Carnegie Mellon University

Displaying 1-40 of 550 results

  • White Papers // May 2014

    Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost Via Heterogeneous-Reliability Memory

    Memory devices represent a key component of datacenter Total Cost of Ownership (TCO), and techniques used to reduce errors that occur on these devices increase this cost. Existing approaches to providing reliability for memory devices pessimistically treat all data as equally vulnerable to memory errors. The authors' key insight is...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2014

    The Heterogeneous Block Architecture

    This paper makes two new observations that lead to a new heterogeneous core design. First, the authors observe that most serial code exhibits fine-grained heterogeneity: at the scale of tens or hundreds of instructions, regions of code fit different micro-architectures better (at the same point or at different points in...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2014

    SpringFS: Bridging Agility and Performance in Elastic Distributed Storage

    The elastic storage systems can be expanded or contracted to meet current demand, allowing servers to be turned off or used for other tasks. However, the usefulness of an elastic distributed storage system is limited by its agility: how quickly it can increase or decrease its number of servers. Due...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Toward Strong, Usable Access Control for Shared Distributed Data

    As non-expert users produce increasing amounts of personal digital data, usable access control becomes critical. Current approaches often fail, because they insufficiently protect data or confuse users about policy specification. This paper presents penumbra, a distributed file system with access control designed to match users' mental models while providing principled...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Improving Cache Performance by Exploiting Read-Write Disparity

    Cache read misses stall the processor if there are no independent instructions to execute. In contrast, most cache write misses are off the critical path of execution, since writes can be buffered in the cache or the store buffer. With few exceptions, cache lines that serve loads are more critical...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Agentless Cloud-wide Streaming of Guest File System Updates

    The authors propose a non-intrusive approach for monitoring Virtual Machines (VMs) in the cloud. At the core of this approach is a mechanism for selective real-time monitoring of guest file updates within VM instances. This mechanism is agentless, requiring no guest VM support. It has low virtual I/O overhead, low...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Improving DRAM Performance by Parallelizing Refreshes with Accesses

    Modern main memory is predominantly built using Dynamic Random Access Memory (DRAM) cells. A DRAM cell consists of a capacitor to store one bit of data as electrical charge. The capacitor leaks charge over time, causing stored data to change. As a result, DRAM requires an operation called refresh that...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Bounding Memory Interference Delay in COTS-based Multi-Core Systems

    In Commercial-Off-The-Shelf (COTS) multi-core systems, a task running on one core can be delayed by other tasks running simultaneously on other cores due to interference in the shared DRAM main memory. Such memory interference delay can be large and highly variable, thereby posing a significant challenge for the design of...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    ARP Attacks in Wireless Ad Hoc Networks

    Previous research to secure ad hoc network protocols concentrates on key distribution and on securing the routing protocol. Unfortunately, securing the routing layer is not sufficient to secure the ad hoc network, as lower layer and upper layer communication protocols remain vulnerable to attack. In this paper, the authors illustrate...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Matching Database Access Patterns to Storage Characteristics

    Database storage managers employ sophisticated algorithms attempting to exploit the performance available inside today's storage systems. However, because the communication between the Storage Manager (SM) and a storage device is limited by a high-level protocol, both the SM and the device make decisions largely in isolation and do not realize...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2013

    Exploiting Compressed Block Size as an Indicator of Future Reuse

    The authors introduce a set of new Compression-Aware Management Policies (CAMP) for on-chip caches that employ data compression. Their management policies are based on two key ideas. First, they show that it is possible to build a more efficient management policy for compressed caches if the compressed block size is...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2013

    Tetrisched: Space-Time Scheduling for Heterogeneous Datacenters

    Tetrisched is a new scheduler that explicitly considers both job-specific preferences and estimated job runtimes in its allocation of resources. Combined, this information allows tetrisched to provide higher overall value to complex application mixes consolidated on heterogeneous collections of machines. Job-specific preferences, provided by tenants in the form of composable...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

    In this webcast, the presenter going to discuss about managing the insider threat and how to ensure the protection of and appropriate access to intellectual property and other critical assets, systems, and data.

