Carnegie Mellon University

Displaying 1-40 of 480 results

  • White Papers // Dec 2014

    Approximate Lifted Inference with Probabilistic Databases

    In this paper, the authors propose a new approach for approximate evaluation of P-hard queries with probabilistic databases. In their approach, every query is evaluated entirely in the database engine by evaluating a fixed number of query plans, each providing an upper bound on the true probability, then taking their...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2014

    Phinding Phish: Evaluating Phishing Tools

    "There are currently dozens of freely available tools to combat phishing and other web-based scams, many of which are web browser extensions that warn users when they are browsing a suspected phishing site. The authors developed an automated test bed for testing anti-phishing tools. They used 200 verified phishing URLs...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2014

    LAPWiN: Location-Aided Probing for Protecting User Privacy in Wi-Fi Networks

    Efficient Wi-Fi probing has been demonstrated to leak sensitive user information. During the probing process, Wi-Fi clients transmit the names of previously known Wi-Fi Access Points (APs) in plaintext. An eavesdropper can easily collect the information leaked by this Wi-Fi probing process to mount numerous attacks, such as fake AP...

    Provided By Carnegie Mellon University

  • White Papers // May 2014

    Studying the Effectiveness of Security Images in Internet Banking

    Security images are often used as part of the login process on internet banking websites, under the theory that they can help foil phishing attacks. Previous studies, however, have yielded inconsistent results about users' ability to notice that a security image is missing and their willingness to log in even...

    Provided By Carnegie Mellon University

  • White Papers // May 2014

    Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost Via Heterogeneous-Reliability Memory

    Memory devices represent a key component of datacenter Total Cost of Ownership (TCO), and techniques used to reduce errors that occur on these devices increase this cost. Existing approaches to providing reliability for memory devices pessimistically treat all data as equally vulnerable to memory errors. The authors' key insight is...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2014

    All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API

    HTML5 changes many aspects in the browser world by introducing numerous new concepts; in particular, the new HTML5 screen sharing API impacts the security implications of browsers tremendously. One of the core assumptions on which browser security is built is that there is no cross-origin feedback loop from the client...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2014

    The Heterogeneous Block Architecture

    This paper makes two new observations that lead to a new heterogeneous core design. First, the authors observe that most serial code exhibits fine-grained heterogeneity: at the scale of tens or hundreds of instructions, regions of code fit different micro-architectures better (at the same point or at different points in...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2014

    Predictable Coherent Caching with Incoherent Caches

    Caches are a well known hardware construct for improving energy consumption and average performance by keeping frequently-used data near processing resources. Yet, at the same time, they form a major hurdle for worst-case execution time analyses, in particular if they are shared between multiple cores. Exploiting that most shared data...

    Provided By Carnegie Mellon University

  • White Papers // Feb 2014

    SpringFS: Bridging Agility and Performance in Elastic Distributed Storage

    The elastic storage systems can be expanded or contracted to meet current demand, allowing servers to be turned off or used for other tasks. However, the usefulness of an elastic distributed storage system is limited by its agility: how quickly it can increase or decrease its number of servers. Due...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Toward Strong, Usable Access Control for Shared Distributed Data

    As non-expert users produce increasing amounts of personal digital data, usable access control becomes critical. Current approaches often fail, because they insufficiently protect data or confuse users about policy specification. This paper presents penumbra, a distributed file system with access control designed to match users' mental models while providing principled...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Improving Cache Performance by Exploiting Read-Write Disparity

    Cache read misses stall the processor if there are no independent instructions to execute. In contrast, most cache write misses are off the critical path of execution, since writes can be buffered in the cache or the store buffer. With few exceptions, cache lines that serve loads are more critical...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Agentless Cloud-wide Streaming of Guest File System Updates

    The authors propose a non-intrusive approach for monitoring Virtual Machines (VMs) in the cloud. At the core of this approach is a mechanism for selective real-time monitoring of guest file updates within VM instances. This mechanism is agentless, requiring no guest VM support. It has low virtual I/O overhead, low...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Improving DRAM Performance by Parallelizing Refreshes with Accesses

    Modern main memory is predominantly built using Dynamic Random Access Memory (DRAM) cells. A DRAM cell consists of a capacitor to store one bit of data as electrical charge. The capacitor leaks charge over time, causing stored data to change. As a result, DRAM requires an operation called refresh that...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Bounding Memory Interference Delay in COTS-based Multi-Core Systems

