MS Office 2007 - Peter Djalaliev

advertisement
Peter Liudmilov Djalaliev
Sennott Square Bldg, room 6503
210 South Bouquet Str.
Pittsburgh, PA 15260
USA
Phone (cell): (724) 462-1863
Fax: (412) 624-8854
E-mail: peterdj@cs.pitt.edu
Web: http://www.cs.pitt.edu/~peterdj
OBJECTIVE
I am seeking a position as a software engineer, preferably in security and network systems development.
EDUCATION
 Ph.D. candidate in Computer Science, 2005 – present (to graduate in December 2009), GPA 4.0/4.0
University of Pittsburgh, Pittsburgh, PA, USA
Advisor: Dr. José Carlos Brustoloni
Dissertation: “Mitigating Botnet-based DDoS Attacks against Web Servers”
 M.S. in Computer Science, 2005 – 2009, GPA 4.0/4.0
University of Pittsburgh, Pittsburgh, PA, USA
Advisor: Dr. José Carlos Brustoloni
 B.S., double major in Computer Science, Mathematics, 2001 – 2005, GPA 3.8/4.0
Washington and Lee University, Lexington, VA, USA
Grad. with honors. Honors Thesis: “Evaluating Host-Based Methods for Detecting Spoofed IP Packets”
PROGRAMMING SKILLS, LANGUAGES AND PLATFORMS
 Programming languages: expert knowledge of C /C++, knowledge of Java, Python, bash scripting, Perl, C#,
Visual Basic. Object-oriented programming: inheritance, polymorphism , abstraction, interfaces.
 Software development: multi-threaded system development, socket programming, Linux kernel internals,
file systems, encrypted storage systems; experience with software build environments (GNU make, cmake),
debugging tools (GDB, valgrind, strace) and network packet sniffers (tcpdump, PCAP).
 Network protocols: expert knowledge of the internals of TCP/IP protocols: HTTP, TCP, IP (partially
implemented). Knowledge of network storage protocols: NFS, AFS, CIFS.
 Network security protocols: SSL/TLS v1.0 (implemented an extension), Kerberos and Windows Cardspace
federated authentication (implemented extensions).
 Fluent with cryptographic libraries (NSS, OpenSSL) and major cryptographic schemes (symmetric and
asymmetric encryption, digital signatures, message authentication codes, secure hashes).
WORK EXPERIENCE
 Software Engineer internship, SSL Inspector development team, Netronome Systems, May – August 2008
I designed and implemented high-performance TCP connection termination for a transparent SSL proxy
device. My work included the implementation of an object-oriented Linux socket library in C++.
 Software Engineer internship, Alsos Digital Library for Nuclear Issues, Washington & Lee University, 2005
I used Visual C# on the .NET platform to implement a web service for exporting metadata to a National
Science Digital Library metadata harvesting service.
 Computer Technician, University Computing Helpdesk, Washington and Lee University, 2002 – 2005
I provided phone and on-site support to members of the university community for hardware, software and
network problems. Examples include hardware failures, data backup and recovery, network connectivity
and configuration, virus and malware removal, and system reinstallation.
RESEARCH EXPERIENCE
My research involves building innovative, secure computer and network systems on the Linux platform.
 Hardware-optimized Detection and Mitigation of Botnet-based DDoS Attacks (Ph.D dissertation work)
We use client authentication based on the Kerberos protocol, RSA SecurID hardware tokens and CardSpace
to detect and mitigate botnet-based DDoS attacks. Hardware acceleration using the Netronome NFE-I8000
network acceleration platform provides higher throughput and resilience from DDoS attacks for our system.
My responsibilities include the system’s design, implementation and performance analysis.
 Mitigation of DDoS Attacks against Data Stream Management Systems
We investigate the usage of distributed authentication, authorization and trust management techniques to
mitigate DDoS attacks that affect the availability of data stream management systems and the correct
output of continuous queries.
 Secure Web-based Retrieval of Documents with Usage Controls
We used secure coprocessors and trusted computing to build a system for exchanging documents with
owner-specified and system-enforced usage controls. My responsibilities included modifying the Mozilla
Firefox web browser and Apache web server (implemented RFC 4616), the TLS v1.0 protocol
implementation in the Network Security Services (NSS) library, and the Gnome Nautilus file manager.
PUBLICATIONS
 P. Djalaliev and J. Brustoloni, “Secure Web-based Retrieval of Documents with Usage Controls”, in Proc. of
24th Annual Symposium on Applied Computing (ACM SAC ‘09), Honolulu, HI, March 2009 (accept. rate 17%)
 P. Djalaliev, M. Jamshed, N. Farhan, J. Brustoloni, “Sentinel: Hardware-Accelerated Mitigation of Bot-Based
DDoS Attacks”, in Proc. of 17th Intl. Conference on Computer Communications and Networks (ICCCN‘08), St.
Thomas, US Virgin Islands, August 2008 (accept. rate 26%)
 R. Villamarín-Salomón, P. Djalaliev and J. Brustoloni, “Evaluating the Usability of Usage Control Mechanisms
in Collaborative Design Environments”, in Proc. of the 4th Symposium on Usable Privacy and Security
(SOUPS’08), Pittsburgh, PA, July 2008 (accept. rate 27%)
HONORS AND AWARDS




Outstanding Student Citizenship Award, Department of Computer Science, University of Pittsburgh, 2009
Honorable Mention in the Computing Research Association Outstanding Undergraduate Award, 2005
Phi Beta Kappa honors society, inducted in 2004 as being in the top 5% of the class of 2005.
Phi Eta Sigma honors society, inducted in 2002.
RELEVANT COURSEWORK
 Computer and Network Security; Wide Area Networks – University of Pittsburgh, 2005
 Introduction to Theoretical Cryptography, Carnegie Mellon University, 2007
 Advanced Operating Systems (Storage Systems) – University of Pittsburgh, 2007
EXTRACURRICULAR ACTIVITIES
 University of Pittsburgh Computer Science Graduate Student Organization (GSO)
 Student representative to the Computer Science Day Committee, 2006 – present
 GSO Secretary, 2006 – 2007
REFERENCES
References are available upon request.
Download