    Provided By Carnegie Mellon University

  • White Papers // Nov 2013

    More Effective Distributed ML via a Stale Synchronous Parallel Parameter Server

    The authors propose a parameter server system for distributed ML, which follows a Stale Synchronous Parallel (SSP) model of computation that maximizes the time computational workers spend doing useful work on ML algorithms, while still providing correctness guarantees. The parameter server provides an easy-to-use shared interface for read/write access to...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Illicit Cyber Activity Involving Fraud

    In this webcast, the presenter going to explain about illicit cyber activity involving fraud from the virtual event managing the insider threat. the presenters aim is to assist organizations in improving their security posture and incident response capability by researching technical threat areas, developing and conducting information security assessments, and...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

    Access to data remains a significant impediment to advancing the science of insider threat research. In this webcast, the presenter going to explain about engineering realistic synthetic about the insider threat test data from the virtual event who manages the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Emerging Trends

    An emerging trend to pay attention to is the malicious outsider taking advantage of an inadvertent insider. In this webcast, the presenter going to explain about emerging trends in insider threat research from the virtual event managing the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Best Practices and Controls for Mitigating Insider Threats

    Threats can stem from simple activities like uploading, emailing, and posting sensitive data, etc. In this webcast, the presenter will explain about best practices and controls for mitigating insider threats from the virtual event of how to manage the insider threat.

    Provided By Carnegie Mellon University

  • Podcasts // Nov 2013

    Overview of the Threat Posed by Insiders to Critical Assets

    Insiders pose a substantial threat by virtue of their knowledge of and access to the users systems and/or their databases. In this webcast, the presenter will give an overview of the threat posed by insiders to critical assets.

    Provided By Carnegie Mellon University

  • White Papers // Oct 2013

    GOTCHA Password Hackers!

    The authors introduce GOTCHAs (Generating panOptic Turing tests to tell Computers and Humans Apart) as a way of preventing automated offline dictionary attacks against user selected passwords. A GOTCHA is a randomized puzzle generation protocol, which involves interaction between a computer and a human. Informally, a GOTCHA should satisfy two...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2013

    Challenges in Security and Privacy for Mobile Edge-Clouds

    Mobile devices such as Smartphone and tablets are ubiquitous today, and many of them possess significant computation power, powerful sensors such as high-resolution cameras and GPS sensors, and a wealth of sensor data such as photos, videos, and location information. Collections of mobile devices in close geographical proximity present both...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    LightTx: A Lightweight Transactional Design in Flash-based SSDs to Support Flexible Transactions

    Flash memory has accelerated the architectural evolution of storage systems with its unique characteristics compared to magnetic disks. The no-overwrite property of flash memory has been leveraged to efficiently support transactions, a commonly used mechanism in systems to provide consistency. However, existing transaction designs embedded in flash-based Solid State Drives...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    HAT: Heterogeneous Adaptive Throttling for On-Chip Networks

    The Network-on-Chip (NoC) is a primary shared resource in a Chip Multi-Processor (CMP) system. As core counts continue to increase and applications become increasingly data-intensive, the network load will also increase, leading to more congestion in the network. This network congestion can degrade system performance if the network load is...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    Program Interference in MLC NAND Flash Memory: Characterization, Modeling, and Mitigation

    As NAND flash memory continues to scale down to smaller process technology nodes, its reliability and endurance are degrading. One important source of reduced reliability is the phenomenon of program interference: when a flash cell is programmed to a value, the programming operation affects the threshold voltage of not only...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    Secure Two-Party Computation with Reusable Bit-Commitments, via A Cut-and-Choose with Forge-and-Lose Technique

    A Secure Two-Party Computation (S2PC) protocol allows two parties to compute over their combined private inputs, as if inter-mediated by a trusted third party. In the active model, security is maintained even if one party is malicious, deviating from the protocol specification. For example, an honest party retains privacy of...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2013

    Design of a Write-Optimized Data Store

    The WriteBuffer (WB) tree is a new write-optimized data structure that can be used to implement per-node storage in unordered key-value stores. The WB tree provides faster writes than the Log-Structured Merge (LSM) tree that is used in many current high-performance key-value stores. It achieves this by replacing compactions in...

