This page is devoted to Chuck Easttom's research interests.

 

You can find my papers at academia.edu, Research Gate,  or you can find my work on Google Scholar

Below are samples of my papers and speaking engagements divided by topic area.

Graph theory

One of my areas of research has been the application of graph theory to digital forensics.  I am also expanding that into incident response.  Here are some sources to get you started with basic graph theory:

http://world.mathigon.org/Graph_Theory
http://primes.utm.edu/graph/
http://onlinelibrary.wiley.com/jour…/10.1002/(ISSN)1097-0118

Here are some of my papers and presentations on the topic (more to come):

Easttom, C. (2016). Multi-Dimensional Analysis for Cyber Investigations. Forensic Examiner Journal,25 (4).

Easttom, C. (2016). Applying Graph Theory to Evidence Evaluation. Research Gate  DOI: RG.2.2.23391.0528.

Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examinations- Presentation for the 2nd Annual International Congress of the International Association of Law and Forensic Science (IAFLS). - Cairo Egypt, January 2017. DOI: RG.2.2.33025.66407

Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examination. International Journal of Innovative Research in Information Security (IJIRIS), 4(2).

Easttom, C. (2017). Applications of Graph Theory to Forensic Investigations- Presentation for the University of North Texas March 3, 2017. RG.2.2.16685.69609

Easttom, C. (2017). Applying Graph Theory to Modeling Investigations. IOSR Journal of Mathematics (IOSR-JM) 13,2 PP 47-51. doi:10.9790/5728-130205475

Easttom, C. (2016). Secure World Dallas. Speaking on "Analyzing Forensic Evidence -Applications of graph theory to forensic analysis”.


Easttom, C. (2017). University of North Texas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.


Easttom, C. (2017). Enfuse 2017 conference in Las Vegas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.


Easttom, C. (2017). ISC2 Security Congress in Austin Texas. A presentation on "Applying Graph Theory to Analyzing Digital Evidence".

Easttom, C. (2017). 2nd International Congress of the International Association of Law and Forensic Science (IALFS), in Cairo Egypt January 17, 18, 19.  “Applying Graph Theory to Model Forensic Examinations”.

Cryptography

Easttom, C. (2017). An Overview of Key Exchange Protocols. IOSR Journal of Mathematics (IOSR-JM). 13(4). DOI: 10.9790/5728-1304021618

Easttom, C. (2017).  The RSA Algorithm Explored. International Journal of Innovative Research in Information Security. (IJIRIS). 4(1)

U.S. Patent No. 8,527,779 B1 Method and apparatus of performing distributed steganography of a data message

US Patent No. 9,619,656 Method and apparatus of performing distributed steganography of a data message (continuation patent of 8,527,779 B1)

Easttom, C. (2016). An Overview of Cryptographic Backdoors Journal of Information Security Science and Digital Forensics 1 (1).

Easttom, C. (2015). Modern Cryptography: Applied Mathematics for Encryption and Information Security. New York City, New York: McGraw-Hill Publishing.

Easttom, C. (2014). An Overview of Cryptographic S-Boxes used in Block Ciphers.  Research Gate. DOI RG.2.2.14084.94088

Easttom, C. (2017). An Overview of Pseudo Random Number Generators.  Research Gate DOI: RG.2.2.13941.58087

Easttom, C. (2016). Steganography Workshop presented at Defcon 24

Easttom, C. (2010). RSA and its Challenges. EC Council White Paper.

Easttom, C. (2011). The RSA Algorithm - The ups and Downs. CryptoMagazine.

Easttom, C. (2011). Feistel Ciphers - An Overview. Presentation at Cast Security Conference. Washington, D.C.

