George Mason University

Displaying 1-40 of 136 results

  • White Papers // Jan 2014

    Accessing Big Data in the Cloud Using Mobile Devices

    The amount of data generated annually over the internet has exceeded the zeta-byte levels. Processing data with such high volume far exceeds the computational capabilities of today's datacenters and computers, giving rise to the term big data. The amount of data acquired, stored, and processed annually over the Internet has...

    Provided By George Mason University

  • White Papers // Nov 2013

    The Anatomy of Mapreduce Jobs, Scheduling, and Performance Challenges

    Hadoop is a leading open source tool that supports the realization of the big data revolution and is based on Google's MapReduce pioneering work in the field of ultra large amount of data storage and processing. Instead of relying on expensive proprietary hardware, Hadoop clusters typically consist of hundreds or...

    Provided By George Mason University

  • White Papers // Sep 2013

    Reducing Power in Hybrid MRAM Cache Through Iterative Low Voltage Writes

    As technology scales down, the static leakage power of SRAM based cache becomes a more critical source of dissipated power, particularly for large last level cache where leakage power is high. The emerging non-volatile Spin Transfer Torque (STT-RAM) is a nominee to substitute SRAM due to low leakage power. However,...

    Provided By George Mason University

  • White Papers // Apr 2013

    IOCheck: A Framework to Enhance the Security of I/O Devices at Runtime

    Securing hardware is the foundation for implementing a secure system. However, securing hardware devices remains an open research problem. In this paper, the authors present IOCheck, a framework to enhance the security of I/O devices at runtime. It leverages System Management Mode (SMM) to quickly check the integrity of I/O...

    Provided By George Mason University

  • White Papers // Apr 2013

    MOTAG: Moving Target Defense Against Internet Denial of Service Attacks

    Distributed Denial of Service (DDoS) attacks still pose a significant threat to critical infrastructure and Internet services alike. In this paper, the authors propose MOTAG, a moving target defense mechanism that secures service access for authenticated clients against flooding DDoS attacks. MOTAG employs a group of dynamic packet indirection proxies...

    Provided By George Mason University

  • White Papers // Jan 2013

    Billing Attacks on SIP-Based VoIP Systems

    Billing is fundamental to any commercial VoIP services and it has direct impact on each individual VoIP subscriber. One of the most basic requirements of any VoIP billing function is that it must be reliable and trustworthy. From the VoIP subscriber's perspective, VoIP billing should only charge them for the...

    Provided By George Mason University

  • White Papers // Jan 2013

    Out-of-the-Box Monitoring of VM-Based High-Interaction Honeypots

    Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by deploying honeypots, especially high-interaction ones, largely rely on the monitoring capability on the honeypots. In practice, based on the location of sensors,...

    Provided By George Mason University

  • White Papers // Dec 2012

    Concurrent Object-Oriented Development with Behavioral Design Patterns

    The development of concurrent applications is challenging because of the complexity of concurrent designs and the hazards of concurrent programming. Architectural modeling using the Unified Modeling Language (UML) can support the development process, but the problem of mapping the model to a concurrent implementation remains. This paper addresses this problem...

    Provided By George Mason University

  • White Papers // Dec 2012

    Queuing Network Models to Predict the Completion Time of the Map Phase of MapReduce Jobs

    Big data processing is generally defined as a situation when the size of the data itself becomes part of the computational problem. This paper has made divide-and-conquer type algorithms implemented in clusters of multi-core CPUs in Hadoop/MapReduce environments an important data processing tool for many organizations. Jobs of various kinds,...

    Provided By George Mason University

  • White Papers // Oct 2012

    Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs

    In this paper, the authors present a comprehensive comparison of all Round 3 SHA-3 candidates and the current standard SHA-2 from the point of view of hardware performance in modern FPGAs. Each algorithm is implemented using multiple architectures based on the concepts of iteration, folding, unrolling, pipelining, and circuit replication....

