Carnegie Mellon University

Displaying 1-40 of 525 results

  • White Papers // May 2014

    Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost Via Heterogeneous-Reliability Memory

    Memory devices represent a key component of datacenter Total Cost of Ownership (TCO), and techniques used to reduce errors that occur on these devices increase this cost. Existing approaches to providing reliability for memory devices pessimistically treat all data as equally vulnerable to memory errors. The authors' key insight is...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2014

    The Heterogeneous Block Architecture

    This paper makes two new observations that lead to a new heterogeneous core design. First, the authors observe that most serial code exhibits fine-grained heterogeneity: at the scale of tens or hundreds of instructions, regions of code fit different micro-architectures better (at the same point or at different points in...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2014

    Predictable Coherent Caching with Incoherent Caches

    Caches are a well known hardware construct for improving energy consumption and average performance by keeping frequently-used data near processing resources. Yet, at the same time, they form a major hurdle for worst-case execution time analyses, in particular if they are shared between multiple cores. Exploiting that most shared data...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2014

    SpringFS: Bridging Agility and Performance in Elastic Distributed Storage

    The elastic storage systems can be expanded or contracted to meet current demand, allowing servers to be turned off or used for other tasks. However, the usefulness of an elastic distributed storage system is limited by its agility: how quickly it can increase or decrease its number of servers. Due...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Toward Strong, Usable Access Control for Shared Distributed Data

    As non-expert users produce increasing amounts of personal digital data, usable access control becomes critical. Current approaches often fail, because they insufficiently protect data or confuse users about policy specification. This paper presents penumbra, a distributed file system with access control designed to match users' mental models while providing principled...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Improving Cache Performance by Exploiting Read-Write Disparity

    Cache read misses stall the processor if there are no independent instructions to execute. In contrast, most cache write misses are off the critical path of execution, since writes can be buffered in the cache or the store buffer. With few exceptions, cache lines that serve loads are more critical...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Agentless Cloud-wide Streaming of Guest File System Updates

    The authors propose a non-intrusive approach for monitoring Virtual Machines (VMs) in the cloud. At the core of this approach is a mechanism for selective real-time monitoring of guest file updates within VM instances. This mechanism is agentless, requiring no guest VM support. It has low virtual I/O overhead, low...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Improving DRAM Performance by Parallelizing Refreshes with Accesses

    Modern main memory is predominantly built using Dynamic Random Access Memory (DRAM) cells. A DRAM cell consists of a capacitor to store one bit of data as electrical charge. The capacitor leaks charge over time, causing stored data to change. As a result, DRAM requires an operation called refresh that...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Bounding Memory Interference Delay in COTS-based Multi-Core Systems

    In Commercial-Off-The-Shelf (COTS) multi-core systems, a task running on one core can be delayed by other tasks running simultaneously on other cores due to interference in the shared DRAM main memory. Such memory interference delay can be large and highly variable, thereby posing a significant challenge for the design of...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    ARP Attacks in Wireless Ad Hoc Networks

    Previous research to secure ad hoc network protocols concentrates on key distribution and on securing the routing protocol. Unfortunately, securing the routing layer is not sufficient to secure the ad hoc network, as lower layer and upper layer communication protocols remain vulnerable to attack. In this paper, the authors illustrate...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Matching Database Access Patterns to Storage Characteristics

    Database storage managers employ sophisticated algorithms attempting to exploit the performance available inside today's storage systems. However, because the communication between the Storage Manager (SM) and a storage device is limited by a high-level protocol, both the SM and the device make decisions largely in isolation and do not realize...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2013

    Exploiting Compressed Block Size as an Indicator of Future Reuse

    The authors introduce a set of new Compression-Aware Management Policies (CAMP) for on-chip caches that employ data compression. Their management policies are based on two key ideas. First, they show that it is possible to build a more efficient management policy for compressed caches if the compressed block size is...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2013

    Tetrisched: Space-Time Scheduling for Heterogeneous Datacenters

    Tetrisched is a new scheduler that explicitly considers both job-specific preferences and estimated job runtimes in its allocation of resources. Combined, this information allows tetrisched to provide higher overall value to complex application mixes consolidated on heterogeneous collections of machines. Job-specific preferences, provided by tenants in the form of composable...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

    In this webcast, the presenter going to discuss about managing the insider threat and how to ensure the protection of and appropriate access to intellectual property and other critical assets, systems, and data.

