Association for Computing Machinery

Displaying 281-320 of 6810 results

  • White Papers // Nov 2013

    Exposing and Mitigating Privacy Loss in Crowdsourced Survey Platforms

    Academic and market researchers are increasingly using online platforms for crowd-sourcing survey information from online users. Crowd-sourcing platforms such as Amazon mechanical turk and Google consumer surveys can profile users based on their inputs to online surveys. In this paper the authors first demonstrate how easily user privacy can be...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Optimal Sporadic Location Privacy Preserving Systems in Presence of Bandwidth Constraints

    Various Location Privacy-Preserving Mechanisms (LPPMs) have been proposed in the literature to address the privacy risks derived from the exposure of user locations through the use of Location Based Services (LBSs). LPPMs obfuscate the locations disclosed to the LBS provider using a variety of strategies, which come at a cost...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Using Naive Bayes to Detect Spammy Names in Social Networks

    Many social networks are predicated on the assumption that a member's online information reflects his or her real identity. In such networks, members who fill their name fields with fictitious identities, company names, phone numbers, or just gibberish are violating the terms of service, polluting search results, and degrading the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Distributed Privacy-Preserving Transparency Logging

    The authors present a transparency-enhancing tool in the form of a cryptographic scheme that enables data processors to inform users about the actual data processing that takes place on their personal data. Their proposed solution can handle arbitrary processes while offloading storage and interactions with users to dedicated log servers....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Bias-Based Modeling and Entropy Analysis of PUFs

    Physical Unclonable Functions (PUFs) are increasingly becoming a well-known security primitive for secure key storage and anti-counterfeiting. For both applications it is imperative that PUFs provide enough entropy. This paper is to propose a new model for binary-output PUFs such as SRAM, DFF, Latch and buskeeper PUFs, and a method...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    On the Limits of Provable Anonymity

    The authors study provably secure anonymity. They begin with rigorous definition of anonymity against wide range of computationally bounded attackers, including eavesdroppers, malicious peers, malicious destinations, and their combinations. Their definition is generic, and captures different notions of anonymity (e.g., un-observability and sender anonymity). They then study the feasibility of...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Analysis of the Impact of Data Granularity on Privacy for the Smart Grid

    The upgrade of the electricity network to the \"Smart grid\" has been intensified in the last years. The new automated devices being deployed gather large quantities of data that offer promises of a more resilient grid but also raise privacy concerns among customers and energy distributors. In this paper, the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Bankshot: Caching Slow Storage in Fast Non-Volatile Memory

    Emerging non-volatile storage (e.g., phase change memory and STTRAM) allow access to persistent data at latencies an order of magnitude lower than SSDs. The density and price gap between NVMs and denser storage make NVM economically most suitable as a cache for larger, more conventional storage (i.e., NAND flash-based SSDs...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    InTune: Coordinating Multicore Islands to Achieve Global Policy Objectives

    Multicore platforms are moving from small numbers of homogeneous cores to 'Scale out' designs with multiple tiles or 'Islands' of cores residing on a single chip, each with different resources and potentially controlled by their own resource managers. Applications running on such machines, however, operate across multiple such resource islands,...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    An Untold Story of Redundant Clouds: Making Your Service Deployment Truly Reliable

    To enhance the reliability of cloud services, many application providers leverage multiple cloud providers for redundancy. Unfortunately, such techniques fail to recognize that seemingly independent redundant clouds may share third-party infrastructure components, e.g., power sources and Internet routers, which could potentially undermine this redundancy. This paper presents iRec, a cloud...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Consistent, Durable, and Safe Memory Management for Byte-Addressable Non Volatile Main Memory

    In this paper, the authors present three building blocks for enabling the efficient and safe design of persistent data stores for emerging non-volatile memory technologies. Taking the fullest advantage of the low latency and high bandwidths of emerging memories such as Phase Change Memory (PCM), spin torque, and memristor necessitates...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Fast Dynamic Binary Translation for the Kernel

    Dynamic Binary Translation (DBT) is a powerful technique with several important applications. System-level binary translators have been used for implementing a virtual machine monitor and for instrumentation in the OS kernel. In current designs, the performance overhead of binary translation on kernel-intensive workloads is high. e.g., over 10x slowdowns were...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Exploring Storage Class Memory with Key Value Stores

    In the near future, new Storage-Class Memory (SCM) technologies - such as phase-change memory and memristors - will radically change the nature of long-term storage. These devices will be cheap, non-volatile, byte addressable, and near DRAM density and speed. While SCM offers enormous opportunities, profiting from them will require new...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Disinformation Techniques for Entity Resolution

