Thomas H. (Tommy) Morris
Director, Center for Cybersecurity Research and Engineering (CCRE) 
Professor, Electrical and Computer Engineering (ECE)
The University of Alabama in Huntsville

Education

Ph.D. Computer Engineering
Southern Methodist University
Dallas, TX, 2008

M.S. Computer Engineering
Southern Methodist University
Dallas, TX, 2001

B.S. Electrical Engineering
Texas A&M University
College Station, TX, 1994

Background 

Before joining the University of Alabama in Huntsville I worked at Mississippi State University from 2008-2015 and Texas Instruments from 1991-2008. At MSU, I served as an associate professor and center director. At TI, I worked as a digital designer and digital design verification engineer.

Teaching

I currently teach: 
  • Engineering 101: Introduction to Computing for Engineers
In the past I have taught:
  • CPE 449/549 Introduction to Cybersecurity Engineering
  • CPE 692 - Cybersecurity Capstone - in this class we are completing INSuRE projects
  • INSuRE: Cybersecurity Research Experience
  • Digital Systems Design
  • Industrial Control System Security
  • Cyber Physical Systems Security
  • Data Communications & Computer Networking

Research

My primary research area is computer security. My current research involves security for industrial control systems (SCADA, Smartgrid, Smart meters, process control systems). Together with a group of student researchers, I am investigating control system vulnerabilities and developing methods for control system intrusion detection, forensic data logging, and network traffic authentication.

We have created a set of cyber attack datasets for industrial control systems.

Journal

  1. Alves, T., Morris, T., OpenPLC: An IEC 61131-3 Compliant Open Source Industrial Controller for Cyber Security Research, submitted to Computers & Security. (under review)
  2. Alves, T., Das, R., Werth, A., Morris, T., Virtualization of SCADA Testbeds for Cybersecurity Research: A Modular Approach, in Computers & Security. (to appear)
  3. Alves, T., Das, R., Morris, T., Embedding Encryption and Machine Learning Intrusion Prevention Systems on Programmable Logic Controller, in IEEE Embedded Systems Letters, vol. PP, no. 99, pp. 1-1, doi: 10.1109/LES.2018.2823906. (early access)
  4. Sherman, A., Dark, M., Chan, A., Chong, R., Morris, T., Olivia, L., Springer, J., Thuraisingham, B., Vatcher, C., Verma, R., Wetzel, S., INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research, in IEEE Security & Privacy, vol. 15, no. 4, pp. 72-78, 2017. link
  5. Adhikari, U., Morris, T., Pan, S., Applying Hoeffding Adaptive Trees for Real-Time Cyber-Power Event and Intrusion Classification, IEEE Transactions on Smart Grid, doi: 10.1109/TSG.2017.2647778, (early access), link
  6. Adhikari, U., Morris, T., Pan, S., Applying Non-Nested Generalized Exemplars Classification for Cyber-Power Event and Intrusion Detection,  IEEE Transactions on Smart Grid, doi: 10.1109/TSG.2016.2642787, (early access), link 
  7. Chen, Q., Trivedi, M., Abdelwahed, S., Morris, T., Sheldon, F. Model-based Autonomic Security Management for Cyber Physical Infrastructures. International Journal of Critical Infrastructures, Inderscience Publishers Ltd., vol. 12, no. 4, pp. 273-294, 2016, doi: 10.1504/IJCIS.2016.10002316, link
  8. Adhikari, U., Morris, T., Pan, S., WAMS Cyber-Physical Test Bed for Power System, Cybersecurity Study, and Data Mining. IEEE Transactions on Smart Grid. vol. 8, no. 6, pp. 2744-2753, 2017, doi: 10.1109/TSG.2016.2537210, link
  9. Morris, T., Pan, S., Adhikari, U., Younan, N., King, R. and Madani, V. (2016) ‘Cyber security testing and intrusion detection for synchrophasor systems’, International Journal of Network Science, Vol. 1, No. 1, pp.28–52. link
  10. S. Pan, T. Morris and U. Adhikari, "Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems," in IEEE Transactions on Smart Grid, vol. 6, no. 6, pp. 3104-3113, Nov. 2015. doi: 10.1109/TSG.2015.2409775 link
  11. S. Pan, T. Morris and U. Adhikari, "Classification of Disturbances and Cyber-Attacks in Power Systems Using Heterogeneous Time-Synchronized Data," in IEEE Transactions on Industrial Informatics, vol. 11, no. 3, pp. 650-662, June 2015. doi: 10.1109/TII.2015.2420951 link
  12. Pan, S., Morris, T., Adhikari, U., A Specification-based Intrusion Detection Framework for Cyber-physical Environment in Electric Power System, International Journal of Network Security (IJNS), Vol.17, No.2, PP.174-188, March 2015. pdf
  13. Gao, W., Morris, T.,On Cyber Attacks and Signature Based Intrusion Detection for MODBUS Based Industrial Control Systems. The Journal for Digital Forensics, Security and Law (JDFSL). Volume 9, No. 1. 2014. link
  14. Srivastava, A., Morris, T., Ernster, T., Vellaithurai, C., Pan, S., Adhikari, U. Modeling Cyber-Physical Vulnerability of the Smart Grid With Incomplete Information. IEEE Transactions on Smart Grid. Volume 4, No.1, pp.235-244, March 2013. doi: 10.1109/TSG.2012.2232318 link
  15. Abu-Nimeh, S., Foo, E., Fovino, I.N., Govindarasu, M., Morris, T., "Cyber security of networked critical infrastructures [Guest Editorial]," IEEE Network, vol.27, no.1, pp.3-4, January-February 2013 link
  16. Reaves, B., Morris, T. Analysis and mitigation of vulnerabilities in short-range wireless communications for industrial control systems. International Journal of Critical Infrastructure Protection (IJCIP). Elseiver. Volume 5. Issues 3-4. December 2012. Pages 154–174 link
  17. Reaves, B., Morris, T. An Open Virtual Testbed for Industrial Control System Security Research. International Journal of Information Security (IJIS). Springer. Volume 11, Issue 4 (2012), Page 215-229. DOI: 10.1007/s10207-012-0164-7 link
  18. Morris, T. Srivastava, A., Reaves, B., Gao, W., Pavurapu, K., Reddi, R. A Control System Testbed to Validate Critical Infrastructure Protection Concepts. International Journal of Critical Infrastructure Protection (2011). Elseiver. doi:10.1016/j.ijcip.2011.06.005 link
  19. Morris, T., Nair, V.S.S. Private Computing on Public Platforms: Portable Application Security. In Wiley InterScience Journal of Wireless Communications and Mobile Computing. Volume 10, Issue 7. Pages 942-958. John Wiley & Sons, Ltd. July 2010. link
  20. Morris, T. Nair, V.S.S. Key Protection for Private Computing on Public Platforms. International Journal of Computer Science and Security (IJCSS). Volume 3, Issue 5. Pages 371-383. CSC Journals. November 2009. pdf

