Association for Computing Machinery

Displaying 1-40 of 6439 results

  • White Papers // Jun 2015

    Redundant Memory Mappings for Fast Access to Large Memories

    Page-based virtual memory improves programmer productivity, security and memory utilization, but incurs performance overheads due to costly page table walks after TLB (Translation Lookaside Buffer) misses. This overhead can reach 50% for modern workloads that access increasingly vast memory with stagnating TLB sizes. To reduce the overhead of virtual memory,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Computer Performance Microscopy with SHIM

    Developers and architects spend a lot of time trying to understand and eliminate performance problems. Unfortunately, the root causes of many problems occur at a fine granularity that existing continuous profiling and direct measurement approaches cannot observe. This paper presents the design and implementation of SHIM, a continuous profiler that...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Verification of Producer-Consumer Synchronization in GPU Programs

    Previous efforts to formally verify code written for GPUs have focused solely on kernels written within the traditional data-parallel GPU programming model. No previous paper has considered the higher performance, but more complex, warp-specialized kernels based on producer-consumer named barriers available on current hardware. In this paper, the authors present...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Tier-Partitioning for Power Delivery Vs Cooling Tradeoff in 3D VLSI for Mobile Applications

    Power delivery to the tier farthest away from the package in 3D VLSI is challenging. This is because the current provided by the package on the bottom is first used by other tiers before it reaches the top and delivered using extremely small-size intra and inter-tier vias. The authors' solution...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Design, Packaging, and Architectural Policy Co-Optimization for DC Power Integrity in 3D DRAM

    3D DRAM is the next-generation memory system targeting high bandwidth, low power and small form factor. This paper presents a cross-domain CAD/architectural platform that address DC power noise issues in 3D DRAM targeting stacked DDR3, wide I/O and hybrid memory cube technologies. The authors' design and analysis include both individual...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2015

    Area-Efficient Pipelining for FPGA-Targeted High-Level Synthesis

    Traditional techniques for pipeline scheduling in high-level synthesis for FPGAs assume an additive delay model where each operation incurs a pre-characterized delay. While a good approximation for some operation types, this fails to consider technology mapping, where a group of logic operations can be mapped to a single Look-Up Table...

    Provided By Association for Computing Machinery

  • White Papers // May 2015

    Predicting Program Phases and Defending Against Side-Channel Attacks using Hardware Performance Counters

    Sharing of functional units inside a processor by two applications can lead to information leaks and micro architectural side-channel attacks. Meanwhile, processors now commonly come with hardware performance counters which can count a variety of micro-architectural events, ranging from cache behavior to floating point unit usage. In this paper, the...

    Provided By Association for Computing Machinery

  • White Papers // May 2015

    Analysis of Smartphone Adoption and Usage in a Rural Community Cellular Network

    The smartphone has been touted as the technology of the 21st century. Global smartphone adoption rates are growing rapidly, up to over 24% in 2014, with usage increasing 25% in the last year. However, rural areas are often the last places to benefit from these technological trends. Utilizing cellular network...

    Provided By Association for Computing Machinery

  • White Papers // May 2015

    On the Feasibility of Attribute-Based Encryption on Smartphone Devices

    Attribute-Based Encryption (ABE) is a powerful crypto-graphic tool that allows fine-grained access control over data. Due to its features, ABE has been adopted in several applications, such as encrypted storage or access control systems. Recently, researchers argued about the non-acceptable performance of ABE when implemented on mobile devices. In-deed, the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    Fast Serializable Multi-Version Concurrency Control for Main-Memory Database Systems

    Multi-Version Concurrency Control (MVCC) is a widely employed concurrency control mechanism, as it allows for execution modes where readers never block writers. However, most systems implement only Snapshot Isolation (SI) instead of full serializability. Adding serializability guarantees to existing SI implementations tends to be prohibitively expensive. The authors present a...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    Sirius: An Open End-to-End Voice and Vision Personal Assistant and Its Implications for Future Warehouse Scale Computers

    As user demand scales for Intelligent Personal Assistants (IPAs) such as Apple's Siri, Google's google now, and Microsoft's Cortana, the authors are approaching the computational limits of current datacenter architectures. It is an open question how future server architectures should evolve to enable this emerging class of applications, and the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    A Comprehensive Implementation and Evaluation of Direct Interrupt Delivery

