University of Calgary

Displaying 1-40 of 548 results

  • White Papers // Jan 2015

    Computing Real Time Jobs in P2P Networks

    In this paper, the authors present a distributed computing framework designed to support higher quality of service and fault tolerance for processing deadline-driven tasks in a P2P environment. Their proposed strategy strives to build an open infrastructure that is accessible by ordinary users for both cycle donation and consumption. For...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Applying Infinite State Model Checking and Other Analysis Techniques to Tabular Requirements Specifications of Safety-Critical Systems

    Although it is most often applied to finite state models, in recent years, symbolic model checking has been extended to infinite state models using symbolic representations that encode infinite sets. This paper investigates the application of an infinite state symbolic model checker called Action Language Verifier (ALV) to formal requirements...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Extended Interface Grammars for Automated Stub Generation

    An important challenge in software verification is the ability to verify different software components in isolation. Achieving modularity in software verification requires development of innovative interface specification languages. In this paper the authors focus on the idea of using grammars for specification of component interfaces. In earlier work, they investigated...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Modular Verification of Synchronization with Reentrant Locks

    The authors present a modular approach for verification of synchronization behavior in concurrent programs that use reentrant locks. Their approach decouples the verification of the lock implementation from the verification of the threads that use the lock. This decoupling is achieved using lock interfaces that characterize the allowable execution order...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Analyzing Conversations: Realizability, Synchronizability, and Verification

    Conversations provide an intuitive and simple model for analyzing interactions among composite web services. A conversation is the global sequence of messages exchanged among the peers participating to a composite web service. Interactions in a composite web service can be analyzed by investigating the temporal properties of its conversations. Conversations...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Analyzing Tabular Requirements Specifications Using Infinite State Model Checking

    In this paper, the authors investigate the application of infinite state model checking to the formal analysis of requirements specifications in the SCR (Software Cost Reduction) tabular notation using Action Language Verifier (ALV). After reviewing the SCR method and tools and the Action Language, experimental results are presented of formally...

    Provided By University of Calgary

  • White Papers // Nov 2014

    To Go or Not to Go: On Energy-aware and Communication-aware Robotic Operation

    The authors consider the scenario where a mobile robot needs to visit a number of Points Of Interest (POIs) in a workspace, gather their generated bits of information, and successfully transmit them to a remote station, while operating in a realistic communication environment, minimizing its total energy consumption (including both...

    Provided By University of Calgary

  • White Papers // Sep 2014

    CloudTracker: Using Execution Provenance to Optimize the Cost of Cloud Use

    In this paper, the authors investigate tools that enable dollar cost optimization of scientific simulations using commercial clouds. They present a framework, called CloudTracker that transparently records information from a simulation that is executed in a commercial cloud so that it may be \"Replayed\" exactly to reproduce its results. Using...

    Provided By University of Calgary

  • White Papers // Jul 2014

    Automata-Based Symbolic String Analysis for Vulnerability Detection

    Verifying string manipulating programs is a crucial problem in computer security. String operations are used extensively within web applications to manipulate user input, and their erroneous use is the most common cause of security vulnerabilities in web applications. The authors present an automata-based approach for symbolic analysis of string manipulating...

    Provided By University of Calgary

  • White Papers // Jul 2014

    BareCloud: Bare-metal Analysis-based Evasive Malware Detection

    The volume and the sophistication of malware are continuously increasing and evolving. Automated dynamic malware analysis is a widely-adopted approach for detecting malicious software. However, many recent malware samples try to evade detection by identifying the presence of the analysis environment itself, and refraining from performing malicious actions. Because of...

    Provided By University of Calgary

  • White Papers // Jul 2014

    Hulk: Eliciting Malicious Behavior in Browser Extensions

    The authors present Hulk, a dynamic analysis system that detects malicious behavior in browser extensions by monitoring their execution and corresponding network activity. Hulk elicits malicious behavior in extensions in two ways. First, Hulk leverages HoneyPages, which are dynamic pages that adapt to an extension's expectations in web page structure...

