Digital Forensics Research Group

The Digital Forensics Information Intelligence (DFII) Research Group consist of academic faculty from computing science and information technology, undergraduate and post graduate students, and industry professionals.

Meeting Time: 5:15 to 6:00 pm every Wednesday

Location: Shelby Hall: Room 2117

Spring Semester 2017 Presentation Schedule

Date Speaker Topic Affiliation
1/18/2017 Miranda Jahn Medical Mannequin Forensic Analysis USA
1/25/2017 Brian Ledbetter Analyzing Inherent Vulnerabilities and Associated Risk in Bluetooth Technology USA
2/1/2017 Phil Menard Competitiveness on Social Networking Sites and Its Implications on Individuals’ Security and Privacy Concerns USA
2/8/2017 Adam Brown Immunizing Organizations from Contagious Risk: The Need for Third-Party Information Security Policy Adoption USA
2/15/2017 Dr. Ryan Benton Social Media / Big Data / Data Mining USA
2/22/2017 Patrick Luckett Identifying Cyber Anomalies Using CPU Power Consumption and Learning Algorithms USA
3/1/2017 No Meeting - Mardi Gras!
3/8/2017 Dr. Brad Glisson The role of mobile forensics in terrorism investigations involving the use of cloud apps USA
3/15/2017 No Meeting - Spring Break!
3/22/2017 Dr . Mark Yampolskiy dr0wned USA

Fall Semester 2016 Presentation Schedule

Date Speaker Topic Affiliation
8/24/2016 SoC Faculty & Students I/UCRC 10 Minute Idea Lightening Talks USA
Dr. Brad Glisson - Mobile Device and Cloud Malicious Software Propagation
Dr. Brad Glisson - Investigation of Smartphone Residual Data in Secondary Markets
Dr. Brad Glisson - Mobile Device and Cloud Interaction Residual Data

8/31/2016 SoC Faculty & Students I/UCRC 10 Minute Idea Lightening Talks USA
Dr. Philip Menard - Investigating Customizable Compliance Program Based on Current Activity
Mr. Samuel Moore - Investigating the ability to fingerprint a 3D printer board
Dr. Brad Glisson - Investigating & Mitigating Medical Practitioner Technology Addictions

9/7/2016 SoC Faculty & Students I/UCRC 10 Minute Idea Lightening Talks USA
Dr. Todd McDonald & Dr. Ryan Benton - Exploiting Multi-Layered Vector Spaces for Malware Detection
Dr. Todd McDonald - Hardware-Based Exploitation and Forensics Evaluation of iOS Devices
Dr. Mark Yampolskiy - Side Channel Forensic Alterations Due to Attacker Activity

9/14/2016 SoC Faculty & Students I/UCRC 10 Minute Idea Lightening Talks USA
Dr. Ryan Benton - Developing Cyber Threat Analysis Visualization Solutions in Cloud Environments
Dr. Ryan Benton - Virtual Machine Image Analysis
Dr. Brad Glisson - Investigating the Implementation of Data Mining Algorithms in Android OS Modifications

9/21/16 Mr. Samuel Moore Implications of Malicious 3D Printer Firmware USA
9/28/16 No Meeting
10/5/16 Dr. Philip Menard Training Wheels: A New Approach to Teaching Mobile Device Security USA
10/12/16 Mr. Thanh Nguyen Exploitation and Detection of a Malicious Mobile Application USA
10/19/16 Mr. Patrick Luckett Attack-Graph Threat Modeling Assessment of Ambulatory Medical Devices USA
10/26/16 Dr. Brad Glisson In-the-Wild Residual Data Research and Privacy USA
11/2/16 No Meeting
11/9/16 Mr. Paul Weatherby "Where's the Chat?" FBI - Forensic Examiner
11/16/16 No Meeting
11/23/16 No Meeting - Thanksgiving!

