Northeastern University

Displaying 1-40 of 91 results

  • White Papers // Dec 2014

    BABELCRYPT: The Universal Encryption Layer for Mobile Messaging Applications

    "Internet-based mobile messaging applications have become a ubiquitous means of communication, and have quickly gained popularity over cellular Short Messages Service (SMS). Unfortunately, from a security point of view, free messaging services do not guarantee the privacy of users. For example, free messaging providers can record and store exchanged messages...

    Provided By Northeastern University

  • White Papers // Aug 2014

    Database Queries That Explain Their Work

    Provenance for database queries or scientific workflows is often motivated as providing explanation, increasing understanding of the underlying data sources and processes used to compute the query, and reproducibility, the capability to recompute the results on different inputs, possibly specialized to a part of the output. Many provenance systems claim...

    Provided By Northeastern University

  • White Papers // Jun 2014

    Optical Delusions: A Study of Malicious QR Codes in the Wild

    "QR codes, a form of 2D barcode, allow easy interaction between mobile devices and websites or printed material by removing the burden of manually typing a URL or contact information. QR codes are increasingly popular and are likely to be adopted by malware authors and cyber-criminals as well. In fact,...

    Provided By Northeastern University

  • White Papers // May 2014

    Toward Robust Hidden Volumes using Write-Only Oblivious RAM

    With sensitive data being increasingly stored on mobile devices and laptops, hard disk encryption is more important than ever. In particular, being able to plausibly deny that a hard disk contains certain information is a very useful and interesting research goal. However, it has been known for some time that...

    Provided By Northeastern University

  • White Papers // Feb 2014

    Cost Effective Test Methodology Using PMU for Automated Test Equipment Systems

    In this paper, test methodology using parametric measurement unit is proposed for Automated Test Equipment (ATE) systems using 600MHz Driver, Comparator, and active Load (DCL). ATE systems are a very important means to reduce the device test cost, and the systems should be able to test several modes to check...

    Provided By Northeastern University

  • White Papers // Nov 2013

    Algorithm and Architecture Co-Design of Mixture of Gaussian (MoG) Background Subtraction for Embedded Vision

    Embedded vision is a rapidly growing and challenging market that demands high computation with low power consumption. Carefully crafted heterogeneous platforms have the possibility to deliver the required computation within the power budget. However, to achieve efficient realizations, vision algorithms and architectures have to be developed and tuned in conjunction....

    Provided By Northeastern University

  • White Papers // Nov 2013

    Flexible Function-Level Acceleration of Embedded Vision Applications Using the Pipelined Vision Processor

    The emerging massive embedded vision market is driving demanding and ever-increasing computationally complex high-performance and low-power MPSoC requirements. To satisfy these requirements innovative solutions are required to deliver high performance pixel processing combined with low energy per pixel execution. These solutions must combine the power efficiency of ASIC style IP...

    Provided By Northeastern University

  • White Papers // Nov 2013

    Practical Privacy-Preserving Range and Sort Queries with Update-Oblivious Linked Lists

    The authors present RASP, a new protocol for privacy-preserving range search and sort queries on encrypted data in the face of an untrusted data store. The contribution of RASP over related work is twofold: first, RASP improves privacy guarantees by ensuring that after a query for range [a;b] any new...

    Provided By Northeastern University

  • White Papers // Nov 2013

    Modeling Fuzzy Data With Fuzzy Data Types in Fuzzy Database and XML Models

    Various fuzzy data models such as fuzzy relational databases, fuzzy object-oriented databases, fuzzy object relational databases and fuzzy XML have been proposed in the literature in order to represent and process fuzzy information in databases and XML. But little work has been done in modeling fuzzy data types. Actually in...

    Provided By Northeastern University

  • White Papers // May 2013

    A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks

    Establishing secure access and communications in a Hierarchical Mobile IPv6 (HMIPv6) network, when a mobile node is roaming into a foreign network, is a challenging task and has so far received little attention. Existing solutions are mainly based on Public Key Infrastructure (PKI) or Identity-Based Cryptography (IBC). However, these solutions...

