UC Regents

Displaying 1-40 of 293 results

  • White Papers // Apr 2015

    Per-Core DVFS With Switched-Capacitor Converters for Energy Efficiency in Manycore Processors

    Integrating multiple power converters on-chip improves energy efficiency of many core architectures. Switched Capacitor (SC) DC-DC converters are compatible with conventional CMOS processes, but traditional implementations suffer from limited conversion efficiency. The authors propose a dynamic voltage and frequency scaling scheme with SC converters that achieves high converter efficiency by...

    Provided By UC Regents

  • White Papers // Nov 2014

    Constrained Interpolation for Guided Logic Synthesis

    Craig interpolation is a known method for expressing a target function f as a function of a given set of base functions G. The resulting interpolant represents the dependency function h, such that f

    Provided By UC Regents

  • White Papers // Apr 2014

    m-Inductive Properties of Logic Circuits

    In this paper, the authors introduce the concept of m-inductiveness over a set of signals S in a sequential circuit. The m-inductive property can be used for equivalence-checking or improved sequential optimization. When applied to verification, only equivalency of signals in S and primary outputs need to be checked. When...

    Provided By UC Regents

  • White Papers // Apr 2014

    Enumeration of Irredundant Circuit Structures

    A new approach to Boolean decomposition and matching is proposed. It uses enumeration of all support-reducing decompositions of Boolean functions up to 16 inputs. The approach is implemented in a new framework that compactly stores multiple circuit structures. The method makes use of pre-computations performed offline, before the framework is...

    Provided By UC Regents

  • White Papers // Oct 2013

    Algebraic MACs and Keyed-Verification Anonymous Credentials

    The authors consider the problem of constructing anonymous credentials for use in a setting where the issuer of credentials is also the verifier, or more generally where the issuer and verifier have a shared key. In this setting they can use Message Authentication Codes (MACs) instead of public key signatures...

    Provided By UC Regents

  • White Papers // Oct 2013

    New Trapdoor Projection Maps for Composite-Order Bilinear Groups

    An asymmetric pairing over groups of composite order is a bilinear map e: G1 G2 - GT for groups G1 and G2 of composite order N = pq. The authors observe that a recent construction of pairing-friendly elliptic curves in this setting by the researcher exhibits surprising and unprecedented structure:...

    Provided By UC Regents

  • White Papers // Jun 2013

    Measuring the Practical Impact of DNSSEC Deployment

    DNSSEC extends DNS with a public-key infrastructure, providing compatible clients with cryptographic assurance for DNS records they obtain, even in the presence of an active network attacker. As with many internet protocol deployments, administrators deciding whether to deploy DNSSEC for their DNS zones must perform cost/benefit analysis. For some fraction...

    Provided By UC Regents

  • White Papers // Jun 2012

    Establishing Browser Security Guarantees through Formal Shim Verification

    Web browsers mediate access to valuable private data in domains ranging from health care to banking. Despite this critical role, attackers routinely exploit browser vulnerabilities to exfiltrate private data and take over the underlying system. The authors present QUARK, a browser whose kernel has been implemented and verified in Coq....

    Provided By UC Regents

  • White Papers // Mar 2012

    Logic Synthesis for Disjunctions of Boolean Functions

    In this paper, the authors develop theoretical foundations and present a practical algorithm for optimizing multi-output Boolean function M(x) whose outputs are combined using Boolean OR operator into a single-output Boolean function S(x). The proposed algorithm simplifies the logic structure of function M(x) and may change or remove some of...

    Provided By UC Regents

  • White Papers // Mar 2012

    Sequential Logic Synthesis Using Symbolic Bi-Decomposition

    The authors review some general theorems, proved in a previous paper, about situations when SEC can be reduced to a Combinational Equivalence Checking (CEC) problem. Then, they show how these can be applied to the verification of sequentially clock-gated circuits. A new method based on these theorems was applied to...

