university of tulsa logo

Sujeet Shenoi, PhD

Sujeet Shenoi, PhD
F.P. Walter Professor of Computer Science
College of Engineering & Natural Sciences
Chemical Engineering
Computer Science
918-631-3269 Keplinger Hall Room U351

Education

PhD – Kansas State University BTech – Indian institute of Technology MS – Kansas State University

Bio

Contact at 918-344-1288

Research Interests

Cyber Security
Critical Infrastructure Protection
Cyber Operations
Reverse Engineering
Digital Forensics
Process Control

Teaching Interests

Compiler Construction
Theory of Computing
Computer Security
SCADA Systems
Cyber Operations

Publications

Journal Articles

  • Security Analysis of Multilayer SCADA Protocols. Vol. 253, IFIP International Federation for Information Processing, 2010.
  • Attack Taxonomies for the Modbus Protocols. Vol. 1, International Journal of Critical Infrastructure Protection, 2008, pp. 37–44.
  • Forensic Analysis of SCADA Systems and Networks. Vol. 3, International Journal of Security and Networks, 2008, pp. 95–102.
  • Programmable Access Control. Vol. 11, Journal of Computer Security, 2003, pp. 331–351.
  • Evaluating Controller Robustness Using Cell Mapping. Vol. 121, Fuzzy Sets and Systems, 2001, pp. 3–12.
  • Formal Analysis of E-Commerce Protocols. Vol. 84, IEICE TRANSACTIONS on Information and Systems, 2001, pp. 1313–1323.
  • IEICE/IEEE Joint Special Issue on Autonomous Decentralized Systems and Systems’ Assurance-PAPERS-Electronic Commerce-Formal Analysis of E-Commerce Protocols. Vol. 84, IEICE Transactions on Information and Systems, 2001, pp. 1313–1323.
  • Packet Sniffing for Automated Chat Room Monitoring and Evidence Preservation. Vol. 2, Workshop on Information Assurance and Security, 2001, p. 1045.
  • Lorenz, G., T. Moore, G. Manes, J. Hale, and S. Shenoi. Securing Ss7 Telecommunications Networks. Vol. 2, Workshop on Information Assurance and Security, 2001, pp. 273–278.
  • A Ticket-Based Access Control Architecture for Object Systems. Vol. 8, Journal of Computer Security, 2000, pp. 43–65.
  • Characterization of Attacks on Public Telephone Networks [4232-19]. PROCEEDINGS-SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING, 2000, pp. 93–103.
  • Capability-Based Primitives for Access Control in Object-Oriented Systems. Vol. 11, DATABASE SECURITY, 1998, pp. 134–150.
  • Cell Mapping for Controller Design and Evaluation. Vol. 17, Control Systems, IEEE, 1997, pp. 52–65.
  • A Process Calculus for Distributed Objects. 1996.
  • Analyzing FD Inference in Relational Databases. Vol. 18, Data & Knowledge Engineering, 1996, pp. 167–183.
  • Catalytic Inference Analysis Using Fuzzy Relations. Vol. 2, Proceedings of the 6th International Fuzzy Systems Association World Congress, IFSA, 1995, p. 413.
  • Imprecise Database Inference Using Functional Dependencies. Advances in fuzzy theory and technology, Duke University, 1995, pp. 307–326.
  • Fuzzy Controller Design Using Genetic Algorithms and Cell Maps. In?, Editor. Proceedings of the Second International Conference on Fuzzy Theory & Technology-Control & Decision, page.

Conference Proceedings

  • “Attacks on Public Telephone Networks: Technologies and Challenges”. SPIE 5071, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement II, 72, 2003, pp. 72-83.
  • “Identifying and Tracking Attacks on Networks: C3I Displays and Related Technologies”. AeroSense 2003, 2003, pp. 105–113.
  • “SS7 Messaging Attacks on Public Telephone Networks: Attack Scenarios and Detection”. Workshop on the Scientific Aspects of Cyber Terrorism, ACM, 2002.
  • “Characterization of Attacks on Public Telephone Networks”. Enabling Technologies for Law Enforcement, 2001, pp. 93–103.
  • J. Edmonds, M. Papa, J. Hale, and S. Shenoi, “Modeling and Verifying Protocols with Key Chaining,” Proceedings of the Third Annual Institute of Electrical and Electronics Engineering (IEEE) Information Assurance Workshop, West Point, New York, June 2001.

