University of California

Displaying 121-160 of 666 results

  • White Papers // May 2011

    On the Sum-Capacity With Successive Decoding in Interference Channels

    In this paper, the authors investigate the sum-capacity of the two-user Gaussian interference channel with Gaussian superposition coding and successive decoding. They first examine an approximate deterministic formulation of the problem, and introduce the complementarity conditions that capture the use of Gaussian coding and successive decoding. In the deterministic channel...

    Provided By University of California

  • White Papers // May 2011

    Energy Efficient E-Textile Based Portable Keyboard

    The authors have created sensor architecture, data collection and processing techniques for an E-Textile wireless keyboard. They leverage the inherent properties of E-Textiles to produce optimized architecture for energy efficient sensing. Novel techniques such as one where each sensor senses several events (activations of different keys) and each event is...

    Provided By University of California

  • White Papers // May 2011

    Compressing Provenance Graphs

    The provenance community has built a number of systems to collect provenance, most of which assume that provenance will be retained indefinitely. However, it is not cost-effective to retain provenance information inefficiently. Since provenance can be viewed as a graph, the authors note the similarities to web graphs and draw...

    Provided By University of California

  • White Papers // May 2011

    Performance Evaluation of Secure Network Coding Using Homomorphic Signature

    Network coding has gained significant attention by improving throughput and reliability in disruptive MANETs. Yet, it is vulnerable to attacks from malicious nodes. In order to prevent malicious attacks, the authors have explored the use of secure network coding schemes based on homomorphic properties of cryptographic systems. While homomorphic methods,...

    Provided By University of California

  • White Papers // May 2011

    The Underground Economy of Fake Antivirus Software

    Fake Anti-Virus (AV) programs have been utilized to defraud millions of computer users into paying as much as one hundred dollars for a phony software license. As a result, fake AV software has evolved into one of the most lucrative criminal operations on the Internet. In this paper, the authors...

    Provided By University of California

  • White Papers // May 2011

    Heterogeneity-Aware Resource Allocation and Scheduling in the Cloud

    Data analytics are key applications running in the cloud computing environment. To improve performance and cost-effectiveness of a data analytics cluster in the cloud, the data analytics system should account for heterogeneity of the environment and workloads. In addition, it also needs to provide fairness among jobs when multiple jobs...

    Provided By University of California

  • White Papers // May 2011

    Data Management and Layout for Shingled Magnetic Recording

    Ultimately the performance and success of a shingled write disk will be determined by more than the physical hardware realized, but will depend on the data layouts employed, the workloads experienced, and the architecture of the overall system, including the level of interfaces provided by the devices to higher levels...

    Provided By University of California

  • White Papers // May 2011

    Maximum Damage Battery Depletion Attack in Mobile Sensor Networks

    Developing reliable security measures against outbreaks of malware will facilitate the proliferation of wireless sensing technologies. The first step toward this goal is to investigate potential attack strategies and the extent of damage they can incur. The malware at each infective node may seek to contact more susceptible nodes by...

    Provided By University of California

  • White Papers // May 2011

    Analyzing the Crossdomain Policies of Flash Applications

    Adobe Flash is a rich Internet application platform. Flash applications are often deployed to the Web; The Flash Player plugin is installed on a large fraction of all Web connected PCs. Flash provides a mechanism by which sites can opt in to more expressive information sharing regimes than the same-origin...

    Provided By University of California

  • White Papers // May 2011

    Fingerprinting Information in JavaScript Implementations

    To date, many attempts have been made to fingerprint users on the web. These fingerprints allow browsing sessions to be linked together and possibly even tied to a user's identity. They can be used constructively by sites to supplement traditional means of user authentication such as passwords; and they can...

    Provided By University of California

  • White Papers // May 2011

    Exploiting Mobility for Trust Propagation in Mobile Ad Hoc Networks

    Trust plays an important role in protecting the security of mobile ad hoc networks. The node mobility brings challenge to trust propagation, where traditional graph-based propagation methods are difficult to apply. In this paper, the authors propose a trust establishment and propagation scheme by exploiting natural mobility of mobile ad...

    Provided By University of California

  • White Papers // May 2011

    Phishing on Mobile Devices

    The authors assess the risk of phishing on mobile platforms. Mobile operating systems and browsers lack secure application iden-tity indicators, so the user cannot always identify whether a link has taken her to the expected application. They conduct a systematic analysis of ways in which mobile applications and web sites...

