Association for Computing Machinery

Displaying 1-40 of 6698 results

  • White Papers // Mar 2015

    Fast Serializable Multi-Version Concurrency Control for Main-Memory Database Systems

    Multi-Version Concurrency Control (MVCC) is a widely employed concurrency control mechanism, as it allows for execution modes where readers never block writers. However, most systems implement only Snapshot Isolation (SI) instead of full serializability. Adding serializability guarantees to existing SI implementations tends to be prohibitively expensive. The authors present a...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2015

    Sirius: An Open End-to-End Voice and Vision Personal Assistant and Its Implications for Future Warehouse Scale Computers

    As user demand scales for Intelligent Personal Assistants (IPAs) such as Apple's Siri, Google's google now, and Microsoft's Cortana, the authors are approaching the computational limits of current datacenter architectures. It is an open question how future server architectures should evolve to enable this emerging class of applications, and the...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    Compiler Management of Communication and Parallelism for Quantum Computation

    Quantum Computing (QC) offers huge promise to accelerate a range of computationally intensive benchmarks. Quantum computing is limited, however, by the challenges of decoherence: i.e., a quantum state can only be maintained for short windows of time before it decoheres. While quantum error correction codes can protect against decoherence, fast...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    A Symbolic Execution Algorithm for Constraint-Based Testing of Database Programs

    In so-called constraint-based testing, symbolic execution is a common technique used as a part of the process to generate test data for imperative programs. Databases are ubiquitous in software and testing of programs manipulating databases is thus essential to enhance the reliability of software. In this paper, the authors propose...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    CQIC: Revisiting Cross-Layer Congestion Control for Cellular Networks

    With the advent of high-speed cellular access and the overwhelming popularity of Smartphone's, a large percent of today's Internet content is being delivered via cellular links. Due to the nature of long-range wireless signal propagation, the capacity of the last hop cellular link can vary by orders of magnitude within...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2015

    Utility of the OpenAccess Database in Academic Research

    Twenty years ago, there was a common design tool which was free and open-source and satisfied the needs of many academic circuit designers. The proliferation of OpenAccess is opening promising new research opportunities to academic communities. The benefits of adopting an OpenAccess based approach to EDA research are growing, and...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    GRAPHITE: An Extensible Graph Traversal Framework for Relational Database Management Systems

    Graph traversals are a basic but fundamental ingredient for a variety of graph algorithms and graph-oriented queries. To achieve the best possible query performance, they need to be implemented at the core of a database management system that aims at storing, manipulating, and querying graph data. Increasingly, modern business applications...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Uncovering Network Tarpits with Degreaser

    Network tarpits, whereby a single host or appliance can masquerade as many fake hosts on a network and slow network scanners, are a form of defensive cyber-deception. In this paper, the authors develop degreaser, an efficient fingerprinting tool to remotely detect tarpits. In addition to validating their tool in a...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Exploring Big Data with Helix: Finding Needles in a Big Haystack

    While much work has focused on efficient processing of big data, little work considers how to understand them. In this paper, the authors describe Helix, a system for guided exploration of big data. Helix provides a unified view of sources, ranging from spreadsheets and XML files with no schema, all...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Towards Hardware-Driven Design of Low-Energy Algorithms for Data Analysis

    In the era of "Big" data, data analysis algorithms need to be efficient. Traditionally researchers would tackle this problem by considering "Small" data algorithms and investigating how to make them computationally more efficient for big data applications. The main means to achieve computational efficiency would be to revise the necessity...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2014

    Foundations of Crowd Data Sourcing

    Crowdsourcing techniques are very powerful when harnessed for the purpose of collecting and managing data. In order to provide sound scientific foundations for crowdsourcing and support the development of efficient crowdsourcing processes, adequate formal models must be defined. In particular, the models must formalize unique characteristics of crowd-based settings, such...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Design-Theoretic Encoding of Deterministic Hypotheses as Constraints and Correlations Into U-Relational Databases

    In view of the paradigm shift that makes science ever more data-driven, in this paper the authors consider deterministic scientific hypotheses as uncertain data. In the form of mathematical equations, hypotheses symmetrically relate aspects of the studied phenomena. For computing predictions, however, deterministic hypotheses are used asymmetrically as functions. They...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Patterns in the Chaos - A Study of Performance Variation and Predictability in Public IaaS Clouds

