Nicholas Pecka

Research

Toward Automated Security Risk Detection in Large Software Using Call Graph Analysis

Published research demonstrating how call graph clustering and heuristic analysis can automate threat modeling for large-scale cloud-native applications, addressing the scalability challenges of manual security assessment. Paper Information Title: Toward Automated Security Risk Detection in Large Software Using Call Graph Analysis Authors: Nicholas Pecka (University of North Texas & Red
13 min read
Research

Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment

Published research demonstrating how DevOps pipelines can be exploited through privilege escalation attacks, challenging the assumption that DevSecOps tool adoption alone ensures security. Paper Information Title: Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment Authors: Nicholas Pecka (Iowa State University), Lotfi ben Othmane (Iowa State University)
9 min read
Guide

Building and Optimizing Elasticsearch on Kubernetes: A Logging Stack Homelab Journey

Guide Overview Guide: Building and Optimizing Elasticsearch on Kubernetes: A Logging Stack Homelab Journey Category: Monitoring / Infrastructure Optimization Difficulty: Easy Estimated Time: 1-2 hours for full deployment and optimization Cost: Free (open-source tools) Note: This guide documents a complete Elasticsearch deployment from initial setup through optimization, with all configurations tested
20 min read