence, P. Soma Reddy and Justin Pelletier

Documents from 2021

PDF

Intelligent Lower-Layer Denial-of-Service Attacks Against Cellular Vehicle-to-Everything, Geoff Twardokus

Documents from 2020

PDF

A Reputation Score Driven E-Mail Mitigation System, Tommy Chin

Documents from 2019

PDF

Network-based APT profiler, Benjamin Bornholm

PDF

DRONESCAPE:Distributed Rapid On-site NEtwork Self-deploying Cellular Advanced Phone Environment, Daryl Johnson and Bill Stackpole

PDF

CPTC - A Security Competition Unlike Any Other, Bill Stackpole and Daryl Johnson

Documents from 2018

PDF

Guard Sets in Tor using AS Relationships, Mohsen Imani, Armon Barton, and Matthew Wright

PDF

Longitudinal Analysis of Information Security Incident Spillover Effects, Justin M. Pelletier

PDF

BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks, Nelson Henry Powell III

PDF

Using Packet Timing Information in Website Fingerprinting, Mohammad Saidur Rahman

PDF

Towards Predicting Efficient and Anonymous Tor Circuits, Matthew Wright, Armon Barton, Mohsen Imani, and Jiang Ming

Documents from 2017

PDF

Few Throats to Choke: On the Current Structure of the Internet, H. B. Acharya, Sambuddho Chakravarty, and Devashish Gosain

PDF

Adding Security to Control Area Network of Vehicles by Using SHA-3, Aidin Ameri

PDF

Pencil Puzzles for Introductory Computer Science: an Experience- and Gender-Neutral Context, Zachary Butler, Ivona Bezáková, and Kimberly Fluet

PDF

Mending Wall: On the Implementation of Censorship in India, Devashish Gosain, Sahil Shekhawat, Sahil Shekhawat, H. B. Acharya, and Sambuddho Chakravarty

PDF

Distributed Detection of Sensor Worms Using Sequential Analysis and Remote Software Attestations, Jun-Won Ho and Matthew Wright

PDF

Smart Grid Privacy through Distributed Trust, Benjamin Lipton

PDF

Gamifying Cybersecurity Course Content for Entry Level Students, Yin Pan, Sumita Mishra, and David Schwartz

PDF

LiLAC: Lightweight Low-Latency Anonymous Chat, John P. Podolanko, Revanth Pobala, Hussain Mucklai, George Danezis, and Matthew Wright

PDF

(Work in Progress) An Insight into the Authentication Performance and Security Perception of Older Users, Sovantharith Seng, Sadia Ahmed, Mahdi Nasrullah Al-Ameen, and Matthew Wright

Documents from 2016

PDF

Android Malware Detection Using Category-Based Machine Learning Classifiers, Huda Ali Alatwi

PDF

An Extended Discussion on a High-Capacity Covert Channel for the Android Operating System, Timothy Heard and Daryl Johnson

PDF

Covert Channel in HTTP User-Agents, Susan Heilman, Jonathan Williams, and Daryl Johnson

PDF

Advance Android PHAs/Malware Detection Techniques by Utilizing Signature Data, Behavioral Patterns and Machine Learning, Suyash Jadhav

PDF

Covert Channel using Man-In-The-Middle over HTTPS, Matthew Johnson, Peter Lutz, and Daryl Johnson

PDF

A Hands-On Approach to Computing Security Education: Metasploit Module Development, Jonathan Waggoner, Bill Stackpole, and Daryl Johnson

Documents from 2015

PDF

A Covert Channel in the Worldwide Public Switched Telephone Network Dial Plan, Bryan Harmat, Jared Stroud, and Daryl Johnson

PDF

Gamified Digital Forensics Course Modules for Undergraduates, Yin Pan, David Schwartz, and Sumita Mishra

PDF

Authorized Access and the Challenges of Health Information Systems, Ryan Shelc

PDF

Crowdsourcing Computer Security Attack Trees, Matthew Tentilucci, Nick Roberts, Shreshth Kandari, Daryl Johnson, Bill Stackpole, and George Markowsky

Documents from 2014

PDF

Dictionary Attacks and Password Selection, Tarun Madiraju

PDF

Web Browser Private Mode Forensics Analysis, Emad Sayed Noorulla

PDF

Performance of Meshed Tree Protocols for Loop Avoidance in Switched Networks, Kuhu Sharma, Bill Stackpole, Daryl Johnson, Nirmala Shenoy, and Bruce Hartpence

Documents from 2013

PDF

HTTP man-in-the-middle code execution, Brian Adeloye

PDF

Usefulness of teaching security awareness for middle school students, Hani Alhejaili

PDF

A Dynamic, Broad Spectrum Approach to Covert Channels, Christopher Hoffman

PDF

Rule-based conditional trust with OpenPGP., Andrew Jackson

PDF

A Forensic Comparison: Windows 7 and Windows 8, Peter J. Wilson

Documents from 2012

PDF

A Behavior Based Covert Channel within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, and B. Yuan

PDF

A Physical Channel in a Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

A Practical study of the problems of current internet routing tables, Arnav Ghosh

PDF

Providing public key certificate authorization and policy with DNS, Matthew Lidestri

PDF

Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

UPnp Port Manipulation as a Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, and Bo Yuan

PDF

NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, and Sumita Mishra

Documents from 2011

PDF

Browser web storage vulnerability investigation: HTML5 localStorage object, Daryl Johnson

PDF

The Assembly and provisioning of a red team, Daryl Johnson

PDF

Network Based Malware Defense, Thomas Tufts

Documents from 2010

PDF

A Covert Channel in RTP Protocol, Chrisopher Forbes, Bo Yuan, Daryl Johnson, and Peter Lutz

PDF

A Re-examination of network address translation security, Daryl Johnson and Bruce Hartpence

PDF

Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks, Daryl Johnson, Bo Yuan, Peter Lutz, and Erik Brown

PDF

Computer forensics technologies for personally identifiable information detection and audits, Yin Pan, Bill Stackpole, and Luther Troell

PDF

ICMP Covert Channel Resiliency, Kristian Stokes, Bo Yuan, Daryl Johnson, and Peter Lutz

Documents from 2009

PDF

Understanding malware autostart techniques with web data extraction, Matthew Gottlieb

PDF

Behavior-Based Covert Channel in Cyberspace, Daryl Johnson, Bo Yuan, and Peter Lutz

PDF

Towards virtual machine integrity using introspection, Sammy Lin

PDF

Data center design & enterprise networking, Christian Mahood

PDF

Computing laboratory sustainability & utilization: initiatives for a greener education, Kristian Stokes

PDF

A Framework for data decay in client-server model, Matthew Taber

Documents from 2008

PDF

Evaluation of virtual routing appliances as routers virtual environment, Ahmed Al-Amoudi

PDF

Role-based file archiving, Jean Paul Bourget

PDF

Studying a Virtual Testbed for Unverified Data, William Carl Bridges

PDF

NSSA Faculty Involvement in IT Security Auditing at RIT, Daryl Johnson and Yin Pan

PDF

Differential virtualization for large-scale system modeling, Jason Koppe

PDF

The Development of a graduate course on identity management for the Department of Networking, Security, and Systems Administration, Marsha Mitchell

PDF

Deep freeze and the NSSA Labs, Jay Snell

Documents from 2006

PDF

An Asymptotic Secrecy Model and Intelligent Systems, Bo Yuan

Documents from 2005

PDF

A Covert Channel in Packet Switching Data Networks, Bo Yuan and Peter Lutz

Documents from 2003

PDF

Forensic course development, Luther Troell, Yin Pan, and Bill Stackpole