  • “Extending Java for Package Based Access Control”. Computer Security Applications, 2000. ACSAC’00. 16th Annual Conference, 2000, pp. 67–76.
  • “Policy Mediation for Multi-Enterprise Environments”. Computer Security Applications, 2000. ACSAC’00. 16th Annual Conference, 2000, pp. 100–106.
  • “Security Policy Coordination for Heterogeneous Information Systems”. Acsac, 1999, p. 219.
  • “An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects”. Proceedings of the IFIP TC11 WG11. 3 Eleventh International Conference on Database Securty XI: Status and Prospects, 1997, pp. 385–388.
  • “Catalytic Inference Analysis: Detecting Inference Threats Due to Knowledge Discovery”. Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on, 1997, pp. 188–199.
  • “A Framework for High Assurance Security of Distributed Objects”. in Database Security, X: Status and Prospects, 1996.
  • “A Tool for Inference Detection and Knowledge Discovery in Databases”. Proceedings of the Ninth Annual IFIP TC11 WG11. 3 Working Conference on Database Security IX: Status and Prospects: Status and Prospects, 1996, pp. 317–332.
  • “Effect of Cell Map Granularity on Fuzzy Control System Analysis”. Fuzzy Systems, 1996., Proceedings of the Fifth IEEE International Conference on, Vol. 1, 1996, pp. 411–415.
  • “On Global Analysis and Design of Fuzzy Control Systems”. Industrial Electronics, Control, and Instrumentation, 1996., Proceedings of the 1996 IEEE IECON 22nd International Conference on, Vol. 1, 1996, pp. 372–377.
  • “Auto-Tuning of Fuzzy Controllers Using Cell Mapping”. Industrial Automation and Control: Emerging Technologies, 1995., International IEEE/IAS Conference on, 1995, pp. 492–499.
  • “Catalyzing Database Inference With Fuzzy Relations”. Uncertainty Modeling and Analysis, 1995, and Annual Conference of the North American Fuzzy Information Processing Society. Proceedings of ISUMA-NAFIPS’95., Third International Symposium on, 1995, pp. 408–413.
  • “Evaluation of Cell State Techniques for Optimal Controller Design”. Fuzzy Systems, 1995. International Joint Conference of the Fourth IEEE International Conference on Fuzzy Systems and The Second International Fuzzy Engineering Symposium., Proceedings of 1995 IEEE Int, Vol. 3, 1995, pp. 1331–1338.
  • “A Practical Formalism for Imprecise Inference Control”. Proceedings of the 8th IFIP WG11. 3 Workshop on Database Security, 1994.
  • “Analysing Inference in Fuzzy Database Systems”. Fuzzy Systems, 1994. IEEE World Congress on Computational Intelligence., Proceedings of the Third IEEE Conference on, 1994, pp. 331–336.
  • “Incorporating Cell Map Information in Fuzzy Controller Design”. Fuzzy Systems, 1994. IEEE World Congress on Computational Intelligence., Proceedings of the Third IEEE Conference on, 1994, pp. 394–399.
  • “Robust Fuzzy Controllers”. Systems, Man, and Cybernetics, 1994. Humans, Information and Technology., 1994 IEEE International Conference on, Vol. 1, 1994, pp. 85–90.

Books

  • Critical Infrastructure Protection IV. IFIP International Federation for Information Processing, 2010.
  • Critical Infrastructure Protection II. Vol. 290, Springer, 2008.

Book Chapters

  • “A Taxonomy of Attacks on the DNP3 Protocol”. Critical Infrastructure Protection III, Springer, 2009, pp. 67–81.
  • “Providing Situational Awareness for Pipeline Control Operations”. Critical Infrastructure Protection III, Springer, 2009, pp. 97–111.
  • “Assessing the Integrity of Field Devices in Modbus Networks”. Critical Infrastructure Protection II, Springer, 2008, pp. 115–128.
  • “Security Strategies for SCADA Networks”. Critical Infrastructure Protection, Springer, 2008, pp. 117–131.
  • “An Architecture for SCADA Network Forensics”. Advances in Digital Forensics II, Springer, 2006, pp. 273–285.
  • “GSM Cell Site Forensics”. Advances in Digital Forensics II, Vol. 222, Springer, 2006, pp. 259-72.
  • “Using Signaling Information in Telecom Network Forensics”. Advances in Digital Forensics, Vol. 194, Springer, 2005, pp. 177-88.
  • “Integrating Logics and Process Calculi for Cryptographic Protocol Analysis”. Security and Privacy in the Age of Uncertainty, Springer US, 2003, pp. 349–360.
  • “Public Telephone Network Vulnerabilities”. Database and Application Security XV, Springer US, 2002, pp. 151–164.
  • “Language Extensions for Programmable Security”. Data and Application Security, Springer US, 2001, pp. 221–232.
  • “Simulation and Analysis of Cryptographic Protocols”. Data and Application Security, Springer US, 2001, pp. 89–100.
  • “Programmable Security for Object-Oriented Systems”. Database Security XII, Springer US, 1999, pp. 109–123.

Courses Taught

  • Theory of Computing
  • Special Topics in Computer Science
  • Software Reverse Engineering