    Provided By George Mason University

  • White Papers // Sep 2012

    Geoprocessing on the Amazon Cloud Computing Platform - AWS

    With the continuously increment of the available amount of spatial data sets, science, industry and administration require web-based geo-information concerning storage, availability and processing. The development of Spatial Data Infrastructures (SDIs) brings about the Web-based sharing of large volumes of distributed geospatial data and computational resources. A powerful, dependable and...

    Provided By George Mason University

  • White Papers // Jul 2012

    Security Margin Evaluation of SHA-3 Contest Finalists Through SAT-Based Attacks (Extension)

    In 2007, the U.S. National Institute of Standards and Technology (NIST) announced a public contest aiming at the selection of a new standard for a cryptographic hash function. In this paper, the security margin of five SHA-3 finalists is evaluated with an assumption that attacks launched on finalists should be...

    Provided By George Mason University

  • White Papers // Jun 2012

    The Virtual Apprentice

    Over the past couple of decades, virtual humans have been attracting more and more attention. Many applications including, video games, movies, and various training and tutoring systems have benefited from work in this area. While the visual quality of virtual agents has improved dramatically, their intelligence and socialization still needs...

    Provided By George Mason University

  • White Papers // Apr 2012

    NetGator: Malware Detection Using Program Interactive Challenges

    Internet-borne threats have evolved from easy to detect denial of service attacks to zero-day exploits used for targeted exfiltration of data. Current intrusion detection systems cannot always keep-up with zero-day attacks and it is often the case that valuable data have already been communicated to an external party over an...

    Provided By George Mason University

  • White Papers // Mar 2012

    The MEERKATS Cloud Security Architecture

    MEERKATS is a novel architecture for cloud environments that elevates continuous system evolution and change as first-rate design principles. The authors' goal is to enable an environment for cloud services that constantly changes along several dimensions, toward creating an unpredictable target for an adversary. This unpredictability will both impede the...

    Provided By George Mason University

  • White Papers // Mar 2012

    Throughput Limits in Spectrum Sensing Cognitive Radio Networks Using Point Processes

    Spectrum sensing in cognitive wireless networks is important for Secondary nodes to avoid interference with the Primaries. In this paper, considering a spectrum sensing framework, the authors develop models for bounding interference levels from Secondary network to the Primary nodes. First, they assume that both networks are distributed according to...

    Provided By George Mason University

  • White Papers // Mar 2012

    Crowd Distribution and Location Preference

    Most crowd simulators focus on navigation and agents flow. In this paper, the authors present another perspective which concentrates on the overall distribution of virtual agents and uses psychological preferences for choosing goal locations. Both observation and published theory indicate that most people prefer to maintain their personal space as...

    Provided By George Mason University

  • White Papers // Jan 2012

    NSDMiner: Automated Discovery of Network Service Dependencies

    Enterprise networks today host a wide variety of network services, which often depend on each other to provide and support network-based services and applications. Understanding such dependencies is essential for maintaining the well-being of an enterprise network and its applications, particularly in the presence of network attacks and failures. In...

    Provided By George Mason University

  • White Papers // Nov 2011

    Chrome Extensions: Threat Analysis and Countermeasures

    The widely popular browser extensions now become one of the most commonly used malware attack vectors. The Google chrome browser, which implements the principles of least privileges and privilege separation by design, offers a strong security mechanism to protect malicious websites from damaging the whole browser system via extensions. In...

    Provided By George Mason University

  • White Papers // Nov 2011

    Groestl Tweaks and Their Effect on FPGA Results

    The authors have performed the first order analysis of the influence of the Round 3 tweaks in Groestl on the performance of this algorithm in FPGAs. Both Groestl-0 and the revised Groestl have been fully implemented in VHDL using two alternative architectures: quasi-pipelined and parallel. The results indicate that the...

    Provided By George Mason University

  • White Papers // Sep 2011

    Capacity Bounds in Random Wireless Networks

    The authors consider a receiving node, located at the origin, and a Poisson point process that models the locations of the desired transmitter as well as the interferers. Interference is known to be non-Gaussian in this scenario. The capacity bounds for additive non-Gaussian channels depend on not only the power...

