University of Calgary

Displaying 1-40 of 428 results

  • White Papers // Feb 2014

    The Melbourne Shuffle: Improving Oblivious Storage in the Cloud

    The authors present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Their method can be used to improve previous oblivious storage solutions for network-based outsourcing of data. One of the unmistakable recent trends in networked computation...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Introduction to Hardware-Dependent Software Design

    Microelectronics is ubiquitous and took over large parts of the people daily life. Together with an increasing profileration of such embedded systems, their complexities are growing exponentially. Due to the rapidly increasing software content in embedded systems, Hardware-dependent Software (HdS) has become a critical topic in system design. In this...

    Provided By University of Calgary

  • White Papers // Jan 2014

    A Flexible, Syntax Independent Representation (SIR) for System Level Design Models

    System Level Design (SLD) is widely seen as a solution for bridging the gap between chip complexity and design productivity of Systems on Chip (SoC). SLD relieves the designer from detailed manual implementation by raising the level of abstraction in design models. There are many different modeling approaches to SLD....

    Provided By University of Calgary

  • White Papers // Jan 2014

    Creating Explicit Communication in SoC Models Using Interactive Re-Coding

    Communication exploration has become a critical step during SoC design. Researchers in the CAD community have proposed fast and efficient techniques for comprehensive design space exploration to expedite this critical design step. Although these advances have been helpful in reducing the design time significantly, the overall design time of the...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Data Placement Based on the Seek Time Analysis of a MEMS-based Storage Device

    Reducing access times to secondary I/O devices has long been the focus of many systems researchers. With traditional disk drives, access time is the composition of transfer time, seek time and rotational latency, so many techniques as to minimize these factors, such as ordering I/O requests or intelligently placing data,...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Security Issues in a Future Vehicular Network

    Both modern high-speed motorways and vehicles that drive upon them are becoming increasingly intelligent. In particular, communication devices are being installed in more and more cars and roadside infrastructure components. In this paper, the authors present a novel infrastructure for vehicular communication on highways and propose some potential applications aimed...

    Provided By University of Calgary

  • White Papers // Jan 2014

    An Analysis Framework for Security in Web Applications

    Software systems interact with outside environments (e.g., by taking inputs from a user) and usually have particular assumptions about these environments. Unchecked or improperly checked assumptions can affect security and reliability of the systems. A major class of such problems is the improper validation of user inputs. In this paper,...

    Provided By University of Calgary

  • White Papers // Jan 2014

    RBWA: An Efficient Random-Bit Window-Based Authentication Protocol

    Given the wide and rapid deployment of \"Visitor networks\", how to authenticate the user and account the usage on the per-packet basis securely and yet efficiently is still a challenging problem. In this paper, the authors explore the tradeoff between performance and security, and propose a per-data-packet authentication and access...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Impact of Attacks on a Secure Ad Hoc Routing Protocol: Performance Analysis and Countermeasures

    Mobile ad hoc networks have been an area of increasing research activity. Recently, a number of proto-cols have been proposed which secure ad hoc net-work routing; however, the evaluation of such protocols has been lacking. In particular, performance evaluations of such protocols have either been with-out an attacker, or under...

    Provided By University of Calgary

  • White Papers // Jan 2014

    SRDP: Securing Route Discovery in DSR

    Routing is a critical function in multi-hop Mobile Ad-hoc NETworks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered both the simplest and the most effective. At the same time, security in MANETs - especially, routing security - presents a number of new...

    Provided By University of Calgary

  • White Papers // Jan 2014

    On the Utility of Distributed Cryptography in P2P and MANETs: the Case of Membership Control

    Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized authority, prompts many security-related challenges. Providing efficient security services in these systems is an active research topic which is receiving much attention in the security research...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Group Key Agreement Efficient in Communication

    In recent years, group-oriented applications and protocols have been gaining popularity. Such applications typically involve communication over open networks where security is an important concern. Group key management is one of the basic building blocks in securing group communication. Most prior research in group key management focused on minimizing computation...

    Provided By University of Calgary

  • White Papers // Dec 2013

    Bridging Automotive Systems, Safety and Software Engineering with a Seamless Toolchain

    Multi-core technologies strongly support functional integration, e.g. integration of different applications on the same control unit. However, these applications require different safety concepts with different levels of criticality; and providing consistency of the safety concept during the entire product lifecycle is a tedious task. The aim of this paper is...