    Provided By Northeastern University

  • White Papers // Apr 2013

    Securing Legacy Firefox Extensions With SENTINEL

    A poorly designed web browser extension with security vulnerability may expose the whole system to an attacker. Therefore, attacks directed at "Benign-but-buggy" extensions, as well as extensions that have been written with malicious intents pose significant security threats to a system running such components. Recent studies have in-deed shown that...

    Provided By Northeastern University

  • White Papers // Mar 2013

    PRIVEXEC: Private Execution as an Operating System Service

    Privacy has become an issue of paramount importance for many users. As a result, encryption tools such as TrueCrypt, OS-based full-disk encryption such as FileVault, and privacy modes in all modern browsers have become popular. However, although such tools are useful, they are not perfect. For example, prior work has...

    Provided By Northeastern University

  • White Papers // Jan 2013

    DISCLOSURE: Detecting Botnet Command and Control Servers Through Large-Scale NetFlow Analysis

    Botnets continue to be a significant problem on the Internet. Accordingly, a great deal of research has focused on methods for detecting and mitigating the effects of botnets. Two of the primary factors preventing the development of effective large-scale, wide-area botnet detection systems are seemingly contradictory. On the one hand,...

    Provided By Northeastern University

  • White Papers // Dec 2012

    FReD: Automated Debugging Via Binary Search Through a Process Lifetime

    Reversible debuggers have been developed at least since 1970. Such a feature is useful when the cause of a bug is close in time to the bug manifestation. When the cause is far back in time, one resort to setting appropriate breakpoints in the debugger and beginning a new debugging...

    Provided By Northeastern University

  • White Papers // Dec 2012

    Clickonomics: Determining the Effect of Anti-Piracy Measures for One-Click Hosting

    Piracy is a mass phenomenon on the Internet today. Various file sharing platforms offer free access to unauthorised copies of copyrighted works such as media content and software. Copyright holders are using a range of legal and technical methods to protect their rights, and they are lobbying for legislation that...

    Provided By Northeastern University

  • White Papers // Dec 2012

    A Generic Checkpoint-Restart Mechanism for Virtual Machines

    It is common today to deploy complex software inside a Virtual Machine (VM). Snapshots provide rapid deployment, migration between hosts, dependability (fault tolerance), and security (insulating a guest VM from the host). Yet, for each virtual machine, the code for snapshots is laboriously developed on a per-VM basis. This paper...

    Provided By Northeastern University

  • White Papers // Dec 2012

    A Practical, Targeted, and Stealthy Attack Against WPA Enterprise Authentication

    Wireless networking technologies have fundamentally changed the way the people compute, allowing ubiquitous, anytime and any-where access to information. At the same time, wireless technologies come with the security cost that adversaries may receive signals and engage in unauthorized communication even when not physically close to a network. Because of...

    Provided By Northeastern University

  • White Papers // Sep 2012

    Impact of Mobile Transmitter Sources on Radio Frequency Wireless Energy Harvesting

    Wireless energy harvesting sensor networks constitute a new paradigm, where the motes deployed in the field are no longer constrained by the limited battery resource, but are able to re-charge themselves through directed electromagnetic energy transfer. The energy sources, which the people call actors, are mobile and move along pre-decided...

    Provided By Northeastern University

  • White Papers // Sep 2012

    Privacy Risks in Named Data Networking: What is the Cost of Performance?

    Named data networking architectures have been proposed to improve various shortcomings of the current Internet architecture. A key part of these proposals is the capability of caching arbitrary content in arbitrary network locations. While caching has the potential to improve network performance, the data stored in caches can be seen...

