|Department of Electrical Engineering and Computer Science|
|United States Military Academy|
|West Point, New York|
email: gregory-conti (replace_with_at_symbol) usma.edu
|Secure and Usable Interface Design|
|Security Data Visualization|
|2006||Ph.D. Computer Science  ||Georgia Institute of Technology|
|2000||M.S. Computer Science||Johns Hopkins University|
|1997||Professionalization (Signals Collection)||National Cryptologic School, NSA|
|1989||B.S. Computer Science||United States Military Academy|
|CS484 Computer Networks (Course Director)||Senior Member - Association for Computing Machinery (ACM)|
|CS489 Distributed Application Engineering (Course Developer and Course Director)||Electronic Frontier Foundation (EFF)|
|CS382 Advanced Personal Computing (Course Director)||National Eagle Scout Association (NESA)|
|CS482 Information Assurance (Adjunct)||Phi Kappa Phi Award for Academic Achievement|
|SS490 Strategy and Policy of Cyberwar (Adjunct)||Upsilon Pi Epsilon (UPE)|
|CS105 Introduction to Computing||Adjunct Faculty Member, National Cryptologic School|
|ED101 Training Methods for Cryptographic Instructors (NSA Adjunct)||USMA UPE Faculty Advisor|
|USMA SIGSAC Faculty Advisor
-Won ACM 2001-2002 Chapter Excellence Award
|Command and General Staff College (CGSC)||EECS Faculty||West Point|
|Combined Arms and Services Staff School (CAS3)||Company Commander||HOC, 713th MI Group|
|Advanced Cryptologic Course (CY500)||Deputy Division Chief||713th MI Group|
|Joint Space Intelligence Operations Course (JSIOC)||Battalion S3||743d MI BN|
|National Imagery Analysis Course (NIAC)||Assistant S3||743d MI BN|
|Intelligence Collection Managers Course (ICMC)||Assistant S2||2/4 Cavalry SQDN|
|Signals Intelligence / EW Course (35G)||Platoon Leader||124th MI BN|
|National Systems Development Program (NSDP)||Collection Manager||G2, 24th ID|
|Military Intelligence Officer Advanced Course||Operations Officer||G2, 24th ID|
|Military Intelligence Officer Basic Course|
|Jungle Warfare Course|
Googling Security, Addison Wesley; November 2008. (also available in Chinese and Korean editions) Slashdot and BoingBoing coverage. An EFF Favorite Book.
| Greg Conti;
Security Data Visualization, No Starch Press; September 2007.
|Journals and Magazines|
|Matthew Miller, Jonalan Brickey, and Gregory Conti, "Why Your Intuition About Cyber Warfare is Probably Wrong," Small Wars Journal, 29 Novermber 2012. SWJ coverage
|Gregory Conti, Edward Sobiesk, Paul Anderson, Steven Billington, Alex Farmer, Cory Kirk, Patrick Shaffer, and Kyle Stammer; "Unintended, Malicious, and Evil Applications of Augmented Reality;"
InSecure, Issue 35, September 2012, pp. 20-27.
|Jonalan Brickey, Jacob Cox, John Nelson, and Gregory Conti, "The Case for Cyber," Small Wars Journal, 13 September 2012. SWJ coverage
|David Raymond and Gregory Conti, "Preventing a Digital Pearl Harbor," West Point, Spring 2012.
|Gregory Conti, James Caroland, Thomas Cook, and Howard Taylor; "Self-Development for Cyber Warriors;"
Small Wars Journal, 10 November 2011. SWJ coverage
|Gregory Conti and James Caroland; "Embracing the Kobayashi Maru - Why You Should Teach Your Students to Cheat;"
IEEE Security and Privacy, July/August 2011. Boing Boing, Schneier on Security and Cory Doctorow coverage
|Gregory Conti and David Raymond; "Leadership of Cyber Warriors: Enduring Principles and New Directions;"
Small Wars Journal, 11 July 2011. SWJ coverage
|Gregory Conti, Thomas Babbitt, and John Nelson; "Hacking Competitions and Their Untapped Potential for Security Education;"
IEEE Security and Privacy, May/June 2011.