    The authors study the problem of disinformation. They assume that an \"Agent\" has some sensitive information that the \"Adversary\" is trying to obtain. For example, a camera company (the agent) may secretly be developing its new camera model, and a user (the adversary) may want to know in advance the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    A Two-Phase Algorithm for Mining Sequential Patterns with Differential Privacy

    Frequent sequential pattern mining is a central task in many fields such as biology and finance. However, release of these patterns is raising increasing concerns on individual privacy. In this paper, the authors study the sequential pattern mining problem under the differential privacy framework which provides formal and provable guarantees...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    UNIK: Unsupervised Social Network Spam Detection

    Social network spam increases explosively with the rapid development and wide usage of various social networks on the Internet. To timely detect spam in large social network sites, it is desirable to discover unsupervised schemes that can save the training cost of supervised schemes. In this paper, the authors first...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Consumer-Centric SLA Manager for Cloud-Hosted Databases

    The authors present an end-to-end framework for consumer-centric SLA management of virtualized database servers. The framework facilitates adaptive and dynamic provisioning of the database tier of the software applications based on application-defined policies for satisfying their own SLA performance requirements, avoiding the cost of any SLA violation and controlling the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    A System-Level Infrastructure for Multidimensional MP-SoC Design Space Co-Exploration

    In this paper, the authors present a flexible and extensible system-level MP-SoC Design Space Exploration (DSE) infrastructure, called NASA. This highly modular framework uses well-defined interfaces to easily integrate different system-level simulation tools as well as different combinations of search strategies in a simple plug-and-play fashion. Moreover, NASA deploys a...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Automated Generation of Polyhedral Process Networks from Affine Nested-Loop Programs with Dynamic Loop Bounds

    The Process Networks (PNs) is a suitable parallel Model of Computation (MoC) used to specify embedded streaming applications in a parallel form facilitating the efficient mapping onto embedded parallel execution platforms. Unfortunately, specifying an application using a parallel MoC is a very difficult and highly error-prone task. To overcome the...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Content Coverage Maximization on Word Networks for Hierarchical Topic Summarization

    In this paper, the authors explain about the text summarization by extracting hierarchical topics from a given collection of documents. They propose a new approach of text modeling via network analysis. They convert documents into a word influence network, and find the words summarizing the major topics with an efficient...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2013

    Feedback-Driven Multiclass Active Learning for Data Streams

    Active learning is a promising way to efficiently build up training sets with minimal supervision. Most existing methods consider the learning problem in a pool-based setting. However, in a lot of real-world learning tasks, such as crowd-sourcing, the unlabeled samples arrive sequentially in the form of continuous rapid streams. Thus,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Bottle Graphs: Visualizing Scalability Bottlenecks in Multi-Threaded Applications

    Understanding and analyzing multi-threaded program performance and scalability is far from trivial, which severely complicates parallel software development and optimization. In this paper, the authors present bottle graphs, a powerful analysis tool that visualizes multi-threaded program performance, in regards to both per-thread parallelism and execution time. Each thread is represented...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Fine-Grained Privacy Control for the RFID Middleware of EPCglobal Networks

    The Electronic Product Code (EPC) is a Radio Frequency IDentification (RFID) that offers a new way of automating identification. However, once RFID tags carry more than just an identifier, privacy may be violated. Treating the privacy in early stages helps to master the data view before interpreting and storing it...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Language Support for Dynamic, Hierarchical Data Partitioning

    Applications written for distributed-memory parallel architectures must partition their data to enable parallel execution. As memory hierarchies become deeper, it is increasingly necessary that the data partitioning also be hierarchical to match. Current language proposals perform this hierarchical partitioning statically, which excludes many important applications where the appropriate partitioning is...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    ProtOLAP: Rapid OLAP Prototyping with On-Demand Data Supply

    The approaches to data warehouse design are based on the assumption that source data are known in advance and available. While this assumption is true in common project situations, in some peculiar contexts it is not. This is the case of the French national project for analysis of energetic agricultural...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Speedtrap: Internet-Scale IPv6 Alias Resolution

    "Impediments to resolving IPv6 router aliases have precluded understanding the emerging router-level IPv6 Internet topology. In this paper

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Benchmarking Personal Cloud Storage