    Provided By Northeastern University

  • White Papers // Aug 2012

    Symbol Error Rate Analysis for M-QAM Modulated Physical-Layer Network Coding with Phase Errors

    Recent theoretical studies of Physical-layer Network Coding (PNC) show much interest on high-level modulation, such as M-ary Quadrature Amplitude Modulation (M-QAM), and most related works are based on the assumption of phase synchrony. The possible presence of synchronization error and channel estimation error highlight the demand of analyzing the Symbol...

    Provided By Northeastern University

  • White Papers // Aug 2012

    Privacy Implications of Ubiquitous Caching in Named Data Networking Architectures

    Content is at the heart of next-generation Internet architectures such as Content-Centric Networking (CCN): Instead of routing location-based messages to end hosts, the network transmits location-independent, named content objects. Such data objects can (and are envisioned to) be cached in arbitrary network nodes. In this paper, the authors discuss several...

    Provided By Northeastern University

  • White Papers // Jul 2012

    An Analysis of Complex Adaptive Computer Manufacturing Supply Network Evolution in Competitive Markets

    Unlike in the past, global markets, suppliers, and consumers are more connected today than ever, creating a rapidly changing ecosystem. While this is good for all, it makes markets more competitive and forces businesses to adapt to market trends to survive. This paper focuses on highly dynamic complex adaptive Computer...

    Provided By Northeastern University

  • White Papers // Jun 2012

    WebCloud: Recruiting Social Network Users to Assist in Content Distribution

    Today, the data exchanged over Online Social Networks (OSNs) represents a significant fraction of internet traffic. However, OSN content is different from more traditional web content, as it is more likely to be generated at the edge of the network, to be exchanged within a local geographic region, and to...

    Provided By Northeastern University

  • White Papers // Jun 2012

    Paying for Piracy? an Analysis of One-Click Hosters' Controversial Reward Schemes

    One-Click Hosters (OCHs) such as Rapid share and now defunct Mega upload are popular services where users can upload and store large files. Up loaders can then share the files with friends or make them publicly available by publishing the download links in separate directories, so-called direct download or streaming...

    Provided By Northeastern University

  • White Papers // Jun 2012

    Data Security and Privacy Protection Issues in Cloud Computing

    It is well-known that cloud computing has many potential advantages and many enterprise applications and data are migrating to public or hybrid cloud. But regarding some business-critical applications, the organizations, especially large enterprises, still wouldn't move them to cloud. The market size the cloud computing shared is still far behind...

    Provided By Northeastern University

  • White Papers // May 2012

    ADUS: Adaptive Resource Allocation in Cluster Systems Under Heavy-Tailed and Bursty Workloads

    A large-scaled cluster system has been employed in various areas by offering pools of fundamental resources. How to effectively allocate the shared resources in a cluster system is a critical but challenging issue, which has been extensively studied in the past few years. Despite the fact that classic load balancing...

    Provided By Northeastern University

  • White Papers // Apr 2012

    Preventing Input Validation Vulnerabilities in Web Applications Through Automated Type Analysis

    Web applications have become an integral part of the daily lives of millions of users. Unfortunately, web applications are also frequently targeted by attackers, and critical vulnerabilities such as XSS and SQL injection are still common. As a consequence, much effort in the past decade has been spent on mitigating...

    Provided By Northeastern University

  • White Papers // Apr 2012

    On the Capacity of Rate-Adaptive Packetized Wireless Communication Links Under Jamming

    Over the last decades, wireless communication proved to be an enabling technology to an increasingly large number of applications. The convenience of wireless and its support of mobility has revolutionized the way the authors access data, information services, and interact with the physical world. Beyond enabling mobile devices to access...

    Provided By Northeastern University

  • White Papers // Mar 2012

    Superficially Substructural Types

    Many sub-structural type systems have been proposed for controlling access to shared state in higher-order languages. Central to these systems is the notion of a resource, which may be split into disjoint pieces that different parts of a program can manipulate independently without worrying about interfering with one another. Some...