    Provided By UC Regents

  • White Papers // Feb 2012

    Multiple-Input Relay Design for More Compact Implementation of Digital Logic Circuits

    Multiple-input relays have been proposed to implement digital logic more compactly than single-input relays. Although a multiple-input relay has a larger footprint than a single-input relay for the same input voltage range, the reduction in device count is advantageous because of the significant area required for the suspension beams and...

    Provided By UC Regents

  • White Papers // Nov 2011

    Characterization of Dynamic SRAM Stability in 45 nm CMOS

    Optimization of SRAM yield using dynamic stability metrics has been evaluated in the past to ensure continued scaling of bit-cell size and supply voltage in future technology nodes. Various dynamic stability metrics have been proposed but they have not been used in practical failure analysis and compared with conventional static...

    Provided By UC Regents

  • White Papers // Aug 2011

    Improved Spectrum Access Control of Cognitive Radios Based on Primary ARQ Signals

    Cognitive radio systems capable of opportunistic spectrum access represent a new paradigm for improving the efficiency of current spectrum utilization. In this paper, the authors present a novel cognitive channel access method based on learning from both primary channel transmissions and the receiver ARQ feedback signals. This new sensing-plus-confirmation scheme...

    Provided By UC Regents

  • White Papers // Aug 2011

    Quality-of-Information Aware Networking for Tactical Military Networks

    In tactical military networks, decisions must often be made quickly based on information at hand. It is a challenge to provide decision makers with a notion of the quality of the information they have, or to provide a method by which decision makers can specify a required quality of information....

    Provided By UC Regents

  • White Papers // Aug 2011

    FERMI: A FEmtocell Resource Management System for Interference Mitigation in OFDMA Networks

    The demand for increased spectral efficiencies is driving the next generation broadband access networks towards deploying smaller cells (femtocells) and sophisticated air interface technologies (Orthogonal Frequency Division Multiple Access or OFDMA). The dense deployment of femtocells however, makes interference and hence resource management both critical and extremely challenging. In this...

    Provided By UC Regents

  • White Papers // Aug 2011

    LEISURE: A Framework for Load-Balanced Network-Wide Traffic Measurement

    Network-wide traffic measurement is of interest to network operators to uncover global network behavior for the management tasks of traffic accounting, debugging or troubleshooting, security, and traffic engineering. Increasingly, sophisticated network measurement tasks such as anomaly detection and security forensic analysis are requiring in-depth fine-grained flow-level measurements. However, performing in-depth...

    Provided By UC Regents

  • White Papers // Jul 2011

    On the Empirical Performance of Self-Calibrating WiFi Location Systems

    The pervasive deployment of 802.11 in modern enterprise buildings has long made it an attractive technology for constructing indoor location services. To this end, a broad range of algorithms have been proposed to accurately estimate location from 802.11 signal strength measurements, some without requiring manual calibration for each physical location....

    Provided By UC Regents

  • White Papers // Jul 2011

    Quasi-Planar Bulk CMOS Technology for Improved SRAM Scalability

    Following Moore's law, transistor density has roughly doubled with each new CMOS technology generation largely due to the steady miniaturization of the transistor. A simple approach for manufacturing quasi-planar bulk MOSFET structures is demonstrated and shown to be effective not only for improving device performance but also for reducing variation...

    Provided By UC Regents

  • White Papers // Jul 2011

    Enhanching in Vehicle Digital Maps Via GPS Crowdsourcing

    In this paper, the authors propose a simple and effective method to extend digital maps with the location and timing of stop-signs and traffic lights in a city, given GPS traces collected by on-road vehicles. Their system finds the location and timing of traffic lights and stop-signs using a small...

    Provided By UC Regents

  • White Papers // Jul 2011

    TouchLogger: Inferring Keystrokes On Touch Screen From Smartphone Motion

    Attacks that use side channels, such as sound and electromagnetic emanation, to infer keystrokes on physical keyboards are ineffective on smartphones without physical keyboards. The authors describe a new side channel, motion, on touch screen smartphones with only soft keyboards. Since typing on different locations on the screen causes different...

