Research Toward Automated Security Risk Detection in Large Software Using Call Graph Analysis Published research demonstrating how call graph clustering and heuristic analysis can automate threat modeling for large-scale cloud-native applications, addressing the scalability challenges of manual security assessment. Paper Information Title: Toward Automated Security Risk Detection in Large Software Using Call Graph Analysis Authors: Nicholas Pecka (University of North Texas & Red
Research Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment Published research demonstrating how DevOps pipelines can be exploited through privilege escalation attacks, challenging the assumption that DevSecOps tool adoption alone ensures security. Paper Information Title: Privilege Escalation Attack Scenarios on the DevOps Pipeline Within a Kubernetes Environment Authors: Nicholas Pecka (Iowa State University), Lotfi ben Othmane (Iowa State University)