Search For:

Displaying 1-3 out of 3 total
Third Party Application Forensics on Apple Mobile Devices
Found in: Hawaii International Conference on System Sciences
By Alex Levinson, Bill Stackpole, Daryl Johnson
Issue Date:January 2011
pp. 1-9
Forensics on mobile devices is not new. Law enforcement and academia have been performing forensics on mobile devices for the past several years. Forensics on mobile third party applications is new. There have been third party applications on mobile device...
A HTTP cookie covert channel
Found in: Proceedings of the 4th international conference on Security of information and networks (SIN '11)
By Bo Yuan, Daryl Johnson, Peter Lutz, William Huba
Issue Date:November 2011
pp. 133-136
This paper presents a new covert channel based on Google Analytic web cookies in HTTP protocol. The new covert channel is difficult to disrupt and is capable of reasonably high bandwidths. The Google Analytic framework is used by over half of the most popu...
Network and systems security, a collaborative approach
Found in: Proceedings of the 5th conference on Information technology education (CITC5 '04)
By Daryl Johnson, Luther Troell, Sharon Mason
Issue Date:October 2004
pp. 279-279
In recent years, computer and network security education has become a priority among employers, the government, colleges and universities. Another emerging priority among these institutions is collaborative working environments. Rochester Institute of Tech...