    Provided By UC Regents

  • White Papers // Jul 2011

    Cooperative Jamming for Secure Communications in MIMO Relay Networks

    Secure communications can be impeded by eavesdroppers in conventional relay systems. This paper proposes cooperative jamming strategies for two-hop relay networks where the eavesdropper can wiretap the relay channels in both hops. In these approaches, the normally inactive nodes in the relay network can be used as cooperative jamming sources...

    Provided By UC Regents

  • White Papers // Jul 2011

    No Plan Survives Contact: Experience With Cybercrime Measurement

    An important mode of empirical security research involves analyzing the behavior, capabilities, and motives of adversaries. By definition, such measurements cannot be conducted in controlled settings and require "Engagement" directly with adversaries, their infrastructure or their ecosystem. However, the operational complexities required to successfully carry out such measurements are significant...

    Provided By UC Regents

  • White Papers // Jul 2011

    Variability of Location Management Costs With Different Mobilities and Timer Periods to Update Locations

    In this paper, the authors examine the location management costs in mobile communication networks utilizing the timer-based method. From the study of the probabilities that a mobile terminal changes a number of Location Areas between two calls, they identify a threshold value of 0.7 for the Call-to-Mobility Ratio (CMR) below...

    Provided By UC Regents

  • White Papers // Jul 2011

    Performance and Yield Benefits of Quasi-Planar Bulk CMOS Technology for 6-T SRAM at the 22-nm Node

    The performance and threshold voltage variability of quasi-planar bulk MOSFETs are compared against those of conventional bulk MOSFETs, via Three-Dimensional (3-D) device simulations with gate line-edge roughness and atomistic doping profiles, at 25nm gate length. The nominal performance of Six Transistor (6-T) SRAM cells is studied via 3-D simulation of...

    Provided By UC Regents

  • White Papers // Jul 2011

    Improving the Way We Design Games for Learning by Examining How Popular Video Games Teach

    One of the reasons why commercial video games are popular is that they effectively teach players how to play the game - in many cases as the player plays the game itself. This paper focuses on how to effectively integrate teaching "How to play a game" with teaching an "Instructional...

    Provided By UC Regents

  • White Papers // Jun 2011

    Measuring Pay-Per-Install: The Commoditization of Malware Distribution

    Recent years have seen extensive diversification of the "Underground economy" associated with malware and the subversion of Internet-connected systems. This trend towards specialization has compelling forces driving it: miscreants readily apprehend that tackling the entire value-chain from malware creation to monetization in the presence of ever-evolving countermeasures poses a daunting...

    Provided By UC Regents

  • White Papers // Jun 2011

    BOTMAGNIFIER: Locating Spambots on the Internet

    Unsolicited bulk email (spam) is used by cyber-criminals to lure users into scams and to spread malware infections. Most of these unwanted messages are sent by spam botnets, which are networks of compromised machines under the control of a single (malicious) entity. Often, these botnets are rented out to particular...

    Provided By UC Regents

  • White Papers // May 2011

    Authenticated and Misuse-Resistant Encryption of Key-Dependent Data

    This paper provides a comprehensive treatment of the security of Authenticated Encryption (AE) in the presence of key-dependent data, considering the four variants of the goal arising from the choice of universal nonce or random nonce security and presence or absence of a header. The authors present attacks showing that...

    Provided By UC Regents

  • White Papers // May 2011

    Just-in-Time Compilation for FPGA Processor Cores

    Portability benefits have encouraged the trend of distributing applications using processor-independent instructions, a.k.a. bytecode, and executing that bytecode on an emulator running on a target processor. Transparent Just-In-Time (JIT) compilation of bytecode to native instructions is often used to increase application execution speed without sacrificing portability. Recent work has proposed...

