This page is devoted to Chuck Easttom's research interests.

 

You can find my papers at academia.edu, Research Gate,  or you can find my work on Google Scholar

 

Graph theory

One of my areas of research has been the application of graph theory to digital forensics.  I am also expanding that into incident response.  Here are some sources to get you started with basic graph theory:

http://world.mathigon.org/Graph_Theory
http://primes.utm.edu/graph/
http://onlinelibrary.wiley.com/jour…/10.1002/(ISSN)1097-0118

Here are some of my papers and presentations on the topic (more to come):

Easttom, C. (2016). Multi-Dimensional Analysis for Cyber Investigations. Forensic Examiner Journal,25 (4).

Easttom, C. (2016). Applying Graph Theory to Evidence Evaluation. Research Gate  DOI: RG.2.2.23391.0528.

Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examinations- Presentation for the 2nd Annual International Congress of the International Association of Law and Forensic Science (IAFLS). - Cairo Egypt, January 2017. DOI: RG.2.2.33025.66407

Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examination. International Journal of Innovative Research in Information Security (IJIRIS), 4(2).

Easttom, C. (2017). Applications of Graph Theory to Forensic Investigations- Presentation for the University of North Texas March 3, 2017. RG.2.2.16685.69609

Easttom, C. (2017). Applying Graph Theory to Modeling Investigations. IOSR Journal of Mathematics (IOSR-JM) 13,2 PP 47-51. doi:10.9790/5728-130205475

Cryptography

Easttom, C. (2016). An Overview of Cryptographic Backdoors Journal of Information Security Science and Digital Forensics 1 (1).

Easttom, C. (2015). Modern Cryptography: Applied Mathematics for Encryption and Information Security. New York City, New York: McGraw-Hill Publishing.

Easttom, C. (2014). An Overview of Cryptographic S-Boxes used in Block Ciphers.  Research Gate. DOI RG.2.2.14084.94088

Easttom, C. (2017). An Overview of Pseudo Random Number Generators.  Research Gate DOI: RG.2.2.13941.58087

Easttom, C. (2017).  The RSA Algorithm Explored. International Journal of Innovative Research in Information Security. (IJIRIS). 4(1)

Easttom, C. (2016). Steganography Workshop presented at Defcon 24

Easttom, C. (2010). RSA and its Challenges. EC Council White Paper.

U.S. Patent No. 8,527,779 B1 Method and apparatus of performing distributed steganography of a data message

US Patent No. 9,619,656 Method and apparatus of performing distributed steganography of a data message (continuation patent of 8,527,779 B1)

 

Forensics

Note: some of these are also listed under Graph Theory

Easttom, C. (2014). Windows Registry Forensics. Research Gate. DOI RG.2.2.29603.86561

Easttom, C. (2015). Multi-dimensional Analysis for Cyber Forensic Evidence  Open Source publication academia.edu

Easttom, C. (2015). Recovering Deleted Files from NTFS Open Source publication academia.edu

Easttom, C. (2016). Multi-Dimensional Analysis for Cyber Investigations. Forensic Examiner Journal,25 (4).

Other Papers

Easttom, C. (2016). Spyware Techniques  Journal of Information Security Science and Digital Forensics 1 (1)

Easttom, C. (2016). Spyware Techniques. 2600 Magazine. 33(3). 

Easttom, C. (2017). A Model for Penetration Testing. Research Gate. DOI RG.2.2.36221.15844

Easttom, C. (2016). Zero Day Exploits Presentation at Secure Jordan 2016

Easttom, C. (2016). Zero Day Forensics Presentation at Secure Jordan 2016

Easttom, C. (2016). Dark Web Markets for Law Enforcement and Intelligence Presentation at Hakon India 2016

Easttom, C. (2017). Dark Web Markets Presentation. ResearchGate. DOI: RG.2.2.27945.60003

Easttom, C. (2016). Ransomware Presentation (multiple locations)

 

 

Patents

U.S.  Patent No. 8,527,779 B1 Method and apparatus of performing distributed steganography of a data message

U.S. Patent No. 8,984,639 Method and apparatus of performing data executable integrity verification

U.S. Patent No. 9,405,907  Method and apparatus of performing data executable integrity verification (a continuation patent of '639)

U.S. Patent No. 8,713,067 Stable File System

U.S. Patent No. US 8,819,827 B1 Method and apparatus of performing data executable integrity verification

US Patent No.8,825,845 B1 Managing a network element operating on a network

US Patent No.8,825,810 B1 Domain name service based remote programming objects

US Patent No.9,313,167 B1 Domain name service based remote programming objects

US Patent No. 9,619,656 Method and apparatus of performing distributed steganography of a data message (continuation patent of 8,527,779 B1)

 


 

 

 

 

 

   
FaceBook Fan Page