    Provided By George Mason University

  • White Papers // Sep 2011

    An Empirical Study on Variants of TCP Over AODV Routing Protocol in MANET

    The cardinal concept of TCP development was to carry data within the network where network congestion plays a vital role to cause packet loss. On the other hand, there are several other reasons to lose packets in Mobile Ad Hoc Networks due to fading, interfaces, multi-path routing, malicious node, and...

    Provided By George Mason University

  • White Papers // Aug 2011

    Populations with Purpose

    There are currently a number of animation researchers that focus on simulating virtual crowds, but few are attempting to simulate virtual populations. Virtual crowd simulations tend to depict a large number of agents walking from one location to another as realistically as possible. The virtual humans in these crowds lack...

    Provided By George Mason University

  • White Papers // Jul 2011

    Network Security Risks Associated With IaaS in a Shared Environment

    Cloud computing offers extraordinary benefits and efficiencies to organizations. Organizations can now purchase computing resources on an as-needed basis without the overhead and costs of managing their own IT resources. However, with those efficiencies come many hurdles that must be overcome. Understanding what is going on behind the opaque wall...

    Provided By George Mason University

  • White Papers // Jun 2011

    NetGator: Malware Detection Through Program Interactive Proofs

    Exfiltration of data using internet-borne attacks has become a credible threat for organization and enterprises. History has shown that crafted targeted attacks and zero-day malware are capable of penetrating even the most sophisticated defenses. To make matters worse, intrusion detection systems that perform analysis of network traffic are dependent on...

    Provided By George Mason University

  • White Papers // Jun 2011

    Assessing Home Internet Users' Demand for Security: Will They Pay ISPs?

    One strategy for improving cyber security would be for Internet Service Providers (ISPs) to take a more active role in curtailing criminal behavior over the Internet. However, few ISPs today are offering robust security to their customers. They largely contend that home Internet users are unwilling to pay for improvements...

    Provided By George Mason University

  • White Papers // May 2011

    Guided Exploration of the Architectural Solution Space in the Face of Uncertainty

    A system's early architectural decisions impact its properties (e.g., scalability, dependability) as well as stakeholder concerns (e.g., cost, time to delivery). Choices made early on are both difficult and costly to change, and thus it is paramount that the engineer gets them "Right". This leads to a paradox, as in...

    Provided By George Mason University

  • White Papers // Apr 2011

    CapMan: Capability-Based Defense Against Multi-Path Denial of Service (DoS) Attacks in MANET

    This paper presents a capability-based security mechanism called CapMan. The authors' approach is designed to prevent Denial-of-Service (DoS) attacks on wireless communications, particularly against multi-path communication in Mobile Adhoc NETworks (MANETs). CapMan offers a mechanism for a per flow, distributed bandwidth control by all the participating nodes along multiple communication...

    Provided By George Mason University

  • White Papers // Apr 2011

    GPU-Euler: Sequence Assembly Using GPGPU

    Advances in sequencing technologies have revolutionized the field of genomics by providing cost effective and high throughput solutions. In this paper, the authors develop a parallel sequence assembler implemented on general purpose Graphic Processor Units (GPUs). The authors' work was largely motivated by a growing need in the genomic community...

    Provided By George Mason University

  • White Papers // Mar 2011

    Which Should We Try First? Ranking Information Resources Through Query Classification

    Users seeking information in distributed environments of large numbers of disparate information resources are often burdened with the task of repeating their queries for each and every resource. Invariably, some of the searched resources are more productive (yield more useful documents) than others, and it would be undoubtedly useful to...

    Provided By George Mason University

  • White Papers // Feb 2011

    Hidden Markov Process Based Dynamic Spectrum Access for Cognitive Radio

    Cognitive radio is an emerging technology for sensing and dynamic access of spectrum in mobile radio environments. It aims at dynamically allocating unused bandwidth among secondary users without causing harmful interference to the primary users. This approach, which has clear economical benefits, has recently attracted significant research effort. In this...