    Provided By University of Calgary

  • White Papers // Jul 2014

    EmergeNet: Robust, Rapidly Deployable Cellular Networks

    Cellular phone networks are often paralyzed after a disaster, as damage to fixed infrastructure, loss of power, and increased demand degrade coverage and quality of service. To ensure disaster victims and first responders have access to reliable local and global communication, the authors propose EmergeNet, a portable, rapidly deployable, small...

    Provided By University of Calgary

  • White Papers // Jun 2014

    DRoP:DNS-based Router Positioning

    In this paper, the authors focus on geolocating Internet routers, using a methodology for extracting and decoding geography-related strings from fully qualified domain names (hostnames). They first compiled an extensive dictionary associating geographic strings (e.g., airport codes) with geophysical locations. They then searched a large set of router hostnames for...

    Provided By University of Calgary

  • White Papers // May 2014

    Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting

    Using ground truth sales data for over 40K unlicensed prescription pharmaceuticals sites, the authors present an economic analysis of two aspects of domain abuse in the online counterfeit drug market. First, they characterize the nature of domains abused by affiliate spammers to monetize what is evidently an overwhelming demand for...

    Provided By University of Calgary

  • White Papers // May 2014

    Asymptotically Optimal Sequential Tests for Anomaly Detection: Switching with Memory

    Each anomalous process incurs a cost per unit time until its anomaly is identified and fixed. Different anomalous processes may incur different costs depending on their criticality to the system. Switching between processes and state declarations are allowed at all times, while decisions are based on all past observations and...

    Provided By University of Calgary

  • White Papers // May 2014

    Automatic and Portable Cloud Deployment for Scientific Simulations

    In this paper, the authors present CloudRunner, a framework that extracts arbitrary programs from a source code repository (e.g. GitHub), wraps them in a web service and tasking system, and deploys them over disparate cloud infrastructures and local clusters, automating their portability. In particular, CloudRunner automatically creates and configures virtual...

    Provided By University of Calgary

  • White Papers // May 2014

    Enhanced Lattice-Based Signatures on Reconfigurable Hardware

    The recent Bimodal LattIce Signature Scheme (BLISS) showed that lattice-based constructions have evolved to practical alternatives to RSA or ECC. Besides reasonably small signatures with 5600 bits for a 128-bit level of security, BLISS enables extremely fast signing and signature verification in software. However, due to the complex sampling of...

    Provided By University of Calgary

  • White Papers // May 2014

    A Sampling-Based Approach to Scalable Constraint Satisfaction in Linear Sampled-Data Systems - Part I: Computation

    Sampled-Data (SD) systems, which are composed of both discrete- and continuous-time components, are arguably one of the most common classes of cyber-physical systems in practice; most modern controllers are implemented on digital platforms while the plant dynamics that are being controlled evolve continuously in time. As with all cyber-physical systems,...

    Provided By University of Calgary

  • White Papers // May 2014

    Scalable Fault-Tolerant Data Feeds in AsterixDB

    In this paper, the authors describe the support for data feed ingestion in AsterixDB, an open-source Big Data Management System (BDMS) that provides a platform for storage and analysis of large volumes of semi-structured data. Data feeds are a mechanism for having continuous data arrive into a BDMS from external...

    Provided By University of Calgary

  • White Papers // May 2014

    ReDHiP: Recalibrating Deep Hierarchy Prediction for Energy Efficiency

    Recent hardware trends point to increasingly deeper cache hierarchies. In such hierarchies, accesses that lookup and miss in every cache involve significant energy consumption and degraded performance. To mitigate these problems, in this paper the authors propose Recalibrating Deep Hierarchy Prediction (ReDHiP), an architectural mechanism that predicts Last-Level Cache (LLC)...