    Provided By University of Calgary

  • White Papers // Nov 2013

    Asymptotically Efficient Lattice-Based Digital Signatures

    The authors present a general framework that converts certain types of linear collision-resistant hash functions into one-time signatures. Their generic construction can be instantiated based on both general and ideal (e.g. cyclic) lattices, and the resulting signature schemes are provably secure based on the worst-case hardness of approximating the shortest...

    Provided By University of Calgary

  • White Papers // Oct 2013

    Communication-Efficient MPC for General Adversary Structures

    A MultiParty Computation (MPC) protocol allows a set of players to compute a function of their inputs while keeping the inputs private and at the same time securing the correctness of the output. Most MPC protocols assume that the adversary can corrupt up to a fixed fraction of the number...

    Provided By University of Calgary

  • White Papers // Oct 2013

    Developing Systems for API Governance

    As scalable information technology evolves to a more cloud-like model, digital assets (code, data and software environments) that increasingly form the basis of research and education require curation as web-accessible services. \"Serviceizing\" digital assets consists of encapsulating assets in software that exposes them to web and mobile applications via well-defined,...

    Provided By University of Calgary

  • White Papers // Sep 2013

    Self-Consistency and Consistency-Based Detection and Diagnosis of Malicious Circuitry

    Hardware Trojans (HTs) have become a major concern in the modern IC industry, especially with the fast growth in IC outsourcing. HT detection and diagnosis are challenging due to the huge number of gates in modern IC designs and the high cost of testing. The authors propose a scalable and...

    Provided By University of Calgary

  • White Papers // Sep 2013

    Quantitative Intellectual Property Protection Using Physical-Level Characterization

    Hardware metering, the extraction of unique and persistent IDentifiers (IDs), is a crucial process for numerous Integrated Circuit (IC) intellectual property protection tasks, including protecting designs from unauthorized manufacturing. The currently known hardware metering approaches, however, are subject to alternations due to device aging, since they employ unstable manifestational IC...

    Provided By University of Calgary

  • White Papers // Aug 2013

    Graph Queries in a Next-Generation Datalog System

    The recent revival of interest in Datalog is driven by various developments that include the emergence of natural application areas, such as computer networking, parallel and distributed programming, and distributed data management, and the success of industrial-strength systems. Recent theoretical advances have enabled the use of special monotonic aggregates in...

    Provided By University of Calgary

  • White Papers // Aug 2013

    Wireless Physical Layer Security Enhancement with Buffer-Aided Relaying

    The authors consider utilizing a buffer-aided relay to enhance security for two-hop half-duplex relay networks with an external eavesdropper. They propose a link selection scheme that adapts reception and transmission time slots based on the channel quality, while considering both the two-hop transmission efficiency and the security. Closed-form expressions for...

    Provided By University of Calgary

  • White Papers // Aug 2013

    Decentralized Online Big Data Classification - a Bandit Framework

    Distributed, online data mining systems have emerged as a result of applications requiring analysis of large amounts of correlated and high-dimensional data produced by multiple distributed data sources. The authors propose a distributed online data classification framework where data is gathered by distributed data sources and processed by a heterogeneous...

    Provided By University of Calgary

  • White Papers // Aug 2013

    Firewalls From Double Purity

    The firewall paradox is often presented as arising from double entanglement, but the author argues that more generally the paradox is double purity. Near-horizon modes are purified by the interior, in the infalling vacuum. Hence they cannot also be pure alone, or in combination with any third system, as demanded...

    Provided By University of Calgary

  • White Papers // Aug 2013

    Security Evaluation of a Control System Using Named Data Networking

    Security is an integral part of networked computer systems. The recent Named Data Networking (NDN) project aims to develop a new Internet architecture that communicates data using names rather than locations, the latter of which is what the current IP-based Internet does with IP addresses. One of the first real-world...

    Provided By University of Calgary

  • White Papers // Aug 2013

    Modeling Network Conversation Flux for Patternless Intrusion Detection

    Intrusion is somebody attempting to break into or misuse the users system. The word \"Misuse\" is broad, and can reflect something as severe as stealing confidential data to something benign such as misusing network resources. An Intrusion Detection System (IDS) is a system for detecting such intrusions. An IDS' primary...