    Provided By George Mason University

  • White Papers // Feb 2011

    Resilient Traffic Engineering in a Transit-Edge Separated Internet Routing

    The significant growth of Internet traffic and increase of routing tables require solutions to address Internet scalability and resiliency. A possible direction is to move away from the flat legacy Internet routing to hierarchical routing, separating edge networks from transit networks. In this paper, the authors study the extended traffic...

    Provided By George Mason University

  • White Papers // Jan 2011

    Contract As Convention

    Contract theory is a curiously neglected field. While the efficiency of contract law rules has received much attention, the same cannot be said of the more basic question why contracts should be enforced. The reliance and autonomy explanations which contract theorists most frequently offer are moreover unpersuasive. Reliance theories would...

    Provided By George Mason University

  • White Papers // Jan 2011

    Enforcement Architecture and Implementation Model for Group-Centric Information Sharing

    A fundamental requirement for Secure Information Sharing (SIS) is that protection needs to extend to clients. Trusted Computing Technology provides a hardware root of trust through the Trusted Platform Module. This paper presents a super-distribution based enforcement architecture and implementation model for the group-centric SIS problem which is concerned with...

    Provided By George Mason University

  • White Papers // Jan 2011

    The Sound Of One Hand Clapping: The 2010 Merger Guidelines And The Challenge Of Judicial Adoption

    There is ample justification for the consensus view that the Horizontal Merger Guidelines have proven one of antitrust law's great successes in the grounding of antitrust doctrine within economic learning. The foundation of the Guidelines' success has been its widespread adoption by federal courts, which have embraced its rigorous underlying...

    Provided By George Mason University

  • White Papers // Jan 2011

    Life After Self-Healing: Assessing Post-Repair Program Behavior

    One promising technique for defending software systems against vulnerabilities involve the use of self-healing. Such efforts, however, carry a great deal of risk because they largely bypass the cycle of human-driven patching and testing used to vet both vendor and internally developed patches. In particular, it is difficult to predict...

    Provided By George Mason University

  • White Papers // Jan 2011

    Does Antitrust Enforcement In High Tech Markets Benefit Consumers? Stock Price Evidence From FTC V. Intel

    Antitrust enforcement efforts in the United States and abroad have been ramped up in high-tech industries, rekindling stale and largely unresolved debates concerning the appropriate role of antitrust enforcement in high-tech markets. Like the previous enforcement actions against Microsoft, and likely enforcement efforts in the future against similarly situated business...

    Provided By George Mason University

  • White Papers // Jan 2011

    Usage Control: A Vision for Next Generation Access Control

    The term Usage Control (UCON) is a generalization of access control to cover obligations, conditions, continuity (Ongoing controls) and mutability. Traditionally, access control has dealt only with authorization decisions on a subject's access to target resources. Obligations are requirements that have to be fulfilled by the subject for allowing access....

    Provided By George Mason University

  • White Papers // Jan 2011

    RandSys: Thwarting Code Injection Attacks With System Service Interface Randomization

    Code injection attacks are a top threat to today's Internet. With zero-day attacks on the rise, randomization techniques have been introduced to diversify software and operation systems of networked hosts so that attacks that succeed on one process or one host cannot succeed on others. Two most notable system-wide randomization...

    Provided By George Mason University

  • White Papers // Dec 2010

    Ruminate: A Scalable Architecture for Deep Network Analysis

    Traditionally, Network Intrusion Detection Systems (NIDS) inspect packet header and payload data for malicious content. While each system is different, most NIDS perform limited analysis on network streams and network protocols. Unfortunately, current NIDS are typically susceptible to evasion through network protocol encoding, such as base64 encoding of SMTP/MIME or...