    In Commercial-Off-The-Shelf (COTS) multi-core systems, a task running on one core can be delayed by other tasks running simultaneously on other cores due to interference in the shared DRAM main memory. Such memory interference delay can be large and highly variable, thereby posing a significant challenge for the design of...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    ARP Attacks in Wireless Ad Hoc Networks

    Previous research to secure ad hoc network protocols concentrates on key distribution and on securing the routing protocol. Unfortunately, securing the routing layer is not sufficient to secure the ad hoc network, as lower layer and upper layer communication protocols remain vulnerable to attack. In this paper, the authors illustrate...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2014

    Matching Database Access Patterns to Storage Characteristics

    Database storage managers employ sophisticated algorithms attempting to exploit the performance available inside today's storage systems. However, because the communication between the Storage Manager (SM) and a storage device is limited by a high-level protocol, both the SM and the device make decisions largely in isolation and do not realize...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2013

    Exploiting Compressed Block Size as an Indicator of Future Reuse

    The authors introduce a set of new Compression-Aware Management Policies (CAMP) for on-chip caches that employ data compression. Their management policies are based on two key ideas. First, they show that it is possible to build a more efficient management policy for compressed caches if the compressed block size is...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2013

    Tetrisched: Space-Time Scheduling for Heterogeneous Datacenters

    Tetrisched is a new scheduler that explicitly considers both job-specific preferences and estimated job runtimes in its allocation of resources. Combined, this information allows tetrisched to provide higher overall value to complex application mixes consolidated on heterogeneous collections of machines. Job-specific preferences, provided by tenants in the form of composable...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Panel Discussion: Managing the Insider Threat: What Every Organization Should Know

    In this webcast, the presenter going to discuss about managing the insider threat and how to ensure the protection of and appropriate access to intellectual property and other critical assets, systems, and data.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Illicit Cyber Activity Involving Fraud

    In this webcast, the presenter going to explain about illicit cyber activity involving fraud from the virtual event managing the insider threat. the presenters aim is to assist organizations in improving their security posture and incident response capability by researching technical threat areas, developing and conducting information security assessments, and...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Engineering Realistic Synthetic Insider Threat (Cyber-Social) Test Data

    Access to data remains a significant impediment to advancing the science of insider threat research. In this webcast, the presenter going to explain about engineering realistic synthetic about the insider threat test data from the virtual event who manages the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Emerging Trends

    An emerging trend to pay attention to is the malicious outsider taking advantage of an inadvertent insider. In this webcast, the presenter going to explain about emerging trends in insider threat research from the virtual event managing the insider threat.

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2013

    Best Practices and Controls for Mitigating Insider Threats

    Threats can stem from simple activities like uploading, emailing, and posting sensitive data, etc. In this webcast, the presenter will explain about best practices and controls for mitigating insider threats from the virtual event of how to manage the insider threat.

    Provided By Carnegie Mellon University

  • White Papers // Nov 2013

    More Effective Distributed ML via a Stale Synchronous Parallel Parameter Server

    The authors propose a parameter server system for distributed ML, which follows a Stale Synchronous Parallel (SSP) model of computation that maximizes the time computational workers spend doing useful work on ML algorithms, while still providing correctness guarantees. The parameter server provides an easy-to-use shared interface for read/write access to...

    Provided By Carnegie Mellon University

  • Podcasts // Nov 2013

    Overview of the Threat Posed by Insiders to Critical Assets

    Insiders pose a substantial threat by virtue of their knowledge of and access to the users systems and/or their databases. In this webcast, the presenter will give an overview of the threat posed by insiders to critical assets.

    Provided By Carnegie Mellon University

  • White Papers // Nov 2013

    Energy-Governed Resilient Networked Systems

    Connected embedded systems in the realm of smart infrastructures comprise ubiquitous end-point devices supported by a communication infrastructure. Device, energy supply and network failures are a reality and provisioned communications could fail. Self-organization is a process where network devices cooperate with each other to restore network connectivity on detecting network...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2013

    GOTCHA Password Hackers!