    Provided By University of Calgary

  • White Papers // Apr 2014

    Multi-Level Coded Caching

    Recent work has demonstrated that for content caching, joint design of storage and delivery can yield significant benefits over conventional caching approaches. This is based on storing content in the caches, so as to create coded-multicast opportunities even amongst users with different demands. Such a coded-caching scheme has been shown...

    Provided By University of Calgary

  • White Papers // Apr 2014

    Towards Automatically Estimating Porting Effort Between Web Service APIs

    In this paper, the authors describe a new methodology for automatically quantifying the relative work required for a programmer to port an application from one web API to another, i.e. \"Porting effort\". Their approach defines a simple language (based on Python) with which API developers specify the semantics of API...

    Provided By University of Calgary

  • White Papers // Apr 2014

    SELFISHMIGRATE: A Scalable Algorithm for Non-Clairvoyantly Scheduling Heterogeneous Processors

    Many computer architects believe that architectures consisting of heterogeneous processors will be the dominant architectural design in the future: simulation studies indicate that, for a given area and power budget, heterogeneous multiprocessors can offer an order of magnitude better performance for typical workloads. Looking at the consequences of Moore's Law...

    Provided By University of Calgary

  • White Papers // Mar 2014

    Lithography-Induced Limits to Scaling of Design Quality

    Quality and value of an IC product are functions of power, performance, area, cost and reliability. The forthcoming 2013 ITRS roadmap observes that while manufacturers continue to enable potential Moore's Law scaling of layout densities, the \"Realizable\" scaling in competitive products has for some years been significantly less. In this...

    Provided By University of Calgary

  • White Papers // Mar 2014

    VANET via Named Data Networking

    Recently manufactured vehicles are equipped with not only computation powers but also a variety of wireless communication interfaces such as 3G/LTE, WiMAX, Wi-Fi, IEEE 1901 (power line communication), and 802.11p (DSRC/WAVE). In this paper, the authors apply the named data networking, a newly proposed Internet architecture, to networking vehicles on...

    Provided By University of Calgary

  • White Papers // Mar 2014

    Circuit Switching Under the Radar with REACToR

    The potential advantages of optics at high link speeds have led to significant interest in deploying optical switching technology in data-center networks. Initial efforts have focused on hybrid approaches that rely on millisecond-scale circuit switching in the core of the network, while maintaining the flexibility of electrical packet switching at...

    Provided By University of Calgary

  • White Papers // Feb 2014

    SENIC: Scalable NIC for End-Host Rate Limiting

    Rate limiting is an important primitive for managing server network resources. Unfortunately, software-based rate limiting suffers from limited accuracy and high CPU overhead, and modern NICs only support a handful of rate limiters. The authors present SENIC, a NIC design that can natively support 10s of thousands of rate limiters...

    Provided By University of Calgary

  • White Papers // Feb 2014

    SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks

    Several defenses have increased the cost of traditional, low-level attacks that corrupt control data, e.g. return addresses saved on the stack, to compromise program execution. In response, creative adversaries have begun circumventing these defenses by exploiting programming errors to manipulate pointers to virtual tables, or vtables, of C++ objects. These...

    Provided By University of Calgary

  • White Papers // Feb 2014

    The Melbourne Shuffle: Improving Oblivious Storage in the Cloud

    The authors present a simple, efficient, and secure data-oblivious randomized shuffle algorithm. This is the first secure data-oblivious shuffle that is not based on sorting. Their method can be used to improve previous oblivious storage solutions for network-based outsourcing of data. One of the unmistakable recent trends in networked computation...