    As the performance overhead associated with CPU (Central Processing Unit) and memory virtualization becomes largely negligible, research efforts are directed toward reducing the I/O (Input/Output) virtualization overhead, which mainly comes from two sources: DMA (Direct Memory Access) setup and payload copy, and interrupt delivery. The advent of SRIOV (Single-Root I/O...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2015

    Mapping-Aware Constrained Scheduling for LUT-Based FPGAs

    Scheduling plays a central role in high-level synthesis as it inserts clock boundaries into the untimed behavioral model and greatly impacts the performance, power and area of the synthesized circuits. While current scheduling techniques can make use of pre-characterized delay values of individual operations, it is difficult to obtain accurate...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2015

    Enhancing Design Space Exploration by Extending CPU/GPU Specifications onto FPGAs

    The design cycle for complex special-purpose computing systems is extremely costly and time-consuming. It involves a multi-parametric design space exploration for optimization, followed by design verification. Designers of special purpose VLSI (Very-Large-Scale Integration) implementations often need to explore parameters, such as optimal bit width and data representation, through time-consuming Monte...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2015

    Libra: Software-Controlled Cell Bit-Density to Balance Wear in NAND Flash

    Hybrid flash storages combine a small Single-Level Cell (SLC) partition with a large MultiLevel Cell (MLC) partition. Compared to MLC-only solutions, the SLC partition exploits fast and short local write updates, while the MLC part brings large capacity. On the whole, hybrid storage achieves a tangible performance improvement for a...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    Compiler Management of Communication and Parallelism for Quantum Computation

    Quantum Computing (QC) offers huge promise to accelerate a range of computationally intensive benchmarks. Quantum computing is limited, however, by the challenges of decoherence: i.e., a quantum state can only be maintained for short windows of time before it decoheres. While quantum error correction codes can protect against decoherence, fast...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    A Symbolic Execution Algorithm for Constraint-Based Testing of Database Programs

    In so-called constraint-based testing, symbolic execution is a common technique used as a part of the process to generate test data for imperative programs. Databases are ubiquitous in software and testing of programs manipulating databases is thus essential to enhance the reliability of software. In this paper, the authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks

    With the advent of high-speed cellular access and the overwhelming popularity of Smartphone's, a large percent of today's Internet content is being delivered via cellular links. Due to the nature of long-range wireless signal propagation, the capacity of the last hop cellular link can vary by orders of magnitude within...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    Utility of the OpenAccess Database in Academic Research

    Twenty years ago, there was a common design tool which was free and open-source and satisfied the needs of many academic circuit designers. The proliferation of OpenAccess is opening promising new research opportunities to academic communities. The benefits of adopting an OpenAccess based approach to EDA research are growing, and...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    GRAPHITE: An Extensible Graph Traversal Framework for Relational Database Management Systems

    Graph traversals are a basic but fundamental ingredient for a variety of graph algorithms and graph-oriented queries. To achieve the best possible query performance, they need to be implemented at the core of a database management system that aims at storing, manipulating, and querying graph data. Increasingly, modern business applications...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Uncovering Network Tarpits with Degreaser

    Network tarpits, whereby a single host or appliance can masquerade as many fake hosts on a network and slow network scanners, are a form of defensive cyber-deception. In this paper, the authors develop degreaser, an efficient fingerprinting tool to remotely detect tarpits. In addition to validating their tool in a...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Hot-Hardening: Getting More Out of Your Security Settings

    Applying optimized security settings to applications is a difficult and laborious task. Especially in cloud computing, where virtual servers with various pre-installed software packages are leased, selecting optimized security settings is very difficult. In particular, optimized security settings are not identical in every setup. They depend on characteristics of the...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Exploring Big Data with Helix: Finding Needles in a Big Haystack

    While much work has focused on efficient processing of big data, little work considers how to understand them. In this paper, the authors describe Helix, a system for guided exploration of big data. Helix provides a unified view of sources, ranging from spreadsheets and XML files with no schema, all...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Towards Hardware-Driven Design of Low-Energy Algorithms for Data Analysis

    In the era of "Big" data, data analysis algorithms need to be efficient. Traditionally researchers would tackle this problem by considering "Small" data algorithms and investigating how to make them computationally more efficient for big data applications. The main means to achieve computational efficiency would be to revise the necessity...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Foundations of Crowd Data Sourcing

