Jason jaskolka, identifying and analyzing implicit interactions in critical infrastructure systems event type seminarsymposium sponsor critical infrastructure resilience institute ciri location via webcast gotomeeting date jan 25, 2018 1. Mitigating covert channels based on analysis of the potential for communication. An aspectoriented language for product family speci. Visit this page to learn about the business and what locals in orlando have to say. As systems grow larger and more complex they invariably become more susceptible to an array of unforeseen security vulnerabilities. Most recommended computer programming services businesses. See the complete profile on linkedin and discover jason s. Community home blog smb trust index coronavirus resources join today. Sarita spillert implementation specialist k8 education, education technology harvard graduate school of education, cambridge public schools christine carforo designer. Most software is still being written very badly, he said.
Kidney diseases and hemodialysis programs at the toronto general hospital. Second, testing is still the best software assurance, but it cant find all defects. A read is counted each time someone views a publication summary such as the title, abstract, and list of authors, clicks on a figure, or views or downloads the fulltext. Jason jaskolka 1, ridha khedri, and khair eddin sabri2 1 department of computing and software, faculty of engineering, mcmaster university, hamilton, ontario, canada 2 department of computer science, king abdullah ii school for information technology, university of jordan, amman, jordan technical report cas1105rk department of computing and. Lecture objectives overview of malware types of malicious software malware countermeasures summary malicious software. Fateful software llciphone developer since jan 2009. To this end, i conduct research that spans the areas of cyber security, software engineering, distributed systems, and formal specification and verification. The scene and autopsy findings con stitute elder neglect. We ask that you consider turning off your ad blocker or. His research interests include cybersecurity assurance and securitybydesign, covert channel analysis, distributed multiagent systems, and formal methods and algebraic. Publications by type jason jaskolka carleton university. Jason jaskolka, ridha khedri, and khair eddin sabri. To my family who has provided me with the support and encouragement to nd my path to success iii.
Promoting software engineering and computer science at mcmaster university. Outline introduction and motivation a brief overview of process algebras process algebras and petri nets a comparative example a comment on bisimilarity. Jaskolka is director of the cyber security evaluation and assurance cybersea research lab at carleton university within the department of systems and. Broadly speaking, my research spans the areas of cyber security, software engineering, distributed systems, and formal specification and verification and is aimed. View jason jaskolka s profile on linkedin, the worlds largest professional community. Jason jaskolka is an assistant professor in the department of systems and computer engineering at carleton university in ottawa, canada. Analyzing implicit interactions in ci systems critical.
Qinglei zhang, ridha khedri, and jason jaskolka technical report cas1108rk department of computing and software mcmaster university november 11, 2011 abstract aspectorientation is a promising paradigm for managing the separation of crosscutting concerns and decomposing a system using more than one criterion. Reexamining origins of human fatherhood potentially fatal combinations. Do local business owners recommend fateful software. His research interests include cybersecurity assurance and securitybydesign, covert channel analysis. Modeling, analysis, and detection of information leakage. Bryan jaskolka says perseverance is the key to succeeding in business and having launched several companies, he ought to know as a teenager, jaskolka turned the. In proceedings of the 9th international conference on future networks and communications, volume 34 of procedia computer science, fnc 2014 and mobispc 2014, pages 266275, niagara. Implementation specialist k8 education, software consulting far hills country day school, synygy inc. Elements of a legacy system support software application data system hardware from sysc 5807x at carleton university. Elements of a legacy system support software application. Ais program, shoreline work and dam projects part of nr meeting. C2ka to develop his approach, which is now set to run via a prototype software tool. Jason jaskolka football alfred university athletics.
Citeseerx department of computing and software faculty. Validating the effectiveness of security design patterns. Jason jaskolka critical infrastructure resilience institute u of i. The technology runs an automation of all of the analyses, which provide salient metrics for the severity or exploitability of a given vulnerability in his case an implicit interaction identified to exist in a given. Procedia computer science 34 2014 276 285 277 thereareshortcomingsinthescience,mathematics. Maintaining families of these systems to address issues with the crosscutting concerns, such as security concerns, is recognised to be tedious and costly. I am actively looking for a graduate student to work on a funded research project titled.
