publications

Vidas, T., Tan, J., Nahata, J., Tan C., Christin, C., Tague, P. A5: Automated Analysis of Adversarial Android Applications In proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM'14). Scottsdale, AZ. Nov 2014. PDF

Vidas T., and Christin, N. Evading Android Runtime Analysis via Sandbox Detection. Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS'14). Kyoto, Japan. June 2014. PDF

Vidas, T., Kaplan, B., and Geiger, M. OpenLV: Empowering investigators and first-responders in the digital forensics process. Digital Investigation 11 (2014): S45-S53. PDF

Mazurek, M., Komanduri, S., Vidas, T., Bauer, L., Christin, N., Cranor, L., Kelley, P., Shay, R., and Ur, B. Measuring Password Guessability for an Entire University. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013). Berlin, Germany. November 2013. PDF

Votipka, D., Vidas, T., Christin, N. Passe-Partout: a General Collection Methodology for Android Devices. IEEE Transactions on Information Forensics and Security. Issue: 99. October 2013. PDF

Vidas T., Owusu, E., Wang S., Zeng, C., Cranor, L., and Christin, N. QRishing: The Susceptibility of Smartphone Users to QR Code Phishing Attacks. Proceedings of the 2013 Workshop on Usable Security (USEC'13). Naha, Japan. April 2013. PDF

Kelley, P., Komanduri, S., Mazurek, M., Shay, R., Vidas, T., Bauer, L., Christin, N., and Cranor, L. The impact of length and mathematical operators on the usability and security of system-assigned one-time PINs. Proceedings of the 2013 Workshop on Usable Security (USEC'13). Naha, Japan. April 2013. PDF

Vidas, T., Christin, N. “Sweetening Android Lemon Markets: Measuring and Curbing Malware in Application Marketplaces,“ Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy (CODASPY '13). San Antonio, TX. February 2013. PDF

Ur, B. Kelley, P., Komanduri S., Lee, J., Maass, M., Mazurek, M., Passaro, T., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L. “Helping Users Create Better Passwords“ USENIX ;login:. Volume 37, Number 6, pp 51-57. December 2012. PDF

Ur, B. Kelley, P., Komanduri S., Lee, J., Maass, M., Mazurek, M., Passaro, T., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L. “How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation.“ Proceedings of the 21st USENIX Security Symposium (USENIX Security'12). Bellevue, WA. August 2012. PDF

Shay, R., Kelley, P., Komanduri, S., Mazurek, M., Ur, B., Vidas, T., Bauer, L., Christin, N., Cranor, L. “Correct horse battery staple: Exploring the usability of system-assigned passphrases.“ In Proceedings of the 8th Symposium on Usable Privacy and Security (SOUPS'12). Washington, DC. July 2012. PDF

Kelley, P., Komanduri, S., Mazurek, M., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L., Lopez, J. “Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms,“ Proceedings of the 33rd IEEE Symposium on Security and Privacy. San Francisco, CA. May 2012. PDF

Vidas, T., Votipka, D., Christin, N. “All Your Droid Are Belong To Us,“ Proceedings of the 5th USENIX Workshop on Offensive Technologies. August 8-9, 2011. San Francisco, CA. PDF

Vidas, T., Zhang, C., and Christin, N. “Towards a General Collection Methodology for Android Devices,“ 11th annual DFRWS. August 1-3, 2011. New Orleans, LA. PDF

King, C., and Vidas, T. “Empirical Analysis of Solid State Disk Data Retention when used with Contemporary Operating Systems“ 11th annual DFRWS. August 1-3, 2011. New Orleans, LA. PDF

Vidas, T., Christin, C., and Cranor, L. “Curbing Android Permission Creep,“ Web 2.0 Security and Privacy workshop (W2SP) 2011. May 26, 2011. Oakland, California. PDF

Hibshi, H., Vidas, T., and Cranor, L. “Usability of Forensic Tools: A User Study,“ 6th International Conference on IT Security Incident Management & IT Forensics. May 10-12, 2011. Stuttgart, Germany. PDF