|Gregory Conti, Dominic Larkin, David Raymond and Edward Sobiesk; "The Military's Cultural Disregard for Personal Information;"
Small Wars Journal, 6 Dec 2010. New York Times (Front Page), Government Information Security, Army Times 1 2, USAA, and SWJ coverage, DoD SWJ Response
|Gregory Conti and Jen Easterly; "Recruiting, Development, and Retention of
Cyber Warriors Despite an Inhospitable Culture;"
Small Wars Journal, 29 July 2010. Stars and Stripes, TaoSecurity, Foreign Policy, ISACA, and SWJ coverage
|Gregory Conti; "Mystical Math;"
ACM netWorker, Vol 13, Issue 4 (Winter 2009).
|Gregory Conti; "There's a Fly in My Digital Soup;"
ACM netWorker, Vol 13, Issue 2 (Summer 2009).
|Gregory Conti and Edward Sobiesk; "Malicious Interfaces and Personalization's Uninviting Future;"
IEEE Security and Privacy, May/June 2009.
|Gregory Conti and John "Buck" Surdu; "Army, Navy, Air Force, Cyber: Is it Time for a Cyberwarfare Branch of the Military;"
Information Assurance Newsletter, Vol. 12, No. 1, Spring 2009, pp. 14-18. TaoSecurity and Slashdot coverage, redux Federal News Radio Government Information Security
|Sam Abbott-McCune, A.J. Newtson, Robert Ross, Ralph Ware, and Gregory Conti; "Free Visualization Tools for Security Analysis and Network Monitoring;"
InSecure, Issue 15, February 2008, pp. 18-25.
|Gregory Conti; "Could Googling Take Down a President?;"
Communications of the ACM (50th Anniversary Issue), January 2008.
|Edward Sobiesk and Gregory Conti; "The Cost of Free Web Tools;"
IEEE Security and Privacy, May/June 2007. BBC Documentary video
| Gregory Conti
(guest editor); "Hacking and Innovation (special issue);"
Communications of the ACM (CACM), June 2006. Articles
Kulsoom Abdullah, Chris Lee, Gregory Conti and John Copeland. "Processing Data to Construct
Practical Visualizations for Network Security," Information Assurance Newsletter, Vol. 9, No. 1, Summer 2006.
| Gregory Conti, Kulsoom Abdullah, Julian Grizzard,
John Stasko, John Copeland, Mustaque Ahamad, Henry Owen and Chris Lee;"Countering Security
Analyst and Network Administrator Overload Through Alert and Packet Visualization;"
IEEE Computer Graphics and Applications (CG&A), March 2006.
|Gregory Conti and Mustaque Ahamad; "A
Taxonomy and Framework for Countering Denial of Information Attacks;"
IEEE Security and Privacy. November/December 2005.
| Gregory Conti; "Why
Computer Scientists Should Attend Hacker Conferences;" Communications
of the ACM (CACM), March 2005.
|Gregory Conti, "Thinking
Out of the Box," Military Review, April 1998.
|Gregory Conti, "You
Can't Circle X a Deadlined Computer," Military Intelligence,
|Gregory Conti, "Automation:
An Intelligence Multiplier," Military Intelligence, June
|Conference and Workshop Publications|
|Lisa Shay, Gregory Conti, and Woodrow Hartzog. "Beyond Sunglasses and Spray Paint: A Taxonomy of Countermeasures Against Overly-Intrusive Surveillance." IEEE International Symposium on Technology and Society (ISTAS), Toronto, June 2013.
|Gregory Conti, John Nelson, and David Raymond. "Towards a Cyber Common Operating Picture." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2013.
|David Raymond, Gregory Conti, Tom Cross, and Robert Fanelli. "A Control Measure Framework to Limit Collateral Damage and Propagation of Cyber Weapons." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2013.
|Lisa Shay, Woodrow Hartzog, John Nelson, and Gregory Conti. "Do Robots Dream of Electric Laws? An Experiment in the Law as Algorithm." We Robot, Stanford, April 2013. (24% selection rate) datasets
Ars Technica, Slashdot, and San Francisco Chronicle coverage.