There is an evergrowing need to assure the security of critical software dependent systems, and the information that they use, store, and communicate, in the face of cyberattacks and failures. The use of software that blocks ads hinders our ability to serve you the content you came here to enjoy. We dodged the y2k computer apocalypse 20 years ago. In proceedings of the 9th international conference on future networks and communications, volume 34 of procedia computer science, fnc 2014 and mobispc 2014, pages 266275, niagara falls, on, canada, august 2014. Lecture objectives software security issues secure programming practices summary software security fundamentals sysc 4810. I am always looking for talented highlymotivated students interested in joining the cybersea research lab to work on topics that align with my research interests including, but not limited to, cybersecurity evaluation and assurance, threat modeling, risk assessment and management, software engineering, distributed systems, formal methods, and. On the necessary conditions for covert channel existence. Cybersecurity assurance for critical infrastructure. Ideal candidates will have a strong background and interest in software design and design patterns, and formal specification and verification using fundamental tools such as firstorder logic. Towards the certification of covert channel freeness in. Jason jaskolka fateful software computer programming services orlando, fl recommended 1 contact refer jamie layne marteknology computer programming services.
On saturday november the 2nd, ieee wie ottawa section hosted dr. Events national center for supercomputing applications. Khalsa fateh chairman, president, ceo, partner sic. Jeff jaskolka, kong teng tan, joanna sasal, mercedeh kiaii, jason. Applications in cryptanalysis and digital forensics. Investigative support for information confidentiality part.
New magnet technology creates easy blood access for hemodialysis. Jason jaskolka assistant professor, department of systems and computer engineering. Detecting information leakage via protocolbased covert channels. Crosscutting concerns are pervasive in embedded software and ambient systems due to the stringent nonfunctional requirements imposed on them.
My research interests are primarily in the area of cybersecurity evaluation and assurance for softwaredependent systems. Jason jaskolka ottawa, ontario, canada professional. Jaskolka is available to discuss secure cyberdependent systems, including critical infrastructures, security evaluation, systemlevel threat modelling, and securitybydesign. Jason jaskolka is an assistant professor in the department of systems and computer engineering at carleton university, ottawa, on, canada.
Verification of aspectual composition in featuremodeling. I am interested in exploring new ideas, techniques, and tools that can support cyber security evaluation and assurance activities and advance securitybydesign approaches leading to. Vera pantelicprincipal research engineer, mcmaster centre for software certification, mcmaster universityverified email at mcmaster. In proceedings of the 9th international conference on future networks and communications, volume 34 of procedia computer science, fnc 2014 and mobispc 2014, pages 276285.
View the profiles of professionals named jaskolka on linkedin. An approach for identifying and analyzing implicit interactions in distributed systems. Jason jaskolka ottawa, ontario, canada professional profile. Jason jaskolka mobile architect ios, android mit, sony, office depot. Jason jaskolka and ridha khedri procedia computer science 52 2015 318 325 319 sense used by milner3 where an agent refers to any system whose behaviour consists of discrete actions. Jason jaskolka who is an assistant professor in the department of. Department of homeland security cybersecurity postdoctoral scholar at stanford university within the center for international security and cooperation cisac. See the complete profile on linkedin and discover jason s connections and jobs at similar companies. Hassan ashtiani, mcmaster university, publication cochair. Identifying implicit component interactions in distributed cyberphysical systems in proceedings of the 50th hawaii international conference on system sciences, hicss50, pages 59885997, hilton waikoloa village, hi, u.
1370 1065 908 116 1226 167 274 1612 1073 583 835 958 849 619 214 753 1383 390 75 56 1312 110 870 1057 480 1249 1335 403 1159 1050 1434 525 919 1637 282 760 828 1041 1506 91 1233 482 194 873 1307 367 1404 712 604 113