    Provided By Northeastern University

  • White Papers // Mar 2012

    Active Flash: Out-of-Core Data Analytics on Flash Storage

    Next generation science will increasingly come to rely on the ability to perform efficient, on-the-fly analytics of data generated by High-Performance Computing (HPC) simulations, modeling complex physical phenomena. Scientific computing workflows are stymied by the traditional chaining of simulation and data analysis, creating multiple rounds of redundant reads and writes...

    Provided By Northeastern University

  • White Papers // Feb 2012

    Discovery Through Gossip

    The authors study randomized gossip-based processes in dynamic networks that are motivated by discovery processes in large-scale distributed networks like peer-to-peer or social networks. A well-studied problem in peer-to-peer networks is the resource discovery problem. There, the goal for nodes (hosts with IP addresses) is to discover the IP addresses...

    Provided By Northeastern University

  • White Papers // Feb 2012

    Novel Blind CFO Estimator for Uplink Interleaved OFDMA Systems

    In Orthogonal Frequency-Division Multiple Access (OFDMA) systems, closely spaced and overlapped sub-carriers are divided into groups and assigned to multiple users for simultaneous transmission. However, Carrier Frequency Offsets (CFOs) between the transmitter and the receiver destroy the orthogonality and introduce Inter-Carrier Interference (ICI), resulting in Multiple-Access Interference (MAI). By the...

    Provided By Northeastern University

  • White Papers // Feb 2012

    Distributed Lifetime Maximization Routing With Data Aggregation in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of low-power and energy-constrained sensor nodes, and a fundamental challenge in the design of WSNs is to maximize the network lifetime. In WSNs, data collected by adjacent sensor nodes usually have spatial-temporal correlations, and data aggregation technique is often used as an effective approach to...

    Provided By Northeastern University

  • White Papers // Feb 2012

    ERP Implementation for Corporate Growth and Sustainability

    This paper discusses the problems a growing high-tech company faces and how it responds by selecting new Enterprise Resource Planning (ERP) software. It describes the process they used in selecting a 'Best fit' ERP vendor, how they developed a time frame to train employees and implement the new ERP system,...

    Provided By Northeastern University

  • White Papers // Dec 2011

    CEIP Maps: Context-embedded Information Product Maps

    In this paper, the authors present a second-generation coding and visualization technique for IP Maps to improve usability and analyzability. They expand the details of IP mapping to convey contextual elements of the data production process. They ground their modifications in theories on information quality, context theory and argumentation theory....

    Provided By Northeastern University

  • White Papers // Dec 2011

    Exploring the Design Space of Social Network-Based Sybil Defenses

    Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glance, existing social network-based Sybil defense schemes can be divided into two categories: Sybil detection and Sybil tolerance. These two categories of systems both...

    Provided By Northeastern University

  • White Papers // Dec 2011

    Active Flash: Performance-Energy Tradeoffs for Out-of-Core Processing on Non-Volatile Memory Devices

    In this paper, the authors study the performance and energy tradeoffs involved in migrating data analysis into the flash device, a process they refer to as Active Flash. The Active Flash paradigm is similar to "Active disks", which has received considerable attention. Active Flash allows one to move processing closer...

    Provided By Northeastern University

  • White Papers // Dec 2011

    Quantized Feedback Control for Networked Control Systems Under Communication Constraints

    This paper investigates the feedback stabilization problem for Networked Control Systems (NCSs) with unbound process noise, where sensors and controllers are connected via noiseless digital channels carrying a finite number of bits per unit time. A sufficient condition for stabilization of NCSs, which relies on a variable-rate digital link used...

    Provided By Northeastern University

  • White Papers // Nov 2011

    Insights Into User Behavior in Dealing With Internet Attacks

    The Internet is a lucrative medium for criminals targeting Internet users. Most common Internet attacks require some form of user interaction such as clicking on an exploit link. Hence, the problem at hand is not only a technical one, but it also has a strong human aspect. Although the security...