    Provided By Carnegie Mellon University

  • White Papers // Nov 2013

    More Effective Distributed ML via a Stale Synchronous Parallel Parameter Server

    The authors propose a parameter server system for distributed ML, which follows a Stale Synchronous Parallel (SSP) model of computation that maximizes the time computational workers spend doing useful work on ML algorithms, while still providing correctness guarantees. The parameter server provides an easy-to-use shared interface for read/write access to...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Illicit Cyber Activity Involving Fraud

    In this webcast, the presenter going to explain about illicit cyber activity involving fraud from the virtual event managing the insider threat. the presenters aim is to assist organizations in improving their security posture and incident response capability by researching technical threat areas, developing and conducting information security assessments, and...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

    Access to data remains a significant impediment to advancing the science of insider threat research. In this webcast, the presenter going to explain about engineering realistic synthetic about the insider threat test data from the virtual event who manages the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Emerging Trends

    An emerging trend to pay attention to is the malicious outsider taking advantage of an inadvertent insider. In this webcast, the presenter going to explain about emerging trends in insider threat research from the virtual event managing the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Best Practices and Controls for Mitigating Insider Threats

    Threats can stem from simple activities like uploading, emailing, and posting sensitive data, etc. In this webcast, the presenter will explain about best practices and controls for mitigating insider threats from the virtual event of how to manage the insider threat.

    Provided By Carnegie Mellon University

  • Podcasts // Nov 2013

    Overview of the Threat Posed by Insiders to Critical Assets

    Insiders pose a substantial threat by virtue of their knowledge of and access to the users systems and/or their databases. In this webcast, the presenter will give an overview of the threat posed by insiders to critical assets.

    Provided By Carnegie Mellon University

  • White Papers // Oct 2013

    GOTCHA Password Hackers!

    The authors introduce GOTCHAs (Generating panOptic Turing tests to tell Computers and Humans Apart) as a way of preventing automated offline dictionary attacks against user selected passwords. A GOTCHA is a randomized puzzle generation protocol, which involves interaction between a computer and a human. Informally, a GOTCHA should satisfy two...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2013

    Challenges in Security and Privacy for Mobile Edge-Clouds

    Mobile devices such as Smartphone and tablets are ubiquitous today, and many of them possess significant computation power, powerful sensors such as high-resolution cameras and GPS sensors, and a wealth of sensor data such as photos, videos, and location information. Collections of mobile devices in close geographical proximity present both...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    LightTx: A Lightweight Transactional Design in Flash-based SSDs to Support Flexible Transactions

    Flash memory has accelerated the architectural evolution of storage systems with its unique characteristics compared to magnetic disks. The no-overwrite property of flash memory has been leveraged to efficiently support transactions, a commonly used mechanism in systems to provide consistency. However, existing transaction designs embedded in flash-based Solid State Drives...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    Program Interference in MLC NAND Flash Memory: Characterization, Modeling, and Mitigation

    As NAND flash memory continues to scale down to smaller process technology nodes, its reliability and endurance are degrading. One important source of reduced reliability is the phenomenon of program interference: when a flash cell is programmed to a value, the programming operation affects the threshold voltage of not only...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    HAT: Heterogeneous Adaptive Throttling for On-Chip Networks

    The Network-on-Chip (NoC) is a primary shared resource in a Chip Multi-Processor (CMP) system. As core counts continue to increase and applications become increasingly data-intensive, the network load will also increase, leading to more congestion in the network. This network congestion can degrade system performance if the network load is...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    Secure Two-Party Computation with Reusable Bit-Commitments, via A Cut-and-Choose with Forge-and-Lose Technique

    A Secure Two-Party Computation (S2PC) protocol allows two parties to compute over their combined private inputs, as if inter-mediated by a trusted third party. In the active model, security is maintained even if one party is malicious, deviating from the protocol specification. For example, an honest party retains privacy of...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2013

    Design of a Write-Optimized Data Store

    The WriteBuffer (WB) tree is a new write-optimized data structure that can be used to implement per-node storage in unordered key-value stores. The WB tree provides faster writes than the Log-Structured Merge (LSM) tree that is used in many current high-performance key-value stores. It achieves this by replacing compactions in...

