Roman Danyliw's research while affiliated with Carnegie Mellon University and other places

Publications (2)

Article
Abstract Current security event analysis techniques are myopic,in focusing only on single administrative domains. With the increasing security dependencies,among,Internet-connected networks there are few mechanisms,in place to share and analyze security event data on a larger scale. Existing information sharing strategies do not scale well, as they...

Citations

... Our approach can be complemented with other techniques that watch the run-time execution of a program for abnormality [57]. Because the function packet read() is vulnerable [33], the attacker can overwrite the auth variable to one (1). As a result, the attacker can gain the access the system. ...