William Mahoney, PhD

Associate Professor

  • 94 Citations
  • 5 h-Index
19982018
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where William Mahoney is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

SCADA systems Engineering & Materials Science
Intrusion detection Engineering & Materials Science
Reverse engineering Engineering & Materials Science
Servers Engineering & Materials Science
Monitoring Engineering & Materials Science
Control systems Engineering & Materials Science
Economics Engineering & Materials Science
Data acquisition Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1998 2018

  • 94 Citations
  • 5 h-Index
  • 16 Conference contribution
  • 13 Article
  • 3 Paper

Leave it to Weaver

Mahoney, W., Franco, J., Hoff, G. & McDonald, J. T., Dec 3 2018, Proceedings of the 8th Software Security, Protection, and Reverse Engineering Workshop, SSPREW 2018. Association for Computing Machinery, (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Reverse engineering
Synchronization

Comparing the effectiveness of commercial obfuscators against MATE attacks

Manikyam, R., McDonald, J. T., Mahoney, W., Andel, T. R. & Russ, S. H., Dec 5 2016, Proceedings of the 6th Software Security, Protection, and Reverse Engineering Workshop 2016, SSPREW 2016. Association for Computing Machinery, a8. (ACM International Conference Proceeding Series; vol. 05-06-December-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reverse engineering
Copying
Static analysis
Dynamic analysis
Industry
4 Citations (Scopus)

Authentication bypass and remote escalated I/O command attacks

Grandgenett, R., Mahoney, W. & Gandhi, R., Apr 7 2015, Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISRC 2015. Association for Computing Machinery, 2. (ACM International Conference Proceeding Series; vol. 06-08-April-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Network protocols
Programmable logic controllers
Ethernet
Data acquisition
1 Citation (Scopus)

Modifications to GCC for increased software privacy

Mahoney, W., Jan 1 2015, In : International Journal of Information and Computer Security. 7, 2-4, p. 160-176 17 p.

Research output: Contribution to journalArticle

Program compilers
Reverse engineering
Engineering technology
Intellectual property
Engineers
1 Citation (Scopus)

Towards a new quasigroup block cipher for a single-chip FPGA implementation

Mahoney, W. & Parakh, A., Oct 2 2015, 24th International Conference on Computer Communications and Networks, ICCCN 2015. Institute of Electrical and Electronics Engineers Inc., 7288479. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2015-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Field programmable gate arrays (FPGA)
Cryptography
SCADA systems
Computer hardware
Costs