    Benchmarking the performance of public cloud providers is a common research topic. Previous paper has already extensively evaluated the performance of different cloud platforms for different use cases, and under different constraints and experiment setups. In this paper, the authors present a principled, large-scale literature review to collect and codify...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Analysis of SSL Certificate Reissues and Revocations in the Wake of Heartbleed

    Central to the secure operation of a Public Key Infrastructure (PKI) is the ability to revoke certificates. While much of users' security rests on this process taking place quickly, in practice, revocation typically requires a human to decide to reissue a new certificate and revoke the old one. Thus, having...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Computing Multi-Relational Sufficient Statistics for Large Databases

    Databases contain information about which relationships do and do not hold among entities. To make this information accessible for statistical analysis requires computing sufficient statistics that combine information from different database tables. Such statistics may involve any number of positive and negative relationships. With a naive enumeration approach, computing sufficient...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    PixelVault: Using GPUs for Securing Cryptographic Operations

    Protecting the confidentiality of cryptographic keys in the event of partial or full system compromise is crucial for containing the impact of attacks. The Heartbleed vulnerability of April 2014, which allowed the remote leakage of secret keys from HTTPS web servers, is an indicative example. In this paper, the authors...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Faces in the Distorting Mirror: Revisiting Photo-based Social Authentication

    In an effort to hinder attackers from compromising user accounts, Facebook launched a form of two-factor authentication called Social Authentication (SA), where users are required to identify photos of their friends to complete a log-in attempt. Recent research, however, demonstrated that attackers can bypass the mechanism by employing face recognition...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Characterizing Large-Scale Click Fraud in ZeroAccess

    Click fraud is a scam that hits a criminal sweet spot by both tapping into the vast wealth of online advertising and exploiting that ecosystem's complex structure to obfuscate the flow of money to its perpetrators. In this paper, the authors illuminate the intricate nature of this activity through the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    On The Security of Mobile Cockpit Information Systems

    Recent trends in aviation have led many general aviation pilots to adopt the use of iPads (or other tablets) in the cockpit. While initially used to display static charts and documents, uses have expanded to include live data such as weather and traffic information that is used to make flight...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild

    Online accounts are inherently valuable resources - both for the data they contain and the reputation they accrue over time. Unsurprisingly, this value drives criminals to steal, or hijack, such accounts. In this paper, the authors focus on manual account hijacking - account hijacking performed manually by humans instead of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Search + Seizure: The Effectiveness of Interventions on SEO Campaigns

    Black hat Search Engine Optimization (SEO), the practice of abusively manipulating search results, is an enticing method to acquire targeted user traffic. In turn, a range of interventions - from modifying search results to seizing domains - are used to combat this activity. In this paper, the authors examine the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Challenges in Inferring Internet Interdomain Congestion

    The authors introduce and demonstrate the utility of a method to localize and quantify inter-domain congestion in the Inter-net. Their Time Sequence Latency Probes (TSLP) method depends on two facts: internet traffic patterns are typically diurnal, and queues increase packet delay through a router during periods of adjacent link congestion....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Data Driven Investigation of Faults in HVAC Systems with Model, Cluster and Compare (MCC)

    The complexity of modern HVAC systems leads to device misconfiguration in about 40% of buildings, wasting upto 40% of the energy consumed. Fault detection methods generate excessive alarms leading to operator alert fatigue, faults left unfixed and energy wastage. Sophisticated fault detection techniques developed in the literature are seldom used...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2014

    Multiplierless Design of Folded DSP Blocks

    In this paper, the authors address the problem of minimizing the implementation cost of the Time-Multiplexed Constant Multiplication (TMCM) operation that realizes the multiplication of an input variable by a single constant selected from a set of multiple constants at a time. It presents an efficient algorithm, called ORPHEUS that...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    SoftMoW: Recursive and Reconfigurable Cellular WAN Architecture

    The current LTE network architecture is organized into very large regions, each having a core network and a radio access network. The core network contains an Internet edge comprised of Packet data network GateWays (PGWs). The radio network consists of only base stations. There are minimal interactions among regions other...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    PRAN: Programmable Radio Access Networks

    With the continued exponential growth of mobile traffic and the rise of diverse applications, the current LTE Radio Access Network (RAN) architecture of cellular operators faces mounting challenges. Current RAN suffers from insufficient radio resource coordination, inefficient infrastructure utilization, and inflexible data paths. The authors present the high level design...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Sweet Little Lies: Fake Topologies for Flexible Routing