    Provided By University of California

  • White Papers // May 2011

    FingerGlass: Efficient Multiscale Interaction on Multitouch Screens

    Many tasks in graphical user interfaces require users to interact with elements at various levels of precision. The authors present FingerGlass, a bimanual technique designed to improve the precision of graphical tasks on multitouch screens. It enables users to quickly navigate to different locations and across multiple scales of a...

    Provided By University of California

  • White Papers // May 2011

    Measurement-Based Short-Term Performance Prediction in Wireless Mesh Networks

    Traditionally, the performance of Wireless Mesh Networks (WMNs) is measured by long-term averaged metrics, such as long-term averaged packet delivery ratio or throughput. However, due to the dynamic nature of the wireless networks, long-term averaged metrics cannot reflect the short-term behaviors of the network. In the meanwhile, the users may...

    Provided By University of California

  • White Papers // May 2011

    A Hybrid Cross-Layer Routing Protocol for MANETs

    Wireless link effects impose unique challenges to routing protocols in Mobile Ad Hoc NETworks (MANETs). In this paper, the authors propose Hybrid Cross-Layer Routing (HCLR) protocol designed and implemented based on the premise of being able to leverage a pair of proactive and reactive routing schemes. While the former is...

    Provided By University of California

  • White Papers // May 2011

    Dynamic Egocentric Models for Citation Networks

    The analysis of the formation and evolution of networks over time is of fundamental importance to social science, biology, and many other fields. While longitudinal network data sets are increasingly being recorded at the granularity of individual time-stamped events, most studies only focus on collapsed cross-sectional snapshots of the network....

    Provided By University of California

  • White Papers // May 2011

    Exploring the Relationship BetweenWeb Application Development Tools and Security

    How should software engineers choose which tools to use to develop secure web applications? Different developers have different opinions regarding which language, framework, or vulnerability-finding tool tends to yield more secure software than another; some believe that there is no difference at all between such tools. This paper adds quantitative...

    Provided By University of California

  • White Papers // May 2011

    Exploring the Relationship Between Web Application Development Tools and Security

    How should software engineers choose which tools to use to develop secure web applications? Different developers have different opinions regarding which language, framework, or vulnerability-finding tool tends to yield more secure software than another; some believe that there is no difference at all between such tools. This paper adds quantitative...

    Provided By University of California

  • White Papers // May 2011

    Formal Modeling Execution Semantic of Control and Data Flow for the Composition Web Services

    Web Services Composition (WSC)-based applications are widely used in the heterogeneous environment, which has inevitably led to the need for reliable mechanisms for the WSC paradigm that can provide sustainable execution semantic. This paper focuses on constructing data flow and control flow for the composition Web services execution. A flexible...

    Provided By University of California

  • White Papers // May 2011

    The Effects Of Monetary Policy "News" And "Surprises"

    There is substantial agreement in the monetary policy literature over the effects of exogenous monetary policy shocks. The shocks that are investigated, however, almost exclusively represent unanticipated changes in policy, which surprise the private sector and which are typically found to have a delayed and sluggish effect on output. In...

    Provided By University of California

  • White Papers // Apr 2011

    In-Situ MapReduce for Log Processing

    Log analytics are a bedrock component of running many of today's Internet sites. Application and click logs form the basis for tracking and analyzing customer behaviors and preferences, and they form the basic inputs to ad-targeting algorithms. Logs are also critical for performance and security monitoring, debugging, and optimizing the...

    Provided By University of California

  • White Papers // Apr 2011

    OppSense: Information Sharing for Mobile Phones in Sensing Field With Data Repositories

    With the popularity and advancements of smart phones, mobile users can interact with the sensing facilities and exchange information with other wireless devices in the environment by short range communications. Opportunistic exchange has recently been suggested in similar contexts; yet the authors show strong evidence that, in their application, opportunistic...

    Provided By University of California

  • White Papers // Apr 2011

    Malware Analysis With Tree Automata Inference

    The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors seem to share some source code and malware samples often feature similar behaviors, but such commonalities are difficult to detect with signature-based methods because of an increasing use...

    Provided By University of California

  • White Papers // Apr 2011

    RADBench: A Concurrency Bug Benchmark Suite

    Testing and debugging tools for concurrent programs are often validated on known bugs. To aid the development of these tools, the authors present the Race, Atomicity, and Deadlock Benchmark (RADBench) suite. The RADBench suite contains the full source of 10 real concurrency bugs found in large open-source software projects including...