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Responding to a Large Scale Cybersecurity Incident

    In this Webcast, the presenter explain about how to respond to a large scale cyber security incidents, with an introduction about the role of technology. Technology which is an important one, but the limitations of that need to be understood.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    20+ Years of Cyber (in)Security

    The use of information and communications technology is pervasive. The information systems are increasingly interconnected and interdependent. Attack technology is outpacing defensive technology. In this webcast, the presenter will give an introduction to the cyber security.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Observations of Successful Cyber Security Operations

    In this Webcast, the presenter going explain about the cyber security The presenter will also discuss the observations of successful cyber security operations from the virtual event showing the users a big picture about the organization how they successfully react to new specific accessories build on the cyber security.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Achieving Mission Assurance Through Resilience Management

    In this webcast, the presenter going to explain about the resilience management. Resilience management is to protect a sustain organizations mission and business operations. The presenter will also explain about how the organizations are constant operational stress on these days.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Developing Your Cyber Workforce

    In this webcast, the presenter going to explain about the how to develop the cyber workforce against the security attacks. The presenter going to discuss about the new solutions and research that he had done to improve the security.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    The Cyber Security R&D Pipeline - Building Capability Through Science

    In this webcast, the presenter going to explain about the cyber security R&D pipeline how to build the capability through science. The presenter explains about the SEI advances software engineering and related disciplines to ensure systems with predictable and improved quality, cost and schedule.

    Provided By Carnegie Mellon University

  • White Papers // Aug 2013

    A Proof of Correctness for Egalitarian Paxos

    In this paper the authors present a proof of correctness for Egalitarian Paxos (EPaxos), a new distributed consensus algorithm based on Paxos. EPaxos achieves three goals: availability without interruption as long as a simple majority of replicas are reachable - its availability is not interrupted when replicas crash or fail...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2013

    Breaking the DDoS Attack Chain

    Department of Defense (DoD) communications and data networks continue to be targets for adversaries to deny operational use of those networks. Distributed Denial of Service (DDoS) is one such attack strategy that has proven to be an effective method of denying service to military, political, infrastructure, and economic targets. The...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2013

    A Case for Efficient Hardware/Software Cooperative Management of Storage and Memory

    Most applications manipulate persistent data, yet traditional systems decouple data manipulation from persistence in a two-level storage model. Programming languages and system software manipulate data in one set of formats in volatile main memory (DRAM) using a load/store interface, while storage systems maintain persistence in another set of formats in...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2013

    Memory Scaling: A Systems Architecture Perspective

    The memory system is a fundamental performance and energy bottleneck in almost all computing systems. Recent system design, application, and technology trends that require more capacity, bandwidth, efficiency, and predictability out of the memory system make it an even more important system bottleneck. At the same time, DRAM technology is...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2013

    Space-Efficient, High-Performance Rank & Select Structures on Uncompressed Bit Sequences

    Rank & select data structures are one of the fundamental building blocks for many modern succinct data structures. With the continued growth of massive-scale information services, the space efficiency of succinct data structures is becoming increasingly attractive in practice. In this paper, the authors re-examine the design of rank &...

    Provided By Carnegie Mellon University

  • White Papers // May 2013

    Wireless Mesh Network Simulator for Studying Cross-Layer Jamming Effects

    Various wireless mesh network standards have been actively constituted for the last several years. Because of its flexible network architecture, wireless mesh network can provide alternative paths even when some of wireless links are broken by node failures or intended attacks. Among various types of mesh network, the authors focus...

    Provided By Carnegie Mellon University

  • White Papers // May 2013

    MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks

    Wireless mesh networks represent an emerging network architecture which has been actively studied and standardized for the last several years. Because of their flexible network architecture, wireless mesh networks can provide alternative paths even when wireless links are broken by node failures or routing attacks. Among a variety of mesh...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    Adaptive Quality of Service in Ad Hoc Wireless Networks

    In high criticality crisis scenarios, such as disaster management, ad hoc wireless networks are quickly assembled in the field to support decision makers through situational awareness using messaging-, voice-, and video-based applications. These applications cannot afford the luxury of stalling or failing due to overwhelming bandwidth demand on these networks...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    A Multilingual Screen Reader In Indian Languages