    Personal cloud storage services are data-intensive applications already producing a significant share of Internet traffic. Several solutions offered by different companies attract more and more people. However, little is known about each service capabilities, architecture and - most of all - performance implications of design choices. This paper presents a...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Scap: Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks

    Many network monitoring applications must analyze traffic beyond the network layer to allow for connection-oriented analysis, and achieve resilience to evasion attempts based on TCP segmentation. However, existing network traffic capture frameworks provide applications with just raw packets, and leave complex operations like flow tracking and TCP stream reassembly to...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Next Stop, the Cloud: Understanding Modern Web Service Deployment in EC2 and Azure

    An increasingly large fraction of internet services are hosted on a cloud computing system such as Amazon EC2 or windows Azure. But to date, no in-depth studies about cloud usage by internet services has been performed. The authors provide a detailed measurement study to shed light on how modern web...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Choreo: Network-Aware Task Placement for Cloud Applications

    Cloud computing infrastructures are increasingly being used by network-intensive applications that transfer significant amounts of data between the nodes on which they run. This paper shows that tenants can do a better job placing applications by understanding the underlying cloud network as well as the demands of the applications. To...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    A Comparison of Syslog and IS-IS for Network Failure Analysis

    Accurate reporting and analysis of network failures has historically required instrumentation (e.g., dedicated tracing of routing protocol state) that is rarely available in practice. In previous paper, the authors' group has proposed that a combination of common data sources could be substituted instead. In particular, by opportunistically stitching together data...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Internet Nameserver IPv4 and IPv6 Address Relationships

    The modern Domain Name System (DNS) provides not only resolution, but also enables intelligent client routing, e.g. for Content Distribution Networks (CDNs). The adoption of IPv6 presents CDNs the opportunity to utilize different paths when optimizing traffic, and the challenge of appropriately mapping IPv6 DNS queries. This paper seeks to...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    GamingAnywhere: An Open-Source Cloud Gaming Testbed

    While cloud gaming opens new business opportunity, it also poses tremendous challenges as the Internet only provides best-effort service and gamers are hard to please. Although researchers have various ideas to improve cloud gaming systems, existing cloud gaming systems are closed and proprietary, and cannot be used to evaluate these...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Rise of the Planet of the Apps: A Systematic Study of the Mobile App Ecosystem

    Mobile applications (apps) have been gaining rising popularity due to the advances in mobile technologies and the large increase in the number of mobile users. Consequently, several app distribution platforms, which provide a new way for developing, downloading, and updating software applications in modern mobile devices, have recently emerged. To...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Access Privacy and Correctness on Untrusted Storage

    The authors introduce a new practical mechanism for remote data storage with access pattern privacy and correctness. A storage client can deploy this mechanism to issue encrypted reads, writes, and inserts to a potentially curious and malicious storage service provider, without revealing information or access patterns. The provider is unable...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Network Sampling: From Static to Streaming Graphs

    Network sampling is integral to the analysis of social, information, and biological networks. Since many real-world networks are massive in size, continuously evolving, and/or distributed in nature, the network structure is often sampled in order to facilitate study. For these reasons, a more thorough and complete understanding of network sampling...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Meta-Stars: Multidimensional Modeling for Social Business Intelligence

    Social business intelligence is the discipline of combining corporate data with User-Generated Content (UGC) to let decision-makers improve their business based on the trends perceived from the environment. A key role in the analysis of textual UGC is played by topics, meant as specific concepts of interest within a subject...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    Energy-Aware Design of Secure Multi-Mode Real-Time Embedded Systems with FPGA Co-Processors

    The authors approach the emerging area of energy efficient, secure real-time embedded systems design. Many modern embedded systems have to fulfill strict security constraints and are often required to meet stringent deadlines in different operation modes, where the number and nature of active tasks vary (dynamic task sets). In this...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    SigMal: A Static Signal Processing Based Malware Triage

    In this paper, the authors propose SigMal, a fast and precise malware detection framework based on signal processing techniques. SigMal is designed to operate with systems that process large amounts of binary samples. It has been observed that many samples received by such systems are variants of previously seen malware,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2013

    MyCloud - Supporting User-Configured Privacy Protection in Cloud Computing

    Privacy concern is still one of the major issues that prevent users from moving to public clouds. The root cause of the privacy problem is that the cloud provider has more privileges than it is necessary, which leaves no options for the cloud users to protect their privacy. Due to...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    BibBase Triplified