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Observations of Successful Cyber Security Operations

    In this Webcast, the presenter going explain about the cyber security The presenter will also discuss the observations of successful cyber security operations from the virtual event showing the users a big picture about the organization how they successfully react to new specific accessories build on the cyber security.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Responding to a Large Scale Cybersecurity Incident

    In this Webcast, the presenter explain about how to respond to a large scale cyber security incidents, with an introduction about the role of technology. Technology which is an important one, but the limitations of that need to be understood.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    20+ Years of Cyber (in)Security

    The use of information and communications technology is pervasive. The information systems are increasingly interconnected and interdependent. Attack technology is outpacing defensive technology. In this webcast, the presenter will give an introduction to the cyber security.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Achieving Mission Assurance Through Resilience Management

    In this webcast, the presenter going to explain about the resilience management. Resilience management is to protect a sustain organizations mission and business operations. The presenter will also explain about how the organizations are constant operational stress on these days.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Developing Your Cyber Workforce

    In this webcast, the presenter going to explain about the how to develop the cyber workforce against the security attacks. The presenter going to discuss about the new solutions and research that he had done to improve the security.

    Provided By Carnegie Mellon University

  • White Papers // Aug 2013

    A Proof of Correctness for Egalitarian Paxos

    In this paper the authors present a proof of correctness for Egalitarian Paxos (EPaxos), a new distributed consensus algorithm based on Paxos. EPaxos achieves three goals: availability without interruption as long as a simple majority of replicas are reachable - its availability is not interrupted when replicas crash or fail...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2013

    Breaking the DDoS Attack Chain

    Department of Defense (DoD) communications and data networks continue to be targets for adversaries to deny operational use of those networks. Distributed Denial of Service (DDoS) is one such attack strategy that has proven to be an effective method of denying service to military, political, infrastructure, and economic targets. The...

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    The Cyber Security R&D Pipeline - Building Capability Through Science

    In this webcast, the presenter going to explain about the cyber security R&D pipeline how to build the capability through science. The presenter explains about the SEI advances software engineering and related disciplines to ensure systems with predictable and improved quality, cost and schedule.

    Provided By Carnegie Mellon University

  • White Papers // Jul 2013

    ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets

    Many commodity operating systems and applications become infested with malicious software over time, primarily due to exploits that take advantage of software flaws and operator errors. In this paper, the authors present the salient features of a system design which allows remote-device authentication by a verifier, reaching malware-free system states,...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2013

    A Case for Efficient Hardware/Software Cooperative Management of Storage and Memory

    Most applications manipulate persistent data, yet traditional systems decouple data manipulation from persistence in a two-level storage model. Programming languages and system software manipulate data in one set of formats in volatile main memory (DRAM) using a load/store interface, while storage systems maintain persistence in another set of formats in...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2013

    Memory Scaling: A Systems Architecture Perspective

    The memory system is a fundamental performance and energy bottleneck in almost all computing systems. Recent system design, application, and technology trends that require more capacity, bandwidth, efficiency, and predictability out of the memory system make it an even more important system bottleneck. At the same time, DRAM technology is...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2013

    Space-Efficient, High-Performance Rank & Select Structures on Uncompressed Bit Sequences

    Rank & select data structures are one of the fundamental building blocks for many modern succinct data structures. With the continued growth of massive-scale information services, the space efficiency of succinct data structures is becoming increasingly attractive in practice. In this paper, the authors re-examine the design of rank &...

    Provided By Carnegie Mellon University

  • White Papers // May 2013

    Wireless Mesh Network Simulator for Studying Cross-Layer Jamming Effects

    Various wireless mesh network standards have been actively constituted for the last several years. Because of its flexible network architecture, wireless mesh network can provide alternative paths even when some of wireless links are broken by node failures or intended attacks. Among various types of mesh network, the authors focus...

    Provided By Carnegie Mellon University

  • White Papers // May 2013

    MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks

    Wireless mesh networks represent an emerging network architecture which has been actively studied and standardized for the last several years. Because of their flexible network architecture, wireless mesh networks can provide alternative paths even when wireless links are broken by node failures or routing attacks. Among a variety of mesh...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    Effects of Access-Control Policy Conflict-Resolution Methods on Policy-Authoring Usability

    Access-control policies can be stated more succinctly if they support both rules that grant access and rules that deny access, but this introduces the possibility that multiple rules will give conflicting conclusions for an access. In this paper, the authors compare a new conflict-resolution method, which uses first specificity and...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2009

