Senior Member of Technical Staff, SEI Cyber Threat and Vulnerability Analysis
Research methodology to advance a Science of Cyber Security (SCS). We have developed computational algorithms for malicious-code detection, characterization, and analysis to expose the malicious design goals (of malware) or aberrant behaviors of software (vulnerabilities/exploits). Recently we have considered how these capabilities can be re-engineered into mobile and communicable formats that can be shared among agents within a Recommendation-Verification System.
Casey has worked in the areas of threat analysis, code analysis, natural language processing, genomics, bio-informatics, and applied mathematics in academia, industry, and government. Casey received his PhD in applied mathematics from the Courant Institute at New York University. He also holds an MS in mathematics from Southern Illinois University Carbondale, a master’s equivalency in computer science from the Courant Institute at New York University, and an MA in mathematics from the University of Missouri Columbia. Casey is a member of the American Mathematical Society (AMS) and Society for Industrial and Applied Mathematics (SIAM).
"Cyber Security via Minority Games with Epistatic Signaling," (with B. Mishra, R. Weaver, L. Metcalf, J.A. Morales, and E. Wright), 8th International Conference on Bio-Inspired Information and Communications Technologies, BICT 2014, Boston, MA , (Dec 1-3, 2014), 2014
"Agent Based Trace Learning in a Recommendation-Verification System for Cyber Security," (with B. Mishra, E. Wrigth, J.A. Morales, M. Appel, J. Gennari, L. Metcalf, J. Spring and R. Weaver), 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014, Fajardo, Puerto Rico, October 28-30, 2014.
"Cyber Security via Signaling Games: Toward a Science of Cyber Security," (with B. Mishra, J.A. Morales, T. Nguyen, J. Spring, R. Weaver, and E. Wright), 10th International Conference on Distributed Computing and Internet Technology, Bhubaneswar, Odisha, India, (February, 2014), 2013.
"Diversity Characteristics in the Zeus Family of Malware," (with C. Cohen, D. French, C. Hines, J. Havrilla, R. Kinder), Carnegie Mellon University, CMU/SEI-2010-SR-030
"Application of Code Comparison Techniques Characterizing the Aliser Malware Family," (with C. Cohen, D. French, C. Hines, and J. Havrilla), Carnegie Mellon University, CMU/SEI-2010-SR-031
"Coupled oscillator models for a set of communicating cells," Priami, Corrado (ed.), Computational methods in systems biology. First international workshop, CMSB 2003, Rovereto, Italy, February 24-26, 2003.
"Minimal entropy probability paths between genome families," (with Ahlbrandt, Calvin; Benson, Gary), J. Math. Biol. 48, No.5, 563-590 (2004).
"Placing Probes along the Genome using Pair-wise Distance Data," (with B. Mishra and M. Wigler), Algorithms in Bioinformatics, First International Workshop, WABI 2001 Proceedings, LNCS 2149:52-68, Springer-Verlag, 2001.