    Provided By University of Calgary

  • White Papers // Jul 2013

    Received Signal Strength Indicator and its Analysis in a Typical WLAN System

    Received signal strength based fingerprinting approaches have been widely exploited for localization. The Received Signal Strength (RSS) plays a very crucial role in determining the nature and characteristics of location fingerprints stored in a radio-map. The received signal strength is a function of distance between the transmitter and receiving device,...

    Provided By University of Calgary

  • White Papers // Jul 2013

    The CloudProxy Tao for Trusted Computing

    Applications running in a cloud data center face several challenges, including secure deployment, insider attacks, and cryptographic key management. Previous research shows how to securely start and run individual programs using the Trusted Platform Module or other secure co-processors, but none of that work solves the end-to-end problem of deploying...

    Provided By University of Calgary

  • White Papers // Jul 2013

    DupLESS: Server-Aided Encryption for Deduplicated Storage

    Cloud storage service providers such as dropbox, mozy, and others perform de-duplication to save space by only storing one copy of each file uploaded. Should clients conventionally encrypt their files, however, savings are lost. Message-locked encryption (the most prominent manifestation of which is convergent encryption) resolves this tension. However it...

    Provided By University of Calgary

  • White Papers // Jul 2013

    Distributed Online Big Data Classification Using Context Information

    Distributed, online data mining systems have emerged as a result of applications requiring analysis of large amounts of correlated and high-dimensional data produced by multiple distributed data sources. The authors propose a distributed online data classification framework where data is gathered by distributed data sources and processed by a heterogeneous...

    Provided By University of Calgary

  • White Papers // Jul 2013

    DoS & DDoS in Named Data Networking

    With the growing realization that current Internet protocols are reaching the limits of their senescence, several ongoing research efforts aim to design potential next-generation Internet architectures. Although they vary in maturity and scope, in order to avoid past pitfalls, these efforts seek to treat security and privacy as fundamental requirements....

    Provided By University of Calgary

  • White Papers // Jun 2013

    LogBase: A Scalable Logstructured Database System in the Cloud

    Numerous applications such as financial transactions (e.g., stock trading) are write-heavy in nature. The shift from reads to writes in web applications has also been accelerating in recent years. Write-ahead-logging is a common approach for providing recovery capability while improving performance in most storage systems. However, the separation of log...

    Provided By University of Calgary

  • White Papers // Jun 2013

    Quantifying the Effects of Removing Permissions from Android Applications

    With the growing popularity of android smart phones, it is increasingly important to ensure the security of sensitive user information. A recent study found that approximately 26% of android applications in Google play can access personal data, such as contacts and email, and 42 percent, GPS location data. While android...

    Provided By University of Calgary

  • White Papers // Jun 2013

    FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession

    With popularity of cloud storage, efficiently proving the integrity of data stored at an untrusted server has become significant. Authenticated skip lists and Rank-Based Authenticated Skip Lists (RBASL) have been used in cloud storage to provide support for provable data update operations. In a dynamic file scenario, an RBASL falls...

    Provided By University of Calgary

  • White Papers // Jun 2013

    Multi-Path TCP With Network Coding for Mobile Devices in Heterogeneous Networks

    Existing mobile devices have the capability to use multiple network technologies simultaneously to help increase performance; but they rarely, if at all, effectively use these technologies in parallel. The authors present empirical data to help understand the mobile environment when three heterogeneous networks are available to the mobile device (i.e.,...

    Provided By University of Calgary

  • White Papers // Jun 2013

    Message-Locked Encryption for Lock-Dependent Messages

    Motivated by the problem of avoiding duplication in storage systems, Bellare, Keelveedhi, and Ristenpart have recently put forward the notion of Message-Locked Encryption (MLE) schemes which subsumes convergent encryption and its variants. Such schemes do not rely on permanent secret keys, but rather encrypt messages using keys derived from the...

    Provided By University of Calgary

  • White Papers // May 2013

    Local Privacy and Minimax Bounds: Sharp Rates for Probability Estimation

    The authors provide a detailed study of the estimation of probability distributions - discrete and continuous - in a stringent setting in which data is kept private even from the statistician. They give sharp minimax rates of convergence for estimation in these locally private settings, exhibiting fundamental tradeoffs between privacy...