    Efficient Proving for Practical Distributed Access-Control Systems

    The authors present a new technique for generating a formal proof that an access request satisfies access-control policy, for use in logic-based access-control frameworks. The approach is tailored to settings where credentials needed to complete a proof might need to be obtained from, or reactively created by, distant components in...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    High Dimensional Consensus in Large-Scale Networks: Theory and Applications

    In this paper, the authors develop the theory of High Dimensional Consensus (HDC), a general class of distributed algorithms in large-scale networks. HDC relies only on local information, local communication, and low-order computation, and, hence, is ideally suited to implement network tasks under resource constraints, e.g., in sparse networks with...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    A Statistical Approach to Contention Modeling for High-Level Heterogeneous Multiprocessor Simulation

    Single chip systems featuring multiple heterogeneous processors and a variety of communication and memory architectures have emerged to satisfy the demand for networking, handheld computing, and other custom devices. The complex interactions between applications, schedulers, and processor resources, along with the resulting contention delays for shared busses and memories, are...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    Predicting Memory Activity Using Spatial Correlation

    The memory wall continues to pose a performance bottleneck for computer systems - studies show that modern servers spend up to two-thirds of execution time stalled on memory accesses. Although recent trends forecast growth in processor clock frequencies to be minimal, improvements to memory access latencies are correspondingly slow. Traditional...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2008

    Temporal Instruction Fetch Streaming

    L1 instruction-cache misses pose a critical performance bottleneck in commercial server workloads. Cache access latency constraints preclude L1 instruction caches large enough to capture the application, library, and OS instruction working sets of these workloads. To cope with capacity constraints, researchers have proposed instruction prefetchers that use branch predictors to...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    A Narrow Waist for Multipath Routing

    Many applications can use multipath routing to improve reliability or throughput, and many multipath routing protocols exist. Despite this diversity of mechanisms and applications, no common interface exists to allow an application to select these paths. This paper presents a design for such a common interface, called path bits. Path...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2009

    The Past, Present and Future of Programming in HCI

    The first computer users were all programmers, and the field of Human-Computer Interaction started, in part, with a focus on improving how programming was done. There was a significant amount of work in the 1980's on this topic, but it mostly died out in the 1990s. Now, there is a...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Here Are My Data Files. Here Are My Queries. Where Are My Results?

    DataBase Management Systems (DBMS) provide incredible flexibility and performance when it comes to query processing, scalability and accuracy. To fully exploit DBMS features, however, the user must define a schema, load the data, tune the system for the expected workload, and answer several questions. Should the database use a column-store,...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Size-Based Scheduling to Improve Web Performance

    Is it possible to reduce the expected response time of every request at a web server, simply by changing the order in which people schedule the requests? That is the question the authors ask in this paper. This paper proposes a method for improving the performance of web servers servicing...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness

    While the MPP is still the most common architecture in supercomputer centers today, a simpler and cheaper machine configuration is growing increasingly common. This alternative setup may be described simply as a collection of multiprocessors or a distributed server system. This collection of multiprocessors is fed by a single common...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Sequential Monte Carlo Pricing Of American-Style Options Under Stochastic Volatility Models

    The authors introduce a new method to price American-style options on underlying investments governed by Stochastic Volatility (SV) models. The method does not require the volatility process to be observed. Instead, it exploits the fact that the optimal decision functions in the corresponding dynamic programming problem can be expressed as...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Asset Pricing Puzzles Explained By Incomplete Brownian Equilibria

    The authors examine a class of Brownian based models which produce tractable incomplete equilibria. The models are based on finitely many investors with heterogeneous exponential utilities over intermediate consumption who receives partially unspanned income. The investors can trade continuously on a finite time interval in a money market account as...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    A Supervised Factorial Acoustic Model for Simultaneous Multiparticipant Vocal Activity Detection in Close-Talk Microphone Recordings of Meetings

    The authors have implemented a supervised acoustic model for VAD in conversations with an arbitrary number of participants, and analyzed its performance with respect to the unsupervised AM baseline. Analysis consisted of a broad exploration of several parameters, two of which (inclusion of NLED features and decoding constraints on the...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    Modeling Content From Human-Verified Blacklists for Accurate Zero-Hour Phish Detection