Book Chapters

  1. Das, R. Morris, T., "Modeling a Midstream Oil Terminal for Cybersecurity Risk Evaluation," in Critical Instructure Protection XII, Sujeet Shenoi and Jason Staggs, Eds. IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, 2018. (to appear)
  2. Thornton, Z., Morris, T., "Enhancing a Virtual SCADA Cyber Security Laboratory Using Simulink," in Critical Infrastructure Protection IX, Sujeet Shenoi and Johnathan Butts, Eds. IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, 2015. link
  3. Morris, T., Gao, W., "Industrial Control System Network Traffic Data sets to Facilitate Intrusion Detection System Research," in Critical Infrastructure Protection VIII, Sujeet Shenoi and Johnathan Butts, Eds. IFIP Advances in Information and Communication Technology, Springer Berlin Heidelberg, Volume 441, 2014, pp 65-78. link
  4. Morris, T., "Trusted Platform Module," in Encyclopedia of Cryptography and Security, H. C. A. van Tilborg and S. Jajodia, Eds. Boston, MA: Springer US, 2011, ch. 796, pp. 1332-1335. link
  5. Giri, J., Morris, T., "Transmission Systems," in Smart Grids: infrastructure, Technology, and Solutions, Stuart Borlase, Ed., Boca Raton, FL: CRC Press, Taylor and Francis Group, 2012, Chapter 3.4.1, pp. 156-168. link
  6. Morris, T., Pan, S., Adhikari, U., Younan, N., King, R., Madani, V., "Phasor Measurement Unit and Phasor Data Concentrator Cyber Security" in Systems and Optimization Aspects of Smart Grid Challenges, Carvalho, M., Pappu, V., Pardalos, P., Eds., Springer-Verlag Berlin Heidelberg, 2013, Chapter 7. link