    Provided By University of Calgary

  • White Papers // Feb 2014

    Optimal Reliability-Constrained Overdrive Frequency Selection In Multicore Systems

    In leading-edge process technologies, reliability is a first-class constraint for both IC design and system operation. For multicore systems, reliability affects task scheduling decisions since it constrains both performance and throughput. Previous works on reliability-constrained task scheduling have two basic limitations: either they cannot guarantee lifetime (e.g., that the chip...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Automated Test Generation from Vulnerability Signatures

    Web applications need to validate and sanitize user inputs in order to avoid attacks such as Cross Site Scripting (XSS) and SQL injection. Writing string manipulation code for input validation and sanitization is an error-prone process leading to many vulnerabilities in real-world web applications. Automata-based static string analysis techniques can...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Cloud Platform Support for API Governance

    As scalable information technology evolves to a more cloud-like model, digital assets (code, data and software environments) increasingly require duration as web-accessible services. \"Service-izing\" digital assets consist of encapsulating assets in software that exposes them to web and mobile applications via well-defined yet flexible, network accessible, Application Programming Interfaces (APIs)....

    Provided By University of Calgary

  • White Papers // Jan 2014

    NOLO : A No-Loop, Predictive Useful Skew Methodology for Improved Timing in IC Implementation

    Useful skew is a well-known design technique that adjusts clock sink latencies to improve performance and/or robustness of high-performance IC designs. Current design methodologies apply useful skew after the netlist has been synthesized (e.g., with a uniform skew or clock uncertainty assumption on all flops), and after placement has been...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Timing Margin Recovery with Flexible Flip-Flop Timing Model

    In timing signoff for leading-edge SOCs, even few-picosecond timing violations will not only increase design turnaround time, but also degrade design quality (e.g., through power increase from insertion of extra buffers). Conventional flip-flop timing models have fixed values of setup/hold times and clock-to-q (c2q) delay, with some advanced \"Setup-Hold Pessimism...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Design Considerations for Solar Energy Harvesting Wireless Embedded Systems

    Sustainable operation of battery powered wireless embedded systems (such as sensor nodes) is a key challenge, and considerable research effort has been devoted to energy optimization of such systems. Environmental energy harvesting, in particular solar based, has emerged as a viable technique to supplement battery supplies. However, designing an efficient...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Security Issues in a Future Vehicular Network

    Both modern high-speed motorways and vehicles that drive upon them are becoming increasingly intelligent. In particular, communication devices are being installed in more and more cars and roadside infrastructure components. In this paper, the authors present a novel infrastructure for vehicular communication on highways and propose some potential applications aimed...

    Provided By University of Calgary

  • White Papers // Jan 2014

    An Analysis Framework for Security in Web Applications

    Software systems interact with outside environments (e.g., by taking inputs from a user) and usually have particular assumptions about these environments. Unchecked or improperly checked assumptions can affect security and reliability of the systems. A major class of such problems is the improper validation of user inputs. In this paper,...

    Provided By University of Calgary

  • White Papers // Jan 2014

    RBWA: An Efficient Random-Bit Window-Based Authentication Protocol

    Given the wide and rapid deployment of \"Visitor networks\", how to authenticate the user and account the usage on the per-packet basis securely and yet efficiently is still a challenging problem. In this paper, the authors explore the tradeoff between performance and security, and propose a per-data-packet authentication and access...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Impact of Attacks on a Secure Ad Hoc Routing Protocol: Performance Analysis and Countermeasures

    Mobile ad hoc networks have been an area of increasing research activity. Recently, a number of proto-cols have been proposed which secure ad hoc net-work routing; however, the evaluation of such protocols has been lacking. In particular, performance evaluations of such protocols have either been with-out an attacker, or under...

    Provided By University of Calgary

  • White Papers // Jan 2014

    SRDP: Securing Route Discovery in DSR

    Routing is a critical function in multi-hop Mobile Ad-hoc NETworks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is widely considered both the simplest and the most effective. At the same time, security in MANETs - especially, routing security - presents a number of new...

    Provided By University of Calgary

  • White Papers // Jun 2013

    Revolver: An Automated Approach to the Detection of EvasiveWeb-based Malware

    In recent years, attacks targeting web browsers and their plugins have become a prevalent threat. Attackers deploy web pages that contain exploit code, typically written in HTML and JavaScript, and use them to compromise unsuspecting victims. Initially, static techniques, such as signature-based detection, were adequate to identify such attacks. The...