    Crowdsourcing techniques are very powerful when harnessed for the purpose of collecting and managing data. In order to provide sound scientific foundations for crowdsourcing and support the development of efficient crowdsourcing processes, adequate formal models must be defined. In particular, the models must formalize unique characteristics of crowd-based settings, such...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Design-Theoretic Encoding of Deterministic Hypotheses as Constraints and Correlations Into U-Relational Databases

    In view of the paradigm shift that makes science ever more data-driven, in this paper the authors consider deterministic scientific hypotheses as uncertain data. In the form of mathematical equations, hypotheses symmetrically relate aspects of the studied phenomena. For computing predictions, however, deterministic hypotheses are used asymmetrically as functions. They...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Patterns in the Chaos - A Study of Performance Variation and Predictability in Public IaaS Clouds

    Benchmarking the performance of public cloud providers is a common research topic. Previous paper has already extensively evaluated the performance of different cloud platforms for different use cases, and under different constraints and experiment setups. In this paper, the authors present a principled, large-scale literature review to collect and codify...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Characterizing Large-Scale Click Fraud in ZeroAccess

    Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem's complex structure to obfuscate the flow of money to its perpetrators. In this paper, the authors illuminate the intricate nature of this activity through the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    On The Security of Mobile Cockpit Information Systems

    Recent trends in aviation have led many general aviation pilots to adopt the use of iPads (or other tablets) in the cockpit. While initially used to display static charts and documents, uses have expanded to include live data such as weather and traffic information that is used to make flight...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild

    Online accounts are inherently valuable resources - both for the data they contain and the reputation they accrue over time. Unsurprisingly, this value drives criminals to steal, or hijack, such accounts. In this paper, the authors focus on manual account hijacking - account hijacking performed manually by humans instead of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Search + Seizure: The Effectiveness of Interventions on SEO Campaigns

    Black hat Search Engine Optimization (SEO), the practice of abusively manipulating search results, is an enticing method to acquire targeted user traffic. In turn, a range of interventions - from modifying search results to seizing domains - are used to combat this activity. In this paper, the authors examine the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Challenges in Inferring Internet Interdomain Congestion

    The authors introduce and demonstrate the utility of a method to localize and quantify inter-domain congestion in the Inter-net. Their Time Sequence Latency Probes (TSLP) method depends on two facts: internet traffic patterns are typically diurnal, and queues increase packet delay through a router during periods of adjacent link congestion....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Computing Multi-Relational Sufficient Statistics for Large Databases

    Databases contain information about which relationships do and do not hold among entities. To make this information accessible for statistical analysis requires computing sufficient statistics that combine information from different database tables. Such statistics may involve any number of positive and negative relationships. With a naive enumeration approach, computing sufficient...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed

    Central to the secure operation of a Public Key Infrastructure (PKI) is the ability to revoke certificates. While much of users' security rests on this process taking place quickly, in practice, revocation typically requires a human to decide to reissue a new certificate and revoke the old one. Thus, having...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    PixelVault: Using GPUs for Securing Cryptographic Operations

    Protecting the confidentiality of cryptographic keys in the event of partial or full system compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April 2014, which allowed the remote leakage of secret keys from HTTPS web servers, is an indicative example. In this paper, the authors...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

    In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called Social Authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Taking Authenticated Range Queries to Arbitrary Dimensions

    In this paper, the authors study the problem of authenticated multi-dimensional range queries over outsourced databases, where an owner outsources its database to an untrusted server, which maintains it and answers queries to clients. Previous schemes either scale exponentially in the number of query dimensions, or rely on heuristic data...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Data Driven Investigation of Faults in HVAC Systems with Model, Cluster and Compare (MCC)

    The complexity of modern HVAC systems leads to device misconfiguration in about 40% of buildings, wasting upto 40% of the energy consumed. Fault detection methods generate excessive alarms leading to operator alert fatigue, faults left unfixed and energy wastage. Sophisticated fault detection techniques developed in the literature are seldom used...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Multiplierless Design of Folded DSP Blocks

    In this paper, the authors address the problem of minimizing the implementation cost of the Time-Multiplexed Constant Multiplication (TMCM) operation that realizes the multiplication of an input variable by a single constant selected from a set of multiple constants at a time. It presents an efficient algorithm, called ORPHEUS that...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Plug&Chip: A Framework for Supporting Rapid Prototyping of 3D Hybrid Virtual SoCs