    The authors introduce GOTCHAs (Generating panOptic Turing tests to tell Computers and Humans Apart) as a way of preventing automated offline dictionary attacks against user selected passwords. A GOTCHA is a randomized puzzle generation protocol, which involves interaction between a computer and a human. Informally, a GOTCHA should satisfy two...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2013

    Challenges in Security and Privacy for Mobile Edge-Clouds

    Mobile devices such as Smartphone and tablets are ubiquitous today, and many of them possess significant computation power, powerful sensors such as high-resolution cameras and GPS sensors, and a wealth of sensor data such as photos, videos, and location information. Collections of mobile devices in close geographical proximity present both...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    Designing for Self-Configuration and Self-Adaptation in the Internet of Things

    The Internet of Things (IoT) paradigm comprises a heterogenous mix of connected devices connected to the Internet. This promises a wealth of opportunity for a large collection of distributed applications and services. However, the IoT introduces significant changes to the Internet model, largely in the form of billions to trillions...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    LightTx: A Lightweight Transactional Design in Flash-based SSDs to Support Flexible Transactions

    Flash memory has accelerated the architectural evolution of storage systems with its unique characteristics compared to magnetic disks. The no-overwrite property of flash memory has been leveraged to efficiently support transactions, a commonly used mechanism in systems to provide consistency. However, existing transaction designs embedded in flash-based Solid State Drives...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    Program Interference in MLC NAND Flash Memory: Characterization, Modeling, and Mitigation

    As NAND flash memory continues to scale down to smaller process technology nodes, its reliability and endurance are degrading. One important source of reduced reliability is the phenomenon of program interference: when a flash cell is programmed to a value, the programming operation affects the threshold voltage of not only...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    HAT: Heterogeneous Adaptive Throttling for On-Chip Networks

    The Network-on-Chip (NoC) is a primary shared resource in a Chip Multi-Processor (CMP) system. As core counts continue to increase and applications become increasingly data-intensive, the network load will also increase, leading to more congestion in the network. This network congestion can degrade system performance if the network load is...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2013

    Secure Two-Party Computation with Reusable Bit-Commitments, via A Cut-and-Choose with Forge-and-Lose Technique

    A Secure Two-Party Computation (S2PC) protocol allows two parties to compute over their combined private inputs, as if inter-mediated by a trusted third party. In the active model, security is maintained even if one party is malicious, deviating from the protocol specification. For example, an honest party retains privacy of...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2013

    Design of a Write-Optimized Data Store

    The WriteBuffer (WB) tree is a new write-optimized data structure that can be used to implement per-node storage in unordered key-value stores. The WB tree provides faster writes than the Log-Structured Merge (LSM) tree that is used in many current high-performance key-value stores. It achieves this by replacing compactions in...

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Observations of Successful Cyber Security Operations

    In this Webcast, the presenter going explain about the cyber security The presenter will also discuss the observations of successful cyber security operations from the virtual event showing the users a big picture about the organization how they successfully react to new specific accessories build on the cyber security.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Responding to a Large Scale Cybersecurity Incident

    In this Webcast, the presenter explain about how to respond to a large scale cyber security incidents, with an introduction about the role of technology. Technology which is an important one, but the limitations of that need to be understood.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    20+ Years of Cyber (in)Security

    The use of information and communications technology is pervasive. The information systems are increasingly interconnected and interdependent. Attack technology is outpacing defensive technology. In this webcast, the presenter will give an introduction to the cyber security.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Achieving Mission Assurance Through Resilience Management

    In this webcast, the presenter going to explain about the resilience management. Resilience management is to protect a sustain organizations mission and business operations. The presenter will also explain about how the organizations are constant operational stress on these days.

    Provided By Carnegie Mellon University

  • Webcasts // Aug 2013

    Developing Your Cyber Workforce

    In this webcast, the presenter going to explain about the how to develop the cyber workforce against the security attacks. The presenter going to discuss about the new solutions and research that he had done to improve the security.

    Provided By Carnegie Mellon University

  • White Papers // Aug 2013

    Breaking the DDoS Attack Chain

    Department of Defense (DoD) communications and data networks continue to be targets for adversaries to deny operational use of those networks. Distributed Denial of Service (DDoS) is one such attack strategy that has proven to be an effective method of denying service to military, political, infrastructure, and economic targets. The...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2010

    Energy-Efficient Cluster Computing With FAWN: Workloads and Implications

    This paper presents the architecture and motivation for a cluster-based, many-core computing architecture for energy-efficient, data-intensive computing. FAWN, a Fast Array of Wimpy Nodes, consists of a large number of slower but efficient nodes coupled with low-power storage. The authors present the computing trends that motivate a FAWN-like approach, for...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2010

    The Software Quality Profile

    The software community has been slow to use data to measure software quality. This paper discusses the reasons for this problem and describes a way to use process measurements to assess product quality. The basic process measures are time, size, and defects. When these data are gathered for every engineer...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2011

    Local Isomorphism to Solve the Pre-Image Problem in Kernel Methods

    Kernel methods have been popular over the last decade to solve many computer vision, statistics and machine learning problems. An important, both theoretically and practically, open problem in kernel methods is the pre-image problem. The pre-image problem consists of finding a vector in the input space whose mapping is known...

