Papers
- J. Aycock and D. M. N. de Castro. Permutation Steganography in FAT Filesystems. Transactions on Data Hiding and Multimedia Security X (LNCS 8948), Springer, 2015, pp. 92-105.
- D. M. N. de Castro and J. Aycock. Sample creation not considered harmful. 1st Workshop on Anti-malware Testing Research (WATeR2013), 2013, pp. 35-40.
- D. M. N. de Castro. NSPHD: The Polyglot Computer. Abstract of NSPHD Talk at New Security Paradigms Workshop 2013 (NSPW2013), 2013. pp. 121-122.(The full version of this paper can be found at Technical Report 2013-1048-16, Department of Computer Science, University of Calgary, 2013)
- A. Mosunov, V. Sinha, H. Crawford, J. Aycock, D. M. N. de Castro, and R. Kumari. Assured Supraliminal Steganography in Computer Games.14th International Workshop on Information Security Applications (WISA2013), 2014, pp. 245-259.
- J. Aycock, D. M. N. de Castro, M. E. Locasto, and C. Jarabek. Babel: A Secure Computer is a Polyglot. ACM Cloud Computing Security Workshop, 2012, pp. 43-54. Acceptance Rate: 25% (This is an extended version of Technical Report 2012-1026-09, Department of Computer Science, University of Calgary, 2012.)
- E. Lin, D. M. N. de Castro, M. Wang, and J. Aycock. SPoIM: A Close Look at Pollution Attacks in P2P Live Streaming. IEEE International Workshop on Quality of Service, 2010, 9pp. Acceptance Rate: 24.8 %
- D. Williams-King, J. Aycock, and D. M. N. de Castro. Enbug: When Debuggers Go Bad. ACM ITiCSE 2010, pp. 28-32. Acceptance Rate: 18.5 %
- D. M. N. de Castro, E. Lin, J. Aycock, and M. Wang. Typhoid Adware. 19th Annual EICAR Conference, 2010, pp. 13-30. Acceptance Rate: 29.4 %
- J. Aycock, J. M. Gutiérrez Cárdenas, and D. M. N. de Castro. Code Obfuscation using Pseudo-Random Number Generators, 1st International Workshop on Software Security Process, 2009, pp. 418-423.
- J. Nielson and D. M. N. de Castro and J. Aycock. Image Spam - ASCII to the Rescue! Malware '08, short paper, pp. 65-68.