Conference

  1. Alves, T., Morris, T., Hardware-based Cyber Threats, 4th International Conference on Information Systems Security and Privacy, Funchal-Madeira, Portugal, January 22-24, 2018.
  2. Lingasubramanian, K., Kumar, R., Gunti, N., Morris, T., Study of Hardware Trojans Based Security Vulnerabilities in Cyber Physical Systems, IEEE 36th International Conference on Consumer Electronics, Las Vegas, NV, January 12-15, 2018. (to appear)
  3. Alves, T., Morris, T., Yoo, S., Securing SCADA Applications Using OpenPLC With End-To-End Encryption. Third Annual Industrial Control System Security (ICSS) Workshop at the 2016 Annual Computer Security Applications Conference. Orlando, Florida, USA, December 4-8, 2017.
  4. Das, R., Morris, T. Machine Learning and Cyber Security, International Conference on Computer, Electrical & Communication Engineering, Kolkata, West Bengal, India, December 22-23, 2017.
  5. Gunti, N., Lingasubramanian, K., Alves, T., Das, R., Morris, T., Virtual Simulation Platform for Studying Hardware Trojan Vulnerabilities in SCADA Systems, Proceedings of the 2017 National Cyber Summit Research Track, Huntsville, AL, June 6-8, 2017.
  6. Alves, T., Das, R. Morris, T. Virtualization of Industrial Control System Testbeds for Cybersecurity. Second Annual Industrial Control System Security (ICSS) Workshop at the 2016 Annual Computer Security Applications Conference. Los Angeles, CA. December 5-9, 2016. link,slides
  7. Vaughn, R., Morris, T., Addressing Critical Industrial Control System Cyber Security Concerns via High Fidelity Simulation. The 11th Annual Cyber and Information Security Research (CISR) Conference. April 5-7, 2016. Oak Ridge, TN, USA. link
  8. Hu, F., Morris, T., McCallum, D., Zhou, H., Towards a Multimedia-based Virtual Classroom on Cyber-Physical System (CPS) Security Education for Both City and Rural Schools. 2015 ASEE Annual Conference and Exposition. June 14-17, 2015. Seattle, WA, USA. link
  9. Beaver, J., Borges, R., Buckner, M., Morris, T., Adhikari, U., Pan, S., Machine Learning for Power System Disturbance and Cyber-attack Discrimination, Proceedings of the 7th International Symposium on Resilient Control Systems, August 19-21,2014, Denver, CO, USA. link
  10. Adhikari, U., Morris, T., Pan, S. A Cyber-Physical Power System Test Bed for Intrusion Detection Systems. Proceedings of the 2014 IEEE Power Energy Society General Meeting (PESGM). July 27-31, 2014. National Harbor, MD. pdf
  11. Adhikari, U., Morris, T., Pan, S. A Causal Event Graph for Cyber-Power System Events Using Synchrophasor. Proceedings of the 2014 IEEE Power Energy Society General Meeting (PESGM). July 27-31, 2014. National Harbor, MD. pdf
  12. Madani, V., Barich, J., Day, D., Gotesky, J., Jampala, A., Giri, J., Parashar, M., Rahmnatian, F., Gharpure, V., King, R., Morris, T. Advanced EMS Applications Using Synchrophasor Systems for Grid Operation. Proceedings of the 2014 IEEE PES Transmission & Distribution Conference & Exposition. April 14-17, 2014. Chicago, IL. link
  13. Morris, T., Gao, W. Classifications of Industrial Control System Cyber Attacks. Proceedings of the 1st International Symposium for ICS & SCADA Cyber Security 2013. September 16-17, 2013. Leicester, UK. link
  14. Morris, T., Vaughn, R., Sitnikova, E. Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security. Proceedings of the Australasian Information Security Conference (ACSW-AISC) 2013. January 29-February 1, 2013. Adelaide, Australia. pdf
  15. Pan, S., Morris, T., Adhikari, U., Causal Event Graphs Cyber-physical System Intrusion Detection System. Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW8). Jan 8-10, 2013. Oak Ridge, TN. pdf
  16. Sprabery, R., Morris, T., Pan, S., Adhikari, U., Protocol Mutation Intrusion Detection for Synchrophasor Communications. Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW8). Jan 8-10, 2013. Oak Ridge, TN. pdf
  17. Vaughn, R., Morris, T., Sitnikova, E. Development and Expansion of an Industrial Control System Security Laboratory and an International Research Collaboration. Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW8). Jan 8-10, 2013. Oak Ridge, TN. pdf
  18. Sheldon, S., Huang, J., Dang, J., Fetzer, D., Goose, S., Kirsch, J., Manz, D., Morris, T., Wei, D. Intrinsically Resilient Energy Control Systems. Proceedings of the 8th Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW8). Jan 8-10, 2013. Oak Ridge, TN. pdf
  19. Sheldon, S., Huang, J., Dang, J., Fetzer, D., Manz, D., Morris, T., Wei, D., Kirsch, J., Goose, S. Using Semantic Web Technologies to Develop Intrinsically Resilient Energy Control Systems. Proceedings of the 7th International Conference on Semantic Technologies for Intelligence, Defense, and Security (STIDS 2012). October 23-26 , 2012. Fairfax, VA. pdf