    Provided By University of Calgary

  • White Papers // Aug 2013

    Steal This Movie - Automatically Bypassing DRM Protection in Streaming Media Services

    Streaming movies online is quickly becoming the way in which user's access video entertainment. This has been powered by the ubiquitous presence of the Internet and the availability of a number of hardware platforms that make access to movies convenient. Often, video-on-demand services use a digital rights management system to...

    Provided By University of Calgary

  • White Papers // Sep 2014

    CloudTracker: Using Execution Provenance to Optimize the Cost of Cloud Use

    In this paper, the authors investigate tools that enable dollar cost optimization of scientific simulations using commercial clouds. They present a framework, called CloudTracker that transparently records information from a simulation that is executed in a commercial cloud so that it may be \"Replayed\" exactly to reproduce its results. Using...

    Provided By University of Calgary

  • White Papers // May 2014

    Automatic and Portable Cloud Deployment for Scientific Simulations

    In this paper, the authors present CloudRunner, a framework that extracts arbitrary programs from a source code repository (e.g. GitHub), wraps them in a web service and tasking system, and deploys them over disparate cloud infrastructures and local clusters, automating their portability. In particular, CloudRunner automatically creates and configures virtual...

    Provided By University of Calgary

  • White Papers // Apr 2014

    Towards Automatically Estimating Porting Effort Between Web Service APIs

    In this paper, the authors describe a new methodology for automatically quantifying the relative work required for a programmer to port an application from one web API to another, i.e. \"Porting effort\". Their approach defines a simple language (based on Python) with which API developers specify the semantics of API...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Cloud Platform Support for API Governance

    As scalable information technology evolves to a more cloud-like model, digital assets (code, data and software environments) increasingly require duration as web-accessible services. \"Service-izing\" digital assets consist of encapsulating assets in software that exposes them to web and mobile applications via well-defined yet flexible, network accessible, Application Programming Interfaces (APIs)....

    Provided By University of Calgary

  • White Papers // Aug 2013

    From Unprovability to Environmentally Friendly Protocols

    An important security concern for cryptographic protocols is the extent to which they adversely affect the security of the systems in which they run. In particular, can the authors rule out the possibility that introducing a new protocol to a system might, as a \"Side effect\", break the security of...

    Provided By University of Calgary

  • White Papers // Jul 2014

    EmergeNet: Robust, Rapidly Deployable Cellular Networks

    Cellular phone networks are often paralyzed after a disaster, as damage to fixed infrastructure, loss of power, and increased demand degrade coverage and quality of service. To ensure disaster victims and first responders have access to reliable local and global communication, the authors propose EmergeNet, a portable, rapidly deployable, small...

    Provided By University of Calgary

  • White Papers // Apr 2013

    Intelligent Channel Bonding in 802.11n WLANs

    The IEEE 802.11n standard defines channel bonding that allows wireless devices to operate on 40MHz channels by doubling their bandwidth from standard 20MHz channels. Increasing channel width increases capacity, but it comes at the cost of decreased transmission range and greater susceptibility to interference. However, with the incorporation of Multiple-Input...

    Provided By University of Calgary

  • White Papers // Mar 2013

    WhiteRate: A Context-Aware Approach to Wireless Rate Adaptation

    The increased demand for wireless connectivity emphasizes the necessity of efficient wireless communication as resources such as the available spectrum and energy reserves become limiting factors for network proliferation. Recent advancements in software-defined radio enable high flexibility of the physical layer allowing fine grained transmission adjustments. Although communication efficiency can...