    Provided By University of Calgary

  • White Papers // May 2013

    Decentralizing Network Inference Problems with Multiple-Description Fusion Estimation (MDFE)

    Two forms of network inference (or tomography) problems have been studied rigorously: traffic matrix estimation or completion based on link-level traffic measurements, and link-level loss or delay inference based on end-to-end measurements. These problems are often posed as UnderDetermined Linear Inverse (UDLI) problems and solved in a centralized manner, where...

    Provided By University of Calgary

  • White Papers // May 2013

    Efficient Garbling from a Fixed-Key Blockcipher

    The authors advocate schemes based on fixed-key AES as the best route to highly efficient circuit-garbling. They provide such schemes making only one AES call per garbled-gate evaluation. On the theoretical side, they justify the security of these methods in the random-permutation model, where parties have access to a public...

    Provided By University of Calgary

  • White Papers // May 2013

    ObliviStore: High Performance Oblivious Cloud Storage

    The authors design and build ObliviStore, a high performance, distributed ORAM-based cloud data store secure in the malicious model. To the best of their knowledge, ObliviStore is the fastest ORAM implementation known to date, and is faster by 10X or more in comparison with the best known ORAM implementation. ObliviStore...

    Provided By University of Calgary

  • White Papers // Apr 2013

    MuSIC: Mobility-Aware Optimal Service Allocation in Mobile Cloud Computing

    In this paper the authors exploits the observation that using tiered clouds, i.e. clouds at multiple levels (local and public) can increase the performance and scalability of mobile applications. User mobility introduces new complexities in enabling an optimal decomposition of tasks that can execute cooperatively on mobile clients and the...

    Provided By University of Calgary

  • White Papers // Apr 2013

    Smart Communications Via a Tree-Based Overlay Over Multiple and Heterogeneous (TOMH) Spontaneous Networks

    The current networking scenario is characterized by widespread availability of ubiquitous devices with significant processing capabilities, e.g., Smartphones, tablets, and laptops. In addition, the simultaneous availability of multiple connectivity interfaces, e.g., cellular, WiFi, and Ethernet, pushes towards spontaneous networking scenarios where devices create a multi-network environment based on collaborative and...

    Provided By University of Calgary

  • White Papers // Nov 2009

    Accurate Timed RTOS Model for Transaction Level Modeling

    In this paper, the authors present an accurate timed RTOS model within Transaction Level Models (TLMs). Their RTOS model, implemented on top of System Level Design Language (SLDL), incorporates two key features: RTOS behavior model and RTOS overhead model. The RTOS behavior model provides dynamic scheduling, Inter-Process Communication (IPC), and...

    Provided By University of Calgary

  • White Papers // Jul 2009

    Efficient Modeling of Embedded Systems Using Computer-Aided Recoding

    The design of embedded computing systems faces a serious productivity gap due to the increasing complexity of their hardware and software components. One solution to address this problem is the modeling at higher levels of abstraction. However, writing proper executable system models is challenging, error-prone, and very time-consuming. This tutorial...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Introduction to Hardware-Dependent Software Design

    Microelectronics is ubiquitous and took over large parts of the people daily life. Together with an increasing profileration of such embedded systems, their complexities are growing exponentially. Due to the rapidly increasing software content in embedded systems, Hardware-dependent Software (HdS) has become a critical topic in system design. In this...

    Provided By University of Calgary

  • White Papers // Sep 2009

    ConcurrenC: A New Approach Towards Effective Abstraction of C-Based SLDLs

    Embedded system design in general can only be successful if it is based on a suitable Model of Computation (MoC) that can be well represented in an executable System-Level Description Language (SLDL) and is supported by a matching set of design tools. While C-based SLDLs, such as SystemC and SpecC,...

    Provided By University of Calgary

  • White Papers // Jan 2014

    A Flexible, Syntax Independent Representation (SIR) for System Level Design Models

    System Level Design (SLD) is widely seen as a solution for bridging the gap between chip complexity and design productivity of Systems on Chip (SoC). SLD relieves the designer from detailed manual implementation by raising the level of abstraction in design models. There are many different modeling approaches to SLD....

    Provided By University of Calgary

  • White Papers // Jan 2014

    Creating Explicit Communication in SoC Models Using Interactive Re-Coding

    Communication exploration has become a critical step during SoC design. Researchers in the CAD community have proposed fast and efficient techniques for comprehensive design space exploration to expedite this critical design step. Although these advances have been helpful in reducing the design time significantly, the overall design time of the...

