
MAJ Jonathan Fuller began his military career as an Armor Officer. He served in various roles in the 101st Airborne Division (Air Assault), including as a platoon leader and executive officer, during which he was deployed in support of Operation Enduring Freedom. He later transitioned to the Signal Corps, where he commanded a Signal Detachment in the 3rd Special Forces Group (Airborne). Subsequently, Jonathan shifted to become a Functional Area 26A (Network Engineer), with responsibilities including IT engineering within the U.S. Army Information Systems Engineering Command and information systems engineering for the 1st Theater Sustainment Command. He is currently the Chief Information Security Officer (CISO) at the U.S. Military Academy and an Assistant Professor in EECS, where he directs the Digital Forensics Course
Ph.D.,Electrical and Computer Engineering, Georgia Institute of Technology, 2022
M.S.,Computer Science, Air Force Institute of Technology, 2016
Research Interests
Binary Analysis
Cyber Forensics
Security Measurements
Mobile Security
IoT Security
Selected Publications
Conference Publications
M. Yao, J. Fuller, R. Pai Kasturi, S. Agarwal, AK. Sikder, and B. Saltaformaggio, “Hiding in Plain Sight: An Empirical Study of Web Application Abuse in Malware,” in Proceedings of the 32nd USENIX Security Symposium (Security‘23), 2023.
Artifact Evaluated Badges: Available, Functional
Media Coverage: Georgia Tech, Tech Times, Israel Homeland Security, ACM Tech News, Tech Xplore
R. Pai Kasturi, J. Fuller, Y. Sun, O. Chbaklo, A. Rodriguez, J. Park, and B. Saltaformaggio, “Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins In WordPress Market- places,” in Proceedings of the 31st USENIX Security Symposium (Security‘22), 2022.
CSAW’22 Applied Research Competition Finalist
Media Coverage: Georgia Tech, Security Affairs, The Hacker News, The Tech Outlook, All Tech News, Communications of the ACM
J. Fuller, R. Pai Kasturi, AK. Sikder, H. Xu, B. Arik, V. Verma, E. Asdar, and B. Saltaformaggio, “C3PO: Large Scale Study Of Covert Monitoring of C&C Servers via Over-Permissioned Protocol Infiltration,” in Proceedings of the 28th ACM Conference on Computer and Communications Security (CCS‘21), 2021.
B. Ramsey, J. Fuller, and C. Badenhop, “Efficacy of Physical Layer Preamble Manipulation for IEEE 802.11 a/ac,” IEEE Electronic Letters, 52(8), pp 669-671, 2016.
J. Fuller, B. Ramsey, J. Pecarina, and M. Rice, “Wireless Intrusion Detection of Covert Channel Attacks in ITU-T G.9959-based Networks,” 11th International Conference on Cyber Warfare and Security (ICCWS‘16), pp 137-145, 2016.
J. Fuller and B. Ramsey, “Rogue Z-Wave Controllers: A Persistent Attack Channel,” 10th IEEE International Workshop on Practical Issues in Building Sensor Network Applications (SenseAPP‘15), pp 734-741, 2015