|Lisa Shay, Gregory Conti, Dominic Larkin and John Nelson. "A Framework for Analysis of Quotidian Exposure in an Instrumented World." IEEE Carnahan Conference on Security Technology, Boston, October 2012.
|Greg Conti, Lisa Shay, and Woody Hartzog. "Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement." DEFCON 20, Las Vegas, July 2012. PPT Slides [12.4M] Bloomberg coverage
|Lisa Shay and Greg Conti. "Countermeasures: Proactive Self-Defense Against Ubiquitous Surveillance." HOPE, New York City, July 2012. PDF Slides [7.0M] Off the Hook and Computerworld coverage.
|Robert Fanelli and Gregory Conti. "A Methodology for Cyber Operations Targeting and Control of Collateral Damage in the Context of Lawful Armed Conflict." International Conference on Cyber Conflict (CyCon), Tallinn Estonia, June 2012.
|Thomas Cook, Gregory Conti, and David Raymond. "When Good Ninjas Turn Bad: Preventing Your Students from Becoming the Threat." Colloquium for Information Systems Security Education, June 2012.
|Lisa Shay, Woodrow Hartzog, John Nelson, Dominic Larkin and Gregory Conti. "Confronting Automated Law Enforcement." We Robot, Miami, April 2012.
|James Caroland and Greg Conti. "Lessons of the Kobayashi Maru: Cheating is Fundamental." Shmoocon, January 2012. Talk PPT Slides PDF Slides Video(m4v) (April 2012 SOURCE Boston Extented Version PDF Slides)
|Greg Conti; "The Art and Science of Security Research"; DEFCON 19; August 2011. Talk PPT Slides [15.3M] New York Times coverage
|Gregory Conti, Sergey Bratus, Benjamin Sangster, Roy Ragsdale, Matthew Supan, Andrew Lichtenberg, Robert Perez and Anna Shubina; "Automated Mapping of Large Binary Objects Using Primitive Fragment Type Classification; Digital Forensics Research Conference (DFRWS); August 2010. binvis tool (v0.44)
|Greg Conti; "Our Instrumented Lives: Sensors, Sensors, Everywhere"; DEFCON 18; July 2010. Talk PPT Slides [31.8M] PDF Slides [7.6M]
|Greg Conti and Sergey Bratus; "Voyage of the Reverser: A Visual Study of Binary Species"; Black Hat USA; July 2010. binvis tool release (v0.44) Talk PPT Slides [6.9M]
|Gregory Conti, Sergey Bratus, Anna Shubina, Benjamin Sangster, Roy Ragsdale, Matthew Supan, Andrew Lichtenberg, and Robert Perez-Alemany. "A Visual Study of Binary Fragment Types." Black Hat USA. White Paper, July 2010.
|Gregory Conti and Edward Sobiesk; "Malicious Interface Design: Exploiting the User"; International World Wide Web Conference (WWW 2010); April 2010. Slashdot, EFF, and MSNBC coverage.
|Benjamin Sangster, Roy Ragsdale, Gregory Conti; "Automated Mapping of Large Binary Objects; Shmoocon; Work in Progress Talk; February 2009. Talk PPT Slides [2.0M]
Gregory Conti, Erik Dean, Matthew Sinda, and Benjamin Sangster; "Visual
Reverse Engineering of Binary and Data Files;" Workshop on Visualization for Computer Security (VizSEC);
|Greg Conti; "Could Googling Take Down a President, a Prime Minister, or an Average Citizen?; DEFCON 16; August 2008. Talk PPT Slides [8.0M]
|Greg Conti and Erik Dean; "Visual Forensic Analysis and Reverse Engineering of Binary Data;" Black Hat USA; August 2008.
Talk PPT Slides [17.9M] DanglyBytes and VizBin tool releases
InfoWorld, Law.com and Securosis Coverage
|Greg Conti; "Evil Interfaces: Violating the User;" HOPE; July 2008. Talk PPT Slides [15.5M]|
Kulsoom Abdullah, Gregory Conti and Raheem Beyah; "A Visualization Framework for Self-monitoring of Web-based Information Disclosure;" International Conference on Communications (ICC); May 2008.