    Provided By George Mason University

  • White Papers // Oct 2009

    Combining Cooperative Relaying With Spectrum Sensing in Cognitive Radio Networks

    In a network with dynamic spectrum access, secondary users equipped with frequency-agile cognitive radios communicate with one another via spectrum that is not being used by the primary, licensed users of the spectrum. The authors consider a scenario in which a secondary transmitter can communicate with a secondary receiver via...

    Provided By George Mason University

  • White Papers // Aug 2009

    Performance of a Cognitive Radio Network With Tolerable Service Degradation

    The authors analyze the performance of a cognitive radio wireless network, where secondary users opportunistically share the radio spectrum with primary users through spectrum sensing and may cause service degradation to the primary users due to unreliable spectrum sensing. When a secondary user occupying a channel detects the presence of...

    Provided By George Mason University

  • White Papers // Sep 2008

    Collaborative Opportunistic Spectrum Access in the Presence of Multiple Transmitters

    The authors present a collaborative algorithm to enable opportunistic spectrum access for cognitive radios in the presence of multiple co-channel transmitters. A spectrum hole detection and estimation technique based on received signal strength observations is developed, which allows the coexistence of both licensed and unlicensed transmitters. They address the issue...

    Provided By George Mason University

  • White Papers // Aug 2008

    An Adaptive Spectrum Detection Mechanism for Cognitive Radio Networks in Dynamic Traffic Environments

    The authors propose an adaptive spectrum detection mechanism for cognitive radios in a dynamic traffic environment. Cognitive radios generate secondary calls, which opportunistically make use of channels left idle by primary traffic generated by the licensed radios in the system. Spectrum detection for the cognitive radios is formulated as a...

    Provided By George Mason University

  • White Papers // Jun 2010

    Transmission Probability Control Game for Coexisting Random ALOHA Wireless Networks in Unlicensed Bands

    In this paper, the authors consider N ad hoc networks, with nodes randomly and uniformly distributed, coexisting and sharing an unlicensed band. The objective of this paper is the optimization of the transmission probabilities in these networks to maximize the throughput in each network. Throughput in each system is limited...

    Provided By George Mason University

  • White Papers // Jun 2011

    Assessing Home Internet Users' Demand for Security: Will They Pay ISPs?

    One strategy for improving cyber security would be for Internet Service Providers (ISPs) to take a more active role in curtailing criminal behavior over the Internet. However, few ISPs today are offering robust security to their customers. They largely contend that home Internet users are unwilling to pay for improvements...

    Provided By George Mason University

  • White Papers // Nov 2011

    Groestl Tweaks and Their Effect on FPGA Results

    The authors have performed the first order analysis of the influence of the Round 3 tweaks in Groestl on the performance of this algorithm in FPGAs. Both Groestl-0 and the revised Groestl have been fully implemented in VHDL using two alternative architectures: quasi-pipelined and parallel. The results indicate that the...

    Provided By George Mason University

  • White Papers // Jan 2012

    NSDMiner: Automated Discovery of Network Service Dependencies

    Enterprise networks today host a wide variety of network services, which often depend on each other to provide and support network-based services and applications. Understanding such dependencies is essential for maintaining the well-being of an enterprise network and its applications, particularly in the presence of network attacks and failures. In...

    Provided By George Mason University

  • White Papers // Feb 2011

    Resilient Traffic Engineering in a Transit-Edge Separated Internet Routing

    The significant growth of Internet traffic and increase of routing tables require solutions to address Internet scalability and resiliency. A possible direction is to move away from the flat legacy Internet routing to hierarchical routing, separating edge networks from transit networks. In this paper, the authors study the extended traffic...

    Provided By George Mason University

  • White Papers // Mar 2012

    Throughput Limits in Spectrum Sensing Cognitive Radio Networks Using Point Processes

    Spectrum sensing in cognitive wireless networks is important for Secondary nodes to avoid interference with the Primaries. In this paper, considering a spectrum sensing framework, the authors develop models for bounding interference levels from Secondary network to the Primary nodes. First, they assume that both networks are distributed according to...

