UC AB

Displaying 1 - 10 of 12 results

  • A Solution to the Network Challenges of Data Recovery in Erasure-coded Distributed Storage Systems: A Study on the Facebook Warehouse Cluster

    White Papers // Sep 2013 // provided by UC AB

    Erasure codes, such as Reed-Solomon (RS) codes, are being increasingly employed in data centers to combat the cost of reliably storing large amounts of data. Although these codes provide optimal storage efficiency, they require significantly high network and disk usage during recovery of missing data. In this paper, the authors ...

    Download Now
  • Practical Comprehensive Bounds on Surreptitious Communication Over DNS

    White Papers // Jul 2013 // provided by UC AB

    DNS queries represent one of the most common forms of network traffic, and likely the least blocked by sites. As such, DNS provides a highly attractive channel for attackers who wish to communicate surreptitiously across a network perimeter, and indeed a variety of tunneling toolkits exist. The authors develop a ...

    Download Now
  • The Case for Tiny Tasks in Compute Clusters

    White Papers // Apr 2013 // provided by UC AB

    The authors argue for breaking data-parallel jobs in compute clusters into tiny tasks that each complete in hundreds of milliseconds. Tiny tasks avoid the need for complex skew mitigation techniques: by breaking a large job into millions of tiny tasks, work will be evenly spread over available resources by the ...

    Download Now
  • Parallel and Dynamic Searchable Symmetric Encryption

    White Papers // Feb 2013 // provided by UC AB

    Searchable Symmetric Encryption (SSE) enables a client to outsource a collection of encrypted documents in the cloud and retain the ability to perform keyword searches without revealing information about the contents of the documents and queries. Although efficient SSE constructions are known, previous solutions are highly sequential. This is mainly ...

    Download Now
  • Model Checking One Million Lines of C Code

    White Papers // Jan 2013 // provided by UC AB

    Implementation bugs in security-critical software are pervasive. Several authors have previously suggested model checking as a promising means to detect improper use of system interfaces and thereby detect a broad class of security vulnerabilities. In this paper, the authors report on their practical experience using MOPS, a tool for software ...

    Download Now
  • Role Mining with Probabilistic Models

    White Papers // Dec 2012 // provided by UC AB

    Role mining pursues the goal of finding a Role-Based Access Control (RBAC) configuration that is extracted from the assignment of users to access permissions given by an access-control matrix. Most approaches to role mining work by constructing a large set of candidate roles and use a greedy selection strategy to ...

    Download Now
  • Towards Practical Oblivious RAM

    White Papers // Dec 2012 // provided by UC AB

    As cloud computing gains momentum, an increasing amount of data is outsourced to cloud storage, and data privacy has become an important concern for many businesses and individuals alike. The authors take an important step forward in making Oblivious RAM (O-RAM) practical. On the theoretic front, they propose a fundamentally ...

    Download Now
  • Active Learning for Crowd-Sourced Databases

    White Papers // Dec 2012 // provided by UC AB

    In this paper, the authors present algorithms for integrating machine learning algorithms for acquiring labeled data into crowd-sourced databases. The key observation is that there are a number of tasks for which humans and machine learning algorithms can be complementary, e.g., at labeling images where humans generally provide more accurate ...

    Download Now
  • A Mission-Centric Visualization Tool for Cybersecurity Situation Awareness

    White Papers // Aug 2012 // provided by UC AB

    The authors present a novel visualization tool that provides high-level situation awareness for cyber-security scenarios. Their visualization tool is tailored to intrinsically higher level information presentation centered around cyber-defense missions. They applied their visualizations to data logs from the 2011 UCSB international capture the flag competition, which was designed to ...

    Download Now
  • Enterprise Data Analysis and Visualization: An Interview Study

    White Papers // Aug 2012 // provided by UC AB

    Organizations rely on data analysts to model customer engagement, streamline operations, improve production, inform business decisions, and combat fraud. Though numerous analysis and visualization tools have been built to improve the scale and efficiency at which analysts can work, there has been little research on how analysis takes place within ...

    Download Now