Kulsoom Abdullah, Gregory Conti and Edward Sobiesk; "Self-monitoring of Web-based Information Disclosure;" Workshop on Privacy in the Electronic Society; October 2007.
Gregory Conti and Edward Sobiesk; "An Honest Man Has Nothing to Fear: User Perceptions on Web-based Information Disclosure;" Symposium on Usable Privacy and Security (SOUPS); July 2007.
|Greg Conti; "Satellite Imagery Analysis;" DEFCON 15; July 2007. Talk PDF Slides [6.8M]|
Gregory Conti; "Googling Considered Harmful;" New Security Paradigms Workshop; October 2006. (See also the eWeek and USENIX LOGIN coverage)
| Greg Conti; "Googling: I'm Feeling (un)Lucky;" DEFCON 14; July 2006.
Talk PDF Slides(0.8M) Talk Audio(MP3 21.0M) Talk Video(MP4 78.5M)
| Greg Conti; "Malware Cinema:
A Picture is Worth a Thousand Packets;" Black Hat Europe;
March 2006. Talk
PPT Slides [16.1M] Talk
PDF Slides [6.8M] |
Greg Conti; "Google: Don't Be Evil or Don't Be Good;" Interz0ne 5; March 2006. Talk PPT Slides (2.6M)
|Greg Conti; "High Bandwidth Visual Analysis of Security Data Flows;" Interz0ne
5; March 2006. Talk
PPT Slides (15.7M)
| K. Abdullah, C. Lee, G. Conti,
J. Copeland and J. Stasko; " IDS
RainStorm: Visualizing IDS Alarms;" IEEE Symposium on Information
Visualization's Workshop on Visualization for Computer Security (VizSEC);
| G. Conti; "Beyond Ethereal:
Crafting A Tivo for Security Datastreams;" Black Hat USA;
July 2005. Talk
PPT Slides (4.0M) Talk
PDF Slides (6.7M)
| G. Conti; "Countering
Denial of Information Attacks;" DEFCON 13; July 2005.
Talk PPT Slides (3.4M) Talk PDF Slides (1.7M)
Talk Audio(MP3 21.0M) Talk Video(MP4 78.5M)
G. Conti, M. Ahamad and J. Stasko; "Attacking Information Visualization System Usability: Overloading and Deceiving the Human;" Symposium on Usable Privacy and Security (SOUPS); July 2005.
|S. Krasser, G. Conti, J. Grizzard,
J. Gribschaw and H. Owen; "Real-Time
and Forensic Network Data Analysis Using Animated and Coordinated Visualization;"
IEEE Information Assurance Workshop (IAW); June 2005. Talk
PPT Slides (0.7M)
|K. Abdullah, C. Lee, G. Conti
and J. Copeland; "Visualizing
Network Data for Intrusion Detection;" IEEE Information Assurance
Workshop (IAW); June 2005. Talk
PDF Slides (0.7M)
|G. Conti, M. Ahamad and R. Norback;
Fusion and Dynamic Information Presentation: Towards a General Information
Firewall;" IEEE International Conference on Intelligence and
Security Informatics (IEEE-ISI); May 2005. Talk
PPT Slides (2.0M)
|G. Conti;"Countering Denial
of Information Attacks with Information Visualization;" Interz0ne
4; March 2005. Talk
PPT Slides (4.3M)
|G. Conti and K. Abdullah; "
Visual Fingerprinting of Network Attack Tools;" ACM Conference
on Computer and Communications Security's Workshop on Visualization and
Data Mining for Computer Security (VizSEC); October 2004. Talk
J. Grizzard, S. Krasser, H. Owen, G. Conti and E. Dodson; " Towards an Approach for Automatically Repairing Compromised Network Systems;" IEEE Symposium on Network Computing and Application's Workshop on Trustworthy Network Computing (IEEE-NCA); August 2004.
