Graduate Papers

Scholarship for Service Seminar (CS 501 02) Dr. Paul Oman
Spring 2005
Criminal Law and Constitutional Perspectives of Contemporary Issues in Computer Security Presentation

A presentation on criminal law in computer security, presented as a case study --- added constitutional perspectives as well.

The Essence of Active Response Presentation

A presentation on the basic principles of my active response research.


RADICL: Reconfigurable Attack and Defend Instructional Computing Laboratory (CS 502 01) Dr. Paul Oman
Spring 2005
RADICL: Design and Feasibility (.doc)

The design and feasibility report for a new attack/defend computer security lab at the University of Idaho.

RADICL Network Security Lab 1 (Lab 1 Setup and Instructor Copy)

The RADICL network security lab 1. Focuses on teaching an attack philosophy and methodology using network security tools and attack scripts.

RADICL Network Security Lab 2 (Lab 2 Setup and Instructor Copy)

The RADICL network security lab 2. Focuses on teaching network level security with packet crafting and Snort IDS.


Network Security (CS 501 02) Dr. Carol Taylor
Spring 2005
The Technicalities of Active Response

A presentation on the technical concerns of active response -- how one would actually implement active response.

Network Security Midterm (.doc)

Class midterm


Evolutionary Computation (CS 572 01) Dr. Robert Heckendorn
Fall 2004
Evolving Active Defense Strategies

The final project of the class: I used competitive co-evolution to produce active defense strategies.
The Code(.tar)

Assignment 3 Report: Decipher

We implemented discovering a key for a simple substitution cipher with a genetic algorithm; this is the report for the experiment.
The Code(.tar)

Assignment 2 Report: All Ones

We implemented and experimented with a GA to solve the all one's problem; this is the report for the experiment.
The Code(.tar)

Assignment 1 Report: Local Search

We implemented and experimented with three mutation of a basic local search algorithm; this is the report for the experiment.
The Code(.tar)


Scholarship for Service Seminar (CS 501 02) Dr. Paul Oman
Fall 2004
Criminal Law Perspectives of Contemporary Issues in Computer Security Presentation

A presentation of my paper on the same issues.

Important Legal Definitions

A reference guide to important legal definitions for the Criminal Law Perspectives of Contemporary Issues in Computer Security Presentation.


Directed Study: Legal Issues in Computer Security (CS 501 08) Dr. Deborah Frincke
Spring 2004
Criminal Law Perspectives of Contemporary Issues in Computer Security

Paper in support of my directed study credits. Discusses the criminal statutes with regard to contemporary security issues such as hacking, active defense, and vulnerability publication.


Human-Computer Interaction (PSYC 561 01) Dr. Steffen Werner
Spring 2004
Security and Privacy in the Digital Age

Presentation on Security and Privacy Issues with regard to HCI. 3/30/04

Ubiquitous Computing and the Future

First paper of the semester, describes how ubiquitous computing has evolved since 1980 and where it will be in 2020.

Interaction Styles in Minority Report

Describes and analyzes technology portrayed in the movie, "Minority Report" (2002).

Shuttle Commander Interface Designer HCI
PPT Presentation

Final paper discusses the elements of the interface for the Interface Designer tool of Shuttle Commander.


Computer and Network Forensics (CS 504 01) Dr. Gurdeep Hura
Spring 2004
Term Paper: Honeypots

My graduate term paper for the course, on honeypots. Discusses the purpose, uses, and types of honeypots as well as the honeynet project at the University of Idaho.

Exam 1
Exam 2
Final Exam
Lab 1: Tracking an Email

We had to track an email that was sent to us and conclude whether the email was real or not.

Lab 2: Investigating a Crime

Given some data about an intrusion we had to come to conclusions about the nature of the intrusion, and the possible motives of the perpetrator.

Lab 3: Chain of Custody

This lab was to teach us how to use evidence tags and chain of custody forms.

Lab 4: Collecting Live Data

This lab gave us experience with collecting digital evidence from a running machine (live data).

Lab 5: Cracking a Password File

Used John the Ripper to crack a NetBSD password file.

Lab 6: Gathering Evidence from a Floppy

Created a forensic duplicate of a floppy diskette and then analyzed the files - searching for evidence of a crime.

Project 1: Evidence Gathering Procedure

Our group researched and created a digital evidence gathering procedure for law enforcement.
RCFL Evidence Collection Procedure
DoJ Electronic Crime Scene Investigation
NIJ Digital Evidence in the Courtroom
Teleconference /w Det. Palmer Notes
Class Presentation on Computer Related Evidence

Project 2: Blaster Worm

Our group researched worms, and detailed the Blaster Worm specifically.


Intrusion Detection Systems (CS 504 01) Dr. Deborah Frincke
Fall 2003
Project 1: Testing Firewalls

Project 1, our group tested multiple firewalls for intrusion detection stopping protection - this is our experiment write-up

Active Defense Presentation Outline

My portion of a group presentation on active defense - my part is regarding the risks of active defense.


Computer Security Concepts (CS 542 01) Dr. Jim Alves-Foss
Fall 2003
Term Paper: A Practical Ethical Assessment of Hacktivism

Term Paper: Discusses hacktivism, and its ethical implications, focuses on a solution for defining hacktivist actions as ethical or unethical

Homework #2 Literature Review

Review of R. D. Pietro and L. V. Mancini, "Security and Privacy Issues of Handheld and Wearable Wireless Devices," in Communications of the ACM, vol. 46, 2003, pp. 75-79.

Homework #3 Literature Review

Review of M. Manion and A. Goodrum, "Terrorism or Civil Disobedience: Toward a Hacktivist Ethic," in ACM SIGCAS, vol. 30, 2000, pp. 14-19.

Homework #4 Literature Review

Review of D. E. Denning, "A Debate on Electronic Publishing, Constitutional Rights and Hacking," in Communications of the ACM, vol. 34, 1991, pp. 24-43.

Homework #5 Literature Review

Review of P. Dourish and D. Redmiles, "An Approach to Useable Security Based on Event Monitoring and Visualization," presented at Workshop on New Security Paradigms, Virginia Beach, Virginia, 2002.

Homework #7 Literature Review

Review of S. L. Cornford, M. S. Feather, J. C. Kelly, T. W. Larson, B. Sigal, and J. D. Kiper, "Design and Development Assessment," presented at 10th International Workshop on Software Specification and Design, 2000.

Homework Assignment #1
Homework Assignment #7

Advanced Operating Systems (CS 541 01) Dr. Bob Rinker
Fall 2003
OS Test #1
OS Test #2
OS Final
Term Paper: Transactions in Distributed Systems

Term Paper: Discusses transactions in distributed systems, such as databases, and distributed file systems.


Database Systems (CS 360 01) Dr. Carol Taylor
Fall 2003
Homework Assignment #3
Databases Project 1 Part 1
Databases Project 1 Final Output
Databases Project 2 Part 1
Databases Project 2 EER Diagram (.vsd)
Databases Project 2 Final Files
Databases Project 3 Final Output

Scholarship for Service Seminar (CS 501 02) Dr. Paul Oman
Fall 2003
Ethics and Hacktivism Presentation

Powerpoint presentation on ethics and hacktivism.