Overview

Brian's research interests primarily reside in the areas of anomaly detection and various types of security assessments. Past and current graduate students and their research projects, undergraduate design projects and publications are listed below.

Current Graduate Students

  • Andrew Fryer (co-supervision with Dr. Tom Dean, Queen's University) - Vulnerability Discovery
  • Labib Chowdhry (co-supervision with Dr. Tom Dean, Queen's University) - Vulnerability Discovery
  • Rachael Machnee - IPMS Vulnerability Discovery, Binary Fuzzing
  • Derek Klaver (co-supervision with Dr. Al Mallah) - Part-time, research focus TBD
  • Stéphane Gagnon - Host Based Anomaly Detection Using Temporal Graph Autoencoder and Sysmon Logs
  • Joey Lord (co-supervision with Dr. Knight) - Defensive Cybersecurity Trainer for the Integrated Platform Management System

Past Graduate Students

  • 2023, Clint Legg (co-supervision with Dr. Roberge) - Exposing Vulnerabilities in a Proprietary SCADA System
  • 2023, Charlie Grimshaw - Link-Based Anomaly Detection with SysMon and Graph Neural Networks
  • 2023, Emilie Coote - Natural Language Processing and Deep Learning for IPMS Host-Based Anomaly Detection
  • 2023, Alec Harlow (co-supervision with Dr. Roberge) - Anomaly Detection for the MIL-STD-1553B Multiplex Data Bus Using an LSTM Autoencoder
  • 2022, Taylor Perkins (co-supervision with Dr. Leblanc) - Data Handling Framework to Enable IPMS Anomaly Detection
  • 2022, Patrick Cousineau - IPMS Vulnerability Discovery Through Network Protocol Fuzzing
  • 2022, Dakotah Soucy - Feature Engineering for a MIL-STD-1553B LSTM Autoencoder Anomaly Detector
  • 2021, Eddie O'Handley - Physical Layer Security of the ARINC 429 Data Bus Protocol
  • 2020, Jon Timmins (co-supervision with Dr. Knight) - Offensive Cybersecurity Trainer for the Integrated Platform Management System

4th Year Design Projects

  • 2023 (co-supervision with Dr. Roberge) - Grant Brooks and Jake Giczi, MIL-STD-1553B Data Bus Attack Framework
  • 2020 - Bill Lai and Han Na Baik, Custom ELK Stack for Anomaly Detection leveraging Suricata and Zeek
  • 2019 (co-supervision with Dr. Leblanc) - Cody Carter, Ryan Tsui and Connor Weeks, Instrusion Detecton System for NISRN

Publications

Conference Publications
  • D. Soucy, B. Lachine, "Feature Engineering for a MIL-STD-1553B LSTM AutoEncoder", 2024 European Conference on Cyber Warfare and Security (ECCWS) [accepted].
  • A. Harlow, B. Lachine, V. Roberge, "Anomaly Detection for the MIL-STD-1553B Multiplex Data Bus Using an LSTM Autoencoder", 2024 International Conference on Cyber Warfare and Security (ICCWS) [accepted].
  • C. Grimshaw, B. Lachine, T. Perkins, E. Coote, "Link-based Anomaly Detection with Sysmon and Graph Neural Networks", 2024 IEEE International Conference on AI in Cybersecurity (ICAIC) [accepted].
  • R. Al Mallah, B. Lachine and G. Badu-Marfo, "Security of SDN in an Adversarial Setting: The DDoS Case," 2023 IEEE Global Conference on Artificial Intelligence and Internet of Things (GCAIoT), Dubai, United Arab Emirates, 2023, pp. 53-58, doi: 10.1109/GCAIoT61060.2023.10385112.
  • A. Fryer, T. Dean, and B. Lachine, “Input Output Grammar Coverage in Fuzzing”, 2023 IEEE Military Communications Conference (MILCOM), Oct. 2023, pp. 937–943. doi: 10.1109/MILCOM58377.2023.10356308.
  • E. Coote and B. Lachine, “Platform Management System Host-Based Anomaly Detection using TF-IDF and an LSTM Autoencoder”, 2023 IEEE Military Communications Conference (MILCOM), Oct. 2023, pp. 471–477. doi: 10.1109/MILCOM58377.2023.10356381.
  • P. Cousineau and B. Lachine, "Enhancing Boofuzz Process Monitoring for Closed-Source SCADA System Fuzzing", 2023 IEEE International Systems Conference (SysCon), Vancouver, BC, Canada, 2023, pp. 1-8, doi: 10.1109/SysCon53073.2023.10131048.
  • J. Timmins, S. Knight and B. Lachine, "Offensive Cyber Security Trainer for Platform Management Systems", 2021 IEEE International Systems Conference (SysCon), Vancouver, BC, Canada, 2021, pp. 1-8, doi: 10.1109/SysCon48628.2021.9447060.
Technical Reports

Brian also has 11 technical reports submitted to research sponsors focused primarily on platform cyber security.