    The authors present BibBase, a system for publishing and managing bibliographic data available in BibTeX files. BibBase uses a powerful yet light-weight approach to transform BibTeX les into rich triplified data as well as custom HTML and RSS code that can readily be integrated within a user's website while the...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2009

    Compositional Deadlock Detection for Rendezvous Communication

    Concurrent programming languages are growing in importance with the advent of multi-core systems. However, concurrent programs suffer from problems, such as data races and deadlock, absent from sequential programs. Unfortunately, traditional race and deadlock detection techniques fail on both large programs and small programs with complex behaviors. In this paper,...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Power Management for Main Memory With Access Latency Control

    Main memory, as an essential component of modern computer systems, has increased its power consumption significantly over the last 10 to 20 years. Energy consumed by memory can account for as much as 40% of an entire computer system. To address this challenge, major memory manufactures have developed memory chips...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Temperature-Constrained Power Control for Chip Multiprocessors With Online Model Estimation

    As Chip Multiprocessors (CMPs) become the main trend in processor development, various power and thermal management strategies have recently been proposed to optimize system performance while controlling the power or temperature of a CMP chip to stay below a constraint. The availability of per-core DVFS (Dynamic Voltage and Frequency Scaling)...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    MCRT: Multi-Channel Real-Time Communications in Wireless Sensor Networks

    As many radio chips used in today's sensor mote hardware can work at different frequencies, several multi-channel communication protocols have recently been proposed to improve network throughput and reduce packet loss for wireless sensor networks. However, existing work cannot utilize multiple channels to provide explicit guarantees for application-specified end-to-end communication...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2010

    Querying XML Data Sources That Export Very Large Sets of Views

    The authors study the problem of querying XML data sources that accept only a limited set of queries, such as sources accessible by Web services which can implement very large (Potentially infinite) families of XPath queries. To compactly specify such families of queries the authors adopt the Query Set Specifications,...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    A Declarative Approach for Secure and Robust Routing

    Many Internet failures are caused by misconfigurations of the BGP routers that manage routing of traffic between domains. The problems are usually due to a combination of human errors and the lack of a high-level language for specifying routing policies that can be used to generate router configurations. This paper...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    A New Cell Counter Based Attack Against Tor

    Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of users, many anonymity systems pack the application data into equal-sized cells (e.g., 512 bytes for Tor, a known real-world, circuit-based low-latency anonymous communication network)....

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Evolution of State-Dependent Risk Preferences

    Researchers have invested much e ort in constructing models of the state-dependent (Sometimes risk-averse and sometimes risk-prone) nature of human decision-making. An important open question is how state-dependent risk behavior can arise and remain prominent in populations. The authors believe that one part of the answer is the interplay between...

    Provided By Association for Computing Machinery

  • White Papers // Jan 2011

    SMARTINT: Using Mined Attribute Dependencies to Integrate Fragmented Web Databases

    Many web databases can be seen as providing partial and overlapping information about entities in the world. To answer queries effectively, the authors need to integrate the information about the individual entities that are fragmented over multiple sources. At first blush this is just the inverse of traditional database normalization...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    CADS: A Collaborative Adaptive Data Sharing Platform

    Content management tools like Microsoft's SharePoint allow users of an application domain to share documents and tag them in an ad-hoc way. Similarly, Google Base allows users to define attributes for their objects or choose from predefined templates. This ad-hoc or predefined annotation of the shared data incurs problems like...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Confidentiality Preserving Distributed Proofs of Conjunctive Queries

    Distributed proof construction protocols have been shown to be valuable for reasoning about authorization decisions in open distributed environments such as pervasive computing spaces. Unfortunately, existing distributed proof protocols offer only limited support for protecting the confidentiality of sensitive facts, which limits their utility in many practical scenarios. In this...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems

    Publish-subscribe (Pub-sub) systems are useful for many applications, including pervasive environments. In the latter context, however, great care must be taken to preserve the privacy of sensitive information, such as users' location and activities. Traditional access control schemes provide at best a partial solution, since they do not capture potential...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    On the Appropriateness of Evolutionary Rule Learning Algorithms for Malware Detection

    In this paper, the authors evaluate the performance of ten well-known evolutionary and non-evolutionary rule learning algorithms. The comparative study is performed on a real-world classification problem of detecting malicious executables. The executable dataset, used in this study, consists of 189 attributes which are statically extracted from the executables of...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Probabilistic QoS Modeling for Reliability/Timeliness Prediction in Distributed Content-Based Publish/Subscribe Systems Over Best-Effort Networks

