Binghamton University

Displaying 1-21 of 21 results

  • White Papers // May 2013

    Cloud Security Auditing based on Behavioral Modeling

    Multi-tenancy is one of the most attractive features of cloud computing, which provides significant benefits to both clients and service providers by supporting elastic, efficient, and on-demand resource provisioning and allocation. However, this architecture also introduces additional security implications. Client Virtual Machine (VM) instances running on the same physical machine...

    Provided By Binghamton University

  • White Papers // Jan 2013

    An Optimized Design of Reconfigurable PSD Accelerator for Online Shrew DDoS Attacks Detection

    Shrew Distributed Denial-of-Service (DDoS) attacks are stealthy, concealing their malicious activities in normal traffic. Although it is difficult to detect shrew DDoS attacks in the time domain, the existent energy exposes them in frequency domain. For this purpose, online Power Spectral Density (PSD) analysis necessitates real-time PSD data conversion. In...

    Provided By Binghamton University

  • White Papers // Nov 2012

    Green Firewall: An Energy-Efficient Intrusion Prevention Mechanism in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are vulnerable to security attacks due to the broadcast nature of transmission and limited computation capability. After Intrusion Detection Systems (IDSs) identifies an mobile intruder, IDS may broadcast the blacklist to all nodes in network. This method is energy inefficient because all nodes have to receive...

    Provided By Binghamton University

  • White Papers // Oct 2012

    Adaptive Load Shedding Via Fuzzy Control in Data Stream Management Systems

    Data Stream Management Systems (DSMS) aim to process massive data streams in a timely fashion to support important applications, e.g., financial market analysis. However, DSMS can be overloaded due to large bursts in data stream arrivals and data-dependent query executions. To avoid overloads, the authors design a new load shedding...

    Provided By Binghamton University

  • White Papers // Jul 2012

    A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts

    Cloud computing hosts require a good source of cryptographically strong random numbers. Most of the standard security practices are based on assumptions that hold true for physical machines, but don't translate immediately into the domain of virtualized machines. It is imperative to reconsider the well accepted security practices that were...

    Provided By Binghamton University

  • White Papers // Jul 2011

    Mitigating Cloud Computing Security Risks Using a Self-Monitoring Defensive Scheme

    Cloud Computing (CC) promises to offer seamless provisioning of on-demand services and data through the network. These services are made discoverable to the user in the form of simple abstractions via virtualized resources. These services offer unprecedented dynamic, primarily hardware dependent, scalability. Although CC promises to make life much easier...

    Provided By Binghamton University

  • White Papers // Mar 2011

    A Fair Multi-Party Non-Repudiation Scheme for Storage Clouds

    Data storage is one of the most profitable applications in Clouds. Although a transparent service model is convenient, it may be subject to the loss of data integrity. The authors' study revealed vulnerabilities in some commercial Cloud storage services. They analyzed the repudiation problem in a Cloud environment. In this...

    Provided By Binghamton University

  • White Papers // Jan 2011

    Scalability Aspects of Instruction Distribution Algorithms for Clustered Processors

    In the evolving sub-micron technology, importance of wire delays is growing, making it particularly attractive to use decentralized designs. A common form of decentralization adopted in processors is to partition the execution core into multiple clusters. Each cluster has a small instruction window, and a set of functional units. A...

    Provided By Binghamton University

  • White Papers // Jan 2011

    Crosstalk Reduction in Area Routing

    Interconnect delay dominates system delay in modern circuits, and with reduced feature sizes, coupling capacitance and signal crosstalk have become significant issues. By spacing interconnect wires effectively, and avoiding long parallel runs, coupling can be reduced; with current routing methods, however, this is difficult to achieve. This paper presents a...

    Provided By Binghamton University

  • White Papers // Mar 2010

    EEO: An Efficient MDS-Like RAID-6 Code for Parallel Implementation

    In recent years, researchers have found that some XOR erasure codes lead to higher performance and better throughput in fault-tolerant distributed data storage applications. However, little consideration has been given to the advantages of parallel processing or hardware implementations taking advantage of the emergence of multi-core processors. This paper presents...