    Provided By George Mason University

  • White Papers // Sep 2011

    An Empirical Study on Variants of TCP Over AODV Routing Protocol in MANET

    The cardinal concept of TCP development was to carry data within the network where network congestion plays a vital role to cause packet loss. On the other hand, there are several other reasons to lose packets in Mobile Ad Hoc Networks due to fading, interfaces, multi-path routing, malicious node, and...

    Provided By George Mason University

  • White Papers // Apr 2011

    CapMan: Capability-Based Defense Against Multi-Path Denial of Service (DoS) Attacks in MANET

    This paper presents a capability-based security mechanism called CapMan. The authors' approach is designed to prevent Denial-of-Service (DoS) attacks on wireless communications, particularly against multi-path communication in Mobile Adhoc NETworks (MANETs). CapMan offers a mechanism for a per flow, distributed bandwidth control by all the participating nodes along multiple communication...

    Provided By George Mason University

  • White Papers // Sep 2011

    Capacity Bounds in Random Wireless Networks

    The authors consider a receiving node, located at the origin, and a Poisson point process that models the locations of the desired transmitter as well as the interferers. Interference is known to be non-Gaussian in this scenario. The capacity bounds for additive non-Gaussian channels depend on not only the power...

    Provided By George Mason University

  • White Papers // Mar 2009

    Measurement Clustering Criteria for Localization of Multiple Transmitters

    The authors consider the problem of localizing multiple co-channel transmitters belonging to a licensed or primary network using signal strength measurements taken by a group of unlicensed or secondary nodes. Traditional localization techniques can be applied to multiple transmitter localization, provided that: the total number of co-channel transmitters in the...

    Provided By George Mason University

  • White Papers // May 2009

    Spectrum Sensing With SS-AOA Measurements and Directional Transmissions

    For successful Opportunistic Spectrum Access (OSA) using spatial information, accurate localization is a crucial first step. In this paper, the authors consider a group of unlicensed (secondary) nodes that collaboratively localize a target licensed (primary) transmitter. They propose an optimal hybrid localization scheme based on Signal Strength (SS) and Angle-Of-Arrival...

    Provided By George Mason University

  • White Papers // Aug 2008

    Estimation of Maximum Interference-Free Transmit Power Level for Opportunistic Spectrum Access

    The authors consider a scenario in which frequency agile radios opportunistically share a fixed spectrum resource with a set of primary nodes. They develop a collaborative scheme for a group of frequency agile radios to estimate the maximum power at which they can transmit on a given frequency channel, without...

    Provided By George Mason University

  • White Papers // Feb 2011

    Hidden Markov Process Based Dynamic Spectrum Access for Cognitive Radio

    Cognitive radio is an emerging technology for sensing and dynamic access of spectrum in mobile radio environments. It aims at dynamically allocating unused bandwidth among secondary users without causing harmful interference to the primary users. This approach, which has clear economical benefits, has recently attracted significant research effort. In this...

    Provided By George Mason University

  • White Papers // May 2010

    Exploiting Multichannel Diversity in Cognitive Radio Networks

    Cognitive radios hold tremendous promise for increasing spectral efficiency in wireless systems. In cognitive radio networks, secondary users equipped with frequency-agile cognitive radios communicate with one another via spectrum that is not being used by the primary, licensed users of the spectrum. The authors consider a multichannel cognitive radio network...

    Provided By George Mason University

  • White Papers // Feb 2010

    Cooperative Communication With Regenerative Relays for Cognitive Radio Networks

    Cognitive radios hold tremendous promise for increasing spectral efficiency in wireless systems. In cognitive radio networks, secondary users equipped with frequency-agile cognitive radios communicate with one another via spectrum that is not being used by the primary, licensed users of the spectrum. The authors consider a cooperative communication scenario in...

