This page is devoted to Chuck Easttom's research interests.

 

You can find my papers at academia.edu or you can find my work on Google Scholar

Below are samples of my papers and other research publications divided by topic area.

Scientific Review Boards

1. Reviewer for scientific papers submitted to IEEE Security & Privacy.
2. Reviewer for scientific papers submitted to the International Journal of Cyber Warfare and Terrorism (IJCWT)
3. Reviewer for scientific papers submitted to Digital Forensics magazine.
4. Reviewer for the International Journal of Network Security (IJNS)
5. Member of IEEE Software & Systems Engineering Standards Committee. Working on the  DevOps working group.
6. Editorial board member for the year 2016 for Journal of Information Security Science & Digital Forensics. This is an international peer reviewed information security journal.
7. Editorial board for the year 2016 member for The Forensic Examiner. This is a peer reviewed forensic journal. 

Cryptography

 Presentation on "Quantum Computing and Cryptography" October 10th and 11th, 2018 SecureWorld Dallas 2018.

"An exploration of quantum computing and post quantum cryptography" October 8 to 10  ISC2 Security Congress in New Orleans.

 Presentation on "Quantum Computing and Cryptography" May 17, 2018. SecureWorld Houston 2018.

Presentation on "Quantum Computing and Lattice Based Cryptography" April 11, 2018 University of Texas at Dallas ACM chapter as part of the Distinguished Speakers of the ACM program.

Easttom, C. (2018) An Overview of Cryptographic Backdoors. Journal of Information System Security, 13 (3), 177-185.

Easttom, C. (2018). A Study of Cryptographic Backdoors in Cryptographic Primitives. 26th Iranian Conference on Electrical Engineering (ICEE2018). Mashad Iran.

Easttom, C. (2018). An Examination of Inefficiencies in Key Dependent Variations of the Rijndael S-Box. 26th Iranian Conference on Electrical Engineering (ICEE2018). Mashad Iran.

Easttom, C. (2018). A Generalized Methodology for Designing Non-Linear Elements in Symmetric Cryptographic Primitives. In Computing and Communication Workshop and Conference (CCWC), 2018 IEEE 8th Annual. IEEE.

Easttom, C. (2017). An Overview of Quantum Cryptography with Lattice Based Cryptography. IOSR Journal of Mathematics, 13(6).

Easttom, C. (2017). An Overview of Key Exchange Protocols. IOSR Journal of Mathematics (IOSR-JM). 13(4). DOI: 10.9790/5728-1304021618

Easttom, C. (2017).  The RSA Algorithm Explored. International Journal of Innovative Research in Information Security. (IJIRIS). 4(1)

U.S. Patent No. 8,527,779 B1 Method and apparatus of performing distributed steganography of a data message

US Patent No. 9,619,656 Method and apparatus of performing distributed steganography of a data message (continuation patent of 8,527,779 B1)

Easttom, C. (2016). Cryptographic Backdoors - An Introduction. Journal of Information Security Science and Digital Forensics 1 (1).

Easttom, C. (2015). Modern Cryptography: Applied Mathematics for Encryption and Information Security. New York City, New York: McGraw-Hill Publishing.

Easttom, C. (2014). An Overview of Cryptographic S-Boxes used in Block Ciphers.  Research Gate. DOI RG.2.2.14084.94088

Easttom, C. (2017). An Overview of Pseudo Random Number Generators.  Research Gate DOI: RG.2.2.13941.58087

Easttom, C. (2016). Steganography Workshop presented at Defcon 24

Easttom, C. (2010). RSA and its Challenges. EC Council White Paper.

Easttom, C. (2011). The RSA Algorithm - The ups and Downs. CryptoMagazine.

Easttom, C. (2011). Feistel Ciphers - An Overview. Presentation at Cast Security Conference. Washington, D.C.

Easttom, C. (2012). Problems with RSA. Presentation at Takedown Security Conference – Dallas, TX.


Easttom, C. (2013). Cryptanalysis. Presentation at Takedown Security Conference. Huntsville, Alabama

Easttom, C. (2014). Cryptographic Backdoors. Presentation at ISC2 Security Congress. Atlanta, Georgia.


Easttom, C. (2014). Cryptographic Backdoors. Presentation at University of Texas Dallas ACM Chapter Conference

Graph theory

One of my areas of research has been the application of graph theory to digital forensics.  I am also expanding that into incident response.  Here are some sources to get you started with basic graph theory:

http://world.mathigon.org/Graph_Theory
http://primes.utm.edu/graph/
http://onlinelibrary.wiley.com/jour…/10.1002/(ISSN)1097-0118

Here are some of my papers and presentations on the topic (more to come):

Easttom, C. (2018). "A Systems Approach To Indicators Of Compromise Utilizing Graph Theory". 2018 IEEE International Symposium on Technologies for Homeland Security.

Presenting "Applying Graph Theory to Digital Forensics" 6 May 2018 Princess Sumaya University for Technology in Amman Jordan as part of the Distinguished Speakers of the ACM program.

Easttom, C. (2016). Multi-Dimensional Analysis for Cyber Investigations. Forensic Examiner Journal,25 (4).

Easttom, C. (2016). Applying Graph Theory to Evidence Evaluation. Research Gate  DOI: RG.2.2.23391.0528.

Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examinations- Presentation for the 2nd Annual International Congress of the International Association of Law and Forensic Science (IAFLS). - Cairo Egypt, January 2017. DOI: RG.2.2.33025.66407

Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examination. International Journal of Innovative Research in Information Security (IJIRIS), 4(2).