    Provided By Northeastern University

  • White Papers // Nov 2011

    Typing the Numeric Tower

    In the past, the creators of numerical programs had to choose between simple expression of mathematical formulas and static type checking. While the Lisp family and its dynamically typed relatives support the straightforward expression via a rich numeric tower, existing statically typed languages force programmers to pollute textbook formulas with...

    Provided By Northeastern University

  • White Papers // May 2014

    Toward Robust Hidden Volumes using Write-Only Oblivious RAM

    With sensitive data being increasingly stored on mobile devices and laptops, hard disk encryption is more important than ever. In particular, being able to plausibly deny that a hard disk contains certain information is a very useful and interesting research goal. However, it has been known for some time that...

    Provided By Northeastern University

  • White Papers // Nov 2013

    Algorithm and Architecture Co-Design of Mixture of Gaussian (MoG) Background Subtraction for Embedded Vision

    Embedded vision is a rapidly growing and challenging market that demands high computation with low power consumption. Carefully crafted heterogeneous platforms have the possibility to deliver the required computation within the power budget. However, to achieve efficient realizations, vision algorithms and architectures have to be developed and tuned in conjunction....

    Provided By Northeastern University

  • White Papers // Nov 2013

    Flexible Function-Level Acceleration of Embedded Vision Applications Using the Pipelined Vision Processor

    The emerging massive embedded vision market is driving demanding and ever-increasing computationally complex high-performance and low-power MPSoC requirements. To satisfy these requirements innovative solutions are required to deliver high performance pixel processing combined with low energy per pixel execution. These solutions must combine the power efficiency of ASIC style IP...

    Provided By Northeastern University

  • White Papers // Feb 2014

    Cost Effective Test Methodology Using PMU for Automated Test Equipment Systems

    In this paper, test methodology using parametric measurement unit is proposed for Automated Test Equipment (ATE) systems using 600MHz Driver, Comparator, and active Load (DCL). ATE systems are a very important means to reduce the device test cost, and the systems should be able to test several modes to check...

    Provided By Northeastern University

  • White Papers // Oct 2011

    WCET Analysis with MRU Caches: Challenging LRU for Predictability

    Most previous paper in cache analysis for WCET estimation assumes a particular replacement policy called LRU. In contrast, much less work has been done for non-LRU policies, since they are generally considered to be very \"Unpredictable\". However, most commercial processors are actually equipped with these non-LRU policies, since they are...

    Provided By Northeastern University

  • White Papers // Jun 2012

    WebCloud: Recruiting Social Network Users to Assist in Content Distribution

    Today, the data exchanged over Online Social Networks (OSNs) represents a significant fraction of internet traffic. However, OSN content is different from more traditional web content, as it is more likely to be generated at the edge of the network, to be exchanged within a local geographic region, and to...

    Provided By Northeastern University

  • White Papers // Dec 2014

    BABELCRYPT: The Universal Encryption Layer for Mobile Messaging Applications

    "Internet-based mobile messaging applications have become a ubiquitous means of communication, and have quickly gained popularity over cellular Short Messages Service (SMS). Unfortunately, from a security point of view, free messaging services do not guarantee the privacy of users. For example, free messaging providers can record and store exchanged messages...

    Provided By Northeastern University

  • White Papers // Jun 2014

    Optical Delusions: A Study of Malicious QR Codes in the Wild

    "QR codes, a form of 2D barcode, allow easy interaction between mobile devices and websites or printed material by removing the burden of manually typing a URL or contact information. QR codes are increasingly popular and are likely to be adopted by malware authors and cyber-criminals as well. In fact,...

    Provided By Northeastern University

  • White Papers // Aug 2014

    Database Queries That Explain Their Work

    Provenance for database queries or scientific workflows is often motivated as providing explanation, increasing understanding of the underlying data sources and processes used to compute the query, and reproducibility, the capability to recompute the results on different inputs, possibly specialized to a part of the output. Many provenance systems claim...