G. Conti; "Network Attack Visualization;" DEFCON 12; August 2004.
Talk PPT Slides(5.6M) Talk Audio(MP3 11.6M) Talk Video(MP4 97.4M)
Classical InfoVis Survey PPT Slides (8.4M)
Security InfoVis Survey PPT Slides (16.8M)
|G. Conti, D. Ragsdale, S. Lathrop
and C. Gates; "Implementation
and Lessons Learned from an Undergraduate Special Interest Group in Information
Assurance;" Colloquium for Information Systems Security Education(CISSE);
| J. Grizzard, E. Dodson, G.
Conti, J. Levine and Henry Owen; "Towards
a Trusted Immutable Kernel Extension (TIKE) for Self-Healing Systems: a
Virtual Machine Approach" IEEE Information Assurance Workshop
(IAW); Poster Session; June 2004.
|G. Conti; "Network Security
Data Visualization;" Interz0ne3; April 2004. Talk
PDF Slides (4.7M)
|G. Conti; "Interface
Design of Hacking Tools;" DEFCON 11; August 2003. Talk
PPT Slides (8.7M) Talk
|G. Conti, J. Hill,
S. Lathrop, K. Alford and D. Ragsdale; "A
Comprehensive Undergraduate Information Assurance Program;"
Third World Conference on Information Security Education (WISE3); June
|S. Lathrop, G. Conti
and D. Ragsdale; "Information
Warfare in the Trenches: Experiences from the Firing Line;"
Third World Conference on Information Security Education (WISE3); June
|J. Hill, J. Surdu,
S. Lathrop, G. Conti and C. Carver; "MAADNET:
Toward a Web-Distributed Tool for Teaching Networking and Information Assurance;"
Educational Multimedia, Hypermedia and Telecommunications (ED-Media);
|R. Tate and K. Blankenheim
(Advisor G. Conti); "Adapting
Linux for Use on a Windows Based Campus Network: Modifying Open Source/Free
Software to Meet Local Policy, Security, and Training Constraints;"
National Conference on Undergraduate Research(NCUR); March 2003.
|D. Ragsdale, J.
Hill and G. Conti; "The Information Assurance Program at West Point;"
Federal Information Systems Security Educators’ Association(FISSEA)
Conference; March 2003. PPT
Slides (3.4M)  PDF
|J. Hill, J. Surdu,
S. Lathrop, G. Conti and C. Carver; "MAADNET
NetBuilder: A Service/Demand Focused Network Simulator;" Communication
Networks and Distributed Systems Modeling and Simulation (CNDS) conference;
|G. Conti, J. Hill
and C. Carver; "Developing
an Undergraduate Distributed Development Course;" Frontiers
in Education Conference (FIE); November 2002. PPT
Slides (474K) Selected as Frontiers in Education New Faculty Fellow
|J. Surdu and G.
the Cyber Corps;" IEEE Information Assurance Workshop (IAW);
Poster Session; June 2002.
|K. Alford, G. Conti,
D. Cushen, E. Ressler, W. Turmel and D. Welch; "A
Two Edged Sword: Computing at West Point;" Making History:
West Point at 200 Years Conference; March 2002.
|G. Conti et al.
A Framework for Integrating Ethical and Values-Based Instruction into the
ACM Computing Curricula 2001;" Protecting Information in the
Computer and Beyond Workshop; Purdue University, October 2001.
|D. Welch, J. Marin
and G. Conti; "A
Framework for Information Warfare Simulation;" IEEE Systems,
Man and Cybernetics Information Assurance Workshop; May 2001.
|Other Books, Book Chapters, and Journal Publications|
| G. Conti. "Stone Turnings of Baghdad." American Woodturner Journal, December 2011, Vol. 26, No. 6, pp. 43-45.
| Betros, Lance; (G. Conti et
al contributors); “History of Computing at West Point;” West
Point: Two Centuries And Beyond; The McWhiney Foundation Press,
|G. Conti, J. M. D. Hill, S.