    Link-state routing protocols (e.g., OSPF and IS-IS) are widely used because they are scalable, robust, and based on simple abstractions. Unfortunately, these protocols are also relatively inflexible, since they direct all traffic over shortest paths. In contrast, Software Defined Networking (SDN) offers fine-grained control over routing, at the expense of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Tango: Simplifying SDN Control with Automatic Switch Property Inference, Abstraction, and Optimization

    A major benefit of Software-Defined Networking (SDN) over traditional networking is simpler and easier control of network devices. The diversity of SDN switch implementation properties, which include both diverse switch hardware capabilities and diverse control-plane software behaviors, however, can make it difficult to understand and/or to control the switches in...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Blender: Upgrading Tenant-based Data Center Networking

    In this paper, the authors present Blender, a framework that enables network operators to improve tenant performance by tailoring the network's behavior to tenant needs. Tenants may upgrade their provisioned portion of the network with specific features, such as multi-path routing, isolation, and failure recovery, without modifying hosted application code....

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    System-Level Memory Optimization for High-Level Synthesis of Component-Based SoCs

    The design of specialized accelerators is essential to the success of many modern systems-on-chip. Electronic system-level design methodologies and high-level synthesis tools are critical for the efficient design and optimization of an accelerator. Still, these methodologies and tools offer only limited support for the optimization of the memory structures, which...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Automatic Custom Instruction Identification in Memory Streaming Algorithms

    Application-Specific Instruction Set Processors (ASIPs) extend the instruction set of a general purpose processor by dedicated Custom Instructions (CIs). In the last decade, reconfigurable processors advanced this concept towards runtime reconfiguration to increase the efficiency and adaptivity. Compiler support for automatic identification and implementation of ASIP CIs exists commercially and...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Timing Analysis of Erroneous Systems

    Erroneous systems allow timing errors to occur during execution, but use measures to ensure continued operation through changes in operating parameters (voltage and frequency), error correction at various levels of the system, or ensuring controlled occurrence of errors to perform approximate computing. In this paper, the authors are interested in...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    SenseGlass: Using Google Glass to Sense Daily Emotions

    Emotions play a very important role in everyone's daily life. For over a century, scientists have studied human emotions in laboratory settings. However, these emotions have been largely contrived - elicited by movies or fake "Lab" stimuli, which tend not to matter to the participants in the studies, at least...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Measurement and Analysis of OSN Ad Auctions

    Advertising is ubiquitous on the web; numerous ad networks serve billions of ads daily via keyword or search term auctions. Recently, Online Social Networks (OSNs) such as Facebook have created site-specific ad services that differ from traditional ad networks by letting advertisers bid on users rather than keywords. With Facebook's...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Beyond CPM and CPC: Determining the Value of Users on OSNs

    Not all of the over one billion users of Online Social Networks (OSNs) are equally valuable to the OSNs. The current business model of monetizing advertisements targeted to users does not appear to be based on any visible grouping of the users. The primary metrics remain CPM (Cost Per Mille...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2014

    Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks

    Intrusion detection, traffic classification, and other network monitoring applications need to analyze the captured traffic beyond the network layer to allow for connection-oriented analysis, and achieve resilience to evasion attempts based on TCP segmentation. Existing network traffic capture frameworks, however, provide applications with raw packets and leave complex operations like...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Security and QoS Tradeoff Recommendation System (SQT-RS) for Dynamic Assessing CPRM-based Systems

    Context-based Parametric Relationship Models (CPRM) defines complex dependencies between different types of parameters. In particular, security and QoS relationships that may occur at different levels of abstraction are easily identified using CPRM. However, the growing number of parameters and relationships, typically due to the heterogeneous scenarios of future networks, increase...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    On the Role of Routing in Named Data Networking

    A unique feature of Named Data Networking (NDN) is that its forwarding plane can detect and recover from network faults on its own, enabling each NDN router to handle network failures locally without relying on global routing convergence. This new feature prompts the authors to re-examine the role of routing...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    VIP: A Framework for Joint Dynamic Forwarding and Caching in Named Data Networks

    Emerging information-centric networking architectures seek to optimally utilize both bandwidth and storage for efficient content distribution. This highlights the need for joint design of traffic engineering and caching strategies, in order to optimize network performance in view of both current traffic loads and future traffic demands. The authors present a...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2014