    Provided By UC Regents

  • White Papers // May 2011

    Concurrently Secure Computation in Constant Rounds

    The authors study the problem of constructing concurrently secure computation protocols in the plain model, where no trust is required in any party or setup. While the well established UC framework for concurrent security is impossible to achieve in this setting, a meaningful notion of concurrent security based on Super-Polynomial...

    Provided By UC Regents

  • White Papers // May 2011

    Exploring the Effects of Feed-Forward and Feedback on Information Disclosure and User Experience in a Context-Aware Recommender System

    When disclosing information to a recommender system, users need to trade off its usefulness for receiving better recommendations with the privacy risks incurred through its disclosure. The paper describes a series of studies that will investigate the use of feed-forward and feedback messages to inform users about the potential usefulness...

    Provided By UC Regents

  • White Papers // May 2011

    RFID Assisted Vehicle Positioning in VANETs

    With technological advancement, recent VANET applications such as safe driving and emergency rescue often demand high position accuracy. Unfortunately, however, conventional localization systems, e.g., GPS, hardly meet new accuracy requirements. To overcome this limitation, this paper proposes an RFID-assisted localization system. The proposed system employs the DGPS concept to improve...

    Provided By UC Regents

  • White Papers // May 2011

    Some Issues in WSN, MANET and Cellular Security

    In this position paper, the authors address some current limitations and challenges as well as emerging directions in three related areas of secure communication: security in Wireless Sensor Networks - WSNs, security in Mobile Ad hoc NETworks - MANETs, and security in Cellular Phone Networks. Sensors that obtain information by...

    Provided By UC Regents

  • White Papers // May 2011

    Analyzing Interaction Communication Networks in Enterprises and Identifying Hierarchies

    With the proliferation of electronic modes of communication (e.g., e-mails, short messages), a group of people in an enterprise can form several distinct Communication Interaction Networks, or CINs for short. A CIN is essentially a graph representation of "Who talks to whom" among a group of individuals. In this paper,...

    Provided By UC Regents

  • White Papers // May 2011

    Correlated-Input Secure Hash Functions

    The authors undertake a general study of hash functions secure under correlated inputs, meaning that security should be maintained when the adversary sees hash values of many related high-entropy inputs. Such a property is satisfied by a random oracle, and its importance is illustrated by study of the "Avalanche effect,"...

    Provided By UC Regents

  • White Papers // May 2011

    Database-Agnostic Transaction Support for Cloud Infrastructures

    In this paper, the authors present and empirically evaluate the performance of Database-Agnostic Transaction (DAT) support for the cloud. Their design and implementation of DAT is scalable, fault-tolerant, and requires only that the datastore provide atomic, row-level access. Their approach enables applications to employ a single transactional datastore API that...

    Provided By UC Regents

  • White Papers // May 2011

    SAIL: A Scalable Approach for Wide-Area IP Mobility

    The Internet is becoming increasingly mobile, with not only smartphones outnumbering stationary hosts, but also cars, buses, trains and airplanes all coming online. This makes Internet mobility support more important than ever. However, the existing standard mobility support protocols, mainly Mobile IPv6 and NEtwork MObility (NEMO), suffer from triangle routing...

    Provided By UC Regents

  • White Papers // May 2011

    On the Symmetry of User Mobility in Wireless Networks

    In this paper analyzed WLAN - GPS -and synthetic traces that record mobility in a variety of network environments. The authors observe that from a macroscopic level, human mobility is symmetric. In other words, the number of users that move from point A to point B approximates the number of...

    Provided By UC Regents

  • White Papers // May 2011

    A Comparitive Study of Achievability of Security Against Related-Key Attack

    This paper begins with a practical contribution, namely a way to leverage the RKA security of blockciphers to provide RKA security for a suite of high-level primitives. This motivates a more general theoretical question, namely, when is it possible to transfer RKA security from a primitive P1 to a primitive...

    Provided By UC Regents

  • White Papers // May 2011

    GQ: Practical Containment for Measuring Modern Malware Systems

    Measurement and analysis of modern malware systems such as botnets relies crucially on execution of specimens in a setting that enables them to communicate with other systems across the Internet. Ethical, legal, and technical constraints, however, demand containment of resulting network activity in order to prevent the malware from harming...