Lathrop, K. Alford, and D. J. Ragsdale, "Towards A Comprehensive Undergraduate
Information Assurance Program," Security
Education and Critical Infrastructure, C. Irvine and H. Armstrong,
Editors, Kluwer Academic Publishers, Norwell, Massachusetts, 2003, pp. 243-260,
|S. D. Lathrop, G. J. Conti,
and D. J. Ragsdale, "Information Warfare In The Trenches: Experiences from
the Firing Range ," Security
Education and Critical Infrastructure, C. Irvine and H. Armstrong,
Editors, Kluwer Academic Publishers, Norwell, Massachusetts, 2003, pp. 19-40,
|Smith, A. N., Custer, J. M.,
Berrie, J. W., G. J. Conti, and T. Thompson, Warfighter's Guide to Intelligence
Communications Architectures, Operational Support Office, June 1996.
|Dmitri Alperovich, Gregory Conti, and Simson Garfinkel. How Do We Create a Viable Cyber Profession: Opportunities and Challenges, AFCEA TechNet Land Forces - East, Baltimore, MD, August 2012. (projected)
|Marcia Hoffman, Congressman Jim Langevin, Vice Admiral Mike McConnell, Jeff Moss, and Sami Saydjari (Gregory Conti Moderator). The Role of the U.S. Government in Cyberspace, United States Military Academy Senior Conference, West Point, NY, June 2012.
|Patti Ihnat, Guillaume Poupard, Howard Schmidt and Frederic Sutter. (Gregory Conti Moderator). Structure and Deployment of Cyber Defenders, French American Defense Symposium on Cyber Security, Washington, DC, April 2012.
|Gregory Conti, Joel Ogren, Benjamin Shao, Andy Singer (Robert Shea Moderator), Recruiting, Training, and Retaining Tomorrow's Cyber Warriors, AFCEA TechNet Land Forces - Southwest, 28 March 2012. AFCEA SIGNALSCAPE and SIGNAL Online coverage
|Jamie Clark, Gregory Conti, Tanya Forsheit, Charles Palmer (Roland Trope Moderator), Deploying Tools to Build or Self-Sabotage the Enterprise: How Do We Square Legal Obligations for Cybersecurity with the Increasing Use of Technologies that Undermine It?, American Bar Association Business Law Section Spring Meeting, 23 March 2012.
|Tom Bianculli, Gregory Conti, Raj Goel, Nasir Memon (Paul Stirpe Moderator), Challenges in Cloud Computing, NYIT Cyber Security Conference, 15 September 2011.
|Alessandro Acquisti, Ryan Calo, Gregory Conti, and Woodrow Hartzog (Chris Hoofnagle Moderator); Human Computer Interaction and Consumer Protection, Samuelson Law, Technology & Public Policy Clinic, Privacy Scholars Speaker Series. UC Berkeley; 30-31 March 2011.
||David Aucsmith, Gregory Conti, David Dagon, Paul Judge, Val Rahmani, Chris Rouland, and Marcus Sachs (Rich DeMillo Moderator); Evolving Nature of Cyber Security Threats, GTISC Security Summit; October 2010.
|Gregory Conti, Carrie Gates, John Goodall, Bill Pike (Jeremy Epstein Moderator). Data Visualization Technologies, United States Secret Service Global Cyber Security Conference, Washington, DC, August 2009.
|Judit Bar-Ilan, Tom Cross, Martin Kratz and Wendy Seltzer (Gregory Conti Moderator); Web Search Privacy Issues, World Wide Web Conference (WWW2007); May 2007.
|Gregory Conti; Googling Considered Harmful
(as part of the 2006 Highlights of the New Security Paradigms Workshop Panel), Annual Computer Security Applications Conference(ACSAC); December 2006.
|Steve Chan, Gregory Conti and Mary Ellen Zurko
(Konstantin Beznosov moderator); Usability of Security Administration vs. Usability
of End-user Security Panel, Symposium on Usable Privacy and Security
(SOUPS), Carnegie Mellon University; June 2005.
Ed Balas, John Stasko, Kirsten Whitley
and Bill Yurcik (Gregory Conti moderator); Visualizing Security Data;
IEEE Information Assurance Workshop, United States Military Academy, June
|Gregory Conti, "Countering Network
Level Denial of Information Attacks Using Information Visualization,"
Georgia Institute of Technology, May 2006. (Advisor: Mustaque Ahamad)