    Content-Based Publish/Subscribe (CBPS) paradigm is a powerful data dissemination paradigm that offers both scalability and flexibility. However, its nature of high expressiveness makes it difficult to analyze or predict the behavior of the system such as event delivery probability and end-to-end delivery delay, especially when deployed over unreliable, best-effort public...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Understanding Overlay Characteristics of a Large-Scale Peer-to-Peer IPTV System

    This paper presents results from the authors' measurement and modeling efforts on the large-scale Peer-to-Peer (P2P) overlay graphs spanned by the PPLive system, the most popular and largest P2P IPTV (Internet Protocol Television) system today. Unlike other previous studies on PPLive, which focused on either network-centric or user-centric measurements of...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Symbolic Security Analysis of Ruby-on-Rails Web Applications

    Many of today's web applications are built on frameworks that include sophisticated defenses against malicious adversaries. However, mistakes in the way developers deploy those defenses could leave applications open to attack. To address this issue, the authors introduce Rubyx, a symbolic executor that the authors use to analyze Ruby-on-Rails web...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Secure File System Services for Web 2.0 Applications

    The authors present a design for a file system that provides a secure file storage service for Web 2.0 applications. Currently, each Web application stores its own user data. This not only burdens the applications with storing, managing, and securing user data but also deprives users from controlling their own...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2009

    Multi-Party Off-the-Record Messaging

    Most cryptographic algorithms provide a means for secret and authentic communication. However, under many circumstances, the ability to repudiate messages or deny a conversation is no less important than secrecy and authenticity. For whistleblowers, informants, political dissidents and journalists to name a few it is most important to have means...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2009

    Defending Against Sensor-Sniffing Attacks on Mobile Phones

    Modern mobile phones possess three types of capabilities: computing, communication, and sensing. While these capabilities enable a variety of novel applications, they also raise serious privacy concerns. The authors explore the vulnerability where attackers snoop on users by sniffing on their mobile phone sensors, such as the microphone, camera, and...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Directing JavaScript With Arrows

    JavaScript programmers make extensive use of event-driven programming to help build responsive web applications. However, standard approaches to sequencing events are messy, and often lead to code that is difficult to understand and maintain. The authors have found that arrows, a generalization of monads, are an elegant solution to this...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Path Projection for User-Centered Static Analysis Tools

    The research and industrial communities have made great strides in developing sophisticated defect detection tools based on static analysis. To date most of the work in this area has focused on developing novel static analysis algorithms, but has neglected study of other aspects of static analysis tools, particularly user interfaces....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Large-Scale Malware Indexing Using Function-Call Graphs

    A major challenge of the Anti-Virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem is to quickly determine if a new malware sample is similar to any previously-seen malware program. This paper designs, implements and...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Finding Bugs in Exceptional Situations of JNI Programs

    Software flaws in native methods may defeat Java's guarantees of safety and security. One common kind of flaws in native methods results from the discrepancy on how exceptions are handled in Java and in native methods. Unlike exceptions in Java, exceptions raised in the native code through the Java Native...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Robusta: Taming the Native Beast of the JVM

    Java applications often need to incorporate native-code components for efficiency and for reusing legacy code. However, it is well known that the use of native code defeats Java's security model. The authors describe the design and implementation of Robusta, a complete framework that provides safety and security to native code...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2009

    Automating Analysis of Large-Scale Botnet Probing Events

    Botnets dominate today's attack landscape. This work investigates ways to analyze collections of malicious probing traffic in order to understand the significance of large-scale "Botnet probes". In such events, an entire collection of remote hosts together probes the address space monitored by a sensor in some sort of coordinated fashion....

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    Test Generation to Expose Changes in Evolving Programs

    Software constantly undergoes changes throughout its life cycle, and thereby it evolves. As changes are introduced into a code base, the authors need to make sure that the effect of the changes is thoroughly tested. For this purpose, it is important to generate test cases that can stress the effect...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Context-Sensitive Timing Analysis of Esterel Programs

    Traditionally, synchronous languages, such as Esterel, have been compiled into hardware, where timing analysis is relatively easy. When compiled into software - e.g., into sequential C code - very conservative estimation techniques have been used, where the focus has only been on obtaining safe timing estimates and not on the...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Power Routing: Dynamic Power Provisioning in the Data Center

    Data center power infrastructure incurs massive capital costs, which typically exceed energy costs over the life of the facility. To squeeze maximum value from the infrastructure, researchers have proposed over-subscribing power circuits, relying on the observation that peak loads are rare. To ensure availability, these proposals employ power capping, which...

