Daryl Johnson Headshot

Daryl Johnson

Associate Professor

Department of Cybersecurity
Golisano College of Computing and Information Sciences

Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Daryl Johnson

Associate Professor

Department of Cybersecurity
Golisano College of Computing and Information Sciences

Education

BS, St. John Fisher College; MS, Rochester Institute of Technology

Bio

Daryl Johnson is an associate professor of Computing Security. His research focus over the last two decades has been in the areas of computer and network security with a focus on Anonymity, Covert Communication, and CPS/IoT security. He has published over 50 papers in computing security. He was one of the founders of the Northeast Collegiate Cyber Competition and the Collegiate Penetration Testing Competition, has served 12 years as the NECCDC Red Team Captain, and organized many other security competitions. He has developed over thirteen and co-developed over a dozen new courses in the areas of security, networking, and systems administration as well as redesigning and contributing to many others. He has been a principle in the creation of three departments (IT, NSSA, & CSEC) and the associated graduate and undergraduate degrees.


Areas of Expertise

Select Scholarship

Published Conference Proceedings
Nagrikar, Sashaa, Saeed Alshahrani, and Daryl G Johnson. "Covert Communication Using MODBUS Protocol in IoT Devices." Proceedings of the 7th International Conference of Control, Dynamic Systems, and Robotics (CDSR\\\'20) 9-11 November, 2020 in Niagara Falls, Canada. Ed. Dr. Aparicio Carranza. Ottawa, Canada: n.p., 2020. Web.
Johnson, Matthew R, Peter H Lutz, and Daryl G Johnson. "Covert Channel using Man-In-The-Middle over HTTPS." Proceedings of the 2016 International Conference on Computational Science and Computational Intelligence(CSCI’16)(2016, December). Las Vegaas, NV: CPS, 2016. Print.
Heilman, Susan, Jonathan Williams, and Daryl G Johnson. "Covert Channel in HTTP User-Agents." Proceedings of the 11th Annual Symposium on Information Assurance (ASIA’16) (2016, June)Albany, NY USA. Ed. Sanjay Goel. Albany, NY: ASIA, 2016. Web.
Show 39 More
Journal Paper
Heard, Timothy and Daryl G Johnson. "An Extended Discussion on a High-Capacity Covert Channel for the Android Operating System." International Journal of Computing 15. 3 (2016): 191-199. Web.
Sharma, Kuhu, et al. "Performance of Meshed Tree Protocols for Loop Avoidance in Switched Networks." The International Journal on Advances in Networks and Services 7. 3&4 (2014): 228-239. Web.

Currently Teaching

CSEC-473
3 Credits
Students will study, build, defend and test the security of computer systems and networking infrastructure while potentially under attack. Students will gain an understanding of standard business operations, timelines and the value of risk and project management. Techniques as related to security guidelines and goals will be studied. Aspects of legal requirements, inheriting existing infrastructure, techniques for backup and recovery of data and systems will be examined.
CSEC-742
3 Credits
The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies.
CSEC-750
3 Credits
Students will be introduced to the history, theory, methodology and implementation of various kinds of covert communications. Students will explore future techniques and uses of covert communications. More specifically students will explore possible uses of covert communications in the management of botnets. To be successful in this course students should be knowledgeable in networking, systems, and security technologies.

In the News