    Kite: A Mobility Support Scheme for NDN

    Named Data Networking (NDN) natively supports the mobility of data consumers through its data-centric design and stateful forwarding plane. However, the mobility support for data producers remains open in the original proposal. In this paper, the authors introduce Kite, a design of mobility support for NDN. Kite leverages the state...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2003

    Computing Equilibrium Strategies in Infinite Games of Incomplete Information

    This paper describes an algorithm for computing best-response strategies in a class of infinite games of incomplete information (of which various auctions are prime examples). Under certain conditions, this algorithm can be used to automatically compute Bayes-Nash equilibria. The predominant game-solving algorithms generally address finite games and approximate infinite games...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2008

    Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-Based Single Sign-on for Google Apps

    Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by different companies. The OASIS Security Assertion Markup Language (SAML) 2.0 Web Browser SSO Profile is the emerging standard in this context. This...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Improving Application Security With Data Flow Assertions

    Using RESIN, Web application programmers can prevent a range of problems, from SQL injection and cross-site scripting, to inadvertent password disclosure and missing access control checks. Adding a RESIN assertion to an application requires few changes to the existing application code, and an assertion can reuse existing code and data...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Intelligent File Scoring System for Malware Detection From the Gray List

    The most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software from a black list, and running any unknown software (i.e., the gray list) in a controlled manner. The gray list, containing unknown software programs which could...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Beyond Blacklists: Learning to Detect Malicious Web Sites From Suspicious URLs

    Malicious Web sites are a cornerstone of Internet criminal activities. As a result, there has been broad interest in developing systems to prevent the end user from visiting such sites. This paper describes an approach to this problem based on automated URL classification, using statistical methods to discover the tell-tale...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Multi-Aspect Security Configuration Assessment

    This paper presents a framework for building security assessment tools able to perform online verification of the security of a system configuration. Heterogeneous data generated from multiple sources are integrated into a homogeneous RDF representation using domain-specific ontologies and used for assessing the security of a configuration toward known attack...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Can They Hear Me Now?: A Security Analysis of Law Enforcement Wiretaps

    This paper analyzes the security properties of these inter-faces. It demonstrates that the standard CALEA interfaces are vulnerable to a range of unilateral attacks by the intercept target. In particular, because of poor design choices in the interception architecture and protocols, experiments show it is practical for a CALEA-tapped target...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Using Identity Credential Usage Logs to Detect Anomalous Service Accesses

    For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a variety of defenses and invest significant time and effort to the analysis of a large amount of log data to detect malicious activities and their impact....

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    Harvesting Collective Intelligence

    When harvesting collective intelligence, a user wishes to maximize the accuracy and value of the acquired information without spending too much time collecting it. The author empirically studies how people behave when facing these conflicting objectives using data from Yahoo Answers, a community driven question-and-answer site. The paper takes two...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Recognizing Daily Activities With RFID-Based Sensors

    This paper explores a dense sensing approach that uses RFID sensor network technology to recognize human activities. In the setting, everyday objects are instrumented with UHF RFID tags called WISPs that are equipped with accelerometers. RFID readers detect when the objects are used by examining this sensor data, and daily...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Demo Abstract: Measuring Foot Pronation Using RFID Sensor Networks

    Running efficiency is an important factor to consider in order to avoid injury. In particular, foot pronation, the angle of the foot as it hits the ground, is a common cause for many types of injuries among runners. Though pronation is common, diagnosing pronation is difficult and imprecise. Currently there...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Wildlife and Environmental Monitoring Using RFID and WSN Technology

    Wireless Sensor Networks enable scientists to collect information about the environment with a granularity unseen before, while providing numerous challenges to software designers. Since sensor devices are often powered by small batteries, which take considerable effort to replace, it is of major importance to use energy carefully. The paper presents...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Enhancing Dynamic Cloud-Based Services Using Network Virtualization

    It is envisaged that services and applications will migrate to a cloud-computing paradigm where thin-clients on user devices access, over the network, applications hosted in data centers by application service providers. Examples are cloud based gaming applications and cloud-supported virtual desktops. For good performance and efficiency, it is critical that...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Does Virtualization Make Disk Scheduling Pass

    Analysis of technology and application trends reveals a growing imbalance in the peak compute-to-memory-capacity ratio for future servers. At the same time, the fraction contributed by memory systems to total datacenter costs and power consumption during typical usage is increasing. In response to these trends, this paper re-examines traditional compute-memory...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Disaggregated Memory for Expansion and Sharing in Blade Servers