Easttom, C. (2017). Applications of Graph Theory to Forensic Investigations- Presentation for the University of North Texas March 3, 2017. RG.2.2.16685.69609

Easttom, C. (2017). Applying Graph Theory to Modeling Investigations. IOSR Journal of Mathematics (IOSR-JM) 13,2 PP 47-51. doi:10.9790/5728-130205475

Easttom, C. (2016). Secure World Dallas. Speaking on "Analyzing Forensic Evidence -Applications of graph theory to forensic analysis”.


Easttom, C. (2017). University of North Texas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.


Easttom, C. (2017). Enfuse 2017 conference in Las Vegas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.


Easttom, C. (2017). ISC2 Security Congress in Austin Texas. A presentation on "Applying Graph Theory to Analyzing Digital Evidence".

Easttom, C. (2017). 2nd International Congress of the International Association of Law and Forensic Science (IALFS), in Cairo Egypt January 17, 18, 19.  “Applying Graph Theory to Model Forensic Examinations”.

 

Forensics

Note: some of these are also listed under Graph Theory

Easttom, C. (2018). A Method For Using Historical GPS Phone Records. Digital Forensics Magazine, 36.

Easttom, C. (2018). The Daubert Standard as a Framework for Digital Forensics. Digital Forensics Magazine, 35.

Easttom, C. (2014). Windows Registry Forensics. Research Gate. DOI RG.2.2.29603.86561

Easttom, C. (2015). Multi-dimensional Analysis for Cyber Forensic Evidence  Open Source publication academia.edu

Easttom, C. (2015). Recovering Deleted Files from NTFS Open Source publication academia.edu

Easttom, C. (2016). Multi-Dimensional Analysis for Cyber Investigations. Forensic Examiner Journal,25 (4).

Easttom, C. (2017). American Academy of Forensic Sciences 69th Annual Meeting. Speaking on a novel approach JTAG phone forensics.


Easttom, C. (2017). University of North Texas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.


Easttom, C. (2017). Enfuse 2017 conference in Las Vegas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.


Easttom, C. (2017). 2nd International Congress of the International Association of Law and Forensic Science (IALFS), in Cairo Egypt January 17, 18, 19. The topics were “Improving Digital Forensics” and “Applying Graph Theory to Model Forensic Examinations”.

Easttom, C. (2016). Secure World Dallas. A presentation on "Analyzing Forensic Evidence -Applications of graph theory to forensic analysis”.


Easttom, C. (2016).Jordan Cyber Security & Forensics Forum (JCSFF-2016) Presenting two presentations. The topics were “Zero Day Exploits” and “How to forensically analyze Zero Day Exploits”.


Easttom, C. (2016).“Improving Professional Standards in Cyber Forensics” Keynote speaker for Association of Digital Forensics Security and Law.

Other Papers/Research

Easttom, C. (2018). The role of weaponized malware in cyber conflict and espionage. In 13th International Conference on Cyber Warfare and Security ICCWS, 2018.

Easttom, C. (2018). Bluetooth Hacking 101. 2600 Magazine 35(1).

Easttom, C. (2017). Enhancing SQL Injection With Stored Procedures. 2600 Magazine. 34(3).

Easttom, C. (2017). A Model for Penetration Testing. Research Gate. DOI RG.2.2.36221.15844

Easttom, C. (2016). Spyware Techniques  Journal of Information Security Science and Digital Forensics 1 (1)

Easttom, C. (2016). Spyware Techniques. 2600 Magazine. 33(3). 

Easttom, C. (2016). Zero Day Exploits Presentation at Secure Jordan 2016

Easttom, C. (2016). Zero Day Forensics Presentation at Secure Jordan 2016

Easttom, C. (2016). Dark Web Markets for Law Enforcement and Intelligence Presentation at Hakon India 2016

Easttom, C. (2017). Dark Web Markets Presentation. ResearchGate. DOI: RG.2.2.27945.60003

Easttom, C. (2016). Ransomware Presentation (multiple locations)

Easttom, C. (2016). Steganography Workshop presented at Defcon 24

Easttom, C. (2017). Windows: The Undiscovered Country presented at Defcon 25

 

Patents

U.S.  Patent No. 8,527,779 B1 Method and apparatus of performing distributed steganography of a data message

U.S. Patent No. 8,984,639 Method and apparatus of performing data executable integrity verification

U.S. Patent No. 9,405,907  Method and apparatus of performing data executable integrity verification (a continuation patent of '639)

US Patent 9,984,229 Method and apparatus providing a multiple source evidence application trust model

U.S. Patent No. 8,713,067 Stable File System

U.S. Patent No. US 8,819,827 B1 Method and apparatus of performing data executable integrity verification

US Patent No.8,825,845 B1 Managing a network element operating on a network

US Patent No.8,825,810 B1 Domain name service based remote programming objects

US Patent No.9,313,167 B1 Domain name service based remote programming objects

US Patent No. 9,619,656 Method and apparatus of performing distributed steganography of a data message (continuation patent of 8,527,779 B1)

US Patent No. 9,686,227 Domain Name Service based remote programming objects.  A continuation patent of U.S. Pat. No. 9,313,167

US Patent No. 9,755,887 Managing a network element operating on a network

US Patent No. 9,754,108 Method and apparatus of performing data executable integrity verification

US Patent No. 9,753,957 System and method for document tracking