    Provided By University of California

  • White Papers // Apr 2011

    A Context-Aware Approach to Wireless Transmission Adaptation

    Recent advancements in wireless transmission have enabled networks with a high level of physical layer flexibility. Unfortunately, these new opportunities are not harnessed by modern wireless systems. Due to inefficient resource allocation, systems typically encounter problems such as spectrum scarcity, energy depletion or low quality of service. In this paper,...

    Provided By University of California

  • White Papers // Apr 2011

    Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information

    The need for controlled (privacy-preserving) sharing of sensitive information occurs in many different and realistic everyday scenarios, ranging from national security to social networking. A typical setting involves two parties: one seeks information from the other without revealing the interest while the latter is either willing, or compelled, to share...

    Provided By University of California

  • White Papers // Apr 2011

    Datacenter-Scale Network Research on FPGAs

    The authors describe an FPGA-based datacenter network simulator to allow researchers to rapidly experiment with O(10, 000) node datacenter network architectures. They configure the FPGA hardware to implement abstract models of key datacenter building blocks including servers and all levels of switches. They discuss design and implementation issues of their...

    Provided By University of California

  • White Papers // Apr 2011

    Financial Crises, Credit Booms, And External Imbalances: 140 Years Of Lessons

    Do external imbalances increase the risk of financial crises? In this paper, the authors study the experience of 14 developed countries over 140 years (1870{2008). They exploit their long-run dataset in a number of different ways. First, they apply new statistical tools to describe the temporal and spatial patterns of...

    Provided By University of California

  • White Papers // Apr 2011

    Throughput and Collision Analysis of Multi-Channel Multi-Stage Spectrum Sensing Algorithms

    Multi-stage sensing is a novel concept that refers to a general class of spectrum sensing algorithms that divide the sensing process into a number of sequential stages. The number of sensing stages and the sensing technique per stage can be used to optimize performance with respect to secondary user throughput...

    Provided By University of California

  • White Papers // Apr 2011

    Illiquid Financial Markets And Monetary Policy

    This paper analyzes the role of money in markets where financial investment takes place in a decentralized fashion. A key methodological contribution is the development of a dynamic framework that brings together a model for illiquid assets a la Duffie et al. and a monetary framework a la Lagos and...

    Provided By University of California

  • White Papers // Mar 2011

    Implications of Netalyzr's DNS Measurements

    Netalyzr is a widely used network measurement and diagnosis tool. To date, it has collected 198,000 measurement sessions from 146,000 distinct IP addresses. One of the primary focus areas of Netalyzr is DNS behavior, including DNS resolver properties, common name lookups, NXDOMAIN wildcarding, lookup performance, and on-the-wire manipulations. Additional tests...

    Provided By University of California

  • White Papers // Mar 2011

    To Preempt or Not: Tackling Bid and Time-Based Cheating in Online Spectrum Auctions

    Online spectrum auctions offer ample flexibility for bidders to request and obtain spectrum on-the-fly. Such flexibility, however, opens up new vulnerabilities to bidder manipulation. Aside from rigging their bids, selfish bidders can falsely report their arrival time to game the system and obtain unfair advantage over others. Such time-based cheating...

    Provided By University of California

  • White Papers // Mar 2011

    Scaling Laws for Cooperative Node Localization in Non-Line-of-Sight Wireless Networks

    The authors study the problem of cooperative node localization in Non-Line-Of-Sight (NLOS) wireless networks and address design questions such as, "How many anchors and what fraction of Line-Of-Sight (LOS) measurements are needed achieve a specified target accuracy?". They analytically characterize the performance improvement in localization accuracy as a function of...

    Provided By University of California

  • White Papers // Mar 2011

    A Game Theoretical Approach to Communication Security

    The increased reliance on the Internet has made information and communication systems more vulnerable to security attacks. Many recent incidents demonstrate this vulnerability, such as the rapid propagation of sophisticated malwares, the fast growth of botnets, Denial-of-Service (DoS) attacks against business and government websites, and attacks against the power grid...