    Provided By UC Regents

  • White Papers // Jan 2011

    OM: A Tunable Framework for Optimizing Continuous Queries Over Data Streams

    Continuous Query (CQ) is an important class of queries in Data Stream Management Systems. While much work has been done on algorithms for processing CQs, less attention has been paid to the issue of optimizing such queries. In this paper, the authors first argue that parameters such as output rate...

    Provided By UC Regents

  • White Papers // May 2011

    GQ: Practical Containment for Measuring Modern Malware Systems

    Measurement and analysis of modern malware systems such as botnets relies crucially on execution of specimens in a setting that enables them to communicate with other systems across the Internet. Ethical, legal, and technical constraints, however, demand containment of resulting network activity in order to prevent the malware from harming...

    Provided By UC Regents

  • White Papers // Aug 2010

    The Effects of Information Transparency on Suppliers, Manufacturers, and Consumers in Online Markets

    This paper looks into the effects of information transparency on market participants in an online trading environment. The authors study these effects in business-to-business electronic markets with firms competing in both upstream and downstream industries. The prior literature generally assumes that either the downstream firm (buyer) or the upstream firm...

    Provided By UC Regents

  • White Papers // Apr 2011

    Digitizing Physical Objects in the Home

    Technology in the home has brought about a number of changes in the way things are being done. Particularly interesting is the question as to whether some ways of doing activities are now being replaced given the availability of technology at an affordable cost. The ownership of a home computer...

    Provided By UC Regents

  • White Papers // Nov 2009

    Games for Controls

    The authors argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), accountability based controls (e.g., insurance), controls derived from rationality assumptions on participants (e.g., network mechanisms), and their composition. Building on the extensive research into games, they...

    Provided By UC Regents

  • White Papers // Jan 2011

    Protocol-Independent Adaptive Replay of Application Dialog

    For many applications - including recognizing malware variants, determining the range of system versions vulnerable to a given attack, testing defense mechanisms, and filtering multi-step attacks - it can be highly useful to mimic an existing system while interacting with a live host on the network. The authors present RolePlayer,...

    Provided By UC Regents

  • White Papers // Jan 2011

    Predicting the Resource Consumption of Network Intrusion Detection Systems

    When installing Network Intrusion Detection Systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between detection accuracy versus resource requirements. In this paper, the authors set out to assist this process by understanding and predicting the CPU and memory consumption of such...

    Provided By UC Regents

  • White Papers // Dec 2009

    A New Look at Selfish Routing

    The authors revisit price of anarchy in network routing, in a new model in which routing decisions are made by self-interested components of the network, as opposed to by the flows. This significant departure from previous work on the problem seeks to model Internet routing more accurately. They propose two...

    Provided By UC Regents

  • White Papers // Oct 2010

    Monitoring User-Level Functionality and Performance Using Inca

    Inca is a user-level monitoring tool that has been used successfully in cyberinfrastructure projects such as the TeraGrid and other similar projects. Its flexible architecture enables multiple types of functionality and performance data to easily be collected about the systems it is monitoring. A unique centralized monitoring configuration approach makes...

    Provided By UC Regents

  • White Papers // Feb 2010

    HILTI: An Abstract Execution Environment for High-Performance Network Traffic Analysis

    When building applications that process large volumes of network traffic - such as high-performance firewalls or intrusion detection systems - one faces a striking gap between the ease with which the desired analysis can often be described in high-level terms, and the tremendous amount of low-level implementation details one must...

    Provided By UC Regents

  • White Papers // May 2011

    Authenticated and Misuse-Resistant Encryption of Key-Dependent Data

    This paper provides a comprehensive treatment of the security of Authenticated Encryption (AE) in the presence of key-dependent data, considering the four variants of the goal arising from the choice of universal nonce or random nonce security and presence or absence of a header. The authors present attacks showing that...