    Provided By University of Calgary

  • White Papers // Sep 2013

    VillageLink: Wide-Area Wireless Coverage

    White spaces promise to revolutionize the way wireless connectivity is delivered over wide areas. However, large-scale white space networks face the problem of allocating channels to multiple contending users in the wide white space band. To tackle the issue, the authors first examine wireless propagation in a long-distance outdoor white...

    Provided By University of Calgary

  • White Papers // Apr 2013

    Joint Rate and Channel Width Adaptation for 802.11 MIMO Wireless Networks

    The emergence of MIMO antennas and channel bonding in 802.11n wireless networks has resulted in a huge leap in capacity compared with legacy 802.11 systems. This leap, however, adds complexity to selecting the right transmission rate. Not only does the appropriate data rate need to be selected, but also the...

    Provided By University of Calgary

  • White Papers // May 2013

    Delay Tolerant Disaster Communication with the One Laptop Per Child XO Laptop

    In this paper, the authors describe the design, implementation, and evaluation of a mesh network based messaging application for the one laptop per child XO laptop. They outline the creation of an easy-to-use OLPC activity that exchanges Ushahidi-style messages with nearby OLPC users through the Internet or a mesh network....

    Provided By University of Calgary

  • White Papers // Sep 2012

    A Static Binary Instrumentation Threading Model for Fast Memory Trace Collection

    As hardware vendors push for higher levels of concurrency in multicore and manycore chips, the HPC software running on that hardware must increasingly utilize sophisticated models of parallelization, including interprocess message passing via MPI or SHMEM, intraprocess data sharing via threading models such as pthreads and OpenMP, and combinations of...

    Provided By University of Calgary

  • White Papers // Nov 2008

    Energy-Aware High Performance Computing with Graphic Processing Units

    The use of Graphics Processing Units (GPUs) in general purpose computing has been shown to incur significant performance benefits, for applications ranging from scientific computing to database sorting and search. The emergence of high-level APIs facilitates GPU programming to the point that general purpose computing with GPUs is now considered...

    Provided By University of Calgary

  • White Papers // Jan 2014

    Design Considerations for Solar Energy Harvesting Wireless Embedded Systems

    Sustainable operation of battery powered wireless embedded systems (such as sensor nodes) is a key challenge, and considerable research effort has been devoted to energy optimization of such systems. Environmental energy harvesting, in particular solar based, has emerged as a viable technique to supplement battery supplies. However, designing an efficient...

    Provided By University of Calgary

  • White Papers // Nov 2014

    To Go or Not to Go: On Energy-aware and Communication-aware Robotic Operation

    The authors consider the scenario where a mobile robot needs to visit a number of Points Of Interest (POIs) in a workspace, gather their generated bits of information, and successfully transmit them to a remote station, while operating in a realistic communication environment, minimizing its total energy consumption (including both...

    Provided By University of Calgary

  • White Papers // Apr 2013

    An Integrated Framework for Obstacle Mapping with See-Through Capabilities using Laser and Wireless Channel Measurements

    In this paper, the authors consider a team of mobile robots that are tasked with building a map of the obstacles, including occluded ones, in a given environment. They propose an integrated framework for mapping with see-through capabilities using laser and wireless channel measurements, which can provide mapping capabilities beyond...

    Provided By University of Calgary

  • White Papers // Dec 2009

    Optimizing Throughput and Latency Under Given Power Budget for Network Packet Processing

    Current state-of-the-art task scheduling algorithms for network packet processing schedule the program into a parallel-pipeline topology on network processors to maximize the throughput. However, there has been no existing paper targeting power budget for packet processing on off-the-shelf multi-core architectures. As energy consumption, reliability and cooling cost for packet processing...

    Provided By University of Calgary

  • White Papers // Dec 2010

    A New Server I/O Architecture for High Speed Networks

    Ethernet continues to be the most widely used network architecture today for its low cost and backward compatibility with the existing Ethernet infrastructure. Traditional architectural designs are normally focused on CPUs and have been often decoupled from I/O considerations. They are inefficient for high-speed network processing with a bandwidth of...