    Provided By University of Calgary

  • White Papers // Nov 2011

    Hierarchical Additions to the SPMD Programming Model

    Large-scale parallel machines are programmed mainly with the Single Program, Multiple Data (SPMD) model of parallelism. This model has advantages of scalability and simplicity, combining independent threads of execution with global collective communication and synchronization operations. However, the model does not fit well with divide-and-conquer parallelism or hierarchical machines that...

    Provided By University of Calgary

  • White Papers // Jul 2012

    On the Energy Efficiency of Last-Level Cache Partitioning

    Computing systems frequently have a mix of interactive, real-time applications and background computation to execute. In order to guarantee responsiveness, the interactive and background applications are often run on completely disjoint sets of resources to ensure performance isolation. These practices are expensive in terms of battery life, power and capital...

    Provided By University of Calgary

  • White Papers // Dec 2011

    A Predictive Model for Solving Small Linear Algebra Problems in GPU Registers

    The authors examine the problem of solving many thousands of small dense linear algebra factorizations simultaneously on Graphics Processing Units (GPUs). They are interested in problems ranging from several hundred of rows and columns to 4

    Provided By University of Calgary

  • White Papers // Apr 2013

    Communication Efficient Gaussian Elimination with Partial Pivoting using a Shape Morphing Data Layout

    High performance for numerical linear algebra often comes at the expense of stability. Computing the LU decomposition of a matrix via Gaussian Elimination can be organized so that the computation involves regular and efficient data access. However, maintaining numerical stability via partial pivoting involves row interchanges that lead to inefficient...

    Provided By University of Calgary

  • White Papers // Dec 2013

    Bridging Automotive Systems, Safety and Software Engineering with a Seamless Toolchain

    Multi-core technologies strongly support functional integration, e.g. integration of different applications on the same control unit. However, these applications require different safety concepts with different levels of criticality; and providing consistency of the safety concept during the entire product lifecycle is a tedious task. The aim of this paper is...

    Provided By University of Calgary

  • White Papers // Aug 2013

    Graph Queries in a Next-Generation Datalog System

    The recent revival of interest in Datalog is driven by various developments that include the emergence of natural application areas, such as computer networking, parallel and distributed programming, and distributed data management, and the success of industrial-strength systems. Recent theoretical advances have enabled the use of special monotonic aggregates in...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Data Placement Based on the Seek Time Analysis of a MEMS-based Storage Device

    Reducing access times to secondary I/O devices has long been the focus of many systems researchers. With traditional disk drives, access time is the composition of transfer time, seek time and rotational latency, so many techniques as to minimize these factors, such as ordering I/O requests or intelligently placing data,...

    Provided By University of Calgary

  • White Papers // Dec 2010

    Cyclic and Quasi-Cyclic LDPC Codes: New Developments

    In this paper, the authors have shown that cyclic and QC descendant codes can be derived from a given cyclic code through decomposition of its parity-check matrix in circulant form using specific column and row permutations. This paper presents a technique to decompose a cyclic code given by a parity-check...

    Provided By University of Calgary

  • White Papers // Apr 2008

    Error Floors in LDPC Codes: Fast Simulation, Bounds and Hardware Emulation

    The error-correcting performance of Low-Density Parity Check (LDPC) codes, when decoded using practical iterative decoding algorithms, is known to be very close to Shannon limits in the asymptotic limit of large blocklengths. A substantial limitation to the use of finite-length LDPC codes is the presence of an error floor in...

    Provided By University of Calgary

  • White Papers // Dec 2008

    Software Techniques to Improve Virtualized I/O Performance on Multi-Core Systems

    Virtualization technology is now widely deployed on high performance networks such as 10-Gigabit Ethernet (10GE). It offers useful features like functional isolation, manageability and live migration. Unfortunately, the overhead of network I/O virtualization significantly degrades the performance of network-intensive applications. Two major factors of loss in I/O performance result from...

    Provided By University of Calgary

  • White Papers // Jul 2012

    CloudProtect: Managing Data Privacy in Cloud Applications

    This paper describes the CloudProtect middleware that empowers users to encrypt sensitive data stored within various cloud applications. However, most web applications require data in plaintext for implementing the various functionalities and in general, do not support encrypted data management. Therefore, CloudProtect strives to carry out the data transformations (encryption/decryption)...