    Provided By Carnegie Mellon University

  • Webcasts // May 2011

    Introduction to the SOA Architect Professional Certificate With Grace Lewis

    In this video the presenter discusses why the SEI is offering the SOA certificate and the importance of knowing how the service-oriented architectural style affects a system's quality attributes (e.g., security, performance, and modifiability). She talks about her primary goals in teaching the SOA courses, the three main takeaways SOA...

    Provided By Carnegie Mellon University

  • Webcasts // May 2011

    Introduction to the SOA Architect Professional Certificate With Dennis Smith

    In this video, the presenter, SOA course instructor and lead of the SEI System-of-Systems Performance team, discusses why the SEI is offering the SOA certificate and why basic architecture principles and practices are even more important to effective SOA adoption than to single system development. He also explains his primary...

    Provided By Carnegie Mellon University

  • Webcasts // Nov 2009

    Talking Architects With Len Bass

    In this webcast, the presenter talks with Len Bass, co-author of Software Architecture in Practice, about how quality attributes (non-functional requirements) could be considered as "First class citizens" of a project in an agile development environment (20 minutes, 15 seconds).

    Provided By Carnegie Mellon University

  • White Papers // Apr 2010

    Dissecting One Click Frauds

    One Click Fraud is an online confidence scam that has been plaguing an increasing number of Japanese Internet users, in spite of new laws and the mobilization of police task forces. In this scam, the victim clicks on a link presented to them, only to be informed that they just...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2009

    The Coremelt Attack

    Over the past two decades, the Internet has become of critical importance for social, business, and government activities. Corporations depend on Internet availability to facilitate sales and the transfer of data to make timely decisions. SCADA networks often use the Internet to enable coordination between physical systems. Unfortunately, malicious parties...

    Provided By Carnegie Mellon University

  • White Papers // Nov 2010

    An Experiment Towards Adaptive Quality of Service in Mobile Ad Hoc Wireless Networks

    In high criticality crisis scenarios, such as disaster management, mobile ad hoc wireless networks are quickly assembled in the field to support decision makers through situational awareness using messaging-, voice-, and video-based applications. These applications cannot afford the luxury of stalling or failing due to overwhelming bandwidth demand on these...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    EBAWA: Efficient Byzantine Agreement for Wide-Area Networks

    The popularity of wide-area computer services has generated a compelling need for efficient algorithms that provide high reliability. Byzantine Fault-Tolerant (BFT) algorithms can be used with this purpose because they allow replicated systems to continue to provide a correct service even when some of their replicas fail arbitrarily, either accidentally...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2011

    Lucy in the Sky Without Diamonds: Stealing Confidential Data in the Cloud

    Cloud computing is a recent paradigm that is creating high expectations about benefits such as the pay-per-use model and elasticity of resources. However, with this optimism come also concerns about security. In a public cloud, the user's data storage and processing is no longer done inside its premises, but in...

    Provided By Carnegie Mellon University

  • White Papers // Sep 2010

    Asset Pricing Puzzles Explained By Incomplete Brownian Equilibria

    The authors examine a class of Brownian based models which produce tractable incomplete equilibria. The models are based on finitely many investors with heterogeneous exponential utilities over intermediate consumption who receives partially unspanned income. The investors can trade continuously on a finite time interval in a money market account as...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2010

    Sequential Monte Carlo Pricing Of American-Style Options Under Stochastic Volatility Models

    The authors introduce a new method to price American-style options on underlying investments governed by Stochastic Volatility (SV) models. The method does not require the volatility process to be observed. Instead, it exploits the fact that the optimal decision functions in the corresponding dynamic programming problem can be expressed as...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    High Dimensional Consensus in Large-Scale Networks: Theory and Applications

    In this paper, the authors develop the theory of High Dimensional Consensus (HDC), a general class of distributed algorithms in large-scale networks. HDC relies only on local information, local communication, and low-order computation, and, hence, is ideally suited to implement network tasks under resource constraints, e.g., in sparse networks with...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    A Statistical Approach to Contention Modeling for High-Level Heterogeneous Multiprocessor Simulation

