CV

...an informal curriculum vitae of things that might be of interest about me to visitors

Current Position

Assistant Research Professor, Department of Computer Science & Engineering, Mississippi State University, 2013 - Present

Areas of Specialization

Offensive information security and cyber operations, digital forensics. Specialization in vulnerability analysis, exploit development, penetration testing, national critical infrastructure, reverse engineering of malicious software, and network traffic analysis.

Selected Talks

  • Blackhat USA 2011/DEF CON 19 - Covert Post-Exploitation Forensics With Metasploit
    • whitepaper
    • slides
    • video - From DEF CON 19. The Black Hat version is slightly longer and was also recorded. Not entirely certain which I prefer, though probably this one.
  • DEF CON 20 - SCADA HMI and Microsoft Bob: Modern Authentication Flaws with a 90's Flavor
  • DEF CON 21 - Pwn the Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices
  • SCADA HMI Vulnerability Hands-on Training, Robert Wesley McGrew, BSides Jackson, 2012.
  • Reverse Engineering Hands-on Training, Robert Wesley McGrew, BSides Jackson, 2013.
  • Demonstrated Cases of Insecurity in Control Systems, Robert Wesley McGrew, Rayford B. Vaughn Jr. Ph.D., IEEE Software Technology Conference, 2010
  • Vulnerabilities in SCADA Human-Machine Interface Software, Robert Wesley McGrew, SANS Process Control and SCADA Security Summit 2009
  • Tracking Online Hacker Groups Through Social Media, Robert Wesley McGrew, Scholarship for Service Job Symposium, 2012.
  • Tracking and Trapping a Hacker: An Actual Takedown, Robert Wesley McGrew, Scholarship for Service Job Symposium, 2010; MSU Cyber Security Week 2009.

Publications

Book Chapter

  • Using Search Engines to Acquire Network Forensic Evidence, Robert Wesley McGrew, Rayford B. Vaughn Jr., Ph.D., Advances in Digital Forensics III, Springer, 2007

Journal Articles

  • Discovering Vulnerabilities in Control System Human-Machine Interface Software, Robert Wesley McGrew, Rayford B. Vaughn Jr. Ph.D., Journal of Systems and Software, April 2009.
  • Honey Tokens and Web Bugs: Developing Reactive Techniques for Investigating Phishing Scams, Craig McRae, Robert Wesley McGrew, Rayford B. Vaughn Jr., Ph.D., Journal of Digital Forensic Practice, September 2006.

Conference Proceedings

  • Digital Forensics Workforce Training for Wounded Warriors, David Dampier, Ph.D., Robert Wesley McGrew, Kendall Blaylock, American Society for Engineering Eductation South-East 2012.
  • Engineering Future Cyber-Physical Energy Systems: Challenges, Research Needs, and Roadmap, Rayford B. Vaughn Jr., Ph.D., Yoginder Dandass, Ph.D., Robert Wesley McGrew, North American Power Symposium, 2009
  • Experiences With Honeypot Systems: Development, Deployment, and Analysis, Robert Wesley McGrew, Rayford B. Vaughn Jr., Ph.D., 39th Hawaii International Conference on System Sciences, 2006

Whitepapers

  • Vulnerability Analysis of SCADA HMI Systems, Robert Wesley McGrew, Rayford B. Vaughn Jr. Ph.D., Center for Infrastructure Protection Report, February 2009

Technical Editor

  • Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols, Michael Raggo, Chet Hosmer, Syngress 2012.

Education

  • Ph.D., Computer Science Mississippi State University, 2013. Dissertation: Vulnerability Analysis Case Studies of Control Systems Human Machine Interfaces
  • M.S., Computer Science, Mississippi State University, 2005, Thesis: Exploring Extensions of Traditional Honeypot Systems and Testing the Impact on Attack Profiling
  • B.S., Computer Science, Mississippi State University, 2002.

Selected Teaching Activities

  • Department of Computer Science and Engineering, Mississippi State University
    • CSE 4243 Information and Computer Security, Fall 2013 - current
    • CSE 4990 Special Topics in CSE: Reverse Engineering, Spring 2013 - current
  • Training Lecturer, National Forensics Training Center, Mississippi State University, 2010-Present.
    • Developed and taught training courses for law enforcement and armed service veterans:
      • Introduction to Digital Forensics
      • Advanced Digital Forensics
      • Network Forensics and Online Investigation • Open Source Digital Forensic Tools
  • SANS Institute Stay Sharp Program
    • IP Packet Analysis training course, 2007.
  • Assistant Lecturer and Exercise Coordinator
    • Introduction to Computer Forensics, Mississippi State University CSE4273 2010-Present
      • Lectures on special topics.
      • Assists in organizing and executing term-length “mock case/trial” exercise.

Acknowledged Vulnerability Disclosures

  • ICS-CERT ICSA-12-212-01 - Iconics Genesis32/BizViz Security Configurator Authentication Bypass Vulnerability
  • ICS-CERT ICSA-ALERT-12-212-01 - Kessler-Ellis Products Infilink HMI Insufficiently Protected Credentials, 2012
  • ICS-CERT ICSA-12-283-02/ICSA-12-212-02 - Wellintech KingView User Credentials Not Securely Hashed, 2012
  • US-CERT VU#310355 - GE Fanuc Proficy HMI/SCADA iFIX Uses Insecure Authentication Techniques, 2009