I'm an early-career computer security researcher on the academic job market for 2026. I completed my PhD at Tufts University working under the supervision of Dr. Kathleen Fisher. My research focuses on applied cyber-security, computer networks, and cyber-deception. My work leverages artificial intelligence (AI), programming languages (PL), and machine learning (ML) to tackle difficult computer security problems. I have an extensive background in visualization and data science.
October 2025 🏝 Presenting new work on using Generative AI to produce Cyber Threat Intelligence at WAITI 2025!
September 2025 Looking forward to teaching How Systems Fail (CS27/CS203) this spring at Tufts University!
August 2025 Excited to serve on the NDSS 2026 artifact evaluation commitee and the eCrime 2025 TPC!
July 2025 Working at the intersection of AI and national security this summer as part of SCADS 2025 at the NC State Labratory for Analytic Sciences!
March 2025 🎉 Our CHI paper on protocol reverse engineers and AI received a CHI Honorable Mention Award! 🎉
February 2025 🎉 Our paper on the interaction and information needs of protocol reverse engineers has been accepted to CHI'25! 🎉
July 2024 🎉 I am excited to join Provost David Kotz's research group at Dartmouth as a research associate focsed on improving IoT network security. 🎉
April 2024 🎉 I successfully defended my PhD dissertation on April 19th! 🎉
February 2024 Delighted to give talks to IDA CCS and the US Government in the DC Area.
February 2024 Delighted to give a talk to the talented security researchers at Black Mesa.
January 2024 Serving as an Invited Expert at the DARPA / ISAT FINDS Workshop in San Franciso.
October 2023 Presenting as part of DARPA Demo Day 2023 at The Pentagon.
July 2023 I will be co-teaching How Systems Work (CS202) this Fall at Tufts!
June 2023 Presenting as part of the Putting the Tech into Cybersecurity Workshop June 19-22 here at Tufts!
March 2023 Presented BinaryInferno at the 30th Symposium on Network and Distributed System Security (NDSS).
March 2023 My work on keyword identification was voted best technical poster at the 30th Symposium on Network and Distributed System Security (NDSS).
January 2023 I will be teaching a one-week Cybersecurity Fundamentals Intensive as part of the Fletcher Cyber-Security and Public Policy graduate program.
An Investigation of Interaction and Information Needs for Protocol Reverse Engineering Automation
Samantha Katcher* , James Mattei*, Jared Chandler, and Daniel Votipka
Proceedings of the Conference on Human Factors in Computing Systems (CHI) 2025. (24% Acceptance Rate)
[ Paper ]
Towards Automatic Triage and Taxonomy of Adversary Shell-Scripts
Jared Chandler
To Appear In: Proceedings of the 2nd Workshop on AI For Cyber Threat Intelligence (WAITI) 2025.
A Trigger for the Autonomous Decommissioning of Smart Devices
Ravindra Mangar, Jared Chandler, Jingyu Qian, Carl Gunter, Timothy Pierson and David Kotz
To Appear In: Proceedings of the 15th International Conference on the Internet of Things (IoTCON) 2025.
Binaryinferno: A semantic-driven approach
to field inference for binary message formats.
Jared Chandler, Adam Wick, and Kathleen Fisher
Proceedings of the 30th Annual Symposium on Network and Distributed System Security (NDSS) 2023. (19% Acceptance Rate)
[
Paper ]
Deceptive self-attack for cyber-defense.
Jared Chandler and Adam Wick
56th Hawaii International Conference on System Sciences (HICSS) 2023.
[
Paper ]
Invasion of the
botnet snatchers: A case study in applied malware cyberdeception.
Jared Chandler, Kathleen Fisher, Erin Chapman, Eric Davis, and Adam Wick.
53rd Hawaii International Conference on System Sciences (HICSS) 2020.
[
Paper ]
Automatic Schema Inference from Unknown Protobuf Messages.
Jared Chandler
IEEE Security and Privacy Workshops (LANGSEC) 2025.
[
Paper ]
Synthesizing intrusion detection system test data from open-
source attack signatures.
Jared Chandler and Adam Wick
IEEE Security and Privacy Workshops (LANGSEC) 2023.
[
Paper ]
Automatic discovery and synthesis of
checksum algorithms from binary data samples.
Lauren Labell*, Jared Chandler, and Kathleen Fisher.
15th Workshop on Programming Languages and Analysis for Security (PLAS) 2020.
[
Paper ]
Technical Report: Using Synthetic Data to Improve Model Performance on Low-Resource Languages in Noisy Environments
Jared Chandler
Laboratory for Analytic Sciences, Summer Conference on Applied Data Science (SCADS) 2025.
Technical Report: Object Detection and Formal Methods for Aircraft Activity Detection
Jared Chandler
Laboratory for Analytic Sciences, Summer Conference on Applied Data Science (SCADS) 2025.
Technical Report: Interfaces for Video Summarization, Sensemaking and Triage
Jared Chandler
Laboratory for Analytic Sciences, Summer Conference on Applied Data Science (SCADS) 2025.
Technical Report: Information Theoretic Edge-Video Summarization and Triage
Jared Chandler , Dmitrii Korobeinikov, and Turquoise Richardson.
Laboratory for Analytic Sciences, Summer Conference on Applied Data Science (SCADS) 2025.
Technical Report: Benchmarking and Optimizing Action Retrieval within a Video Summarization Pipeline
Dmitrii Korobeinikov, and Jared Chandler
Laboratory for Analytic Sciences, Summer Conference on Applied Data Science (SCADS) 2025.
CHI 2025 Honorable Mention Award
2025, Our paper on Automation and Information Needs for Reverse Engineers was awarded an Honorable Mention! [ Award ]
NDSS Best Technical Poster
2023, Voted best technical poster at 30th Symposium on Network and Distributed System Security (NDSS) [ Poster ]
Nominated as a DARPA Forward Riser
2022, Nominated as a DARPA Forward Riser at DARPA Forward Texas A & M.
Automatic Protocol Reverse Engineering
I am currently exanding my approaches to automatic protocol reverse engineering. My goal is a fully automated approach to infering semantic descriptions using only passively collected network traces. This work is valuable for identifying security vulnerabilities in proprietary and adversary systems, for uncovering the specifications of legacy equipment, and for validating that an on-the-wire format is faithful to a given specification.
[ Stage: Theory » System » Experiment » Paper ]
Botnet Scanning Countermeasures
I am currently exploring network counter-measures to delay, deter, and defeat scanning by malicious botnets. Described succinctly as "Anti-Botnet Network Landmines".
[ Stage: Theory » System » Experiment ]
Usable Tools for Protocol Reverse Engineering
I am developing user-facing tools to assist reverse engineers with analyzing unknown protocol data. While tools such as GHIDRA and IDA Pro exist for reverse engineering binary executables, specialized tools for binary protocols do not currently exist.
[ Stage: Theory » System ]
Synthesizing Network Attack Traffic
I am actively exanding my approaches for generating synthetic network attack traffic. This line of research builds on my earlier work leveraging intrusion detection system (IDS) rules as a cook-book for creating look-alike traffic.
[ Stage: Theory » System ]
While my current work is focused on applied security research, I have an extensive background in visualization, design, human computer interfaces (HCI) and user-interfaces (UX). Below are a few examples. A larger portfolio is here.

Parallel coordinates interface with adjustable error bounds.

Scalable squarified treemaps for reasoning about file permissions.

Interactive SQL query visualization.

3D printed tangible grammars.