Skip to main content

Showing 1–2 of 2 results for author: Pekarek, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:1808.10742  [pdf, other

    cs.CR

    Anomaly Detection in Cyber Network Data Using a Cyber Language Approach

    Authors: Bartley D. Richardson, Benjamin J. Radford, Shawn E. Davis, Keegan Hines, David Pekarek

    Abstract: As the amount of cyber data continues to grow, cyber network defenders are faced with increasing amounts of data they must analyze to ensure the security of their networks. In addition, new types of attacks are constantly being created and executed globally. Current rules-based approaches are effective at characterizing and flagging known attacks, but they typically fail when presented with a new… ▽ More

    Submitted 15 August, 2018; originally announced August 2018.

  2. Context-aware Failure-oblivious Computing as a Means of Preventing Buffer Overflows

    Authors: Manuel Rigger, Daniel Pekarek, Hanspeter Mössenböck

    Abstract: In languages like C, buffer overflows are widespread. A common mitigation technique is to use tools that detect them during execution and abort the program to prevent the leakage of data or the diversion of control flow. However, for server applications, it would be desirable to prevent such errors while maintaining availability of the system. To this end, we present an approach to handle buffer o… ▽ More

    Submitted 22 November, 2018; v1 submitted 23 June, 2018; originally announced June 2018.

    Comments: Accepted at the 12th International Conference on Network and System Security