Mark Winterrowd

Learn More
The lack of public access to current, real-world datasets significantly hinders the progress of network research as a scientific pursuit. It is often not possible to robustly validate a proposed mechanism, enhancement, or new service without understanding how it will interact with real networks and real users. Yet obtaining the necessary raw measurement(More)
Because large, complex systems inevitably contain security vulnerabilities, it is important to mitigate their impact. One of the most effective methods for doing so is privilege separation, the separation of an application into modules such that the compromise of one module grants the attacker only the limited privileges possessed by that module. However,(More)
  • 1