Housed in the B. Thomas Golisano College of Computing and Information Sciences, the Department of Computing Security offers bachelor's and master's degrees in computing security.
HistoryIn 2007 RIT became the first university in the US to offer a BS degree in computing security through its Department of Networking, Security and Systems Administration department. The department changed its name to Department of Computing Security in 2012.
Dates of Existence2007-present
Previous NamesDepartment of Networking, Security and Systems Administration (2006-2012)
Documents from 2022
The Pentest Method for Business Intelligence, P. Soma Reddy and Justin Pelletier
Documents from 2021
Intelligent Lower-Layer Denial-of-Service Attacks Against Cellular Vehicle-to-Everything, Geoff Twardokus
Documents from 2020
A Reputation Score Driven E-Mail Mitigation System, Tommy Chin
Documents from 2019
Network-based APT profiler, Benjamin Bornholm
DRONESCAPE:Distributed Rapid On-site NEtwork Self-deploying Cellular Advanced Phone Environment, Daryl Johnson and Bill Stackpole
CPTC - A Security Competition Unlike Any Other, Bill Stackpole and Daryl Johnson
Documents from 2018
Guard Sets in Tor using AS Relationships, Mohsen Imani, Armon Barton, and Matthew Wright
Longitudinal Analysis of Information Security Incident Spillover Effects, Justin M. Pelletier
BATSEN: Modifying the BATMAN Routing Protocol for Wireless Sensor Networks, Nelson Henry Powell III
Using Packet Timing Information in Website Fingerprinting, Mohammad Saidur Rahman
Towards Predicting Efficient and Anonymous Tor Circuits, Matthew Wright, Armon Barton, Mohsen Imani, and Jiang Ming
Documents from 2017
Few Throats to Choke: On the Current Structure of the Internet, H. B. Acharya, Sambuddho Chakravarty, and Devashish Gosain
Adding Security to Control Area Network of Vehicles by Using SHA-3, Aidin Ameri
Pencil Puzzles for Introductory Computer Science: an Experience- and Gender-Neutral Context, Zachary Butler, Ivona Bezáková, and Kimberly Fluet
Mending Wall: On the Implementation of Censorship in India, Devashish Gosain, Sahil Shekhawat, Sahil Shekhawat, H. B. Acharya, and Sambuddho Chakravarty
Distributed Detection of Sensor Worms Using Sequential Analysis and Remote Software Attestations, Jun-Won Ho and Matthew Wright
Smart Grid Privacy through Distributed Trust, Benjamin Lipton
Gamifying Cybersecurity Course Content for Entry Level Students, Yin Pan, Sumita Mishra, and David Schwartz
LiLAC: Lightweight Low-Latency Anonymous Chat, John P. Podolanko, Revanth Pobala, Hussain Mucklai, George Danezis, and Matthew Wright
(Work in Progress) An Insight into the Authentication Performance and Security Perception of Older Users, Sovantharith Seng, Sadia Ahmed, Mahdi Nasrullah Al-Ameen, and Matthew Wright
Documents from 2016
Android Malware Detection Using Category-Based Machine Learning Classifiers, Huda Ali Alatwi
An Extended Discussion on a High-Capacity Covert Channel for the Android Operating System, Timothy Heard and Daryl Johnson
Covert Channel in HTTP User-Agents, Susan Heilman, Jonathan Williams, and Daryl Johnson
Advance Android PHAs/Malware Detection Techniques by Utilizing Signature Data, Behavioral Patterns and Machine Learning, Suyash Jadhav
Covert Channel using Man-In-The-Middle over HTTPS, Matthew Johnson, Peter Lutz, and Daryl Johnson
A Hands-On Approach to Computing Security Education: Metasploit Module Development, Jonathan Waggoner, Bill Stackpole, and Daryl Johnson
Documents from 2015
A Covert Channel in the Worldwide Public Switched Telephone Network Dial Plan, Bryan Harmat, Jared Stroud, and Daryl Johnson
Gamified Digital Forensics Course Modules for Undergraduates, Yin Pan, David Schwartz, and Sumita Mishra