    Single chip systems featuring multiple heterogeneous processors and a variety of communication and memory architectures have emerged to satisfy the demand for networking, handheld computing, and other custom devices. The complex interactions between applications, schedulers, and processor resources, along with the resulting contention delays for shared busses and memories, are...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    Predicting Memory Activity Using Spatial Correlation

    The memory wall continues to pose a performance bottleneck for computer systems - studies show that modern servers spend up to two-thirds of execution time stalled on memory accesses. Although recent trends forecast growth in processor clock frequencies to be minimal, improvements to memory access latencies are correspondingly slow. Traditional...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    A Narrow Waist for Multipath Routing

    Many applications can use multipath routing to improve reliability or throughput, and many multipath routing protocols exist. Despite this diversity of mechanisms and applications, no common interface exists to allow an application to select these paths. This paper presents a design for such a common interface, called path bits. Path...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness

    While the MPP is still the most common architecture in supercomputer centers today, a simpler and cheaper machine configuration is growing increasingly common. This alternative setup may be described simply as a collection of multiprocessors or a distributed server system. This collection of multiprocessors is fed by a single common...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Size-Based Scheduling to Improve Web Performance

    Is it possible to reduce the expected response time of every request at a web server, simply by changing the order in which people schedule the requests? That is the question the authors ask in this paper. This paper proposes a method for improving the performance of web servers servicing...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    A Supervised Factorial Acoustic Model for Simultaneous Multiparticipant Vocal Activity Detection in Close-Talk Microphone Recordings of Meetings

    The authors have implemented a supervised acoustic model for VAD in conversations with an arbitrary number of participants, and analyzed its performance with respect to the unsupervised AM baseline. Analysis consisted of a broad exploration of several parameters, two of which (inclusion of NLED features and decoding constraints on the...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    Modeling Content From Human-Verified Blacklists for Accurate Zero-Hour Phish Detection

    Phishing attacks are a significant security threat to users of the Internet, causing tremendous economic loss every year. Past work in academia has not been adopted by industry in part due to concerns about liability over false positives. However, blacklist-based methods heavily used in industry are slow in responding to...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Improving Web Availability for Clients With MONET

    Despite the increasing degree of multi-homing, path and data redundancy, and capacity available in the Internet, today's clients experience outage rates of a few percent when accessing Web sites. MONET ("Multi-homed Overlay NETwork), is a new system that improves client availability to Web sites using a combination of link multi-homing...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Here Are My Data Files. Here Are My Queries. Where Are My Results?

    DataBase Management Systems (DBMS) provide incredible flexibility and performance when it comes to query processing, scalability and accuracy. To fully exploit DBMS features, however, the user must define a schema, load the data, tune the system for the expected workload, and answer several questions. Should the database use a column-store,...

    Provided By Carnegie Mellon University

  • White Papers // Oct 2009

    A Random Dynamical Systems Approach to Filtering in Large-Scale Networks

    Networked Control Systems (NCS) have been proposed as the paradigm to model, design and analyze control systems where the effects of computation and communication on the performance of the closed loop system cannot be neglected and need to be incorporated in the model. NCS are amenable to describe large-scale systems...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Athena: A New Efficient Automatic Checker for Security Protocol Analysis

    The authors propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authentication, secrecy and properties related to electronic commerce. They have developed an automatic procedure for evaluating well-formed formulae in this logic. For a well-formed formula, if the...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Random Key Predistribution Schemes for Sensor Networks

    Wide-spread deployment of sensor networks is on the horizon. Networks of thousands of sensors may present an economical solution to some of the challenging problems: real-time traffic monitoring, building safety monitoring (structural, fire, and physical security monitoring), military sensing and tracking, distributed measurement of seismic activity, real-time pollution monitoring, wildlife...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software

    Software vulnerabilities have had a devastating effect on the Internet. Worms such as Code Red and Slammer can compromise hundreds of thousands of hosts within hours or even minutes, and cause millions of dollars of damage. To successfully combat these fast automatic Internet attacks, one needs fast automatic attack detection...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Athena: A Novel Approach to Efficient Automatic Security Protocol Analysis

    The authors propose a new efficient automatic verification technique, Athena, for security protocol analysis. It uses a new efficient representation - the extension to the Strand Space Model, and utilizes techniques from both model checking and theorem proving approaches. Athena is fully automatic and is able to prove the correctness...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    New Streaming Algorithms for Fast Detection of Super spreaders

    High-speed monitoring of Internet traffic is an important and challenging problem, with applications to real time attack detection and mitigation, traffic engineering, etc. However, packet-level monitoring requires fast streaming algorithms that use very little memory and little communication among collaborating network monitoring points. In this paper, the authors consider the...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Self-Management in Chaotic Wireless Deployments

    Over the past few years, wireless networking technologies have made vast forays into the daily lives. Today, one can find 802.11 hardware and other personal wireless technology employed at homes, shopping malls, coffee shops and airports. Present-day wireless network deployments bear two important properties: they are unplanned, with most Access...