    Provided By University of California

  • White Papers // Mar 2011

    A General Class of Throughput Optimal Routing Policies in Multi-Hop Wireless Networks

    This paper considers the problem of throughput optimal routing/scheduling in a multi-hop constrained queueing network with random connectivity whose special case includes opportunistic multi-hop wireless networks and input-queued switch fabrics. The main challenge in the design of throughput optimal routing policies is closely related to identifying appropriate and universal Lyapunov...

    Provided By University of California

  • White Papers // Mar 2011

    Differential Slicing: Identifying Causal Execution Differences for Security Applications

    A security analyst often needs to understand two runs of the same program that exhibit a difference in program state or output. This is important, for example, for vulnerability analysis, as well as for analyzing a malware program that features different behaviors when run in different environments. In this paper,...

    Provided By University of California

  • White Papers // Mar 2011

    Defeating UCI: Building Stealthy and Malicious Hardware

    In previous work Hicks et al. proposed a method called Unused Circuit Identification (UCI) for detecting malicious backdoors hidden in circuits at design time. The UCI algorithm essentially looks for portions of the circuit that go unused during design-time testing and flags them as potentially malicious. In this paper, the...

    Provided By University of California

  • White Papers // Mar 2011

    Technology Choices and Pricing Policies in Wireless Networks

    This paper studies the provision of a wireless network by a monopolistic provider who may be either benevolent (seeking to maximize social welfare) or selfish (seeking to maximize provider profit). The paper addresses the following questions: Under what circumstances is it feasible for a provider, either benevolent or selfish, to...

    Provided By University of California

  • White Papers // Mar 2011

    Modeling and Analysis of Stochastic Hybrid Systems

    The author describes a model for Stochastic Hybrid Systems (SHSs) where transitions between discrete modes are triggered by stochastic events. The rate at which these transitions occur is allowed to depend both on the continuous and the discrete states of the SHS. Several examples of SHSs arising from a varied...

    Provided By University of California

  • White Papers // Mar 2011

    Addressing Modeling Challenges in Cyber-Physical Systems

    This paper focuses on the challenges of modeling cyber-physical systems that arise from the intrinsic heterogeneity, concurrency, and sensitivity to timing of such systems. It uses a portion of an aircraft Vehicle Management Systems (VMS), specifically the fuel management subsystem, to illustrate the challenges, and then discusses technologies that at...

    Provided By University of California

  • White Papers // Jan 2011

    Asymptotically Efficient Multi-Channel Estimation for Opportunistic Spectrum Access

    The problem of estimating the parameters of multiple independent continuous-time Markov on-off processes is considered. The objective is to minimize the total Mean Square Error (MSE) under a constraint on the total sensing time. The Fisher information matrix for the primary traffic model and the maximum likelihood estimator are obtained...

    Provided By University of California

  • White Papers // Jan 2011

    Spectrum Opportunity Detection: How Good Is Listen-Before-Talk?

    The authors consider spectrum opportunity detection in cognitive radio networks for spectrum overlay. They highlight the differences between detecting primary signals and detecting spectrum opportunities. They show that besides noise and fading, the geographic distribution and traffic pattern of primary users have significant impact on the performance of spectrum opportunity...

    Provided By University of California

  • White Papers // Mar 2011

    Technology Choices and Pricing Policies in Wireless Networks

    This paper studies the provision of a wireless network by a monopolistic provider who may be either benevolent (seeking to maximize social welfare) or selfish (seeking to maximize provider profit). The paper addresses the following questions: Under what circumstances is it feasible for a provider, either benevolent or selfish, to...

    Provided By University of California

  • White Papers // Aug 2011

    MACE: Model-Inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery

    Program state-space exploration is central to software security, testing, and verification. In this paper, the authors propose a novel technique for state-space exploration of software that maintains an ongoing interaction with its environment. Their technique uses a combination of symbolic and concrete execution to build an abstract model of the...

    Provided By University of California

  • White Papers // Mar 2011

    Differential Slicing: Identifying Causal Execution Differences for Security Applications

    A security analyst often needs to understand two runs of the same program that exhibit a difference in program state or output. This is important, for example, for vulnerability analysis, as well as for analyzing a malware program that features different behaviors when run in different environments. In this paper,...

    Provided By University of California

  • White Papers // Apr 2011

    Malware Analysis With Tree Automata Inference

    The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors seem to share some source code and malware samples often feature similar behaviors, but such commonalities are difficult to detect with signature-based methods because of an increasing use...