    Provided By University of Calgary

  • White Papers // Jan 2015

    Computing Real Time Jobs in P2P Networks

    In this paper, the authors present a distributed computing framework designed to support higher quality of service and fault tolerance for processing deadline-driven tasks in a P2P environment. Their proposed strategy strives to build an open infrastructure that is accessible by ordinary users for both cycle donation and consumption. For...

    Provided By University of Calgary

  • White Papers // Jan 2008

    An Effective Pointer Replication Algorithm in P2P Networks

    Peer-To-Peer (P2P) networks have proven to be an efficient and successful mechanism for file sharing over the Internet. However, current P2P protocols have long worst case query latencies which prevent them from being employed for real time applications. Popularity of objects in these networks can change rapidly and augurs the...

    Provided By University of Calgary

  • White Papers // Jan 2013

    IPv6 Alias Resolution via Induced Fragmentation

    Discovering router-level IPv6 topologies is important to understanding IPv6 growth, structure, and evolution and relation to IPv4. This paper presents a fingerprint-based IPv6 alias resolution technique that induces fragmented responses from IPv6 router interfaces. The authors leverage the way in which IPv6 implements fragmentation to provide reliable inferences. They demonstrate...

    Provided By University of Calgary

  • White Papers // Apr 2010

    Improving HTTP-based Video Performance using Network Flow Buffering

    The authors present network flow buffering, which is the use of a remote flow-regulating buffer that is deployed between a Web client and server to improve performance of HTTP-based playback of video? They show that HTTP enhanced with network flow buffering significantly improves performance, especially under high packet loss and...

    Provided By University of Calgary

  • White Papers // Jun 2010

    Operator and Radio Resource Sharing in Multi-Carrier Environments

    Today's mobile networks prevent users from freely accessing all available networks. Instead, seamless network composition could present a win-win situation for both users and operators. Users can gain better quality of service with more resources to choose from, while each individual operator can provision lesser bandwidth since resources can be...

    Provided By University of Calgary

  • White Papers // Jul 2014

    Hulk: Eliciting Malicious Behavior in Browser Extensions

    The authors present Hulk, a dynamic analysis system that detects malicious behavior in browser extensions by monitoring their execution and corresponding network activity. Hulk elicits malicious behavior in extensions in two ways. First, Hulk leverages HoneyPages, which are dynamic pages that adapt to an extension's expectations in web page structure...

    Provided By University of Calgary

  • White Papers // May 2014

    Empirically Characterizing Domain Abuse and the Revenue Impact of Blacklisting

    Using ground truth sales data for over 40K unlicensed prescription pharmaceuticals sites, the authors present an economic analysis of two aspects of domain abuse in the online counterfeit drug market. First, they characterize the nature of domains abused by affiliate spammers to monetize what is evidently an overwhelming demand for...

    Provided By University of Calgary

  • White Papers // Feb 2014

    SENIC: Scalable NIC for End-Host Rate Limiting

    Rate limiting is an important primitive for managing server network resources. Unfortunately, software-based rate limiting suffers from limited accuracy and high CPU overhead, and modern NICs only support a handful of rate limiters. The authors present SENIC, a NIC design that can natively support 10s of thousands of rate limiters...

    Provided By University of Calgary

  • White Papers // Mar 2014

    Circuit Switching Under the Radar with REACToR

    The potential advantages of optics at high link speeds have led to significant interest in deploying optical switching technology in data-center networks. Initial efforts have focused on hybrid approaches that rely on millisecond-scale circuit switching in the core of the network, while maintaining the flexibility of electrical packet switching at...

    Provided By University of Calgary

  • White Papers // Feb 2014

    SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks

    Several defenses have increased the cost of traditional, low-level attacks that corrupt control data, e.g. return addresses saved on the stack, to compromise program execution. In response, creative adversaries have begun circumventing these defenses by exploiting programming errors to manipulate pointers to virtual tables, or vtables, of C++ objects. These...