    Provided By UC Regents

  • White Papers // Jan 2011

    Hardware and Interface Synthesis of FPGA Blocks Using Parallelizing Code Transformations

    Reconfigurable logic such as FPGAs is increasingly being used on System-on-Chip (SoC) platforms to provide a flexible, programmable co-processor that augments the core processor. In this paper, the authors present a tightly coupled hardware synthesis and interface synthesis approach that forms part of the hardware-software co-design methodology for such FPGA-based...

    Provided By UC Regents

  • White Papers // Jan 2011

    SPARK : A High-Level Synthesis Framework for Applying Parallelizing Compiler Transformations

    This paper presents a modular and extensible high-level synthesis research system, called SPARK, which takes a behavioral description in ANSI-C as input and produces synthesizable register-transfer level VHDL. SPARK uses parallelizing compiler technology developed previously to enhance instruction-level parallelism and re-instruments it for high-level synthesis by incorporating ideas of mutual...

    Provided By UC Regents

  • White Papers // Jan 2011

    Overlay Multicasting for Ad Hoc Networks

    In this paper, the authors study the benefits of using application layer multicast in ad hoc networks. They propose a flexible receiver-driven overlay multicast protocol that the authors call the Application Layer Multicast Algorithm (ALMA). As an application layer protocol, ALMA constructs an overlay multicast tree of logical links between...

    Provided By UC Regents

  • White Papers // Jan 2011

    Achieving Delay and Throughput Decoupling in Distributed Fair Queueing Over Ad Hoc Networks

    In an ad hoc network, groups of networking devices communicate with one another using wireless radios. By virtue of their ability to operate with a peer-to-peer network model, ad hoc networks offer convenient infrastructure-free communication over the shared wireless channel. In such a wireless network, users are expected to run...

    Provided By UC Regents

  • White Papers // Jan 2009

    Downlink MIMO With Frequency-Domain Packet Scheduling for 3GPP LTE

    This paper addresses the problem of Frequency Domain Packet Scheduling (FDPS) incorporating Spatial Division Multiplexing (SDM) Multiple Input Multiple Output (MIMO) techniques on the 3GPP Long-Term Evolution (LTE) downlink. The authors impose the LTE MIMO constraint of selecting only one MIMO mode (spatial multiplexing or transmit diversity) per user per...

    Provided By UC Regents

  • White Papers // Jul 2009

    Observable Subspaces for 3D Human Motion Recovery

    The articulated body models used to represent human motion typically have many degrees of freedom, usually expressed as joint angles that are highly correlated. The true range of motion can therefore be represented by latent variables that span a low-dimensional space. This has often been used to make motion tracking...

    Provided By UC Regents

  • White Papers // May 2011

    Correlated-Input Secure Hash Functions

    The authors undertake a general study of hash functions secure under correlated inputs, meaning that security should be maintained when the adversary sees hash values of many related high-entropy inputs. Such a property is satisfied by a random oracle, and its importance is illustrated by study of the "Avalanche effect,"...

    Provided By UC Regents

  • White Papers // Jan 2011

    Model Based Synthesis of Embedded Software

    This paper presents SW synthesis using Embedded System Environment (ESE), a tool set for design of multi-core embedded systems. The authors propose a classification of multi-core embedded systems based on their platform architecture. They identify key design decisions and models that are required for embedded system synthesis. They present a...

    Provided By UC Regents

  • White Papers // May 2010

    Cybercasing the Joint: On the Privacy Implications of Geo-Tagging

    This paper aims to raise awareness of a rapidly emerging privacy threat that the authors term cybercasing: leveraging geo-tagged information available online to mount real-world attacks. While users typically realize that sharing locations has some implications for their privacy, they provide evidence that many are unaware of the full scope...

    Provided By UC Regents

  • White Papers // May 2010

    Netalyzr: Illuminating Edge Network Neutrality, Security, and Performance

    In this paper, the authors present Netalyzr, a network measurement and debugging service that evaluates the functionality provided by people's Internet connectivity. The design aims to prove both comprehensive in terms of the properties they measure and easy to employ and understand for users with little technical background. They structure...