    In the embedded system domain there is a continuous demand towards providing higher flexibility for application development. This trend strives for virtual prototyping solutions capable of performing fast system simulation. Among other benefits, such a solution supports concurrent hardware/software system design by enabling to start developing, testing and validating the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2003

    Computing Equilibrium Strategies in Infinite Games of Incomplete Information

    This paper describes an algorithm for computing best-response strategies in a class of infinite games of incomplete information (of which various auctions are prime examples). Under certain conditions, this algorithm can be used to automatically compute Bayes-Nash equilibria. The predominant game-solving algorithms generally address finite games and approximate infinite games...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Biorthogonality, Step-Indexing and Compiler Correctness

    This paper defines logical relations between the denotational semantics of a simply typed functional language with recursion and the operational behaviour of low-level programs in a variant SECD machine. The relations, which are defined using biorthogonality and step-indexing, capture what it means for a piece of low-level code to implement...

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    WaterCooler: Exploring an Organization Through Enterprise Social Media

    As organizations scale up, their collective knowledge increases, and the potential for serendipitous collaboration between members grows dramatically. However, finding people with the right expertise or interests becomes much more difficult. Semi-structured social media, such as blogs, forums, and bookmarking, present a viable platform for collaboration - if enough people...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-Based Single Sign-on for Google Apps

    Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by different companies. The OASIS Security Assertion Markup Language (SAML) 2.0 Web Browser SSO Profile is the emerging standard in this context. This...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Semi-Supervised Co-Training and Active Learning Based Approach for Multi-View Intrusion Detection

    Although there is immense data available from networks and hosts, a very small proportion of this data is labeled due to the cost of obtaining expert labels. This proves to be a significant bottle-neck for developing supervised intrusion detection systems that rely solely on labeled data. In spite of the...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Anti-Phishing Based on Automated Individual White-List

    In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The traditional blacklist approach for anti-phishing is partially effective due to its partial list of global phishing sites. This paper presents a novel anti-phishing approach...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Recognizing Daily Activities With RFID-Based Sensors

    This paper explores a dense sensing approach that uses RFID sensor network technology to recognize human activities. In the setting, everyday objects are instrumented with UHF RFID tags called WISPs that are equipped with accelerometers. RFID readers detect when the objects are used by examining this sensor data, and daily...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Towards a Zero-Configuration Wireless Sensor Network Architecture for Smart Buildings

    Offlate buildings account for a large fraction of energy consumption. In an effort to economize scarce fossil fuels on earth, sensor networks are a valuable tool to increase the energy efficiency of buildings without severely reducing quality of life. Within a smart building many sensors and actuators are interconnected to...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Harvesting Collective Intelligence

    When harvesting collective intelligence, a user wishes to maximize the accuracy and value of the acquired information without spending too much time collecting it. The author empirically studies how people behave when facing these conflicting objectives using data from Yahoo Answers, a community driven question-and-answer site. The paper takes two...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    3G and 3.5G Wireless Network Performance Measured From Moving Cars and High-Speed Trains

    In recent years, the world has witnessed the deployment of several 3G and 3.5G wireless networks based on technologies such as CDMA 1x EVolution Data-Only (EVDO), High-Speed Downlink Packet Access (HSDPA), and mobile WiMax (e.g., WiBro). Although 3G and 3.5G wireless networks support enough bandwidth for typical Internet applications, their...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Improving Application Security With Data Flow Assertions

    Using RESIN, Web application programmers can prevent a range of problems, from SQL injection and cross-site scripting, to inadvertent password disclosure and missing access control checks. Adding a RESIN assertion to an application requires few changes to the existing application code, and an assertion can reuse existing code and data...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Multi-Aspect Security Configuration Assessment

    This paper presents a framework for building security assessment tools able to perform online verification of the security of a system configuration. Heterogeneous data generated from multiple sources are integrated into a homogeneous RDF representation using domain-specific ontologies and used for assessing the security of a configuration toward known attack...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Can They Hear Me Now?: A Security Analysis of Law Enforcement Wiretaps

    This paper analyzes the security properties of these inter-faces. It demonstrates that the standard CALEA interfaces are vulnerable to a range of unilateral attacks by the intercept target. In particular, because of poor design choices in the interception architecture and protocols, experiments show it is practical for a CALEA-tapped target...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Demo Abstract: Measuring Foot Pronation Using RFID Sensor Networks