Vidas, T. “MemCorp: an Open Data Corpus for Memory Analysis,“ Proceedings of the 44th Annual Hawaii International Conference on System Sciences. Jan. 2011. PDF

Christin,N., Egelman, S., Vidas, T., and Grossklags, J. “It's all about The Benjamins: Fair Trade botnets and incentivizing users to ignore security advice,“ Financial Cryptography and Data Security 2011. PDF

Vidas, T. “Volatile Memory Acquisition via Warm Boot Memory Survivability.“ Proceedings of the 43rd Annual Hawaii International Conference on System Sciences. Jan. 2010. PDF

Levin, T., Nguyen, T., Clark, P., Irvine, C., Shifflett, D., Vidas, T. “Use of trusted software modules for high integrity data display.“ Naval postgraduate School Technical Report, NpS-CS-08-012, June 2008. PDF

Vidas, T., Branch, D., Nicoll, A. “STEALing Lab Support in Digital Forensics Education,“ Proceedings of the 41st Annual Hawaii International Conference on System Sciences. pp. 482-491, Jan. 2008. PDF

Vidas, T. “Providing a Foundation for Analysis of Volatile Data Stores.“ Journal of Digital Forensics, Security and Law. Vol. 2, No. 3, pp 45-56, 2007.

Shifflett, D., Clark, P., Irvine, C., Nguyen, T., Vidas, T., Levin, T., “SecureCore Software architecture: Trusted Management Layer (TML) Kernel Extension Module Integration Guide,“ Naval Postgraduate School Technical Report, NPS-CS-07-022, Dec. 2007. PDF

Shifflett, D., Clark, P., Irvine, C., Nguyen, T., Vidas, T., Levin, T., “SecureCore Software architecture: Trusted Management Layer (TML) Kernel Extension Module Interface Specification,“ Naval Postgraduate School Technical Report, NPS-CS-07-021, Dec. 2007 PDF

Clark, P., Irvine, C., Levin, T., Nguyen, T., Vidas, T., Shifflett, D., “SecureCore Software architecture: SecureCore Operating System (SCOS) Functional Specification,“ NPS-CS-07-018, Dec. 2007. PDF

Clark, P., Irvine, C., Levin, T., Nguyen, T., Vidas, T., “SecureCore Software architecture: Trusted Path Application (TPA) Requirements,“ Naval Postgraduate School Technical Report, NPS-CS-07-001, Dec. 2007. PDF

Vidas, T. “The Acquisition and Analysis of Random access Memory.“ Journal of Digital Forensic Practice, Vol. 1, No. 4., pp 315-323, 2006. PDF

Teaching Experience

Carnegie Mellon University

Fall 2012 18-631 Intro to Information Security (Teaching Internship)
Summer 2012 Summer Academy for Mathematics and Science - Digital Forensics
Spring 2011 18-731 Network Security (Teaching Internship)
Fall 2009 14-823 Network Forensics (co instructor)

Naval postgraduate School

Spring 2008 CS4920 adv Topics CS: Cyber Defense (CDX) (co instructor)
Fall 2008 CS3690 Network Security
Fall 2008 CS4920 Payload Creation for Contemporary Unix Based Systems

University of Nebraska at Omaha

Fall 2006 CSCI4380 Computer and Network Forensics
Spring 2006 CSCI4980 Defining the IA Boundary (co instructor)
Fall 2005 CSCI4380 Computer and Network Forensics
Spring 2005 CIST1400 Intro to Computer Programming
Fall 2004 CSCI4380 Computer and Network Forensics
Fall 2004 CIST1400 Intro to Computer Programming
Spring 2004 CIST1400 Intro to Computer Programming
Fall 2003 CIST1400 Intro to Computer Programming
Spring 2003 CIST1400 Intro to Computer Programming
Spring 2002 CIST1400 Intro to Computer Programming
Fall 2001 CIST1400 Intro to Computer Programming
Spring 2001 CIST1400 Intro to Computer Programming
Fall 2000 CIST1400 Intro to Computer Programming

University of Nebraska at Lincoln

Fall 1998 AE2250 Construction Graphics & Design process (Teaching assistant)