    Provided By George Mason University

  • White Papers // Oct 2009

    Exploiting Multiuser Diversity for Spectrum Sensing in Cognitive Radio Networks

    The authors consider wireless system consisting of secondary users equipped with cognitive radios that attempt to access radio spectrum that is not being used by the primary licensed users. To avoid causing harmful interference to the primary users, the secondary users perform spectrum sensing to determine spectrum hole opportunities for...

    Provided By George Mason University

  • White Papers // Dec 2009

    An Empirical Investigation Into the Security of Phone Features in SIP-Based VoIP Systems

    Phone features, e.g., 911 call, voicemail, and Do Not Disturb, are critical and necessary for all deployed VoIP systems. In this paper, the authors empirically investigate the security of these phone features. They have implemented a number of attacks and experimented with VoIP services by leading VoIP service providers Vonage,...

    Provided By George Mason University

  • White Papers // Jan 2013

    Billing Attacks on SIP-Based VoIP Systems

    Billing is fundamental to any commercial VoIP services and it has direct impact on each individual VoIP subscriber. One of the most basic requirements of any VoIP billing function is that it must be reliable and trustworthy. From the VoIP subscriber's perspective, VoIP billing should only charge them for the...

    Provided By George Mason University

  • White Papers // Jan 2013

    Out-of-the-Box Monitoring of VM-Based High-Interaction Honeypots

    Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by deploying honeypots, especially high-interaction ones, largely rely on the monitoring capability on the honeypots. In practice, based on the location of sensors,...

    Provided By George Mason University

  • White Papers // Sep 2012

    Geoprocessing on the Amazon Cloud Computing Platform - AWS

    With the continuously increment of the available amount of spatial data sets, science, industry and administration require web-based geo-information concerning storage, availability and processing. The development of Spatial Data Infrastructures (SDIs) brings about the Web-based sharing of large volumes of distributed geospatial data and computational resources. A powerful, dependable and...

    Provided By George Mason University

  • White Papers // Jun 2010

    Geospatial Cyberinfrastructure: Past, Present and Future

    A CyberInfrastructure (CI) is a combination of data resources, network protocols, computing platforms, and computational services that brings people, information, and computational tools together to perform science or other data-rich applications in this information-driven world. Most science domains adopt intrinsic geospatial principles (such as spatial constraints in phenomena evolution) for...

    Provided By George Mason University

  • White Papers // Mar 2012

    The MEERKATS Cloud Security Architecture

    MEERKATS is a novel architecture for cloud environments that elevates continuous system evolution and change as first-rate design principles. The authors' goal is to enable an environment for cloud services that constantly changes along several dimensions, toward creating an unpredictable target for an adversary. This unpredictability will both impede the...

    Provided By George Mason University

  • White Papers // Apr 2009

    Malyzer: Defeating Anti-detection for Application-Level Malware Analysis

    Malware analysis is critical for malware detection and prevention. To defeat malware analysis and detection, today malware commonly adopts various sophisticated anti-detection techniques, such as performing debugger, emulator, and virtual machine fingerprinting, and camouflaging its traffic as normal legitimate traffic. These mechanisms produce more and more stealthy malware that greatly...

    Provided By George Mason University

  • White Papers // Apr 2012

    NetGator: Malware Detection Using Program Interactive Challenges

    Internet-borne threats have evolved from easy to detect denial of service attacks to zero-day exploits used for targeted exfiltration of data. Current intrusion detection systems cannot always keep-up with zero-day attacks and it is often the case that valuable data have already been communicated to an external party over an...

    Provided By George Mason University

  • White Papers // Apr 2013

    IOCheck: A Framework to Enhance the Security of I/O Devices at Runtime

    Securing hardware is the foundation for implementing a secure system. However, securing hardware devices remains an open research problem. In this paper, the authors present IOCheck, a framework to enhance the security of I/O devices at runtime. It leverages System Management Mode (SMM) to quickly check the integrity of I/O...