    Running efficiency is an important factor to consider in order to avoid injury. In particular, foot pronation, the angle of the foot as it hits the ground, is a common cause for many types of injuries among runners. Though pronation is common, diagnosing pronation is difficult and imprecise. Currently there...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Wildlife and Environmental Monitoring Using RFID and WSN Technology

    Wireless Sensor Networks enable scientists to collect information about the environment with a granularity unseen before, while providing numerous challenges to software designers. Since sensor devices are often powered by small batteries, which take considerable effort to replace, it is of major importance to use energy carefully. The paper presents...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds

    Third-party cloud computing represents the promise of out-sourcing as applied to computation. Services, such as Microsoft's Azure and Amazon's EC2, allow users to instantiate Virtual Machines (VMs) on demand and thus purchase precisely the capacity they require when they require it. In turn, the use of virtualization allows third-party cloud...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Capacity of Large-Scale CSMA Wireless Networks

    In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schemes. There have been fewer studies of the asymptotic capacity of large-scale wireless networks based on CSMA (carrier-sensing multi-access), which schedules transmissions in a distributed and random manner. With the...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Implementation and Evaluation of a TDMA MAC for WiFi-Based Rural Mesh Networks

    WiFi mesh networks with outdoor links have become an attractive option to provide cost-effective broadband connectivity to rural areas, especially in developing regions. It is well understood that a TDMA-based approach is necessary to provide good performance over such networks. While preliminary prototypes of TDMA-based MAC protocols have been developed,...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Decoupling Congestion Control From TCP for Multi-Hop Wireless Networks: Semi-TCP

    TCP performs poorly in multihop wireless networks and even worse if end-to-end connectivity is often broken such as in challenged networks. Lots of research has been carried out but this problem has not been solved completely. Recently, hop-by-hop congestion control originally proposed for wired networks has been applied for multihop...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Using Identity Credential Usage Logs to Detect Anomalous Service Accesses

    For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a variety of defenses and invest significant time and effort to the analysis of a large amount of log data to detect malicious activities and their impact....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Using Spatio-Temporal Information in API Calls With Machine Learning Algorithms for Malware Detection

    Run-time monitoring of program execution behavior is widely used to discriminate between benign and malicious processes running on an end-host. Towards this end, most of the existing run-time intrusion or malware detection techniques utilize information available in Windows Application Programming Interface (API) call arguments or sequences. In comparison, the key...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    SBotMiner: Large Scale Search Bot Detection

    This paper studies search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large number of distributed, low rate search bots are difficult to identify and are often associated with malicious attacks. The paper presents SBotMiner,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Botzilla: Detecting the "Phoning Home" of Malicious Software

    Hosts infected with malicious software, so called malware, are ubiquitous in today's computer networks. The means whereby malware can in ltrate a network are manifold and range from exploiting of software vulnerabilities to tricking a user into executing malicious code. Monitoring and detection of all possible infection vectors is intractable...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Trust Based Security Auto-Configuration for Smart Assisted Living Environments

    Recent progresses in wireless sensor networking and pervasive computing have created huge opportunities for providing elderly people with technological facilities. For elderly people, conceiving technologies for increasing their autonomy, so as to enable them to self-manage their life is of utmost importance. However, when it comes to smart home, once...

    Provided By Association for Computing Machinery

  • White Papers // May 2009

    Mobile Personal Electrocardiogram Monitoring System With Patient Location

    The design of portable systems for remote monitoring of cardiac activity is one of the most important fields in telemedicine and telecare. A mobile monitoring system with low-cost hardware equipment will be described, together with wireless transmission utilizing Bluetooth for real-time ECG acquisition, measurement, archiving and visualization in both mobile...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    RACNet: A High-Fidelity Data Center Sensing Network

    RACNet is a sensor network for monitoring a data center's environmental conditions. The high spatial and temporal fidelity measurements that RACNet provides can be used to improve the data center's safety and energy efficiency. RACNet overcomes the network's large scale and density and the data center's harsh RF environment to...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Cloud Security Is Not (Just) Virtualization Security