    Provided By University of California

  • White Papers // Sep 2011

    Dymo: Tracking Dynamic Code Identity

    Code identity is a primitive that allows an entity to recognize a known, trusted application as it executes. This primitive supports trusted computing mechanisms such as sealed storage and remote attestation. Unfortunately, there is a generally acknowledged limitation in the implementation of current code identity mechanisms in that they are...

    Provided By University of California

  • White Papers // Apr 2011

    RADBench: A Concurrency Bug Benchmark Suite

    Testing and debugging tools for concurrent programs are often validated on known bugs. To aid the development of these tools, the authors present the Race, Atomicity, and Deadlock Benchmark (RADBench) suite. The RADBench suite contains the full source of 10 real concurrency bugs found in large open-source software projects including...

    Provided By University of California

  • White Papers // Jan 2011

    Sound and Complete Monitoring of Sequential Consistency for Relaxed Memory Models

    The authors present a technique for verifying that a program has no executions violating Sequential Consistency (SC) when run under the relaxed memory models Total Store Order (TSO) and Partial Store Order (PSO). The technique works by monitoring sequentially consistent executions of a program to detect if similar program executions...

    Provided By University of California

  • White Papers // Apr 2010

    Separating Functional and Parallel Correctness Using Nondeterministic Sequential Specifications

    Writing correct explicitly-parallel programs can be very challenging. While the functional correctness of a program can often be understood largely sequentially, a software engineer must simultaneously reason about the non-deterministic parallel interleavings of the program's threads of execution. This complication is similarly a challenge to automated verification efforts. Thus, the...

    Provided By University of California

  • White Papers // Apr 2009

    CalFuzzer: An Extensible Active Testing Framework for Concurrent Programs

    Active testing has recently been introduced to effectively test concurrent programs. Active testing works in two phases. It first uses predictive off-the-shelf static or dynamic program analyses to identify potential concurrency bugs, such as data races, deadlocks, and atomicity violations. In the second phase, active testing uses the reports from...

    Provided By University of California

  • White Papers // Sep 2009

    Looper: Lightweight Detection of Infinite Loops at Runtime

    When a running program becomes unresponsive, it is often impossible for a user to determine if the program is performing some useful computation or if it has entered an infinite loop. The authors present LOOPER, an automated technique for dynamically analyzing a running program to prove that it is non-terminating....

    Provided By University of California

  • White Papers // Jun 2011

    Cloud Software Upgrades: Challenges and Opportunities

    The fast evolution pace for cloud computing software is on a collision course with the authors' growing reliance on cloud computing. On one hand, cloud software must have the agility to evolve rapidly, in order to remain competitive; on the other hand, more and more critical services become dependent on...

    Provided By University of California

  • White Papers // Aug 2011

    Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware

    Rigorous experiments and empirical studies hold the promise of empowering researchers and practitioners to develop better approaches for cyber security. For example, understanding the provenance and lineage of polymorphic malware strains can lead to new techniques for detecting and classifying unknown attacks. Unfortunately, many challenges stand in the way: the...

    Provided By University of California

  • White Papers // Jul 2010

    Fine-Grained Incremental Learning and Multi-Feature Tossing Graphs to Improve Bug Triaging

    Software bugs are inevitable and bug fixing is a difficult, expensive, and lengthy process. One of the primary reasons why bug fixing takes so long is the difficulty of accurately assigning a bug to the most competent developer for that bug kind or bug class. Assigning a bug to a...

    Provided By University of California

  • White Papers // Dec 2009

    Temporal Spectrum Access Scheduling for Heterogeneous Wireless Systems Coexistence

    The wireless spectrum has always been the scarce resource that creates bottlenecks in communication channels. On the other hand, the channel access scheduling has gone from coordinating homogeneous users to heterogeneous ones, as seen in the recent development of cognitive radio technologies. In this paper, the authors address the spectrum...

    Provided By University of California

  • White Papers // Sep 2009

    Stable Energy-Aware Topology Management in Ad Hoc Networks

    The efficiency of a communication network depends not only on its control protocols, but also on the underlying network topology. The authors propose a distributed topology management algorithm that constructs and maintains a backbone topology based on a Minimal Dominating Set (MDS) of the network. According to this algorithm, each...

    Provided By University of California

  • White Papers // Oct 2009

    Spectrum Access Scheduling Among Heterogeneous Wireless Systems

    The spectrum scarcity problem emerged in recent years. Spectrum access scheduling addresses challenges arising from spectrum sharing by interleaving the channel access among multiple wireless systems in a TDMA fashion. Different from cognitive radio approaches which are opportunistic and non-collaborative in general, spectrum access scheduling proactively structures and interleaves the...