    Provided By Binghamton University

  • White Papers // Feb 2010

    Thermal-Aware Job Allocation and Scheduling for Three Dimensional Chip Multiprocessor

    In this paper, the authors propose a thermal-aware job allocation and scheduling algorithm for Three-Dimensional (3D) Chip Multi-Processor (CMP). The proposed algorithm assigns hot jobs to the cores close to the heat sink and cool jobs to the cores far from the heat sink, subject to thermal constraints. The direct...

    Provided By Binghamton University

  • White Papers // Nov 2009

    Parallel and Distributed Approach for Processing Large-Scale XML Datasets

    An emerging trend is the use of XML as the data format for many distributed scientific applications, with the size of these documents ranging from tens of megabytes to hundreds of megabytes. The earlier benchmarking results revealed that most of the widely available XML processing toolkits do not scale well...

    Provided By Binghamton University

  • White Papers // Aug 2009

    Two-Stage Decomposition of SNORT Rules Towards Efficient Hardware Implementation

    The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution is to close the performance gap through hardware implementation of security functions. However, continuously expanding signature databases have become a major impediment to achieving scalable hardware...

    Provided By Binghamton University

  • White Papers // May 2009

    Post-Copy Live Migration of Virtual Machines

    This paper presents the design, implementation, and evaluation of post-copy based live migration for Virtual Machines (VMs) across a Gigabit LAN. Post-copy migration defers the transfer of a VM's memory contents until after its processor state has been sent to the target host. This deferral is in contrast to the...

    Provided By Binghamton University

  • White Papers // May 2009

    BLINK: Pixel-Domain Encryption for Secure Document Management

    BLINK, or brief-lifetime ink, is a technology for secure document delivery and management that employs pixel-domain scrambling of raster images by a hardware device connecting a computer to its display. A BLINK decoder monitors digital video signals, identifies the presence of scrambled images, and selectively decrypts regions of the video...

    Provided By Binghamton University

  • White Papers // Apr 2009

    Parallel Processing of Large-Scale XML-Based Application Documents on Multi-Core Architectures With PiXiMaL

    Very large scientific datasets are becoming increasingly available in XML formats. The earlier benchmarking results show that parsing XML is a time consuming process when compared with binary formats optimized for large scale documents. This performance bottleneck will get exacerbated as size of XML data increases in e-science applications. The...

    Provided By Binghamton University

  • White Papers // Mar 2009

    RFID Based Localization for a Miniaturized Robotic Platform for Wireless Protocols Evaluation

    The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the development of robust wireless networking protocols is an ability to conduct effective and efficient evaluation of the protocol in order to ensure its successful working in real-world...

    Provided By Binghamton University

  • White Papers // Mar 2009

    On the Accuracy of RFID-Based Localization in a Mobile Wireless Network Testbed

    The extensive recent research in protocols development for wireless networks must be complemented with simple yet efficient prototyping and evaluation mechanism. MiNT-2 is a miniaturized multi-hop wireless network testbed that addresses this challenge by combining the benefits of existing protocol evaluations strategies: simulations and custom built large scale wireless network...

    Provided By Binghamton University

  • White Papers // Dec 2008

    Testbed Design and Localization in MiNT-2: A Miniaturized Robotic Platform for Wireless Protocol Development and Emulation

    A significant challenge in the development of robust wireless networking protocols is often the need to prototype and test these protocols in a small-scale setting before they can be widely deployed. Two contrasting prototyping and testing methods are currently used, requiring a choice between convenience and accuracy. The first involves...

    Provided By Binghamton University

  • White Papers // Oct 2008

    BLINK: Securing Information to the Last Connection

    Robust cryptography provides confidentiality and integrity for information transferred between peers. However, the decrypted plaintext in the memory of a receivers' computer is vulnerable - both to surveillance at the endpoints, and users who choose to forward confidential information. In this paper, the authors proposed a novel scheme called BLINK,...

    Provided By Binghamton University

  • White Papers // May 2008

    Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

    Most existing wireless ad hoc routing protocols rely upon the use of backward learning technique with explicit control messages to route packets. This paper proposes a set of techniques that can be applied in a backward learning routing algorithm in order to minimize or even eliminate explicit control messages for...