    Analysis of technology and application trends reveals a growing imbalance in the peak compute-to-memory-capacity ratio for future servers. At the same time, the fraction contributed by memory systems to total datacenter costs and power consumption during typical usage is increasing. In response to these trends, this paper re-examines traditional compute-memory...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Cloud Security Is Not (Just) Virtualization Security

    Cloud infrastructure commonly relies on virtualization. Customers provide their own VMs, and the cloud provider runs them often without knowledge of the guest OSes or their configurations. However, cloud customers also want effective and efficient security for their VMs. Cloud providers offering security-as-a-service based on VM introspection promise the best...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Vispedia: On-Demand Data Integration for Interactive Visualization and Exploration

    Wikipedia is an example of the large, collaborative, semi-structured data sets emerging on the Web. Typically, before these data sets can be used, they must transformed into structured tables via data integration. The paper presents Vispedia, a Web-based visualization system which incorporates data integration into an iterative, interactive data exploration...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2010

    On Interactive Visualization of High-Dimensional Data Using the Hyperbolic Plane

    This paper proposes a novel projection based visualization method for high-dimensional datasets by combining concepts from MDS and the geometry of the hyperbolic spates. The approach Hyperbolic Multi-Dimensional Scaling (H-MDS) extends earlier work using hyperbolic spaces for visualization of tree structures data ("Hyperbolic tree browser"). By borrowing concepts from multi-dimensional...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Low-Power Amdahl-Balanced Blades for Data Intensive Computing

    Enterprise and scientific data sets double every year, forcing similar growths in storage size and power consumption. As a consequence, current system architectures used to build data warehouses are about to hit a power consumption wall. This paper proposes a novel alternative architecture comprising large number of so-called Amdahl blades...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    PortLand: A Scalable Fault-Tolerant Layer 2 Data Center Network Fabric

    This paper considers the requirements for a scalable, easily manageable, fault-tolerant, and efficient data center net-work fabric. Trends in multi-core processors, end-host virtualization, and commodities of scale are pointing to future single-site data centers with millions of virtual end points. Existing layer 2 and layer 3 network protocols face some...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    RACNet: A High-Fidelity Data Center Sensing Network

    RACNet is a sensor network for monitoring a data center's environmental conditions. The high spatial and temporal fidelity measurements that RACNet provides can be used to improve the data center's safety and energy efficiency. RACNet overcomes the network's large scale and density and the data center's harsh RF environment to...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    DECOR: DEClaritive Network Management and OpeRation

    Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. This paper first examines the fundamental components of management operations and argues that the lack of automation is due to a lack of programmability at the right level of abstraction. To address this challenge, the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Using Spatio-Temporal Information in API Calls With Machine Learning Algorithms for Malware Detection

    Run-time monitoring of program execution behavior is widely used to discriminate between benign and malicious processes running on an end-host. Towards this end, most of the existing run-time intrusion or malware detection techniques utilize information available in Windows Application Programming Interface (API) call arguments or sequences. In comparison, the key...

    Provided By Association for Computing Machinery

  • White Papers // Dec 2009

    SBotMiner: Large Scale Search Bot Detection

    This paper studies search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large number of distributed, low rate search bots are difficult to identify and are often associated with malicious attacks. The paper presents SBotMiner,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Botzilla: Detecting the "Phoning Home" of Malicious Software

    Hosts infected with malicious software, so called malware, are ubiquitous in today's computer networks. The means whereby malware can in ltrate a network are manifold and range from exploiting of software vulnerabilities to tricking a user into executing malicious code. Monitoring and detection of all possible infection vectors is intractable...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Trust Based Security Auto-Configuration for Smart Assisted Living Environments

    Recent progresses in wireless sensor networking and pervasive computing have created huge opportunities for providing elderly people with technological facilities. For elderly people, conceiving technologies for increasing their autonomy, so as to enable them to self-manage their life is of utmost importance. However, when it comes to smart home, once...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Accountability in Hosted Virtual Networks

    Virtualization enables multiple networks, each customized for a particular purpose, to run concurrently over a shared substrate. One such model for managing these virtual net-works is to create a hosting platform where companies can deploy services by leasing a portion of several physical routers. While lowering the barrier for innovation...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Building a Fast, Virtualized Data Plane With Programmable Hardware