    Provided By University of Calgary

  • White Papers // Jan 2013

    Adaptive Algorithms for Finding Replacement Services in Autonomic Distributed Business Processes

    Web service may be used to construct autonomic business processes, where several Web services interact with each other to carry out complex transactions or workflows. During the execution of an autonomic process, if one component service fails or becomes overloaded, a mechanism is needed to ensure that the running process...

    Provided By University of Calgary

  • White Papers // Sep 2012

    The Effect of Working Capital Management on the Profitability of Turkish SMEs

    This paper focuses on the effects of working capital management as measured by cash conversion cycle and net trade cycle on the firm performance for a sample of Turkish listed companies and searches for potential differences between the profitability effects of working capital management for the SMEs and for the...

    Provided By University of Calgary

  • White Papers // Aug 2010

    Quantifying the Environmental Advantages of Large-Scale Computing

    The practical advantages of pay-as-you-go, scalable computing have made large-scale cloud computing services an appealing option for many consumers. At the same time, large-scale datacenters have attracted attention as one of the fastest growing segments of carbon production. In this paper, the authors attempt to quantify the footprint of various...

    Provided By University of Calgary

  • White Papers // Jul 2007

    Specification and Verification of Artifact Behaviors in Business Process Models

    SOA has influenced business process modeling and management. Recent business process models have elevated data representation to the same level as control flows, for example, the artifact-centric business process models allow the life cycle properties of artifacts (data objects) to be specified and analyzed. In this paper, the authors develop...

    Provided By University of Calgary

  • White Papers // Jan 2011

    Introducing the Guard-Stage-Milestone Approach for Specifying Business Entity Lifecycles

    A promising approach to managing business operations is based on Business Entities with Lifecycles (BEL's), i.e., key conceptual entities that are central to guiding the operations of a business, and whose content changes as they move through those operations. A BEL type includes both an information model that captures, in...

    Provided By University of Calgary

  • White Papers // Sep 2011

    Storm Clouds Rising: Security Challenges for IaaS Cloud Computing

    Securing the authors' digital assets has become increasingly challenging as their reliance on rapidly evolving technologies continues to grow. The security perimeter in computing has changed from a well-defined boundary that was relatively easy to identify and defend, to an elastic boundary that is constantly changing and for which the...

    Provided By University of Calgary

  • White Papers // May 2013

    ObliviStore: High Performance Oblivious Cloud Storage

    The authors design and build ObliviStore, a high performance, distributed ORAM-based cloud data store secure in the malicious model. To the best of their knowledge, ObliviStore is the fastest ORAM implementation known to date, and is faster by 10X or more in comparison with the best known ORAM implementation. ObliviStore...

    Provided By University of Calgary

  • White Papers // Jul 2013

    The CloudProxy Tao for Trusted Computing

    Applications running in a cloud data center face several challenges, including secure deployment, insider attacks, and cryptographic key management. Previous research shows how to securely start and run individual programs using the Trusted Platform Module or other secure co-processors, but none of that work solves the end-to-end problem of deploying...

    Provided By University of Calgary

  • White Papers // Jul 2012

    Measuring User Confidence in Smartphone Security and Privacy

    In order to direct and build an effective, secure mobile ecosystem, the authors must first understand user attitudes toward security and privacy for Smartphone's and how they may differ from attitudes toward more traditional computing systems. What are users' comfort levels in performing different tasks? How do users select applications?...

    Provided By University of Calgary

  • White Papers // Jun 2012

    FlashDetect: ActionScript 3 Malware Detection

    Adobe Flash is present on nearly every PC, and it is increasingly being targeted by malware authors. Despite this, research into methods for detecting malicious Flash files has been limited. Similarly, there is very little documentation available about the techniques commonly used by Flash malware. Instead, most research has focused...

    Provided By University of Calgary

  • White Papers // Dec 2011

    Detecting Android Malware on Network Level

    As Android OS establishes itself as the primary platform on Smartphone's, a substantial increase in malware targeted at Android devices is being ob-served in the wild. While anti-virus software is available, and Android limits applications to user approved permissions, many users remain unaware of the threat posed by malware and...