    Provided By Binghamton University

  • White Papers // Mar 2010

    EEO: An Efficient MDS-Like RAID-6 Code for Parallel Implementation

    In recent years, researchers have found that some XOR erasure codes lead to higher performance and better throughput in fault-tolerant distributed data storage applications. However, little consideration has been given to the advantages of parallel processing or hardware implementations taking advantage of the emergence of multi-core processors. This paper presents...

    Provided By Binghamton University

  • White Papers // Apr 2009

    Parallel Processing of Large-Scale XML-Based Application Documents on Multi-Core Architectures With PiXiMaL

    Very large scientific datasets are becoming increasingly available in XML formats. The earlier benchmarking results show that parsing XML is a time consuming process when compared with binary formats optimized for large scale documents. This performance bottleneck will get exacerbated as size of XML data increases in e-science applications. The...

    Provided By Binghamton University

  • White Papers // Jan 2011

    Scalability Aspects of Instruction Distribution Algorithms for Clustered Processors

    In the evolving sub-micron technology, importance of wire delays is growing, making it particularly attractive to use decentralized designs. A common form of decentralization adopted in processors is to partition the execution core into multiple clusters. Each cluster has a small instruction window, and a set of functional units. A...

    Provided By Binghamton University

  • White Papers // Jan 2011

    Crosstalk Reduction in Area Routing

    Interconnect delay dominates system delay in modern circuits, and with reduced feature sizes, coupling capacitance and signal crosstalk have become significant issues. By spacing interconnect wires effectively, and avoiding long parallel runs, coupling can be reduced; with current routing methods, however, this is difficult to achieve. This paper presents a...

    Provided By Binghamton University

  • White Papers // Nov 2009

    Parallel and Distributed Approach for Processing Large-Scale XML Datasets

    An emerging trend is the use of XML as the data format for many distributed scientific applications, with the size of these documents ranging from tens of megabytes to hundreds of megabytes. The earlier benchmarking results revealed that most of the widely available XML processing toolkits do not scale well...

    Provided By Binghamton University

  • White Papers // May 2009

    Post-Copy Live Migration of Virtual Machines

    This paper presents the design, implementation, and evaluation of post-copy based live migration for Virtual Machines (VMs) across a Gigabit LAN. Post-copy migration defers the transfer of a VM's memory contents until after its processor state has been sent to the target host. This deferral is in contrast to the...

    Provided By Binghamton University

  • White Papers // Dec 2008

    Testbed Design and Localization in MiNT-2: A Miniaturized Robotic Platform for Wireless Protocol Development and Emulation

    A significant challenge in the development of robust wireless networking protocols is often the need to prototype and test these protocols in a small-scale setting before they can be widely deployed. Two contrasting prototyping and testing methods are currently used, requiring a choice between convenience and accuracy. The first involves...

    Provided By Binghamton University

  • White Papers // May 2008

    Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

    Most existing wireless ad hoc routing protocols rely upon the use of backward learning technique with explicit control messages to route packets. This paper proposes a set of techniques that can be applied in a backward learning routing algorithm in order to minimize or even eliminate explicit control messages for...

    Provided By Binghamton University

  • White Papers // Mar 2011

    A Fair Multi-Party Non-Repudiation Scheme for Storage Clouds

    Data storage is one of the most profitable applications in Clouds. Although a transparent service model is convenient, it may be subject to the loss of data integrity. The authors' study revealed vulnerabilities in some commercial Cloud storage services. They analyzed the repudiation problem in a Cloud environment. In this...

    Provided By Binghamton University

  • White Papers // Jul 2011

    Mitigating Cloud Computing Security Risks Using a Self-Monitoring Defensive Scheme

    Cloud Computing (CC) promises to offer seamless provisioning of on-demand services and data through the network. These services are made discoverable to the user in the form of simple abstractions via virtualized resources. These services offer unprecedented dynamic, primarily hardware dependent, scalability. Although CC promises to make life much easier...

    Provided By Binghamton University

  • White Papers // Oct 2012

    Adaptive Load Shedding Via Fuzzy Control in Data Stream Management Systems

    Data Stream Management Systems (DSMS) aim to process massive data streams in a timely fashion to support important applications, e.g., financial market analysis. However, DSMS can be overloaded due to large bursts in data stream arrivals and data-dependent query executions. To avoid overloads, the authors design a new load shedding...