Authorized Access and the Challenges of Health Information Systems, Ryan Shelc
Crowdsourcing Computer Security Attack Trees, Matthew Tentilucci, Nick Roberts, Shreshth Kandari, Daryl Johnson, Bill Stackpole, and George Markowsky
Documents from 2014
Dictionary Attacks and Password Selection, Tarun Madiraju
Web Browser Private Mode Forensics Analysis, Emad Sayed Noorulla
Performance of Meshed Tree Protocols for Loop Avoidance in Switched Networks, Kuhu Sharma, Bill Stackpole, Daryl Johnson, Nirmala Shenoy, and Bruce Hartpence
Documents from 2013
HTTP man-in-the-middle code execution, Brian Adeloye
Usefulness of teaching security awareness for middle school students, Hani Alhejaili
A Dynamic, Broad Spectrum Approach to Covert Channels, Christopher Hoffman
Rule-based conditional trust with OpenPGP., Andrew Jackson
A Forensic Comparison: Windows 7 and Windows 8, Peter J. Wilson
Documents from 2012
A Behavior Based Covert Channel within Anti-Virus Updates, D. Anthony, D. Johnson, P. Lutz, and B. Yuan
A Physical Channel in a Digital World, Michael Deffenbaugh, Daryl Johnson, Bo Yuan, and Peter Lutz
A Practical study of the problems of current internet routing tables, Arnav Ghosh
Providing public key certificate authorization and policy with DNS, Matthew Lidestri
Webpage Source Based Covert Channel, Tarun Madiraju, Daryl Johnson, Bo Yuan, and Peter Lutz
UPnp Port Manipulation as a Covert Channel, Steven Monette, Daryl Johnson, Peter Lutz, and Bo Yuan
NAT Denial of Service: An Analysis of Translation Table Behavior on Multiple Platforms, Nathan Winemiller, Bruce Hartpence, Daryl Johnson, and Sumita Mishra
Documents from 2011
Browser web storage vulnerability investigation: HTML5 localStorage object, Daryl Johnson
The Assembly and provisioning of a red team, Daryl Johnson
Network Based Malware Defense, Thomas Tufts
Documents from 2010
A Covert Channel in RTP Protocol, Chrisopher Forbes, Bo Yuan, Daryl Johnson, and Peter Lutz
A Re-examination of network address translation security, Daryl Johnson and Bruce Hartpence
Covert channels in the HTTP network protocol: Channel characterization and detecting man-in-the-middle attacks, Daryl Johnson, Bo Yuan, Peter Lutz, and Erik Brown
Computer forensics technologies for personally identifiable information detection and audits, Yin Pan, Bill Stackpole, and Luther Troell
ICMP Covert Channel Resiliency, Kristian Stokes, Bo Yuan, Daryl Johnson, and Peter Lutz
Documents from 2009
Understanding malware autostart techniques with web data extraction, Matthew Gottlieb
Behavior-Based Covert Channel in Cyberspace, Daryl Johnson, Bo Yuan, and Peter Lutz
Towards virtual machine integrity using introspection, Sammy Lin
Data center design & enterprise networking, Christian Mahood
Computing laboratory sustainability & utilization: initiatives for a greener education, Kristian Stokes
A Framework for data decay in client-server model, Matthew Taber
Documents from 2008
Evaluation of virtual routing appliances as routers virtual environment, Ahmed Al-Amoudi
Role-based file archiving, Jean Paul Bourget
Studying a Virtual Testbed for Unverified Data, William Carl Bridges
NSSA Faculty Involvement in IT Security Auditing at RIT, Daryl Johnson and Yin Pan
Differential virtualization for large-scale system modeling, Jason Koppe
The Development of a graduate course on identity management for the Department of Networking, Security, and Systems Administration, Marsha Mitchell
Deep freeze and the NSSA Labs, Jay Snell
Documents from 2006
An Asymptotic Secrecy Model and Intelligent Systems, Bo Yuan
Documents from 2005
A Covert Channel in Packet Switching Data Networks, Bo Yuan and Peter Lutz
Documents from 2003
Forensic course development, Luther Troell, Yin Pan, and Bill Stackpole