Jonathan Fuller

Jonathan Fuller

Chief Information Security Officer

Electrical Engineering & Computer Science

MAJ Jonathan Fuller began his military career as an Armor Officer. He served in various roles in the 101st Airborne Division (Air Assault), including as a platoon leader and executive officer, during which he was deployed in support of Operation Enduring Freedom. He later transitioned to the Signal Corps, where he commanded a Signal Detachment in the 3rd Special Forces Group (Airborne). Subsequently, Jonathan shifted to become a Functional Area 26A (Network Engineer), with responsibilities including IT engineering within the U.S. Army Information Systems Engineering Command and information systems engineering for the 1st Theater Sustainment Command. He is currently the Chief Information Security Officer (CISO) at the U.S. Military Academy and an Assistant Professor in EECS, where he directs the Digital Forensics Course

Ph.D.,Electrical and Computer Engineering, Georgia Institute of Technology, 2022

M.S.,Computer Science, Air Force Institute of Technology, 2016

Research Interests

Binary Analysis

Cyber Forensics

Security Measurements

Mobile Security

IoT Security

Selected Publications

Conference Publications

M. Yao, J. Fuller, R. Pai Kasturi, S. Agarwal, AK. Sikder, and B. Saltaformaggio, “Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware,” in Proceedings of the 32nd USENIX Security Symposium (Security‘23), 2023.
Artifact Evaluated Badges: Available, Functional
Media Coverage: Georgia TechTech TimesIsrael Homeland Security, ACM Tech News, Tech Xplore

R. Pai Kasturi, J. Fuller, Y. Sun, O. Chbaklo, A. Rodriguez, J. Park, and B. Saltaformaggio, “Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Market- places,” in Proceedings of the 31st USENIX Security Symposium (Security‘22), 2022.
CSAW’22 Applied Research Competition Finalist
Media Coverage: Georgia TechSecurity Affairs, The Hacker News, The Tech OutlookAll Tech News, Communications of the ACM

J. Fuller, R. Pai Kasturi, AK. Sikder, H. Xu, B. Arik, V. Verma, E. Asdar, and B. Saltaformaggio, “C3PO: Large Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration,” in Proceedings of the 28th ACM Conference on Computer and Communications Security (CCS‘21), 2021.

B. Ramsey, J. Fuller, and C. Badenhop, “Efficacy of Physical Layer Preamble Manipulation for IEEE 802.11 a/ac,” IEEE Electronic Letters, 52(8), pp 669-671, 2016.

J. Fuller, B. Ramsey, J. Pecarina, and M. Rice, “Wireless Intrusion Detection of Covert Channel Attacks in ITU-T G.9959-based Networks,” 11th International Conference on Cyber Warfare and Security (ICCWS‘16), pp 137-145, 2016.

J. Fuller and B. Ramsey, “Rogue Z-Wave Controllers: A Persistent Attack Channel,” 10th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseAPP‘15), pp 734-741, 2015