    Network virtualization allows many networks to share the same underlying physical topology; this technology has offered promise both for experimentation and for hosting multiple networks on a single shared physical infrastructure. Much attention has focused on virtualizing the network control plane, but, ultimately, a limiting factor in the deployment of...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Time Series Shapelets: A New Primitive for Data Mining

    Classification of time series has been attracting great interest over the past decade. Recent empirical evidence has strongly suggested that the simple nearest neighbor algorithm is very difficult to beat for most time series problems. While this may be considered good news, given the simplicity of implementing the nearest neighbor...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    vManage: Loosely Coupled Platform and Virtualization Management in Data Centers

    Management is an important challenge for future enterprises. Previous work has addressed platform management (e.g., power and thermal management) separately from virtualization management (e.g., Virtual Machine (VM) provisioning, application performance). Coordinating the actions taken by these different management layers is important and beneficial, for reasons of performance, stability, and efficiency....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Comprehensive QoS Monitoring of Web Services and Event-Based SLA Violation Detection

    In service-oriented systems, Quality of Service represents an important issue which is often considered when selecting and composing services. For receiving up-to-date information, non-functional properties such as response time or availability can be continuously monitored using server- or client-side approaches. However, both approaches have strengths and weaknesses. This paper presents...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2008

    Detecting Energy-Greedy Anomalies and Mobile Malware Variants

    Mobile users of computation and communication services have been rapidly adopting battery-powered mobile handhelds, such as PocketPCs and SmartPhones, for their work. However, the limited battery-lifetime of these devices restricts their portability and applicability, and this weakness can be exacerbated by mobile malware targeting depletion of battery energy. Such malware...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Emulating Emulation-Resistant Malware

    The authors of malware attempt to frustrate reverse engineering and analysis by creating programs that crash or otherwise behave differently when executed on an emulated platform than when executed on real hardware. In order to defeat such techniques and facilitate automatic and semi-automatic dynamic analysis of malware, the paper proposes...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    BlueMonarch: A System for Evaluating Bluetooth Applications in the Wild

    Despite Bluetooth's popularity, low cost, and low power requirements, Bluetooth applications remain remarkably unsophisticated. Although the research community and industry have designed games, cell-phone backup and contextual advertising systems with Bluetooth, few such applications have been prototyped or evaluated on a large scale. Evaluating Bluetooth applications requires recruiting devices in...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Consistency Rationing in the Cloud: Pay Only When It Matters

    Cloud storage solutions promise high scalability and low cost. Existing solutions, however, differ in the degree of consistency they provide. Its experience using such systems indicates that there is a non-trivial trade-off between cost, consistency and availability. High consistency implies high cost per transaction and, in some situations, reduced availability....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds

    Third-party cloud computing represents the promise of out-sourcing as applied to computation. Services, such as Microsoft's Azure and Amazon's EC2, allow users to instantiate Virtual Machines (VMs) on demand and thus purchase precisely the capacity they require when they require it. In turn, the use of virtualization allows third-party cloud...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Evaluating the Cost-Benefit of Using Cloud Computing to Extend the Capacity of Clusters

    This paper investigates the benefits that organisations can reap by using Cloud Computing" providers to augment the computing capacity of their local infrastructure. It evaluates the cost of six scheduling strategies used by an organisation that operates a cluster managed by virtual machine technology and seeks to utilise resources from...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Capacity of Large-Scale CSMA Wireless Networks

    In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schemes. There have been fewer studies of the asymptotic capacity of large-scale wireless networks based on CSMA (carrier-sensing multi-access), which schedules transmissions in a distributed and random manner. With the...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    SPATE: Small-Group PKI-Less Authenticated Trust Establishment

    Establishing trust between a group of individuals remains a difficult problem. Prior works assume trusted infrastructure, require an individual to trust unknown entities, or provide relatively low probabilistic guarantees of authenticity (95% for realistic settings). This work presents SPATE, a primitive that allows users to establish trust via device mobility...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Implementation and Evaluation of a TDMA MAC for WiFi-Based Rural Mesh Networks

    WiFi mesh networks with outdoor links have become an attractive option to provide cost-effective broadband connectivity to rural areas, especially in developing regions. It is well understood that a TDMA-based approach is necessary to provide good performance over such networks. While preliminary prototypes of TDMA-based MAC protocols have been developed,...

    Provided By Association for Computing Machinery