Spring Semester 2016 Presentation Schedule

Date Speaker Topic Affiliation
1/22/16 Dr. Brad Glisson Utilizing the Cloud to Store Hijacked Camera Images USA
1/29/16 Adam Brown Cloud Forensics: Balancing Evidence Gathering and Privacy Protections USA
2/5/16 No meeting - Mardi Gras Holiday
2/12/16 Dr. Ryan Benton Social Media USA
2/19/16 Dr. Jordan Shropshire Insight: Guest Integrity Monitoring for Cloud Eco-Systems USA
2/26/16 Dr. Brad Glisson The impact of Residual Data on Society - I/UCRC USA
3/4/16 Clay Davidson Feasibility of applying Moving Target Defensive Techniques in a SCADA System USA
3/11/16 Doug Greene Email Forensics SSI Group
3/18/16 No meeting - Spring Break
3/25/16 Sam Moore Security Analysis of Desktop 3D Printer Software USA
4/1/16 Dustin Mink Next Generation Aircraft Architecture and Digital Forensics USA
4/8/16 Adam Brown What's in your Honeypot? USA
4/15/16 Maureen van Devender Identifying Opportunities to Compromise Medical Devices USA

Fall Semester 2015 Presentation Schedule

Date Speaker Topic Affiliation
9/04/15 Dr. Brad Glisson CyanogenMod Anti-forensics USA
9/11/15 Dr. Brad Glisson Electronic retention: what does your mobile phone reveal about you? USA
9/18/15 Dr. Brad Glisson Investigating Information Security Risks of Mobile Device Use within Organizations USA
9/25/15 Dr. Jordan Shropshire Emerging security and privacy risks in cloud computing USA
10/02/15 Professor Andrew Blyth Solid State Drives USB Technology: The Challenges that we Face for Data- Recovery and Computer Forensics University of South Wales
10/09/15 No Meeting - Fall Break!
10/16/15 Dr. Ryan Benton Steganalysis: Detecting Hidden Messages USA
10/23/15 Dr. Mark Yampolskiy AM Security Issues / Opportunities USA
10/30/15 Doug Greene Digital Evidence SSI Group
11/06/15 Paul Weatherby Practical Forensics FBI - Forensic Examiner
11/13/15 Dr. Ezhil Kalaimannan Smart Device Forensics: Investigation of Digital Evidence University of West Florida
11/20/15 Becky Bace What did we learn from our Mobile Security efforts that might help us secure IOT? USA
11/27/15 No Meeting - Thanksgiving!
12/4/15 Dr. Phil Menard Putting the ‘Motivation’ in Protection Motivation Theory: An Examination of Persuasive Communication via Extrinsic and Intrinsic Means USA

William Bradley Glisson, PhD

Dr. Glisson is currently an Associate Professor at the University of South Alabama. He has a Ph.D. in Computing Science from the University of Glasgow, Scotland, 2008. His area of research focuses on digital forensics, information assurance, software engineering and applied computing science with specific interest in security, business and healthcare domains. His work has been published in a wide variety of international conferences and journals.
http://soc.southalabama.edu/facultypages/glisson/

Mark Yampolskiy, PhD

Dr. Yampolskiy is an Assistant Professor at USA. He undertakes research in the area of CPS Security. His main research interest lies with Security of Additive Manufacturing (AM) also broadly known as 3D Printing. Dr. Yampolskiy has eleven years of industrial experience in software design and development, four of which in the area of Embedded Systems Security. Furthermore, he has nine years of experience in national and international grade research projects, including two years as a Post-Doctoral Research Scholar at Vanderbilt University with a focus on Security of CPS.
http://www.soc.southalabama.edu/facultypages/yampolskiy/

Jordan Shropshire, PhD

Dr. Jordan Shropshire is an Associate Professor of CIS at the University of South Alabama. His research centers on the technical and strategic aspects of information security. His research is funded by organizations such as the National Science Foundation and the National Security Agency. Dr. Shropshire has published articles in journals such as European Journal of Information Systems, Computers & Security, and Journal of Computer Information Systems. He has served as reviewer and ad hoc associate editor for journals such as MIS Quarterly, European Journal of Information Systems, Decision Support Systems, and Information Systems Research. He has completed external reviewers for the National Science Foundation. He has presented research and provides reviews for conferences such as America’s Conference on Information Systems (AMCIS), International Conference on Information Systems (ICIS), and Hawaiian International Conference on Systems Science (HICSS). Dr. Shropshire completed his PhD in Management Information Systems from Mississippi State University and his Bachelors of Science in Business Administration at the University of Florida.
http://www.cis.usouthal.edu/facultypages/shropshire/

Phil Menard, PhD

Dr. Menard is an Assistant Professor of Information Systems at the University of South Alabama. He is also a past recipient of the CyberCorps Scholarship for Service (SFS), earning certification as an Information Assurance Professional. He is particularly interested in the impacts of security measures on organizational end users, security education training and awareness (SETA) programs, and the impact of espoused cultural values on individuals' performance of secure behaviors. He has published at the Journal of Computer Information Systems (JCIS) and has presented at the IFIP Dewald Roode Workshop on Information Systems Security Research and the Americas Conference on Information Systems (AMCIS). He has served as a reviewer for several IS conferences.