    Provided By Carnegie Mellon University

  • White Papers // Jul 2010

    Real-Time Software Implementation of an IEEE 802.11a Baseband Receiver on Intel Multicore

    This paper presents a software-only implementation of an IEEE 802.11a (WiFi) receiver optimized for Intel multicore platforms. The receiver is about 50 times faster than a straightforward C implementation, i.e., an implementation that has the same functionality, but leaves optimization completely to the compiler. The hand-optimized implementation achieves real-time for...

    Provided By Carnegie Mellon University

  • White Papers // Apr 2010

    Requirements for an Integrity-Protected Hypervisor on the X86 Hardware Virtualized Architecture

    Virtualization has been purported to be a panacea for many security problems. The authors analyze the feasibility of constructing an integrity-protected hypervisor on contemporary x86 hardware that includes virtualization support, observing that without the fundamental property of hypervisor integrity, no secrecy properties can be achieved. Unfortunately, they find that significant...

    Provided By Carnegie Mellon University

  • White Papers // Jun 2010

    Competitive Responses Of Pricing, Advertising And Product Premium To Consumer Reviews

    Consumer product reviews, one of the earliest forms of online user generated contents, play a very significant role in consumer buying decisions as they help consumers resolve or reduce uncertainties about product features and qualities before their purchases. The authors provide a game-theoretic model to study as to how consumer...

    Provided By Carnegie Mellon University

  • White Papers // Dec 2010

    SCI-FI: Domain-Based Scalability, Control and Isolation for the Future Internet

    This paper presents the first Internet architecture designed for control and isolation. The authors of this paper propose to separate ASes into groups of independent routing sub-planes which then in-terconnect to form complete routes. The architecture, SCI-FI, provides superior resilience and security proper-ties as an intrinsic consequence of good design...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    Performance Analysis of IPSec and IKE for Mobile IP on Wireless Environments

    The Mobile IP protocol enables a node to change its point of attachment to an internet without changing its IP address. Mobile users are likely to take advantage of this protocol to obtain the services as if they were connected to their home network. In many cases these users will...

    Provided By Carnegie Mellon University

  • White Papers // Jan 2011

    StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense

    Today's Internet hosts are threatened by large scale Distributed Denial-of-Service (DDoS) attacks. The Path Identification (Pi) DDoS defense scheme has been recently proposed as a deterministic packet marking scheme that allows a DDoS victim to filter out attack packets on a per packet basis with high accuracy after only a...

    Provided By Carnegie Mellon University

  • White Papers // Mar 2010

    Simulation of Network Attacks on SCADA Systems

    Network security is a major issue affecting SCADA systems designed and deployed in the last decade. Simulation of network attacks on a SCADA system presents certain challenges, since even a simple SCADA system is composed of models in several domains and simulation environments. Here the authors demonstrate the use of...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    An Empirical Analysis of Mobile Voice and SMS Service: A Structural Model

    In addition to wireless telephony boom, a similar exponential increasing trend in wireless data service -for example, Short Message Service (SMS) - is visible as technology advances. The authors develop a structural model to examine user demand for voice and SMS services. Specifically, they measure the own- and the cross-price...

    Provided By Carnegie Mellon University

  • White Papers // Aug 2009

    Impact of Clustering on the BER Performance of Ad Hoc Wireless Networks

    Ad hoc wireless networks are characterized by multi-hop radio communications. The spatial distribution of the nodes is seldom perfectly regular. In particular, in a realistic ad hoc wireless network communication scenario, the nodes are likely to be clustered, i.e., to configure themselves in subgroups such that the nodes inside each...

    Provided By Carnegie Mellon University

  • White Papers // May 2010

    On Sparse Nonparametric Conditional Covariance Selection

    The authors develop a penalized kernel smoothing method for the problem of selecting nonzero elements of the conditional precision matrix, known as conditional covariance selection. This problem has a key role in many modern applications such as finance and computational biology. However, it has not been properly addressed. The estimator...

    Provided By Carnegie Mellon University