    Phishing attacks are a significant security threat to users of the Internet, causing tremendous economic loss every year. Past work in academia has not been adopted by industry in part due to concerns about liability over false positives. However, blacklist-based methods heavily used in industry are slow in responding to...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    Using Articulatory Position Data to Improve Voice Transformation

    Voice transformation (also known as voice conversion or voice morphing) is a name given to techniques which take speech from one speaker as input and attempt to produce speech that sounds like it came from another speaker. One compelling argument for good voice transformation is that it reduces the difficulty...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2008

    Learning of Protein Interaction Networks

    Protein-Protein Interactions (PPI) play a key role in determining the outcome of most cellular processes. Correctly identifying and characterizing protein interactions and the networks they comprise are critical for understanding the molecular mechanisms within the cell. Large-scale biological experimental methods can directly and systematically detect the set of interacting proteins...

    Provided By Carnegie Mellon University

  • Webcasts // May 2011

    Introduction to the SOA Architect Professional Certificate With Grace Lewis

    In this video the presenter discusses why the SEI is offering the SOA certificate and the importance of knowing how the service-oriented architectural style affects a system's quality attributes (e.g., security, performance, and modifiability). She talks about her primary goals in teaching the SOA courses, the three main takeaways SOA...

    Provided By Carnegie Mellon University

  • Webcasts // May 2011

    Introduction to the SOA Architect Professional Certificate With Dennis Smith

    In this video, the presenter, SOA course instructor and lead of the SEI System-of-Systems Performance team, discusses why the SEI is offering the SOA certificate and why basic architecture principles and practices are even more important to effective SOA adoption than to single system development. He also explains his primary...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2009

    Classification-Based Relay Selection for Video Streaming Over Wireless Multihop Networks

    Real-time streaming of audiovisual content over wireless networks is emerging as an important technology in multimedia communication. In this paper, the authors present a classification-based method to select appropriate relays in support of their prior work on Time-aware Opportunistic Relaying for video streaming over wireless mesh networks. The proposed scheme...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Towards Secure Multi-Path Routing for Wireless Mobile Ad-Hoc Networks: A Cross-Layer Strategy

    Multi-path routing establishes multiple paths between a source and destination node in a network. This helps in achieving reliability in Mobile Ad-hoc NETworks (MANETs). To achieve efficient, secure and reliable multi-path routing for MANETs, the authors propose a routing mechanism that uses cross-layer strategies. The cross-layer strategy involves incorporating feedback...

    Provided By Carnegie Mellon University

  • White Papers // May 2011

    Digital Filter Design for Jamming Mitigation in 802.15.4 Communication

    Jamming attackers can dramatically increase attack efficiency and stealth by randomly or periodically cycling the jamming transmission on and off, attacks respectively known as random and periodic jamming. In this paper, the authors analyze the impact of such attacks on the IEEE 802.15.4 communication protocol, commonly used in wireless sensor...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Anubis: An Attestation Protocol for Distributed Context-Aware Applications

    Sharing sensitive context information among multiple distributed components in mobile environments introduces major security concerns. The distributed sensing, processing and actuating components of these applications can be compromised and modified or impersonated to extract private and confidential information or to inject false information. In this paper, the authors present the...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2010

    Improving Anti-Jamming Capability and Increasing Jamming Impact With Mobility Control

    The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the relative geometries of the adversarial network of jammers and the network under attack. Hence, changes in network geometry achieved through node and jammer mobility...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2008

    Rate-Harmonized Scheduling for Saving Energy

    Energy consumption continues to be a major concern in multiple application domains including power hungry data centers, portable and wearable devices, mobile communication devices and wireless sensor networks. While energy-constrained, many such applications must meet timing and QoS constraints for sensing, actuation or multimedia data processing. Many modern power-aware processors...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2011

    Social-Based Trust Mechanisms in Mobile Opportunistic Networks

    The fundamental challenge in opportunistic networking, regardless of the application, is enabling node cooperation to forward a message. While node cooperation is considered as a fundamental property in such networks, ensuring such a property between two devices in mobile opportunistic networks remains largely unexplored. In this paper, the authors investigate...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    FOG: Fairness in Mobile Opportunistic Networking

    The fundamental challenge in opportunistic networking, regardless of the application, is when and how to forward a message. Rank-based forwarding techniques currently represent one of the most promising methods for addressing this message forwarding challenge. While these techniques have demonstrated great efficiency in performance, they do not address the rising...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2011