    Provided By George Mason University

  • White Papers // Sep 2009

    Topological Vulnerability Analysis: A Powerful New Approach for Network Attack Prevention, Detection, and Response

    This paper examines issues and methods for survivability of systems under malicious penetrating attacks. To protect from such attacks, it is necessary to take steps to prevent them from succeeding. At the same time, it is important to recognize that not all attacks can be averted at the outset; those...

    Provided By George Mason University

  • White Papers // Apr 2010

    Optimal IDS Sensor Placement And Alert Prioritization Using Attack Graphs

    The authors optimally place Intrusion Detection System (IDS) sensors and prioritize IDS alerts using attack graph analysis. They begin by predicting all possible ways of penetrating a network to reach critical assets. The set of all such paths through the network constitutes an attack graph, which they aggregate according to...

    Provided By George Mason University

  • White Papers // Apr 2010

    Proactive Intrusion Prevention and Response via Attack Graphs

    Network defense today is largely reactive rather than proactive, and lacks sufficient context for optimal countermeasures. Administrators and security analysts are overwhelmed by constant outside threats, complexity of security measures, and network growth. Today's status quo for network defense is often reduced to mere triage and after-the-fact remediation. This paper...

    Provided By George Mason University

  • White Papers // Nov 2007

    A Data Outsourcing Architecture Combining Cryptography and Access Control

    Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challenging issues in such a scenario are the enforcement of authorization policies and the support of policy updates. Since a common approach for protecting...

    Provided By George Mason University

  • White Papers // Apr 2013

    MOTAG: Moving Target Defense Against Internet Denial of Service Attacks

    Distributed Denial of Service (DDoS) attacks still pose a significant threat to critical infrastructure and Internet services alike. In this paper, the authors propose MOTAG, a moving target defense mechanism that secures service access for authenticated clients against flooding DDoS attacks. MOTAG employs a group of dynamic packet indirection proxies...

    Provided By George Mason University

  • White Papers // Jun 2006

    An Anonymous Routing Protocol with the Local-Repair Mechanism for Mobile Ad Hoc Networks

    In this paper, the authors first define the requirements on anonymity and security properties of the routing protocol in mobile ad hoc networks, and then propose a new anonymous routing protocol with the local-repair mechanism. Detailed analysis shows that their protocol achieves both anonymity and security properties defined. A major...

    Provided By George Mason University

  • White Papers // May 2010

    Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs

    Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an evaluation should be performed in order to make it fair, transparent, practical, and acceptable for the majority of the cryptographic community....

    Provided By George Mason University

  • White Papers // Nov 2011

    Chrome Extensions: Threat Analysis and Countermeasures

    The widely popular browser extensions now become one of the most commonly used malware attack vectors. The Google chrome browser, which implements the principles of least privileges and privilege separation by design, offers a strong security mechanism to protect malicious websites from damaging the whole browser system via extensions. In...

    Provided By George Mason University

  • White Papers // Jan 2014

    Accessing Big Data in the Cloud Using Mobile Devices

    The amount of data generated annually over the internet has exceeded the zeta-byte levels. Processing data with such high volume far exceeds the computational capabilities of today's datacenters and computers, giving rise to the term big data. The amount of data acquired, stored, and processed annually over the Internet has...

    Provided By George Mason University

  • White Papers // Dec 2012

    Queuing Network Models to Predict the Completion Time of the Map Phase of MapReduce Jobs

    Big data processing is generally defined as a situation when the size of the data itself becomes part of the computational problem. This paper has made divide-and-conquer type algorithms implemented in clusters of multi-core CPUs in Hadoop/MapReduce environments an important data processing tool for many organizations. Jobs of various kinds,...

    Provided By George Mason University

  • White Papers // Nov 2013

    The Anatomy of Mapreduce Jobs, Scheduling, and Performance Challenges

    Hadoop is a leading open source tool that supports the realization of the big data revolution and is based on Google's MapReduce pioneering work in the field of ultra large amount of data storage and processing. Instead of relying on expensive proprietary hardware, Hadoop clusters typically consist of hundreds or...

    Provided By George Mason University