    Provided By University of California

  • White Papers // Jan 2011

    Latin Square Based Channel Access Scheduling in Large-Scale WLAN Systems

    WLAN systems based on the IEEE 802.11 could contain hundreds even up to thousands of wireless access points nowadays. However, IEEE 802.11 MAC protocols, including DCF, PCF and EDCA mechanisms, are unable to meet the challenges to provide collision freedom, especially in distributed large scale WLAN systems. The authors propose...

    Provided By University of California

  • White Papers // Apr 2010

    Location Estimation for Wireless Sensor Retrieval

    Wireless sensor retrieval is importance for cost saving, data analysis and security purposes in WSNs. Finding sensors is especially challenging because both the number and locations of these sensors could be unknown. In this paper, the authors propose an online probabilistic localization algorithms that iteratively calculate the locations of multiple...

    Provided By University of California

  • White Papers // Jan 2011

    Toward a Definition of and Linguistic Support for Partial Quiescence

    The global quiescence of a distributed computation (or distributed termination detection) is an important problem. Some concurrent programming languages and systems provide global quiescence detection as a built-in feature so that programmers do not need to write special synchronization code to detect quiescence. This paper introduces Partial Quiescence (PQ), which...

    Provided By University of California

  • White Papers // May 2010

    Spark: Cluster Computing With Working Sets

    MapReduce and its variants have been highly successful in implementing large-scale data-intensive applications on commodity clusters. However, most of these systems are built around an acyclic data flow model that is not suitable for other popular applications. This paper focuses on one such class of applications: those that reuse a...

    Provided By University of California

  • White Papers // Nov 2011

    Recomputing Materialized Instances After Changes to Mappings and Data

    A major challenge faced by today's information systems is that of evolution as data usage evolves or new data resources become available. Modern organizations sometimes exchange data with one another via declarative mappings among their databases, as in data exchange and collaborative data sharing systems. Such mappings are frequently revised...

    Provided By University of California

  • White Papers // Apr 2009

    Gaming the Jammer: Is Frequency Hopping Effective ?

    Frequency hopping has been the most popularly considered approach for alleviating the effects of jamming attacks. In this paper, the authors provide a novel, measurement-driven, game theoretic framework that captures the interactions between a communication link and an adversarial jammer, possibly with multiple jamming devices, in a wireless network employing...

    Provided By University of California

  • White Papers // Sep 2009

    Verifying Ptolemy II Discrete-Event Models Using Real-Time Maude

    This paper shows how Ptolemy II Discrete-Event (DE) models can be formally analyzed using Real-Time Maude. The authors formalize in Real-Time Maude the semantics of a subset of hierarchical Ptolemy II DE models, and explain how the code generation infrastructure of Ptolemy II has been used to automatically synthesize a...

    Provided By University of California

  • White Papers // Dec 2011

    Template-Based Program Veri Cation and Program Synthesis

    Program verification is the task of automatically generating proofs for a program's compliance with a given specification. Program synthesis is the task of automatically generating a program that meets a given specification. Both program verification and program synthesis can be viewed as search problems, for proofs and programs, respectively. For...

    Provided By University of California

  • White Papers // Oct 2011

    Types for Precise Thread Interference

    The potential for unexpected interference between threads makes multi-threaded programming notoriously difficult. Programmers use a variety of synchronization idioms such as locks and barriers to restrict where interference may actually occur. Unfortunately, the resulting actual interference points are typically never documented and must be manually reconstructed as the first step...

    Provided By University of California

  • White Papers // Sep 2010

    Tweakable Block Ciphers

    A common trend in applications of block ciphers over the past decades has been to employ block ciphers as one piece of a "Mode of operation" - possibly, a way to make a secure symmetric-key cryptosystem, but more generally, any cryptographic application. Most of the time, these modes of operation...

    Provided By University of California

  • White Papers // May 2011

    Exploring the Relationship BetweenWeb Application Development Tools and Security

    How should software engineers choose which tools to use to develop secure web applications? Different developers have different opinions regarding which language, framework, or vulnerability-finding tool tends to yield more secure software than another; some believe that there is no difference at all between such tools. This paper adds quantitative...