    Provided By Northeastern University

  • White Papers // Dec 2002

    Information Systems Risk Factors, Risk Assessments, and Audit Planning Decisions

    This paper examines systems risk factors identified by external auditors for a sample of their actual audit clients. Specifically, the paper studies two important areas of information systems risk: the risk of breaches in system security and the risk that the information provided by the system is inadequate. To perform...

    Provided By Northeastern University

  • White Papers // Jun 2009

    The Ff - Family of Protocols for RFID-Privacy and Authentication

    Ff is a family of lightweight and privacy-preserving authentication protocols for RFID-systems. Contrary to related work, Ff offers user-adjustable authentication and privacy without requiring a complex cryptographic hash function or non-volatile state on the tag. At the core of Ff is a lightweight keyed hash function that allows the reader...

    Provided By Northeastern University

  • White Papers // May 2007

    Best Practices of Spyware and Virus Removal

    This is the most streamlined document I can recommend to anyone who wants to improve their skills in cleaning an infected machine of spyware and viruses. I wrote it for junior technicians working at Northeastern Universities' Residential Network Resource Center thought the material could be used for the greater good....

    Provided By Northeastern University

  • White Papers // Jan 2010

    Energy-Efficient Data Management for Sensor Networks: A Work-in-Progress Report

    The paper gives a status update of the Cougar Project, in which the authors' investigate a database approach to sensor networks: Clients "Program" the sensors through queries in a high-level declarative language (such as a variant of SQL). This paper overviews the activities on energy-efficient data dissemination and query processing....

    Provided By Northeastern University

  • White Papers // Jan 2010

    Quantifying Load Imbalance on Virtualized Enterprise Servers

    Virtualization has been shown to be an attractive path to increase overall system resource utilization. The use of live Virtual Machine (VM) migration has enabled more effective sharing of system resources across multiple physical servers, resulting in an increase in overall performance. Live VM migration can be used to load...

    Provided By Northeastern University

  • White Papers // May 2009

    Adapting the USRP as an Underwater Acoustic Modem

    This paper describes how the Universal Software Radio Peripheral (USRP) coupled with GNU Radio can be adapted for use as a configurable UnderWater Acoustic (UWA) modem. The USRP contains an Altera Cyclone EP1C12 FPGA and typically acts as the baseband and IF section of a radio communication system. The work...

    Provided By Northeastern University

  • White Papers // Oct 2010

    Transport Layer - Congestion Control and QoS

    The resources being shared in the network include the bandwidth of the links, and the buffers on the routers or switches where packets are queued waiting to be transmitted over these links. Packets contend at a router for the use of a link, with each contending packet placed in a...

    Provided By Northeastern University

  • White Papers // Jan 2010

    QDMR: An Efficient QoS Dependent Multicast Routing Algorithm

    Many real-time applications, such as video conferencing, require the transmission of messages from a sender to multiple receivers subject to Quality-of-Service (QoS) delivery constraints (e.g. Bounded Delay). This requires the underlying multicast protocol to find a QoS-constrained minimum-cost communication path (Tree). However, finding such a tree is known to be...

    Provided By Northeastern University

  • White Papers // Nov 2010

    Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing

    In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on a single physical system, each executing a separate operating system instance. The hypervisor schedules execution of these VMs much as the scheduler in an operating system does, balancing factors such as fairness and I/O performance. As in an operating...

    Provided By Northeastern University

  • White Papers // May 2010

    Hygienic Macros for ACL2

    ACL2 is a theorem prover for a purely functional subset of Common Lisp. It inherits Common Lisp's unhygienic macros, which are used pervasively to eliminate repeated syntactic patterns. The lack of hygiene means that macros do not automatically protect the producers or consumers of macros from accidental variable capture. This...

    Provided By Northeastern University

  • White Papers // Jul 2010

    Functional Data Structures for Typed Racket

    Scheme provides excellent language support for programming in a functional style, but little in the way of library support. In this paper, the authors present a comprehensive library of functional data structures, drawing from several sources. The authors have implemented the library in Typed Racket, a typed variant of Racket,...

