List of Presentations and Publications I've been involved with.
- John Seymour. Hacking a Corporate Social Media Page. ZeroFOX white paper, December 2016.
- John Seymour and Charles Nicholas. How to build a malware classifier [that doesnt suck on real-world data]. SecTor, October 2016. Also presented at Data Science MD (October 2016).
- Philip Tully, John Seymour, and Spencer Wolfe. Post Grams Not Scams: Detecting Money Flipping Scams on Instagram Using Machine Learning. ZeroFOX white paper, September 2016. Covered by BBC News, NBC News, TechCrunch, and The Verge, among others.
- John Seymour and Philip Tully. Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter. Black Hat USA, August 2016. Also presented at DEF CON 24 (August 2016), CyberGamut (December 2016), BrightTalk (December 2016), Baltimore Python (July 2016). Covered by The Atlantic, MIT Technology Review, and Forbes, among others.
- John Seymour and Charles Nicholas. Labeling the VirusShare Corpus: Lessons Learned. BSidesLV, August 2016. Also presented at SPARSA South (July 2016), Baltimore Python (June 2016).
- Alan T. Sherman, John Seymour, Akshayraj Kore and William Newton. Chaum’s protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario. Cryptologia, May 2016.
- John Seymour and Charles Nicholas. An Introduction to Malware Classification. BSidesCharm, April 2016.
- John Seymour and Charles Nicholas. “Quantum” Classification of Malware. DEF CON 23, August 2015. Also presented at CyberPoint International (July 2015), UMBC DREAM LAB (July 2015).
- John Seymour. Overgeneralization in Feature Set Selection for Classification of Malware. CSEE Technical Report 14-06, August 2014. Also presented at Malware Technical Exchange Meeting (June 2015, poster session), CyberPoint International (July 2015).
- Marc Olano, Alan Sherman, Linda Oliva, Ryan Cox, Deborah Firestone, Oliver Kubik, Milind Patil, John Seymour, Isaac Sohn, and Donna Thomas. SecurityEmpire: Development and Evaluation of a Digital Game to Promote Cybersecurity Education. USENIX 3GSE, August 2014.
- John Seymour. Skew Removal from SAT Instances using the D-Wave Quantum Annealer. Army Research Laboratory, July 2014.
- Charles Nicholas, Robert Brandon, Joshua Domangue, Andrew Hallemeyer, Peter Olsen, Alison Pfannenstein and John Seymour. The Exploit Kit Club. Malware Technical Exchange Meeting, July 2014 (poster session).
- Charles Nicholas, Robert Brandon, Andrew Coates, Andrew Hallemeyer, Brian Hillsley, Victoria Lentz, Edward Mukasey, Peter Olsen, Alison Pfannenstein and John Seymour. Tracking Exploit Kit Activity Through Landing Page Analysis. UMBC Computer Science and Electrical Engineering Department Technical Report 14-05, May 2014.
- John Seymour, Joseph Tuzo, and Marie desJardins. Ant Colony Optimization in a Changing Environment. Working Notes of the AAAI Fall Symposium on Complex Adaptive Systems, November 2011.
- Joseph Tuzo, John Seymour and Marie desJardins. Using a Cellular Automaton Simulation to Determine an Optimal Lane Changing Strategy on a Multi-lane Highway. Working Notes of the AAAI Fall Symposium on Complex Adaptive Systems, November 2011.