Golden Richard III

Professor

Expert in cybersecurity, specializing in malware analysis, reverse engineering, and digital forensics.

Areas of Expertise

Cybersecurity
Digital Forensics
Memory Forensics
Reverse Engineering
Malware Analysis
Operating Systems
Vulnerability Analysis
Exploit Development

Biography

Golden G. Richard III is an applied computer scientist working in cybersecurity and a Fellow of the American Academy of Forensic Sciences. He has over 45 years of practical experience in computer systems and computer security. He is currently Professor of Computer Science and Engineering, Director of the LSU Cyber Center and the Applied Cybersecurity Lab (ACL), and Associate Director for Cybersecurity at the Center for Computation and Technology (CCT), all at LSU. His primary research interests are memory forensics, digital forensics, malware analysis, exploit development, reverse engineering, systems programming, and operating systems. Dr. Richard earned his B.S. in Computer Science from the University of New Orleans and M.S. and Ph.D. in Computer Science from The Ohio State University. His first floppy drive cost $600 and required financing; despite that, he's still very much alive.

Research Focus

Cybersecurity

Dr. Richard’s research focuses on malware analysis, reverse engineering, memory forensics, and digital forensics. The primary goal of his research is to create new cybersecurity tools that protect society from digital threats.

Education

University of New Orleans

B.S.

Computer Science

1988

Ohio State University

M.S.

Computer Science

1991

Ohio State University

Ph.D.

Computer Science

1994

Accomplishments

Order of Thor

2025
Military Cyber Professionals Association

DFRWS Best Paper Award

2014, 2015, 2016, 2021

DFRWS Best Student Paper Award

2018

Media Appearances

Cyber experts recommend you delete your data after 23andMe bankruptcy

WAFB 9  tv

2025-03-26

“This kind of personal data is really, can be used for bad things in the wrong hands,” said LSU Cyber Center Director Golden Richard.

View More

LSU seeing record enrollment in cybersecurity program

WAFB 9  tv

2023-10-12

“Those needs are nationwide,” said Golden Richard. “They’re not specific to federal agencies or large corporations. Everyone needs to hire cyber security people.”

Current estimations show there are roughly 750,000 open jobs in the cybersecurity industry and people like Golden Richard are trying to help meet that need.

View More

LSU is recognized as a Center of Academic Excellence in Cyber Operations by the NSA

Louisiana Radio Network  radio

2022-09-26

LSU receives a significant designation from the National Security Agency for its cybersecurity instruction. Director of the LSU Applied Cybersecurity Lab Golden Richard said LSU’s computer science program has been recognized as a Center of Academic Excellence in Cyber Operations (CAE-CO).

“LSU was invited by the National Security Agency to be the only CAE-CO school in actually several years,” said Richard

View More

Show All +

Articles

Memory analysis of. net and. net core applications

Forensic Science International: Digital Investigation

2022

Memory analysis is a digital forensics technique whose goal is to model a computer system's state based solely on the analysis of a snapshot of physical memory (RAM). Memory forensics is frequently employed in incident response to detect and analyze modern malware and attack frameworks. Memory forensics is a particularly powerful tool for analyzing modern malware, which may exist only in memory and not touch non-volatile storage. Memory-only attacks leave no trace of the malware and its associated modules on the file system and all data that traverses the network is commonly encrypted. While initially focused on kernel level rootkits, memory analysis research efforts have recently shifted to detection of userland malware.

View more

cRGB_Mem: At the intersection of memory forensics and machine learning

Forensic Science International: Digital Investigation

2023

Mobile malware’s alarming sophistication and pervasiveness have continued to draw the attention of many cybersecurity researchers. Particularly on the Android platform, malware trojans designed to steal user PIIs, crypto miners, ransomware, and on-device fraud continue to infiltrate the primary Google store market and other secondary markets. While much effort has been put in place by the research community and industry to curb this menace since 2012, malware authors have consistently found ways to circumvent the existing detection and prevention mechanisms. Largely this remains so because of the restrictiveness of the feature set used in building the current classification models.

View more

Every step you take, I'll be tracking you: Forensic analysis of the tile tracker application

Forensic Science International: Digital Investigation

2023

The rise in popularity of personal Bluetooth trackers has incited a need for forensic analysis tools that aid law enforcement in artifact recovery. With 40 million Tile devices reportedly sold at the time of writing, Tile trackers are one of the most popular personal Bluetooth trackers. This growth has not been without consequence, as reports of Bluetooth trackers being used for malicious activities have also escalated. Our work presents a forensic analysis of the Tile ecosystem and the Tile application on iOS, Android, and Windows. This analysis revealed valuable forensic artifacts that contained a diverse set of sensitive user data, including SQLite databases, XML files, cache files, and event logs. This data included information such as geolocation coordinates from the previous 30 days

View more

Show All +

Affiliations

  • Sigma Xi
  • AAAS
  • American Academy of Forensics Sciences (AAFS) : Fellow

Research Grants

CyberCorps Scholarship for Service: Securing the Future: Scholarship for Service Through Excellence in Cyber Operations

National Science Foundation

2025-2028

ADP90: NASIC T-2 Program FY24

NextFlex

2025

ADP68: NASIC T-2 Program FY23

NextFlex

2024-2025

Show All +

Social