Easttom, C. (2012). Problems with RSA. Presentation at Takedown Security Conference – Dallas, TX.
Easttom, C. (2013). Cryptanalysis. Presentation at Takedown Security Conference. Huntsville, Alabama

Easttom, C. (2014). Cryptographic Backdoors. Presentation at ISC2 Security Congress. Atlanta, Georgia.
Easttom, C. (2014). Cryptographic Backdoors. Presentation at University of Texas Dallas ACM Chapter Conference

Forensics

Note: some of these are also listed under Graph Theory

Easttom, C. (2014). Windows Registry Forensics. Research Gate. DOI RG.2.2.29603.86561

Easttom, C. (2015). Multi-dimensional Analysis for Cyber Forensic Evidence  Open Source publication academia.edu

Easttom, C. (2015). Recovering Deleted Files from NTFS Open Source publication academia.edu

Easttom, C. (2016). Multi-Dimensional Analysis for Cyber Investigations. Forensic Examiner Journal,25 (4).

Easttom, C. (2017). American Academy of Forensic Sciences 69th Annual Meeting. Speaking on a novel approach JTAG phone forensics.


Easttom, C. (2017). University of North Texas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.


Easttom, C. (2017). Enfuse 2017 conference in Las Vegas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.


Easttom, C. (2017). 2nd International Congress of the International Association of Law and Forensic Science (IALFS), in Cairo Egypt January 17, 18, 19. The topics were “Improving Digital Forensics” and “Applying Graph Theory to Model Forensic Examinations”.

Easttom, C. (2016). Secure World Dallas. A presentation on "Analyzing Forensic Evidence -Applications of graph theory to forensic analysis”.


Easttom, C. (2016).Jordan Cyber Security & Forensics Forum (JCSFF-2016) Presenting two presentations. The topics were “Zero Day Exploits” and “How to forensically analyze Zero Day Exploits”.


Easttom, C. (2016).“Improving Professional Standards in Cyber Forensics” Keynote speaker for Association of Digital Forensics Security and Law.

Other Papers

Easttom, C. (2017). Enhancing SQL Injection With Stored Procedures. 2600 Magazine. 34(3).

Easttom, C. (2017). A Model for Penetration Testing. Research Gate. DOI RG.2.2.36221.15844

Easttom, C. (2016). Spyware Techniques  Journal of Information Security Science and Digital Forensics 1 (1)

Easttom, C. (2016). Spyware Techniques. 2600 Magazine. 33(3). 

Easttom, C. (2016). Zero Day Exploits Presentation at Secure Jordan 2016

Easttom, C. (2016). Zero Day Forensics Presentation at Secure Jordan 2016

Easttom, C. (2016). Dark Web Markets for Law Enforcement and Intelligence Presentation at Hakon India 2016

Easttom, C. (2017). Dark Web Markets Presentation. ResearchGate. DOI: RG.2.2.27945.60003

Easttom, C. (2016). Ransomware Presentation (multiple locations)

Easttom, C. (2016). Steganography Workshop presented at Defcon 24

Easttom, C. (2017). Windows: The Undiscovered Country presented at Defcon 25

 

Patents

U.S.  Patent No. 8,527,779 B1 Method and apparatus of performing distributed steganography of a data message

U.S. Patent No. 8,984,639 Method and apparatus of performing data executable integrity verification

U.S. Patent No. 9,405,907  Method and apparatus of performing data executable integrity verification (a continuation patent of '639)

U.S. Patent No. 8,713,067 Stable File System

U.S. Patent No. US 8,819,827 B1 Method and apparatus of performing data executable integrity verification

US Patent No.8,825,845 B1 Managing a network element operating on a network

US Patent No.8,825,810 B1 Domain name service based remote programming objects

US Patent No.9,313,167 B1 Domain name service based remote programming objects

US Patent No. 9,619,656 Method and apparatus of performing distributed steganography of a data message (continuation patent of 8,527,779 B1)

US Patent No. 9,686,227 Domain Name Service based remote programming objects.  A continuation patent of U.S. Pat. No. 9,313,167

US Patent No. 9,755,887 Managing a network element operating on a network

US Patent No. 9,754,108 Method and apparatus of performing data executable integrity verification

US Patent No. 9,753,957 System and method for document tracking

 


 

 

 

 

 

   
FaceBook Fan Page