  20. Foo, E. Branagan, M. Morris, T. A Proposed Australian Industrial Control System Security. Proceedings of the 46th IEEE Hawaii International Conference on System Sciences (HICSS – 46). January 7-10, 2013. Grand Wailea, Maui. pdf
  21. Morris, T., Vaughn, R., Dandass, Y. Deterministic Intrusion Detection Rules for MODBUS Protocols. Proceedings of the 46th IEEE Hawaii International Conference on System Sciences (HICSS – 46). January 7-10, 2013. Grand Wailea, Maui. pdf
  22. Morris, T., Adhikari, U., Pan, S. Cyber Security Recommendations for Wide Area Monitoring, Protection, and Control Systems. IEEE Power Energy Society General Meeting. July 22-26, 2012. San Diego, CA. pdf
  23. Adhikari, U., Morris, T., Dahal, N., Pan, S., King, R., Younan, N. Madani, V. Development of Power System Test Bed for Data Mining of Synchrophasors Data, Cyber-Attack and Relay Testing in RTDS. IEEE Power Energy Society General Meeting. July 22-26, 2012. San Diego, CA. pdf
  24. Owens, S., Morris, T., Hall, G. A Multi-Team Multi-Semester Large-Scale Capstone Project Experience. Proceedings of 2012 ASEE Southeastern Section Annual Conference and Meeting. April 1-3, 2012. Mississippi State, MS. pdf
  25. Cody Tankersley, Yoginder S. Dandass, and Thomas H. Morris , “PCI Probe: A Tool for Testing PCIe Peripheral Devices in 64-bit Windows 7,” in Proceedings of the 27th International Conference on Computers and Their Applications (CATA-2012), Las Vegas, March 12–14. pdf
  26. Morris, T., Vaughn, R., Dandass, Y. A Retrofit Network Intrusion Detection System for MODBUS RTU and ASCII Industrial Control Systems. Proceedings of the 45th IEEE Hawaii International Conference on System Sciences (HICSS – 45). January 4-7, 2012. Grand Wailea, Maui. pdf
  27. Morris, T., Pan, S., Lewis, J., Moorhead, J., Reaves, B., Younan, N., King, R., Freund, M., Madani, V. Cybersecurity Testing of Substation Phasor Measurement Units and Phasor Data Concentrators. The 7th Annual ACM Cyber Secruity and Information Intelligence Research Workshop (CSIIRW). October 12-14, 2011. Oak Ridge, TN. pdf
  28. Morris, T., Vaughn, R., Dandass, Y. A Testbed for SCADA Control System Cybersecurity Research and Pedagogy. The 7th Annual ACM Cyber Secruity and Information Intelligence Research Workshop (CSIIRW). October 12-14, 2011. Oak Ridge, TN. pdf
  29. Schmidt, P., Zalewski, J., Murphy, G., Morris, T., Carmen, C., van Susante, P., Case Studies in Application of System Engineering Practices to Capstone Projects. 118th Annual American Society of Engineering Educators Conference and Exposition. June 26-29, 2011. Vancouver, Canada. pdf
  30. Morris, T., Pavurapu, K. A Retrofit Network Transaction Data Logger and Intrusion Detection System for Transmission and Distribution Substations, in the Proceedings of 2010 IEEE International Power and Energy Conference. Kuala Lumpur, Malaysia. Nov 29, 2010. pdf
  31. Gao, W., Morris, T., Reaves, B., Richey, D. On SCADA Control System Command and Response Injection and Intrusion Detection, in the Proceedings of 2010 IEEE eCrime Researchers Summit. Dallas, TX. Oct 18-20, 2010. pdf Best Paper Award Winner!
  32. Reaves, B., Morris, T., Discovery, Infiltration, and Denial of Service in a Process Control System Wireless Network. IEEE eCrime Researchers Summit. October 20-21, 2009. Tacoma, WA. pdf
  33. Morris, T., Srivastava, A., Reaves, B., Pavurapu, K., Abdelwahed, S., Vaughn, R., McGrew, W., Dandass, Y. Engineering Future Cyber-Physical Energy Systems: Challenges, Research Needs, and Roadmap. 2009 IEEE North American Power Symposium. October 4-6, 2009. Starkville, MS. pdf
  34. Morris, T. Nair, V.S.S. Encryption Key Protection for Private Computing on Public Platforms. Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications (Percom 2009). Galveston, TX, USA. 9-13 March 2009 pdf
  35. Morris, T. Nair, V.S.S. Secure Context Switch for Private Computing on Public Platforms. Proceedings of the 2008 IEEE Global Telecommunications Conference (Globecom 2008). New Orleans, LA, USA. 1-4 December 2008 pdf
  36. Morris, T. Nair, V.S.S. Privacy Protected ELF for Private Computing on Public Platforms. Proceedings of the Third International Conference on Availability, Reliability, and Security (ARES2008). Barcelona, Spain. March 4-7, 2008. pdf
  37. Morris, T. Nair, V.S.S. PCPP: On Remote Host Assessment via Naive Bayesian Classification. IEEE International Parallel and Distributed Processing Symposium (IPDPS 2007). Long Beach, CA, USA. 26-30 March 2007. pdf
  38. Morris, T. Nair, V.S.S. PCPP: Private Computing on Public Platforms A New Paradigm in Public Computing. 2nd IEEE International Symposium on Wireless Pervasive Computing (ISWPC 2007). San Juan, PR, USA. Feb. 2007. pdf