    Provided By Northeastern University

  • White Papers // Jul 2009

    Sequence Traces for Object-Oriented Executions

    Researchers have developed a large variety of semantic models of object-oriented computations. These include object calculi as well as denotational, small-step operational, big-step operational, and reduction semantics. Some focus on pure object-oriented computation in small calculi; many others mingle the object-oriented and the procedural aspects of programming languages. In this...

    Provided By Northeastern University

  • White Papers // Dec 2009

    Counting RFID Tags Efficiently and Anonymously

    Radio Frequency Identification (RFID) technology has attracted much attention due to its variety of applications, e.g., inventory control and object tracking. One important problem in RFID systems is how to quickly estimate the number of distinct tags without reading each tag individually. This problem plays a crucial role in many...

    Provided By Northeastern University

  • White Papers // Dec 2009

    Efficient Continuous Scanning in RFID Systems

    RFID is an emerging technology with many potential applications such as inventory management for supply chain. In practice, these applications often need a series of continuous scanning operations to accomplish a task. For example, if one wants to scan all the products with RFID tags in a large warehouse, given...

    Provided By Northeastern University

  • White Papers // Apr 2009

    Approximation Algorithms for Key Management in Secure Multicast

    Many data dissemination and publish-subscribe systems that guarantee the privacy and authenticity of the participants rely on symmetric key cryptography. An important problem in such a system is to maintain the shared group key as the group membership changes. The authors consider the problem of determining a key hierarchy that...

    Provided By Northeastern University

  • White Papers // Mar 2011

    Scheduler Vulnerabilities and Attacks in Cloud Computing

    In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on a single physical system, each executing a separate operating system instance. The hypervisor schedules execution of these VMs much as the scheduler in an operating system does, balancing factors such as fairness and I/O performance. As in an operating...

    Provided By Northeastern University

  • White Papers // Apr 2009

    Resource-Conscious Optimization of Cryptographic Algorithms on an Embedded Architecture

    Cryptographic algorithms are widely used in embedded systems. Applications of cryptographic algorithms include credentials establishment (e.g., authentication), securing contents (e.g., encryption/decryption of communication data or rights-managed objects), IP protection, and tamper-resistance checking. Resource constrained embedded systems can benefit greatly from employing cryptographic algorithms that are tuned to consume as little...

    Provided By Northeastern University

  • White Papers // Apr 2009

    A Code Layout Framework for Embedded Processors With Configurable Memory Hierarchy

    Several embedded processors now support configurable memory hierarchies to exploit application specific workload characteristics. To take advantage of memory reconfigurability, automated software optimization techniques are generally lacking and application developers often resort to a hand tuned code layout. This not only increases the time to market of embedded products but...

    Provided By Northeastern University

  • White Papers // Apr 2009

    Stream Programming on the Blackfin Architecture

    Streaming applications can be characterized by high data parallelism, low data reuse and a high ratio between computations to memory accesses. Memory accesses can be accelerated if the are serviced by low-latency memory and also by delaying writes to main memory until all processing kernels have been executed. In this...

    Provided By Northeastern University

  • White Papers // Oct 2009

    Weaving Generic Programming and Traversal Performance

    The development of complex software requires the implementation of functions over a variety of recursively defined data structures. The design (and modeling) of structures can itself be difficult, but complex data can lead to even more complex functions. In this paper, the authors introduce a declarative form of traversal-based generic...

    Provided By Northeastern University

  • White Papers // Feb 2010

    Nested and Dynamic Contract Boundaries

    Previous work on software contracts assumes fixed and statically known boundaries between the parties to a contract. Implementations of contract monitoring systems rely on this assumption to explain the nature of contract violations and to assign blame to violators. In this paper, the authors explain how to implement arbitrary, nested,...

