Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mark O'Neill is active.

Publication


Featured researches published by Mark O'Neill.


internet measurement conference | 2016

TLS Proxies: Friend or Foe?

Mark O'Neill; Scott Ruoti; Kent E. Seamons; Daniel Zappala

We measure the prevalence and uses of TLS proxies using a Flash tool deployed with a Google AdWords campaign. We generate 2.9 million certificate tests and find that 1 in 250 TLS connections are TLS-proxied. The majority of these proxies appear to be benevolent, however we identify over 1,000 cases where three malware products are using this technology nefariously. We also find numerous instances of negligent, duplicitous, and suspicious behavior, some of which degrade security for users without their knowledge. Distinguishing these types of practices is challenging in practice, indicating a need for transparency and user awareness.


IEEE Internet Computing | 2017

TLS Inspection: How Often and Who Cares?

Mark O'Neill; Scott Ruoti; Kent E. Seamons; Daniel Zappala

TLS inspection -- inline decryption, inspection, and re-encryption of TLS traffic -- is a controversial practice used for both benevolent and malicious purposes. This article describes measurements of how often TLS inspection occurs and reports on a survey of the general public regarding the practice of TLS inspection. This helps inform security researchers and policymakers regarding current practices and user preferences.


computer and communications security | 2014

POSTER: TLS Proxies: Friend or Foe?

Mark O'Neill; Scott Ruoti; Kent E. Seamons; Daniel Zappala

The use of TLS proxies to intercept encrypted traffic is controversial since the same mechanism can be used for both benevolent purposes, such as protecting against malware, and for malicious purposes, such as identity theft or warrantless government surveillance. To understand the prevalence and uses of these proxies, we build a TLS proxy measurement tool and deploy it via a Google AdWords campaign. We generate 2.9 million certificate tests and find that 1 in 250 TLS connections are proxied. The majority of these proxies appear to be benevolent, however we identify over 1,000 cases where three malware products are using this technology nefariously. We also find numerous instances of negligent and duplicitous behavior, some of which degrade security for users without their knowledge.


international conference on web services | 2017

Intrusion Detection with Unsupervised Heterogeneous Ensembles Using Cluster-Based Normalization

Scott Ruoti; Scott Heidbrink; Mark O'Neill; Eric Gustafson; Yung Ryn Choe

Outlier detection has been shown to be a promising machine learning technique for a diverse array of felds and problem areas. However, traditional, supervised outlier detection is not well suited for problems such as network intrusion detection, where proper labelled data is scarce. This has created a focus on extending these approaches to be unsupervised, removing the need for explicit labels, but at a cost of poorer performance compared to their supervised counterparts. Recent work has explored ways of making up for this, such as creating ensembles of diverse models, or even diverse learning algorithms, to jointly classify data. While using unsupervised, heterogeneous ensembles of learning algorithms has been proposed as a viable next step for research, the implications of how these ensembles are built and used has not been explored.


human factors in computing systems | 2016

We're on the Same Page: A Usability Study of Secure Email Using Pairs of Novice Users

Scott Ruoti; Jeff Andersen; Scott Heidbrink; Mark O'Neill; Elham Vaziripour; Justin Wu; Daniel Zappala; Kent E. Seamons


symposium on usable privacy and security | 2016

User Attitudes Toward the Inspection of Encrypted Traffic

Scott Ruoti; Mark O'Neill; Daniel Zappala; Kent E. Seamons


usenix security symposium | 2016

TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication.

Mark O'Neill; Scott Heidbrink; Jordan Whitehead; Scott Ruoti; Dan Bunker; Kent E. Seamons; Daniel Zappala


symposium on usable privacy and security | 2017

Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications.

Elham Vaziripour; Justin Wu; Mark O'Neill; Jordan Whitehead; Scott Heidbrink; Kent E. Seamons; Daniel Zappala


symposium on usable privacy and security | 2016

Social Authentication for End-to-End Encryption

Elham Vaziripour; Mark O'Neill; Justin Wu; Scott Heidbrink; Kent E. Seamons; Daniel Zappala


usenix security symposium | 2018

The Secure Socket API: TLS as an Operating System Service.

Mark O'Neill; Scott Heidbrink; Jordan Whitehead; Tanner Perdue; Luke Dickinson; Torstein Collett; Nick Bonner; Kent E. Seamons; Daniel Zappala

Collaboration


Dive into the Mark O'Neill's collaboration.

Top Co-Authors

Avatar

Daniel Zappala

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Scott Ruoti

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Justin Wu

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jeff Andersen

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar

Luke Dickinson

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar

Yung Ryn Choe

Sandia National Laboratories

View shared research outputs
Researchain Logo
Decentralizing Knowledge