    Provided By University of Calgary

  • White Papers // Sep 2013

    Dahu: Commodity Switches for Direct Connect Data Center Networks

    Solving \"Big data\" problems requires bridging massive quantities of compute, memory, and storage, which requires a very high bandwidth network. Recently proposed direct connect networks like HyperX and flattened butterfly offer large capacity through paths of varying lengths between servers, and are highly cost effective for common data center workloads....

    Provided By University of Calgary

  • White Papers // Jul 2013

    Challenges in the Emulation of Large Scale Software Defined Networks

    Researchers and practitioners alike have long relied upon emulation to evaluate the performance of networked applications and protocols without tying up production infrastructure or committing to expensive hardware purchases. As Software Defined Networks (SDNs) become more prevalent, it is increasingly useful to be able to accurately emulate their behavior. Tools...

    Provided By University of Calgary

  • White Papers // Feb 2013

    SloMo: Downclocking WiFi Communication

    As manufacturers continue to improve the energy efficiency of battery-powered wireless devices, WiFi has become one of - if not the - most significant power draws. Hence, modern devices fastidiously manage their radios, shifting into low-power listening or sleep states whenever possible. The fundamental limitation with this approach, however, is...

    Provided By University of Calgary

  • White Papers // Mar 2012

    Characterizing Logging Practices in Open-Source Software

    Software logging is a conventional programming practice. While its efficacy is often important for users and developers to understand what have happened in the production run, yet software logging is often done in an arbitrary manner. So far, there has been little study for understanding logging practices in real world...

    Provided By University of Calgary

  • White Papers // Jun 2014

    DRoP:DNS-based Router Positioning

    In this paper, the authors focus on geolocating Internet routers, using a methodology for extracting and decoding geography-related strings from fully qualified domain names (hostnames). They first compiled an extensive dictionary associating geographic strings (e.g., airport codes) with geophysical locations. They then searched a large set of router hostnames for...

    Provided By University of Calgary

  • White Papers // Mar 2014

    VANET via Named Data Networking

    Recently manufactured vehicles are equipped with not only computation powers but also a variety of wireless communication interfaces such as 3G/LTE, WiMAX, Wi-Fi, IEEE 1901 (power line communication), and 802.11p (DSRC/WAVE). In this paper, the authors apply the named data networking, a newly proposed Internet architecture, to networking vehicles on...

    Provided By University of Calgary

  • White Papers // Jul 2014

    BareCloud: Bare-metal Analysis-based Evasive Malware Detection

    The volume and the sophistication of malware are continuously increasing and evolving. Automated dynamic malware analysis is a widely-adopted approach for detecting malicious software. However, many recent malware samples try to evade detection by identifying the presence of the analysis environment itself, and refraining from performing malicious actions. Because of...

    Provided By University of Calgary

  • White Papers // Aug 2008

    Automated Verification of Access Control Policies Using a SAT Solver

    Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended consequences. In this paper, the authors present a formal model for specifying access to resources, a model that encompasses the semantics of the XACML access control language. From this...

    Provided By University of Calgary

  • White Papers // Aug 2008

    Choreography Modeling and Analysis with Collaboration Diagrams

    There were similar efforts on Message Sequence Charts (MSCs). However, as MSCs concentrate on specification of local behaviors, earlier results on realizability of MSCs are not applicable to the realizability of collaboration diagrams. In earlier paper, the authors have studied the realizability of conversations specified using automata, called conversation protocols....

    Provided By University of Calgary

  • White Papers // Apr 2008

    Interface Grammars for Modular Software Model Checking

    Verification techniques that rely on state enumeration (such as model checking) face two important challenges: state-space explosion: exponential increase in the state space with the increasing number of components. Environment generation: modeling components that are either not available for analysis, or that are outside the scope of the verification tool...

    Provided By University of Calgary