Jonathan Crussell
Examines impact of Ghidra’s 39 releases and 13,000 commits on code similarity analysis and metrics like analysis time and function detection, revealing that newer versions don’t always provide superior results for every use case.
Gianluca Geraci, Jonathan Crussell, Laura P. Swiler, Bert J. Debusschere
Journal article demonstrating that multifidelity sampling techniques combining high and low-fidelity network simulations produce estimators with significantly lower variance, making them effective UQ tools for network analysis.
Jonathan Crussell, David Fritz, Vince Urias
Describes automated methods and tools for discovering information systems through network and host analysis to create high-fidelity emulation models, demonstrated on SCinet with 5 routers and 10,000 endpoints.
Jonathan Crussell, Aaron Brown, Jeremy Kyle Jennings, David Kavaler, Thomas M Kroeger, Cynthia Phillips
Sandia LDRD report summarizing a three-year project to quantify behavioral (not performance) differences between emulations and real-world systems by running representative workloads on both and comparing collected metrics.
Jonathan Crussell, Thomas M Kroeger, David Kavaler, Aaron Brown, Cynthia Phillips
Documents lessons learned from running over 10,000 experiments and processing half a petabyte of data to quantify behavioral (not just performance) differences between virtual and physical testbeds for cyber security research.
Gianluca Geraci, Laura P. Swiler, Jonathan Crussell, Bert J. Debusschere
Investigates multifidelity UQ strategies for network simulations by combining limited high-fidelity model runs with numerous lower-fidelity evaluations to achieve more accurate estimators with lower variance.
Jonathan Crussell, Thomas M Kroeger, Aaron Brown, Cynthia Phillips
Comparative analysis quantifying behavioral differences between physical and virtual testbeds for cyber security research to assess the fidelity of virtualized environments for experimentation.
Ryan Stevens, Jonathan Crussell, Hao Chen
Proposes Mobile Trusted-Origin Policy to authenticate mobile apps accessing network APIs by annotating HTTP requests with app provenance, preventing click fraud and API abuse through code isolation and origin verification.
Jonathan Crussell, Philip Kegelmeyer
Demonstrates how adversaries can subvert DBSCAN clustering by injecting bridge points to merge arbitrary clusters, degrading system performance, and proposes machine learning-based remediation using outlier detection.
Jonathan Crussell
PhD dissertation presenting scalable semantics-based approaches for detecting similar Android applications, with applications to clone detection, malware analysis, and security assessment.