Technical Reports

  1. Morris, T. Nair, V.S.S. Private Computing on a Public Platform. Department of Computer Science and Engineering. Southern Methodist University. Technical Report 06-CSE-01. 2006. Dallas, TX, USA. pdf

Refereed PHD Dissertations

  1. Adhikari, U. Event and Intrusion Detection Systems for Cyber-physical Power Systems. Department of Electrical and Computer Engineering, Mississippi State University, August 2015. link
  2. Pan, S. Cybersecurity Testing and Intrusion Detection for Cyber-physical Power Systems. Department of Electrical and Computer Engineering, Mississippi State University, August 2014. link
  3. Gao, W. Cyber Threats, Attacks and Intrusion Detection in Supervisory Control and Data Acquisition Networks. Department of Electrical and Computer Engineering, Mississippi State University, December 2013. link

Refereed MS Thesis

  1. Richey, D. Leveraging PLC ladder logic for signature based IDS rule generation. Department of Electrical and Computer Engineering, Mississippi State University, August 2016. link
  2. Turnipseed, I., A new SCADA dataset for intrusion detection system research. Department of Electrical and Computer Engineering, Mississippi State University, August 2015 link
  3. Thorton, Z. A Virtualized SCADA Laboratory for Research and Teaching. Department of Electrical and Computer Engineering, Mississippi State University, May 2015. link
  4. Mudd, D. A Virtual Hydroelectric Power System for Distributable Industrial Control System Security Research. Department of Electrical and Computer Engineering, Mississippi State University, August 2014. link
  5. Owens, S. Design Modifications and Platform Implementation Procedures for Supporting Dynamic Partial Reconfiguration of FPGA Applications. Department of Electrical and Computer Engineering, Mississippi State University, August 2013. link
  6. Edwards, J. Open Source IPSEC Software in Manned and Unmanned Space Missions. Department of Electrical and Computer Engineering, Mississippi State University, August 2012. link
  7. Reaves, B. An Open Virtual Testbed for Industrial Control System Security Research. Department of Electrical and Computer Engineering, Mississippi State University, August 2011. link
  8. Pavurapu, K. A Retrofit Network Transaction Data Logger for SCADA Control Systems . Department of Electrical and Computer Engineering, Mississippi State University, August 2010. link

Conference Poster

  1. Reaves, B., Morris, T., Vulnerabilities in a Proprietary SCADA Wireless System. IEEE Power Energy Society Transmission and Distribution Conference. April 19-22, 2010. New Orleans, LA. pdf Best Undergraduate Poster Winner!

Thesis

  1. Morris, T. Private Computing on Public Platforms. Department of Computer Science and Engineering, Southern Methodist University, July 31, 2008 pdf

Maps

  1. The Center for Cyberecurity Research and Education (CCRE) is located in the SMAP Building.
    Address: 200 Sparkman Dr. Huntsville AL 35805. (map)
  2. The UAH SCADA Security Laboratory is located in room 248 of the Engineering Building.
    Address: 301 Sparkman Dr. Huntsville AL 35899 (map, building #31)