    Provided By Northeastern University

  • White Papers // Aug 2009

    The Scribble Reader: An Alternative to S-Expressions for Textual Content

    For decades, S-expressions have been one of the fundamental advantages of languages in the Lisp family - a major factor in shaping these languages as an ideal platform for symbolic computations, from macros and meta-programming to symbolic data exchange and much more. As convenient as this minimalist syntax has proven...

    Provided By Northeastern University

  • White Papers // Jun 2009

    Debugging Hygienic Macros

    Over the past two decades, Scheme macros have evolved into a powerful API for the compiler front-end. Like Lisp macros, their predecessors, Scheme macros expand source programs into a small core language; unlike Lisp systems, Scheme macro expanders preserve lexical scoping, and advanced Scheme macro systems handle other important properties...

    Provided By Northeastern University

  • White Papers // Sep 2010

    Evaluating Call-by-Need on the Control Stack

    Ariola and Felleisen's call-by-need λ-calculus replaces a variable occurrence with its value at the last possible moment. To support this gradual notion of substitution, function applications-once established-are never discharged. In this paper the authors show how to translate this notion of reduction into an abstract machine that resolves variable references...

    Provided By Northeastern University

  • White Papers // Apr 2011

    An Analytic Framework for JavaScript

    As the programming language of the web, JavaScript deserves a principled yet robust framework for static analysis. To achieve both aims simultaneously, they start from an established reduction semantics for JavaScript and systematically derive its intensional abstract interpretation. The authors' first step is to transform the semantics into an equivalent...

    Provided By Northeastern University

  • White Papers // Feb 2010

    Is It Real, Or Is It Randomized?: A Financial Turing Test

    The authors construct a financial "Turing test" to determine whether human subjects can differentiate between actual vs. randomized financial returns. The experiment consists of an online video-game (http://arora.ccs.neu.edu) where players are challenged to distinguish actual financial market returns from random temporal permutations of those returns. They find overwhelming statistical evidence...

    Provided By Northeastern University

  • White Papers // Dec 2010

    Quo Vadis? a Study of the Evolution of Input Validation Vulnerabilities in Web Applications

    Web applications have become important services in ones' daily lives. Millions of users use web applications to obtain information, perform financial transactions, have fun, socialize, and communicate. Unfortunately, web applications are also frequently targeted by attackers. Recent data from SANS institute estimates that up to 60% of Internet attacks target...

    Provided By Northeastern University

  • White Papers // Feb 2011

    Automated Discovery of Parameter Pollution Vulnerabilities In Web Applications

    In the last twenty years, web applications have grown from simple, static pages to complex, full-fledged dynamic applications. Typically, these applications are built using heterogeneous technologies and consist of code that runs both on the client and on the server. Even simple web applications today may accept and process hundreds...

    Provided By Northeastern University

  • White Papers // Nov 2010

    Clustered Underwater Ad-Hoc Networks in the Presence of Interference

    The paper considers the performance of clustered underwater acoustic ad-hoc networks in the presence of interference. The authors assume a uniform distribution of nodes over a finite area. The cluster-to-cluster channel is modeled as a Ricean fading channel. They adopt a communication theoretic approach and study the interdependence of the...

    Provided By Northeastern University

  • White Papers // Jul 2010

    Clustered Multihop Transmission in Underwater Acoustic Ad-Hoc Networks

    The authors consider the performance of clustered underwater acoustic ad-hoc networks. They assume a uniform distribution of nodes over a finite area. The nodes in the network form clusters. The information is transmitted across the network from cluster to cluster with nodes in each cluster organized as virtual transmit/receive arrays....

    Provided By Northeastern University

  • White Papers // Aug 2010

    Communication Theoretic Analysis of Underwater Ad-Hoc Networks in the Presence of Interference

    The authors consider the performance of underwater acoustic ad-hoc networks in the presence of interference. They assume a uniform distribution of nodes over a finite area. The node-to-node channel was modeled using frequency dependent path loss and Ricean fading. They adopt a communication theoretic approach and study the interdependence of...

    Provided By Northeastern University