UC AB

Displaying 1-10 of 10 results

  • White Papers // Sep 2013

    A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster

    Erasure codes, such as Reed-Solomon (RS) codes, are being increasingly employed in data centers to combat the cost of reliably storing large amounts of data. Although these codes provide optimal storage efficiency, they require significantly high network and disk usage during recovery of missing data. In this paper, the authors...

    Provided By UC AB

  • White Papers // Jul 2013

    Practical Comprehensive Bounds on Surreptitious Communication Over DNS

    DNS queries represent one of the most common forms of network traffic, and likely the least blocked by sites. As such, DNS provides a highly attractive channel for attackers who wish to communicate surreptitiously across a network perimeter, and indeed a variety of tunneling toolkits exist. The authors develop a...

    Provided By UC AB

  • White Papers // Apr 2013

    The Case for Tiny Tasks in Compute Clusters

    The authors argue for breaking data-parallel jobs in compute clusters into tiny tasks that each complete in hundreds of milliseconds. Tiny tasks avoid the need for complex skew mitigation techniques: by breaking a large job into millions of tiny tasks, work will be evenly spread over available resources by the...

    Provided By UC AB

  • White Papers // Feb 2013

    Parallel and Dynamic Searchable Symmetric Encryption

    Searchable Symmetric Encryption (SSE) enables a client to outsource a collection of encrypted documents in the cloud and retain the ability to perform keyword searches without revealing information about the contents of the documents and queries. Although efficient SSE constructions are known, previous solutions are highly sequential. This is mainly...

    Provided By UC AB

  • White Papers // Jan 2013

    Model Checking One Million Lines of C Code

    Implementation bugs in security-critical software are pervasive. Several authors have previously suggested model checking as a promising means to detect improper use of system interfaces and thereby detect a broad class of security vulnerabilities. In this paper, the authors report on their practical experience using MOPS, a tool for software...

    Provided By UC AB

  • White Papers // Dec 2012

    Role Mining with Probabilistic Models

    Role mining pursues the goal of finding a Role-Based Access Control (RBAC) configuration that is extracted from the assignment of users to access permissions given by an access-control matrix. Most approaches to role mining work by constructing a large set of candidate roles and use a greedy selection strategy to...

    Provided By UC AB

  • White Papers // Dec 2012

    Towards Practical Oblivious RAM

    As cloud computing gains momentum, an increasing amount of data is outsourced to cloud storage, and data privacy has become an important concern for many businesses and individuals alike. The authors take an important step forward in making Oblivious RAM (O-RAM) practical. On the theoretic front, they propose a fundamentally...

    Provided By UC AB

  • White Papers // Dec 2012

    Active Learning for Crowd-Sourced Databases

    In this paper, the authors present algorithms for integrating machine learning algorithms for acquiring labeled data into crowd-sourced databases. The key observation is that there are a number of tasks for which humans and machine learning algorithms can be complementary, e.g., at labeling images where humans generally provide more accurate...

    Provided By UC AB

  • White Papers // Aug 2012

    A Mission-Centric Visualization Tool for Cybersecurity Situation Awareness

    The authors present a novel visualization tool that provides high-level situation awareness for cyber-security scenarios. Their visualization tool is tailored to intrinsically higher level information presentation centered around cyber-defense missions. They applied their visualizations to data logs from the 2011 UCSB international capture the flag competition, which was designed to...

    Provided By UC AB

  • White Papers // Aug 2012

    Enterprise Data Analysis and Visualization: An Interview Study

    Organizations rely on data analysts to model customer engagement, streamline operations, improve production, inform business decisions, and combat fraud. Though numerous analysis and visualization tools have been built to improve the scale and efficiency at which analysts can work, there has been little research on how analysis takes place within...

    Provided By UC AB

  • White Papers // Aug 2012

    A Mission-Centric Visualization Tool for Cybersecurity Situation Awareness

    The authors present a novel visualization tool that provides high-level situation awareness for cyber-security scenarios. Their visualization tool is tailored to intrinsically higher level information presentation centered around cyber-defense missions. They applied their visualizations to data logs from the 2011 UCSB international capture the flag competition, which was designed to...

    Provided By UC AB

  • White Papers // Jan 2013

    Model Checking One Million Lines of C Code

    Implementation bugs in security-critical software are pervasive. Several authors have previously suggested model checking as a promising means to detect improper use of system interfaces and thereby detect a broad class of security vulnerabilities. In this paper, the authors report on their practical experience using MOPS, a tool for software...

    Provided By UC AB

  • White Papers // Apr 2013

    The Case for Tiny Tasks in Compute Clusters

    The authors argue for breaking data-parallel jobs in compute clusters into tiny tasks that each complete in hundreds of milliseconds. Tiny tasks avoid the need for complex skew mitigation techniques: by breaking a large job into millions of tiny tasks, work will be evenly spread over available resources by the...

    Provided By UC AB

  • White Papers // Feb 2013

    Parallel and Dynamic Searchable Symmetric Encryption

    Searchable Symmetric Encryption (SSE) enables a client to outsource a collection of encrypted documents in the cloud and retain the ability to perform keyword searches without revealing information about the contents of the documents and queries. Although efficient SSE constructions are known, previous solutions are highly sequential. This is mainly...

    Provided By UC AB

  • White Papers // Jul 2013

    Practical Comprehensive Bounds on Surreptitious Communication Over DNS

    DNS queries represent one of the most common forms of network traffic, and likely the least blocked by sites. As such, DNS provides a highly attractive channel for attackers who wish to communicate surreptitiously across a network perimeter, and indeed a variety of tunneling toolkits exist. The authors develop a...

    Provided By UC AB

  • White Papers // Sep 2013

    A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster

    Erasure codes, such as Reed-Solomon (RS) codes, are being increasingly employed in data centers to combat the cost of reliably storing large amounts of data. Although these codes provide optimal storage efficiency, they require significantly high network and disk usage during recovery of missing data. In this paper, the authors...

    Provided By UC AB

  • White Papers // Aug 2012

    Enterprise Data Analysis and Visualization: An Interview Study

    Organizations rely on data analysts to model customer engagement, streamline operations, improve production, inform business decisions, and combat fraud. Though numerous analysis and visualization tools have been built to improve the scale and efficiency at which analysts can work, there has been little research on how analysis takes place within...

    Provided By UC AB

  • White Papers // Dec 2012

    Active Learning for Crowd-Sourced Databases

    In this paper, the authors present algorithms for integrating machine learning algorithms for acquiring labeled data into crowd-sourced databases. The key observation is that there are a number of tasks for which humans and machine learning algorithms can be complementary, e.g., at labeling images where humans generally provide more accurate...

    Provided By UC AB

  • White Papers // Dec 2012

    Towards Practical Oblivious RAM

    As cloud computing gains momentum, an increasing amount of data is outsourced to cloud storage, and data privacy has become an important concern for many businesses and individuals alike. The authors take an important step forward in making Oblivious RAM (O-RAM) practical. On the theoretic front, they propose a fundamentally...

    Provided By UC AB

  • White Papers // Dec 2012

    Role Mining with Probabilistic Models

    Role mining pursues the goal of finding a Role-Based Access Control (RBAC) configuration that is extracted from the assignment of users to access permissions given by an access-control matrix. Most approaches to role mining work by constructing a large set of candidate roles and use a greedy selection strategy to...

    Provided By UC AB