    Provided By University of California

  • White Papers // May 2011

    Phishing on Mobile Devices

    The authors assess the risk of phishing on mobile platforms. Mobile operating systems and browsers lack secure application iden-tity indicators, so the user cannot always identify whether a link has taken her to the expected application. They conduct a systematic analysis of ways in which mobile applications and web sites...

    Provided By University of California

  • White Papers // Mar 2011

    Defeating UCI: Building Stealthy and Malicious Hardware

    In previous work Hicks et al. proposed a method called Unused Circuit Identification (UCI) for detecting malicious backdoors hidden in circuits at design time. The UCI algorithm essentially looks for portions of the circuit that go unused during design-time testing and flags them as potentially malicious. In this paper, the...

    Provided By University of California

  • White Papers // Apr 2010

    Lazy Annotation for Program Testing and Verification

    The authors describe an interpolant-based approach to test generation and model checking for sequential programs. The method generates Floyd/Hoare style annotations of the program on demand, as a result of failure to achieve goals, in a manner analogous to conflict clause learning in a DPLL style SAT solver. The DPLL...

    Provided By University of California

  • White Papers // Jun 2010

    Efficient Computation of Queueing Delay at a Network Port From Output Link Packet Traces

    Current Internet core routers provide enough buffer capacity at each output port to keep the link busy for 250 msec. to avoid disrupting TCP flows because of dropped packets. Since link speeds are rising much more quickly than the availability and cost-effectiveness of large high-speed memories, there is now significant...

    Provided By University of California

  • White Papers // Jan 2011

    ASCENT: Adaptive Self-Configuring SEnsor Networks Topologies

    Advances in micro-sensor and radio technology will enable small but smart sensors to be deployed for a wide range of environmental monitoring applications. The low per-node cost will allow these wireless networks of sensors and actuators to be densely distributed. The nodes in these dense networks will coordinate to perform...

    Provided By University of California

  • White Papers // Dec 2010

    GeoServ: A Distributed Urban Sensing Platform

    Urban sensing where mobile users continuously gather, process, and share location-sensitive sensor data (e.g., street images, road condition, traffic flow) is emerging as a new network paradigm of sensor information sharing in urban environments. The key enablers are the smartphones (e.g., iPhones and Android phones) equipped with onboard sensors (e.g.,...

    Provided By University of California

  • White Papers // Aug 2010

    VAPR: Void Aware Pressure Routing Protocol

    UnderWater Acoustic Sensor Networks (UW-ASNs) have lately been suggested as a potent means of supporting aquatic applications ranging from environmental monitoring to intrusion detection. A bevy of mobile sensor nodes each equipped with a variety of sensors and a low bandwidth acoustic modem (e.g. Drogues) can be deployed the region...

    Provided By University of California

  • White Papers // Mar 2010

    A Path Loss Model for Non-Line-of-Sight Ultraviolet Multiple Scattering Channels

    An UltraViolet (UV) signal transmission undergoes rich scattering and strong absorption by atmospheric particulates. The authors develop a path loss model for a Non-Line-Of-Sight (NLOS) link. The model is built upon probability theory governing random migration of photons in free space, undergoing scattering, in terms of angular direction and distance....

    Provided By University of California

  • White Papers // May 2011

    On the Sum-Capacity With Successive Decoding in Interference Channels

    In this paper, the authors investigate the sum-capacity of the two-user Gaussian interference channel with Gaussian superposition coding and successive decoding. They first examine an approximate deterministic formulation of the problem, and introduce the complementarity conditions that capture the use of Gaussian coding and successive decoding. In the deterministic channel...

    Provided By University of California

  • White Papers // Jan 2011

    On the Throughput Capacity of Random Wireless Networks

    The authors consider the problem of how throughput in a wireless network with randomly located nodes scales as the number of users n grows. Their results rely on percolation theory arguments. When the node density is too high the network is fully connected but generates excessive interference. In the low...

    Provided By University of California

  • White Papers // Mar 2011

    To Preempt or Not: Tackling Bid and Time-Based Cheating in Online Spectrum Auctions

    Online spectrum auctions offer ample flexibility for bidders to request and obtain spectrum on-the-fly. Such flexibility, however, opens up new vulnerabilities to bidder manipulation. Aside from rigging their bids, selfish bidders can falsely report their arrival time to game the system and obtain unfair advantage over others. Such time-based cheating...

    Provided By University of California