Ryan Benton, PhD

Dr. Benton is an Assistant Professor in the School of Computing at the University of South Alabama. Prior to joining USA, Dr. Benton was a research scientist at the University of Louisiana at Lafayette (UL Lafayette). While at UL Lafayette, he served within the Informatics Research Institute (IRI) and the Center for Advanced Computer Studies (CACS); he was also a founding member of the Center for Visual and Decision Informatics (CVDI), the only Nation Science Foundation Industry/University Collaborative Research Center in Louisiana. Dr. Benton, while associated with UL Lafayette, also served as Director of Research for Star Software Systems Corporation from 2001 to 2005. He received his B.S. degree in Computer Information Systems (1995) from Loyola University New Orleans and his M.S. (1997) and Ph.D. (2001) in Computer Science at UL Lafayette. His research interest lies in the fields of data mining and machine learning, with a current focus upon advanced pattern mining methods, novel graph mining algorithms, and applied applications.

Maureen Van Devender

Maureen Van Devender is currently an instructor in the School of Computing at the University of South Alabama. She has a BS in Computer and Information Sciences from the University of South Alabama and an MBA from Spring Hill College. She is currently pursuing a Ph.D. in Computing at the University of South Alabama. Her research focuses on health informatics.
http://www.soc.southalabama.edu/facultypages/vandevender/

Rhonda Lucas

Ms. Lucas is currently an Instructor at the University of South Alabama. She has a Master's in Information Systems from the University of South Alabama. She also has a Bachelor's in Management Information Systems with a minor in Computer Science from the University of South Alabama. Her research areas include Big Data, data governance, privacy, cyber assurance, cyber security, and forensics with specific interest in business, education, and non-profit organizations.

David Keeler

David Keeler has worked as a consultant in several different client industries. David's areas of specialty include expertise in a variety of PC and web-based programming languages; data modeling, management and organization; and forensic data analysis. He is also a Certified Public Accountant (CPA) licensed in the states of Alabama and Texas. In addition to his diverse technology knowledge and experience, David has also been an organizational leader, holding management positions in the areas of accounting, finance, operations and marketing.

He has served as an expert witness on technology matters, and has worked extensively with Patent and Intellectual Property issues as they apply to telecommunications and related technologies. He holds a baccalaureate degree in Computer Science and a Master’s in Business Administration.

Les Barnett

Les Barnett is the Director of the Center for Forensics, Information Technology, and Security (CFITS) at the University of South Alabama. He brings over 30 years of business management experience, most of which was in the information technology industry. Mr. Barnett was a founder of Omniphone, Inc. and operated that company as president and CEO for twenty years, retiring in 2008. While there, his company developed and provided embedded systems to telephone service providers, including BellSouth, Ameritech, Southwestern Bell, AT&T, Cincinnati Bell and others. In addition to billing, data mining operations were provided as a service, with the emphasis on fraud control, forensics and IT security.

Darren Martin

Darren Martin is an seasoned IT professional with experience in managing a large IT organization.

Elizabeth Tang

Ms. Tang earned her undergraduate degree in Information Technology at the University of South Alabama School of Computing, where she specialized in Digital Forensics and Networking. Current working on a masters in Software Engineering with Penn State. Ms. Tang is currently a Software/Applications Developer at AM/NS Calvert.

Michael Black, PhD

Michael Black is the lead investigator, bringing several years of forensic experience. Michael has done significant research in data carving, and on discovery of new tools that can be used to locate and retrieve and recover data, and enable forensic experts to succeed in data recovery and establishment of the chain of evidence satisfactory for the courts.
http://www.soc.southalabama.edu/facultypages/black/

Monday the 27th. QualityJoomlaTemplates
Copyright © 2014
USA School of Computing

150 Jaguar Drive
Shelby Hall, Suite 2101
Mobile, Alabama 36688-0002

1 (251) 460-6390
University of South Alabama Homepage
ACM
USA Online
Paws
Discovering Web.com
Give to USA
Jag Mail
SOC RSS Feed