    Provided By UC Regents

  • White Papers // Jan 2011

    Parallel Co-Simulation Using Virtual Synchronization With Redundant Host Execution

    In traditional parallel co-simulation approaches, the simulation speed is heavily limited by time synchronization overhead between simulators and idle time caused by data dependency. Recent work has shown that the time synchronization overhead can be reduced significantly by predicting the next synchronization points more effectively or by separating trace-driven architecture...

    Provided By UC Regents

  • White Papers // Apr 2011

    Programming Support for Distributed Optimization and Control in Cyber-Physical Systems

    Large-scale actuator control problems in Cyber-Physical Systems (CPSs) are often expressed within the networked optimization model. While significant advances have taken place in optimization techniques, their widespread adoption in practical implementations is impeded by the complexity of inter-node coordination and lack of programming support that is necessary for sharing information...

    Provided By UC Regents

  • White Papers // Jan 2011

    Loop Shifting and Compaction for the High-Level Synthesis of Designs With Complex Control Flow

    Emerging embedded system applications in multimedia and image processing are characterized by complex control flow consisting of deeply nested conditionals and loops. The authors present a technique called loop shifting that incrementally exploits loop level parallelism across iterations by shifting and compacting operations across loop iterations. The experimental results show...

    Provided By UC Regents

  • White Papers // Aug 2009

    SEJITS: Getting Productivity and Performance With Selective Embedded JIT Specialization

    Today's "High productivity" programming languages such as Python lack the performance of harder-to-program "Efficiency" languages (CUDA, Cilk, C with OpenMP) that can exploit extensive programmer knowledge of parallel hardware architectures. The authors combine efficiency-language performance with productivity-language programmability using Selective Embedded Just-In-Time Specialization (SEJITS). At run-time, they specialize (generate, compile,...

    Provided By UC Regents

  • White Papers // Oct 2009

    Shape Analysis With Reference Set Relations

    Precise reasoning about the structure of the program heap is crucial to understanding the behavior of a given program, particularly for object-oriented languages. Traditional points-to analyses, which calculate sharing properties based on coarse aggregations of the heap (for example by coalescing all cells from the same allocation site and ignoring...

    Provided By UC Regents

  • White Papers // Jan 2011

    Automating Cross-Layer Diagnosis of Enterprise Wireless Networks

    Modern enterprise networks are of sufficient complexity that even simple faults can be difficult to diagnose - let alone transient outages or service degradations. Nowhere is this problem more apparent than in the 802.11-based wireless access networks now ubiquitous in the enterprise. In addition to the myriad complexities of the...

    Provided By UC Regents

  • White Papers // Jan 2011

    Wresting Control From BGP: Scalable Fine-Grained Route Control

    Today's Internet users and applications are placing increased demands on Internet Service Providers (ISPs) to deliver fine-grained, flexible route control. To assist network operators in addressing this challenge, the authors present the Intelligent Route Service Control Point (IRSCP), a route control architecture that allows a network operator to flexibly control...

    Provided By UC Regents

  • White Papers // Apr 2011

    Seeker - A Bandwidth-Based Association Control Framework for Wireless Mesh Networks

    The rapid deployment of wireless mesh networks across universities and enterprises, and the pervasiveness of mobile devices equipped with Wi-Fi connectivity, has resulted in a scenario wherein end users have the option to choose from a multitude of access points at any given location. Moreover, with the increasing availability of...

    Provided By UC Regents

  • White Papers // Jan 2011

    An Approximate Approach for Layered Space - Time Multiuser Detection Performance and Its Application to MIMO Ad Hoc Networks

    In this paper, the authors consider a layered space - time multiuser detection technique and propose an analytical approximation for its performance. The authors' work is useful in two different stages of network design. On one hand, the approximation may be used to evaluate the bit and packet error performance...