    Screen reader is a form of assistive technology to help visually impaired people to use or access the computer and Internet. So far, it has remained expensive and within the domain of English (and some foreign) language computing. For Indian languages this development is limited by: availability of Text-To-Speech (TTS)...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    Identifying Tipping Points in a Decision-Theoretic Model of Network Security

    Although system administrators are frequently urged to protect the machines in their network, the fact remains that the decision to protect is far from universal. To better understand this decision, the authors formulate a decision-theoretic model of a system administrator responsible for a network of size n against an attacker...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2011

    Achieving Both Valid and Secure Logistic Regression Analysis on Aggregated Data from Different Private Sources

    Preserving the privacy of individual databases when carrying out statistical calculations has a long history in statistics and had been the focus of much recent attention in machine learning In this paper, the authors present a protocol for computing logistic regression when the data are held by separate parties without...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    A Spatial-Epistemic Logic for Reasoning About Security Protocols

    Reasoning about security properties involves reasoning about where the information of a system is located, and how it evolves over time. While most security analysis techniques need to cope with some notions of information locality and knowledge propagation, usually they do not provide a general language for expressing arbitrary properties...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    A Learning Theory Approach to Non-Interactive Database Privacy

    In this paper, the authors demonstrate that, ignoring computational constraints, it is possible to privately release synthetic databases that are useful for large classes of queries - much larger in size than the database itself. Specifically, they give a mechanism that privately releases synthetic data for a class of queries...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2012

    TVR - Tall Vehicle Relaying in Vehicular Networks

    Vehicle-to-Vehicle (V2V) communication is a core technology for enabling safety and non-safety applications in next generation Intelligent Transportation Systems. Recently, several studies have shown that line of sight conditions have a direct influence on V2V link quality. Line of sight is influenced by both topographic features and vehicles located between...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    What if Routers Were Social? Analyzing Wireless Mesh Networks From a Social Networks Perspective

    Wireless Mesh Networks (WMNs) consist of radio nodes organized in a mesh topology for serving wireless mesh clients to communicate with one another or to connect to the Internet. Nodes in a mesh network can communicate with each other either directly or through one or more intermediate nodes, similar to...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    R-BATCH: Task Partitioning for Fault-Tolerant Multiprocessor Real-Time Systems

    Many emerging embedded real-time applications such as SCADA (Supervisory Control And Data Acquisition), autonomous vehicles and advanced avionics, require a high degree of dependability. Dealing with tasks having both hard real-time requirements and high reliability constraints is a key challenge faced in such systems. This paper addresses the problem of...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    Time Reversed Ultra-Wideband (UWB) Multiple-Input Multiple-Output (MIMO) Based on Measured Spatial Channels

    UWB technology is envisioned for future wireless high data rate transmission. A UWB system with multiple antennas takes advantage of the rich scattering environment to increase the data rate. On the other hand, given rich multipath, Time Reversal (TR) uses scatters to create space and time focalization at a target...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    A Compact Positioning and Velocity RF Sensor for Improved Inertial Navigation

    Navigation in GPS-denied or GPS-inhibited environments such as urban canyons, mountain areas, and indoors is often accomplished with an Inertial Measurement Unit (IMU). For portable navigation, miniaturized IMUs suffer from poor accuracy due to bias, bias drift and noise. The authors propose to use a compact RF motion sensor to...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2012

    A Toolbox to Explore the Interaction of Adaptive Jamming and Anti-Jamming

    Jamming has long been a problem in wireless communications. Recently, adaptive jamming and anti-jamming techniques have been proposed which aim to use feedback to better perform their task. For an anti-jamming receiver this means detecting jamming and adapting its protocol appropriately. For a jammer this means using feedback from the...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2012

    Jamming-Resistant Distributed Path Selection on Wireless Mesh Networks

    Wireless mesh network is an emerging network architecture which have been actively standardized for the last few years. Because of its flexible network architecture, wireless mesh network can provide alternative paths even when some of wireless links are broken by node failures or intended attacks. Among various types of mesh...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2012

    Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection

    Jamming has long been a problem in wireless communication systems. Traditionally, defense techniques have looked to raise the cost of mounting an equally effective jamming attack. One technique to raise the cost of jamming is Direct Sequence Spread Spectrum (DSSS) which spreads data over a wider bandwidth and has built-in...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    Survivable Smart Grid Communication: Smart-Meters Meshes to the Rescue

    Smart grids are critical cyber-physical infrastructures in the world now. Since these infrastructures are prone to large scale outages due to disasters or faults, a resilient and survivable communication architecture is desired. In this paper, the authors propose a resilient and survivable hierarchical communication architecture for the smart grid that...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Segment Based Inter-Networking to Accommodate Diversity at the Edge

    In this paper, the authors introduce Tapa, a network architecture that accommodates diversity at the network edge: different access networks, heterogeneous edge devices, and rich applications and network services. The core idea underlying Tapa is to use network segments, rather than IP links, as the basis on top of which...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    XIA: Efficient Support for Evolvable Internetworking

    Motivated by limitations in today's host-centric IP network, recent studies have proposed clean-slate network architectures centered around alternate first-class principals, such as content, services, or users. However, much like the host-centric IP design, elevating one principal type above others hinders communication between other principals and inhibits the network's capability to...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    RPT: Re-Architecting Loss Protection for Content-Aware Networks

    The authors revisit the design of redundancy-based loss protection schemes in light of recent advances in content-aware networking. Content-aware networks minimizes the overhead of redundancy, if the redundancy is introduced in a way that the network can understand. With this insight, they propose a new loss protection scheme called Redundant...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    DSRP: Distributed SensorWeb Routing Protocol

    The authors propose a new multi-hop routing protocol for wireless sensor networks, suited for monitoring and control applications. The aim of this research is to adapt flat and hierarchical architectures to create a new hybrid that draws on current protocol theories. The protocol uses a hybrid network structure to achieve...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms

    The authors investigate a new point in the design space of red/green systems, which provide the user with a highly-protected, yet also highly-constrained trusted ("Green") environment for performing security-sensitive transactions, as well as a high-performance, general-purpose environment for all other (non-security-sensitive or "Red") applications. Through the design and implementation of...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    SafeSlinger: An Easy-to-Use and Secure Approach for Human Trust Establishment

    Users regularly experience a crisis of confidence on the Internet. Is that email or instant message truly originating from the claimed individual? Such doubts are commonly resolved through a leap of faith, expressing the desperation of users. To establish a secure basis for Internet communication, the authors propose SafeSlinger, a...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Social Forwarding in Large Scale Networks: Insights Based on Real Trace Analysis

    Social forwarding, recently a hot topic in mobile opportunistic networking, faces extreme challenges from potentially large numbers of mobile nodes, vast areas, and limited communication resources. Such conditions render forwarding more challenging in large-scale networks. The authors observe that forwarding techniques based on social popularity fail to efficiently forward messages...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Anomalies in Optimal Rate-Control and Scheduling Protocols for Cognitive Radio Networks

    Protocols in Cognitive Radio Networks (CRNs) tune the radio and network parameters to utilize the unused frequency spectrum, and thus improve the application performance. Generalized Network Utility Maximization (GNUM) approach has been used to derive optimal algorithms in CRN from a theoretical formulation of the problem. However, there are several...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Measurement and Analysis of Link Quality in Wireless Networks: An Application Perspective

    Estimating the quality of wireless link is vital to optimize several protocols and applications in wireless networks. In realistic wireless networks, link quality is generally predicted by measuring received signal strength and error rates. Understanding the temporal properties of these parameters is essential for the measured values to be representative,...

    Provided By Carnegie Mellon University

  • White Papers // May 2012

    Cloud Terminal: Secure Access to Sensitive Applications From Untrusted Systems

    Current PC- and web-based applications provide insufficient security for the information they access, because vulnerabilities anywhere in a large client software stack can compromise confidentiality and integrity. The authors propose a new architecture for secure applications, Cloud Terminal, in which the only software running on the end host is a...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2012

    Care: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks

    During a disaster scenario, situational awareness information, such as location, physical status and images of the surrounding area, is essential for minimizing loss of life, injury, and property damage. Today's handhelds make it easy for people to gather data from within the disaster area in many formats, including text, images...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    A Proof-Carrying File System With Revocable and Use-Once Certificates

