Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Olgierd Stanislaw Pieczul is active.

Publication


Featured researches published by Olgierd Stanislaw Pieczul.


international workshop on security | 2014

Collaborating as Normal: Detecting Systemic Anomalies in Your Partner

Olgierd Stanislaw Pieczul; Simon N. Foley

It is considered whether anomaly detection techniques might be used to determine potentially malicious behavior by service providers. Data mining techniques can be used to derive patterns of repeating behavior from logs of past interactions between service consumers and providers. Consumers may use these patterns to detect anomalous provider behavior, while providers may seek to adapt their behavior in ways that cannot be detected by the consumer. A challenge is deriving a behavioral model that is a sufficiently precise representation of the consumer-provider interactions. Behavioral norms, which model these patterns of behavior, are used to explore these issues in a on-line photograph sharing style service.


communications and networking symposium | 2013

Discovering emergent norms in security logs

Olgierd Stanislaw Pieczul; Simon N. Foley

A model is presented that characterizes security logs as a collection of norms that reflect patterns of emergent behavior. An analysis technique for detecting behavioral norms based on these logs is described and evaluated. The application of behavioral norms is considered, including its use in system security evaluation and anomaly detection.


30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec) | 2016

Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems

Olgierd Stanislaw Pieczul; Simon N. Foley

It is argued that runtime verification techniques can be used to identify unknown application security vulnerabilities that are a consequence of unexpected execution paths in software. A methodology is proposed that can be used to build a model of expected application execution paths during the software development cycle. This model is used at runtime to detect exploitation of unknown security vulnerabilities using anomaly detection style techniques. The approach is evaluated by considering its effectiveness in identifying 19 vulnerabilities across 26 versions of Apache Struts over a 5 year period.


new security paradigms workshop | 2017

Developer-centered security and the symmetry of ignorance

Olgierd Stanislaw Pieczul; Simon N. Foley; Mary Ellen Zurko

In contemporary software development anybody can become a developer, sharing, building and interacting with software components and services in a virtual free for all. In this environment, it is not feasible to expect these developers to be expert in every security detail of the software they use, and we discuss how difficult it can be to build secure software. In this respect, the practical challenges of the emerging paradigm of developer-centered security are explored, where developers would be required to consider security from the perspective of those other developers who use their software. We question whether current user-centered security techniques are adequate for this task and suggest that new thinking will be required. Two directions---symmetry of ignorance and security archaeology-are offered as a new way to consider this challenge.


international workshop on security | 2016

The Evolution of a Security Control

Olgierd Stanislaw Pieczul; Simon N. Foley

The evolution of security defenses in a contemporary open-source software package is considered over a twelve year period. A qualitative analysis style study is conducted that systematically analyzes security advisories, codebase revisions and related discussions. A number of phenomena emerge from this analysis that provide insights into the process of managing code-level security defenses.


international workshop on security | 2016

The Evolution of a Security Control or Why Do We Need More Qualitative Research of Software Vulnerabilties? (Transcript of Discussion)

Olgierd Stanislaw Pieczul; Simon N. Foley

Hi, my name is Olgierd Pieczul and this is a joint work with Simon Foley. Inspired by the theme of today’s workshop we decided to look at evolution of security controls and vulnerabilities.


Archive | 2010

Method and system for authenticating a rich client to a web or cloud application

Olgierd Stanislaw Pieczul; Mark Alexander McGloin; Mary Ellen Zurko; David S. Kern; Brent Allan Hepburn


Archive | 2011

Authenticating a rich client from within an existing browser session

Olgierd Stanislaw Pieczul; Mark Alexander McGloin; Mary Ellen Zurko


Archive | 2012

Application and data removal system

Joseph Celi; Mark Alexander McGloin; Olgierd Stanislaw Pieczul


Archive | 2010

ENABLING GRANULAR DISCRETIONARY ACCESS CONTROL FOR DATA STORED IN A CLOUD COMPUTING ENVIRONMENT

Stephen P. Kruger; Olgierd Stanislaw Pieczul

Researchain Logo
Decentralizing Knowledge