    Provided By University of Calgary

  • White Papers // Dec 2012

    COMPA: Detecting Compromised Accounts on Social Networks

    As social networking sites have risen in popularity, cyber-criminals started to exploit these sites to spread malware and to carry out scams. Previous paper has extensively studied the use of fake (Sybil) accounts that attackers set up to distribute spam messages (mostly messages that contain links to scam pages or...

    Provided By University of Calgary

  • White Papers // Dec 2012

    Leveraging Email Delivery for Spam Mitigation

    Traditional spam detection systems either rely on content analysis to detect spam emails, or attempt to detect spammers before they send a message, (i.e., they rely on the origin of the message). In this paper, the authors introduce a third approach: they present a system for filtering spam that takes...

    Provided By University of Calgary

  • White Papers // Apr 2013

    Scalable Semantics-Based Detection of Similar Android Applications

    The popularity and utility of Smartphone's rely on their vibrant application markets; however, plagiarism threatens the long-term health of these markets. In this paper, the authors present a scalable approach to detecting similar Android apps based on semantic information. They implement their approach in a tool called AnDarwin and evaluate...

    Provided By University of Calgary

  • White Papers // Dec 2012

    PUBCRAWL: Protecting Users and Businesses from CRAWLers

    Web Crawlers are automated tools that browse the web to retrieve and analyze information. Although crawlers are useful tools that help users to find content on the web, they may also be malicious. Unfortunately, unauthorized (malicious) crawlers are increasingly becoming a threat for service providers because they typically collect information...

    Provided By University of Calgary

  • White Papers // Dec 2012

    Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner

    Black-box web vulnerability scanners are a popular choice for finding security vulnerabilities in web applications in an automated fashion. These tools operate in a point-and-shootmanner, testing any web application regardless of the server side language for common security vulnerabilities. Unfortunately, black-box tools suffer from a number of limitations, particularly when...

    Provided By University of Calgary

  • White Papers // Mar 2012

    Adapting Social Spam Infrastructure for Political Censorship

    As social networks emerge as an important tool for political engagement and dissent, services including Twitter and Facebook have become regular targets of censorship. In the past, nation states have exerted their control over Internet access to outright block connections to social media during times of political upheaval. Parties without...

    Provided By University of Calgary

  • White Papers // Sep 2010

    Polynomial Time Algorithms for Minimum Energy Scheduling

    The aim of power management policies is to reduce the amount of energy consumed by computer systems while maintaining satisfactory level of performance. One common method for saving energy is to simply suspend the system during idle times. No energy is consumed in the suspend mode. However, the process of...

    Provided By University of Calgary

  • White Papers // Jun 2009

    An Event Based Approach to Situational Representation

    Many application domains require representing interrelated real-world activities and/or evolving physical phenomena. In the crisis response domain, for instance, one may be interested in representing the state of the unfolding crisis (e.g., forest fire), the progress of the response activities such as evacuation and traffic control, and the state of...

    Provided By University of Calgary

  • White Papers // Feb 2008

    Generalized Whac-a-Mole

    The authors consider online competitive algorithms for the problem of collecting weighted items from a dynamic set S, when items are added to or deleted from S over time. The objective is to maximize the total weight of collected items. They study the general version, as well as variants with...

    Provided By University of Calgary

  • White Papers // Aug 2013

    Firewalls From Double Purity

    The firewall paradox is often presented as arising from double entanglement, but the author argues that more generally the paradox is double purity. Near-horizon modes are purified by the interior, in the infalling vacuum. Hence they cannot also be pure alone, or in combination with any third system, as demanded...

    Provided By University of Calgary

  • White Papers // Jul 2012

    A Systematic Process-Model-Based Approach for Synthesizing Attacks and Evaluating Them

    This paper describes a systematic approach for incrementally improving the security of election processes by using a model of the process to develop attack plans and then incorporating each plan into the process model to determine if it can complete successfully. More specifically, the authors' approach first applies fault tree...

    Provided By University of Calgary

  • White Papers // Aug 2013

    Security Evaluation of a Control System Using Named Data Networking

    Security is an integral part of networked computer systems. The recent Named Data Networking (NDN) project aims to develop a new Internet architecture that communicates data using names rather than locations, the latter of which is what the current IP-based Internet does with IP addresses. One of the first real-world...

    Provided By University of Calgary