    Cloud infrastructure commonly relies on virtualization. Customers provide their own VMs, and the cloud provider runs them often without knowledge of the guest OSes or their configurations. However, cloud customers also want effective and efficient security for their VMs. Cloud providers offering security-as-a-service based on VM introspection promise the best...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Comprehensive QoS Monitoring of Web Services and Event-Based SLA Violation Detection

    In service-oriented systems, Quality of Service represents an important issue which is often considered when selecting and composing services. For receiving up-to-date information, non-functional properties such as response time or availability can be continuously monitored using server- or client-side approaches. However, both approaches have strengths and weaknesses. This paper presents...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2008

    Detecting Energy-Greedy Anomalies and Mobile Malware Variants

    Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the limited battery-lifetime of these devices restricts their portability and applicability, and this weakness can be exacerbated by mobile malware targeting depletion of battery energy. Such malware...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Emulating Emulation-Resistant Malware

    The authors of malware attempt to frustrate reverse engineering and analysis by creating programs that crash or otherwise behave differently when executed on an emulated platform than when executed on real hardware. In order to defeat such techniques and facilitate automatic and semi-automatic dynamic analysis of malware, the paper proposes...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    On Calibrating Enterprise Switch Measurements

    The complexity of modern enterprise networks is ever-increasing, and one's understanding of these important networks is not keeping pace. The insight into intra-subnet traffic (staying within a single LAN) is particularly limited, due to the widespread use of Ethernet switches that preclude ready LAN-wide monitoring. The paper has recently undertaken...

    Provided By Association for Computing Machinery

  • White Papers // May 2010

    Scalable Simulation of Complex Network Routing Policies

    Modern routing protocols for the internet implement complex policies that take more into account than just path length. However, current routing protocol simulators are limited to either working with hard-coded policies or working on small networks (1000 nodes or less). It is currently not possible to ask questions about how...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    A Network-Aware MAC and Routing Protocol for Effective Load Balancing in Ad Hoc Wireless Networks With Directional Antenna

    Use of directional antenna in the context of ad hoc wireless networks can largely reduce radio interference, thereby improving the utilization of wireless medium. The major contribution in this paper is to devise a routing strategy, along with a MAC protocol, that exploits the advantages of directional antenna in ad...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Stragglers of the Herd Get Eaten: Security Concerns for GSM Mobile Banking Applications

    The first GSM standard was published in 1989, fully two decades ago. Since then, cryptanalysis has weakened or broken significant parts of the original specification. Yet many of these compromised pieces remain in common use, particularly throughout the developing world. This paper will present an overview of recent developments in...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    GUI Testing Using Computer Vision

    Testing a GUI's visual behavior typically requires human testers to interact with the GUI and to observe whether the expected results of interaction are presented. This paper presents a new approach to GUI testing using computer vision for testers to automate their tasks. Testers can write a visual test script...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    Pr2-P2PSIP: Privacy Preserving P2P Signaling for VoIP and IM

    In the last few years, there has been a good deal of effort put into the research and standardization of P2P-based VoIP signaling, commonly called P2PSIP. However, there has been one important issue which has not been dealt with adequately, privacy. Specifically location privacy, and privacy of social interaction in...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Respec: Efficient Online Multiprocessor Replay Via Speculation and External Determinism

    Deterministic replay systems record and reproduce the execution of a hardware or software system. While it is well known how to replay uniprocessor systems, replaying shared memory multiprocessor systems at low overhead on commodity hardware is still an open problem. This paper presents Respec, a new way to support deterministic...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Static Analysis to Model & Measure OO Paradigms

    Object oriented development has proved its worth in today's system because its design and development is better, reliable and easier to access than the traditional methodologies. Due to updated requirements and lack of documentation in old systems has provided a motivation to revamp the systems. Rebuilding or redesigning the same...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Detailed Diagnosis of Performance Anomalies in Sensornets

    This paper addresses the problem of analysing performance anomalies in sensor networks. This paper proposes an approach that uses the local flash storage of the motes for logging system data, in combination with online statistical analysis. The results show not only that this is a feasible method but that the...

    Provided By Association for Computing Machinery

  • White Papers // Apr 2010

    Debugging Standard Document Formats

    The paper presents a tool for helping XML schema designers to obtain a high quality level for their specifications. The tool allows one to analyze relations between classes of XML documents and formally prove them. For instance, the tool can be used to check forward and backward compatibilities of recommendations....

    Provided By Association for Computing Machinery