    SCION: Scalability, Control, and Isolation on Next-Generation Networks

    The authors present the first Internet architecture designed to provide route control, failure isolation, and explicit trust information for end-to-end communications. SCION separates ASes into groups of independent routing sub-planes, called trust domains, which then interconnect to form complete routes. Trust domains provide natural isolation of routing failures and human...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    Predicting Handoffs in 3G Networks

    Cellular data networks have recently seen an explosion in their usage due to the widespread deployment of 3G technologies and the rapid proliferation of smartphones. People are increasingly using their smartphones on the go and expect always-on, high quality connectivity at all times. A key network primitive that enables continuous...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    DTA++: Dynamic Taint Analysis With Targeted Control-Flow Propagation

    Dynamic Taint Analysis (DTA) is a powerful technique for, among other things, tracking the flow of sensitive information. However, it is vulnerable to false negative errors caused by implicit flows, situations in which tainted data values affect control flow, which in turn affects other data. The authors propose DTA++, an...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2010

    Insights From the Inside: A View of Botnet Management From Infiltration

    Recent work has leveraged botnet infiltration techniques to track the activities of bots over time, particularly with regard to spam campaigns. Building the authors' previous success in reverse-engineering C&C protocols, they have conducted a 4-month infiltration of the MegaD botnet, beginning in October 2009. Their infiltration provides one with constant...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    Binary Code Extraction and Interface Identification for Security Applications

    Binary code reuse is the process of automatically identifying the interface and extracting the instructions and data dependencies of a code fragment from an executable program, so that it is self-contained and can be reused by external code. Binary code reuse is useful for a number of security applications, including...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2009

    Towards Generating High Coverage Vulnerability-Based Signatures With Protocol-Level Constraint-Guided Exploration

    Signature-based input filtering is an important and widely deployed defense. But current signature generation methods have limited coverage and the generated signatures often can be easily evaded by an attacker with small variations of the exploit message. In this paper, the authors propose protocol-level constraint-guided exploration, a new approach towards...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    TIE: Principled Reverse Engineering of Types in Binary Programs

    A recurring problem in security is reverse engineering binary code to recover high-level language data abstractions and types. High-level programming languages have data abstractions such as buffers, structures, and local variables that all help programmers and program analyses reason about programs in a scalable manner. During compilation, these abstractions are...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2011

    Q: Exploit Hardening Made Easy

    Modern operating systems have since enabled address randomization (ASLR), which randomizes the location of libc, making these techniques unusable in practice. However, modern ASLR implementations leave smaller amounts of executable code unrandomized and it has been unclear whether an attacker can use these small code fragments to construct payloads in...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    SplitScreen: Enabling Efficient, Distributed Malware Detection

    The authors present the design and implementation of a novel anti-malware system called SplitScreen. SplitScreen performs an additional screening step prior to the signature matching phase found in existing approaches. The screening step filters out most non-infected files (90%) and also identifies malware signatures that are not of interest (99%)....

    Provided By Carnegie Mellon University

  • White Papers // Mar 2010

    All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)

    Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analysis. Example applications of dynamic taint analysis and forward symbolic execution include malware analysis, input filter generation, test case generation, and vulnerability discovery. Despite the widespread usage of these two techniques, there has been little effort...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2009

    A Contractual Anonymity System

    The authors propose, develop, and implement techniques for achieving contractual anonymity. In contractual anonymity, a user and service provider enter into an anonymity contract. The user is guaranteed anonymity and message unlinkability from the contractual anonymity system unless she breaks the contract. The service provider is guaranteed that it can...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2009

    A Language for Large Ensembles of Independently Executing Nodes

    The authors address how to write programs for distributed computing systems in which the network topology can change dynamically. Examples of such systems, which they call ensembles, include programmable sensor networks (where the network topology can change due to failures in the nodes or links) and modular robotics systems (whose...

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2010

    Transforming Your Operational Resilience Management Capabilities: CERT's Resilience Management Model

    Organizations can't plan for every disruption. They need to be able to handle stressors in their risk environment at a moment's notice and with a predictable level of performance. Resilience management is a process that helps organizations establish, improve, and sustain the maturity of their operational resilience management system and...

    Provided By Carnegie Mellon University