    Provided By Binghamton University

  • White Papers // Oct 2008

    BLINK: Securing Information to the Last Connection

    Robust cryptography provides confidentiality and integrity for information transferred between peers. However, the decrypted plaintext in the memory of a receivers' computer is vulnerable - both to surveillance at the endpoints, and users who choose to forward confidential information. In this paper, the authors proposed a novel scheme called BLINK,...

    Provided By Binghamton University

  • White Papers // May 2009

    BLINK: Pixel-Domain Encryption for Secure Document Management

    BLINK, or brief-lifetime ink, is a technology for secure document delivery and management that employs pixel-domain scrambling of raster images by a hardware device connecting a computer to its display. A BLINK decoder monitors digital video signals, identifies the presence of scrambled images, and selectively decrypts regions of the video...

    Provided By Binghamton University

  • White Papers // May 2013

    Cloud Security Auditing based on Behavioral Modeling

    Multi-tenancy is one of the most attractive features of cloud computing, which provides significant benefits to both clients and service providers by supporting elastic, efficient, and on-demand resource provisioning and allocation. However, this architecture also introduces additional security implications. Client Virtual Machine (VM) instances running on the same physical machine...

    Provided By Binghamton University

  • White Papers // Jan 2013

    An Optimized Design of Reconfigurable PSD Accelerator for Online Shrew DDoS Attacks Detection

    Shrew Distributed Denial-of-Service (DDoS) attacks are stealthy, concealing their malicious activities in normal traffic. Although it is difficult to detect shrew DDoS attacks in the time domain, the existent energy exposes them in frequency domain. For this purpose, online Power Spectral Density (PSD) analysis necessitates real-time PSD data conversion. In...

    Provided By Binghamton University

  • White Papers // Jul 2012

    A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts

    Cloud computing hosts require a good source of cryptographically strong random numbers. Most of the standard security practices are based on assumptions that hold true for physical machines, but don't translate immediately into the domain of virtualized machines. It is imperative to reconsider the well accepted security practices that were...

    Provided By Binghamton University

  • White Papers // Feb 2010

    Thermal-Aware Job Allocation and Scheduling for Three Dimensional Chip Multiprocessor

    In this paper, the authors propose a thermal-aware job allocation and scheduling algorithm for Three-Dimensional (3D) Chip Multi-Processor (CMP). The proposed algorithm assigns hot jobs to the cores close to the heat sink and cool jobs to the cores far from the heat sink, subject to thermal constraints. The direct...

    Provided By Binghamton University

  • White Papers // Mar 2009

    RFID Based Localization for a Miniaturized Robotic Platform for Wireless Protocols Evaluation

    The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the development of robust wireless networking protocols is an ability to conduct effective and efficient evaluation of the protocol in order to ensure its successful working in real-world...

    Provided By Binghamton University

  • White Papers // Mar 2009

    On the Accuracy of RFID-Based Localization in a Mobile Wireless Network Testbed

    The extensive recent research in protocols development for wireless networks must be complemented with simple yet efficient prototyping and evaluation mechanism. MiNT-2 is a miniaturized multi-hop wireless network testbed that addresses this challenge by combining the benefits of existing protocol evaluations strategies: simulations and custom built large scale wireless network...

    Provided By Binghamton University

  • White Papers // Aug 2009

    Two-Stage Decomposition of SNORT Rules Towards Efficient Hardware Implementation

    The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution is to close the performance gap through hardware implementation of security functions. However, continuously expanding signature databases have become a major impediment to achieving scalable hardware...

    Provided By Binghamton University

  • White Papers // Nov 2012

    Green Firewall: An Energy-Efficient Intrusion Prevention Mechanism in Wireless Sensor Network

    Wireless Sensor Networks (WSNs) are vulnerable to security attacks due to the broadcast nature of transmission and limited computation capability. After Intrusion Detection Systems (IDSs) identifies an mobile intruder, IDS may broadcast the blacklist to all nodes in network. This method is energy inefficient because all nodes have to receive...

    Provided By Binghamton University