    The authors present the design and implementation of a file system which allows authorizations dependent on revocable and use-once policy certificates. Authorizations require explicit proof objects, combining ideas from previous authorization logics and Girard's linear logic. Use-once certificates and revocations lists are maintained in a database that is consulted during...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    New Modalities for Access Control Logics: Permission, Control and Ratification

    The authors present a new modal access control logic ACL+ to specify, reason about and enforce access control policies. The logic includes new modalities for permission, control, and ratification to overcome some limits of current access control logics. They present a Hilbert-style proof system for ACL+ and a sound and...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2011

    Verification of Information Flow and Access Control Policies With Dependent Types

    The authors present Relational Hoare Type Theory (RHTT), a novel language and verification system capable of expressing and verifying rich information flow and access control policies via dependent types. They show that a number of security policies which have been formalized separately in the literature can all be expressed in...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    On Adversary Models and Compositional Security

    The authors present a representative development in the science of security that includes a generic model of computer systems, their security properties and adversaries who actively interfere with such systems. They describe logic-based methods to reason about security properties of a system as a composition of properties of its components,...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    A Logic of Secure Systems and Its Application to Trusted Computing

    The authors present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared memory, a simple form of access control on memory, machine resets, cryptographic operations, network communication, and dynamically loading and executing unknown (and...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    Distributed GraphLab: A Framework for Machine Learning and Data Mining in the Cloud

    While high-level data parallel frameworks, like MapReduce, simplify the design and implementation of large-scale data processing systems, they do not naturally or efficiently support many important data mining and machine learning algorithms and can lead to inefficient learning systems. To help fill this critical void, the authors introduced the GraphLab...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2012

    Living With Boisterous Neighbors: Studying the Interaction of Adaptive Jamming and Anti-Jamming

    Jamming has long been a problem in wireless communications, but with recent advances in adaptive jamming, adaptive anti-jamming, and other advanced physical layer security techniques, it is hard to understand whether the authors can keep the jammer at bay. In this paper, they consider this problem and introduce a game-theoretic...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2012

    S-SPAN: Secure Smart Posters in Android Using NFC

    Smart posters are a promising new use case for NFC-enabled mobile devices, but to date there has been a general lack of security mechanisms for NFC smart posters. The authors present S-SPAN - a secure smart poster system consisting of three parts: an administrative web interface for managing posters, a...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2011

    All Your Jammers Belong to Us - Localization of Wireless Sensors Under Jamming Attack

    Accurately determining locations of nodes in mobile wireless network is crucial for a myriad of applications. Unfortunately, most localization techniques are vulnerable to jamming attacks where the adversary attempts to disrupt communication between legitimate nodes in the network. In this paper, the authors propose an approach to localize a wireless...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Tracking and Sketching Distributed Data Provenance

    Current provenance collection systems typically gather metadata on remote hosts and submit it to a central server. In contrast, several data-intensive scientific applications require a decentralized architecture in which each host maintains an authoritative local repository of the provenance metadata gathered on that host. The latter approach allows the system...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2009

    Spin One's Wheels - Byzantine Fault Tolerance With a Spinning Primary

    Most Byzantine Fault-Tolerant state machine replication (BFT) algorithms have a primary replica that is in charge of ordering the clients requests. Recently it was shown that this dependence allows a faulty primary to degrade the performance of the system to a small fraction of what the environment allows. In this...

    Provided By Carnegie Mellon University

  • White Papers // May 2012

    QoS Aware Path Selection in Content Centric Networks

    With the availability of higher network bandwidths, greater computing power, and a shift to more content centric use of the internet, researchers are revisiting the Internet architecture. One such effort is the Content Centric Networking (CCN) project where content driven data, rather than nodes, is primarily used for enabling communications....

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Bootstrapping Trust in Commodity Computers

    Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. The authors examine research on securely capturing a computer's state, and consider the utility of this information both for improving security on the local computer (e.g.,...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2009

    Privacy-Preserving Relationship Path Discovery in Social Networks

    As social networks sites continue to proliferate and are being used for an increasing variety of purposes, the privacy risks raised by the full access of social networking sites over user data become uncomfortable. A decentralized social network would help alleviate this problem, but offering the functionalities of social networking...

    Provided By Carnegie Mellon University