    Provided By UC Regents

  • White Papers // Jan 2011

    Coded Cooperation for Ad Hoc Networks With Spatial Multiplexing

    In this paper the authors design a network based on cooperative spatial multiplexing (SM), capable to adaptively support terminals with multiple antennas and multiple cooperating nodes. The authors' proposal overcomes limitations of existing cooperative networks based on Space-Time Block Codes (STBC), i.e., their need for symbol synchronization and signaling overhead...

    Provided By UC Regents

  • White Papers // Mar 2011

    Network Regulations and Market Entry

    This paper uses a two-sided market model to study if last-mile access providers (ISPs), should charge Content Providers (CPs), who derive revenue from advertisers, for the right to access ISP's end-users. The authors compare two-sided pricing (ISPs could charge CPs for content delivery) with one-sided pricing (neutrality regulations prohibit such...

    Provided By UC Regents

  • White Papers // Oct 2010

    Verifiability And Group Formation In Markets

    The authors consider group formation with asymmetric information. Agents have unverifiable characteristics as well as the verifiable qualifications required for memberships in groups. The characteristics can be chosen, such as strategies in games, or can be learned, such as skills required for jobs. They can also be innate, such as...

    Provided By UC Regents

  • White Papers // Aug 2009

    Peer to Peer Edge Caches Should Be Free

    Bulk-data peer-to-peer systems have been promoted as reducing the cost of content distribution. Unfortunately, this isn't generally true. Rather, bulk-data P2P shifts the costs of delivery from the content provider to the ISPs or content recipients. A very simple economic model of content delivery shows how this occurs and that,...

    Provided By UC Regents

  • White Papers // Sep 2010

    Optimal Information Security Investment With Penetration Testing

    Penetration testing, the deliberate search for potential vulnerabilities in a system by using attack techniques, is a relevant tool of information security practitioners. This paper adds penetration testing to the realm of information security investment. Penetration testing is modeled as an information gathering option to reduce uncertainty in a discrete...

    Provided By UC Regents

  • White Papers // Sep 2010

    Onix: A Distributed Control Platform for Large-Scale Production Networks

    Computer networks lack a general control paradigm, as traditional networks do not provide any network-wide management abstractions. As a result, each new function (such as routing) must provide its own state distribution, element discovery, and failure recovery mechanisms. The authors believe this lack of a common control platform has significantly...

    Provided By UC Regents

  • White Papers // Jun 2011

    Measuring Pay-Per-Install: The Commoditization of Malware Distribution

    Recent years have seen extensive diversification of the "Underground economy" associated with malware and the subversion of Internet-connected systems. This trend towards specialization has compelling forces driving it: miscreants readily apprehend that tackling the entire value-chain from malware creation to monetization in the presence of ever-evolving countermeasures poses a daunting...

    Provided By UC Regents

  • White Papers // May 2011

    A Comparitive Study of Achievability of Security Against Related-Key Attack

    This paper begins with a practical contribution, namely a way to leverage the RKA security of blockciphers to provide RKA security for a suite of high-level primitives. This motivates a more general theoretical question, namely, when is it possible to transfer RKA security from a primitive P1 to a primitive...

    Provided By UC Regents

  • White Papers // May 2011

    Concurrently Secure Computation in Constant Rounds

    The authors study the problem of constructing concurrently secure computation protocols in the plain model, where no trust is required in any party or setup. While the well established UC framework for concurrent security is impossible to achieve in this setting, a meaningful notion of concurrent security based on Super-Polynomial...

    Provided By UC Regents

  • White Papers // Jul 2011

    No Plan Survives Contact: Experience With Cybercrime Measurement

    An important mode of empirical security research involves analyzing the behavior, capabilities, and motives of adversaries. By definition, such measurements cannot be conducted in controlled settings and require "Engagement" directly with adversaries, their infrastructure or their ecosystem. However, the operational complexities required to successfully carry out such measurements are significant...

    Provided By UC Regents