scispace - formally typeset
J

Jonathan D. Fuller

Researcher at Air Force Institute of Technology

Publications -  5
Citations -  73

Jonathan D. Fuller is an academic researcher from Air Force Institute of Technology. The author has contributed to research in topics: Wireless sensor network & Z-Wave. The author has an hindex of 3, co-authored 4 publications receiving 60 citations. Previous affiliations of Jonathan D. Fuller include United States Department of the Army.

Papers
More filters
Proceedings ArticleDOI

Rogue Z-Wave controllers: A persistent attack channel

TL;DR: A new vulnerability is introduced that allows the injection of a rogue controller into the network that maintains a stealthy, persistent communication channel with all inadequately defended devices.
Journal ArticleDOI

Misuse-based detection of Z-Wave network attacks

TL;DR: This work extends an existing implementation of a Z-Wave Misuse-Based Intrusion Detection System (MBIDS) and achieves a mean misuse detection rate of 99%, significantly improving the security posture in MBIDS-monitored Z- Wave networks.
Book ChapterDOI

Evaluating ITU-T G.9959 Based Wireless Systems Used in Critical Infrastructure Assets

TL;DR: An open-source, software-defined radio implementation of an ITU-T G.9959 protocol sniffer is used to explore several passive reconnaissance techniques and deduce the properties of active network devices, showing that some properties are observable regardless of whether or not encryption is used.
Journal ArticleDOI

Efficacy of physical layer preamble manipulation for IEEE 802.11a/ac

TL;DR: In this paper, the authors investigated the effectiveness of preamble manipulation on common 5 GHz IEEE 802.11a and I.11ac wireless transceivers for the first time.

Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware

TL;DR: Marsea as mentioned in this paper is an automated malware analysis pipeline that studies web app-engaged malware and enables rapid remediation of WAE malware using 10,000 malware samples from 97 families abusing 29 web apps and found that malware authors are beginning to reduce their reliance on attacker controlled servers.