    Provided By Association for Computing Machinery

  • White Papers // Nov 2009

    Application Containers Without Virtual Machines

    This paper introduces lightweight Cryptographic Jails (CryptoJails) that protect the privacy of application data by intercepting write accesses and redirecting them to encrypted application containers. CryptoJails ensure that application data (for example, cached emails or web pages) cannot be read or undetectably altered by other applications. Unlike existing approaches, CryptoJails...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    CCMP: A Novel Standard Protocol for Conference Management in the XCON Framework

    This paper presents the design and implementation of CCMP, a conference management protocol currently under standardization within the IETF, conceived at the outset as a lightweight protocol allowing conferencing clients to access and manipulate objects describing a centralized conference. The CCMP is a state-less, XML-based, client-server protocol carrying in its...

    Provided By Association for Computing Machinery

  • White Papers // Aug 2010

    The Impact of TLS on SIP Server Performance

    Securing VoIP is a crucial requirement for its successful adoption. A key component of this is securing the signaling path, which is performed by SIP. Securing SIP is accomplished by using TLS instead of UDP as the transport protocol. However, using TLS for SIP is not yet widespread, perhaps due...

    Provided By Association for Computing Machinery

  • White Papers // Sep 2010

    MIMO Rate Adaptation in 802.11n Wireless Networks

    This paper studies MIMO based Rate Adaptation (RA) in 802.11n wireless networks. The case study shows that existing RA algorithms offer much lower throughput than even a fixed-rate scheme. The fundamental problem is that, all such algorithms are MIMO oblivious; they do not consider the characteristics of diversity-oriented, single-stream mode...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2009

    Point&Connect: Intention-Based Device Pairing for Mobile Phone Users

    Point&Connect (P&C) offers an intuitive and resilient device pairing solution on standard mobile phones. Its operation follows the simple sequence of point-and-connect: when a user plans to pair her mobile phone with another device nearby, she makes a simple hand gesture that points her phone towards the intended target. The...

    Provided By Association for Computing Machinery

  • White Papers // Oct 2010

    Managing Tenants in a Multi-Tenant SaaS

    A multi-tenant Software as a Service (SaaS) system has to meet the needs of several tenant organizations, which connect to the system to utilize its services. To leverage economies of scale through reuse, a SaaS vendor would, in general, like to drive commonality amongst the requirements across tenants. However, many...

    Provided By Association for Computing Machinery

  • White Papers // Jul 2009

    Generating Test Programs to Cover Pipeline Interactions

    Functional validation of a processor design through execution of a suite of test programs is common industrial practice. In this paper, the authors develop a high-level architectural specification driven methodology for systematic test-suite generation. The primary contribution is an automated test-suite generation methodology that covers all possible processor pipeline interactions....

    Provided By Association for Computing Machinery

  • White Papers // Nov 2010

    Golden Implementation Driven Software Debugging

    The presence of a functionally correct golden implementation has a significant advantage in the software development life cycle. Such a golden implementation is exploited for software development in several domains, including embedded software - a low resource consuming version of the golden implementation. The golden implementation gives the functionality that...

    Provided By Association for Computing Machinery

  • White Papers // Feb 2011

    Mining Message Sequence Graphs

    Dynamic specification mining involves discovering software behavior from traces for the purpose of program comprehension and bug detection. However, mining program behavior from execution traces is difficult for concurrent/distributed programs. Specifically, the inherent partial order relationships among events occurring across processes pose a big challenge to specification mining. In this...

    Provided By Association for Computing Machinery

  • White Papers // Mar 2010

    Engineering Multi-Tenant Software-as-a-Service Systems

    Increasingly, Software-as-a-Service (SaaS) is becoming a dominant mechanism for the consumption of software by end users. From a vendor's perspective, the benefits of SaaS arise from leveraging economies of scale, by serving a large number of customers ("Tenants") through a shared instance of a centrally hosted software service. Consequently, a...

    Provided By Association for Computing Machinery

  • White Papers // Jun 2010

    Modeling Shared Cache and Bus in Multi-Cores for Timing Analysis

    Timing analysis of concurrent programs running on multi-core platforms is currently an important problem. The key to solving this problem is to accurately model the timing effects of shared resources in multi-cores, namely shared cache and bus. In this paper, the authors provide an integrated timing analysis framework that captures...

    Provided By Association for Computing Machinery