University of Vigo

Displaying 1-40 of 73 results

  • White Papers // Jan 2014

    Integrated Security and Quality of Service Support in E-Commerce

    One of the main challenges against successful ecommerce in an open environment is security and QoS (Quality of Service) support. A security compromise can lead to the failure of an e-business in the worst case. At the same time, an e-commerce system needs to process service requests with a certain...

    Provided By University of Vigo

  • White Papers // Jan 2014

    A Case for Thermal-Aware Floorplanning at the Microarchitectural Level

    In current day microprocessors, exponentially increasing power densities, leakage, cooling costs, and reliability concerns have resulted in temperature becoming a first class design constraint like performance and power. Hence, virtually every high performance microprocessor uses a combination of an elaborate thermal package and some form of Dynamic Thermal Management (DTM)...

    Provided By University of Vigo

  • White Papers // Jan 2014

    Practical Experience Teaching Embedded Systems

    The area of embedded systems and their interconnection is of utmost importance now-a-days. The technological evolution, and widespread use, of small electronic devices with processing and communication capabilities, creates the potential for the development of new applications in several different domains. Areas such as industrial control, automotive, home automation, surveillance...

    Provided By University of Vigo

  • White Papers // Jan 2014

    Challenges in Transformation of Existing Real-Time Embedded Systems to Cyber-Physical Systems

    The recent integration of embedded real-time systems with large collections of sensors and actuators in hostile physical environments, called cyber-physical systems, is posing many new and challenging problems to the computer science community. Most research directions in the context of cyber-physical systems have focused on developing computing foundations for designing,...

    Provided By University of Vigo

  • White Papers // Dec 2013

    Walking Pads: Fast Power-Supply Pad-Placement Optimization

    The authors propose a novel C4 pad placement optimization framework for 2D power delivery grids: Walking Pads (WP). WP optimizes pad locations by moving pads according to the \"Virtual forces\" exerted on them by other pads and current sources in the system. WP algorithms achieve the same IR drop as...

    Provided By University of Vigo

  • White Papers // Sep 2013

    Trellis: Portability Across Architectures with a High-level Framework

    The increasing computational needs of parallel applications inevitably require portability across parallel architectures, which now include heterogeneous processing resources, such as CPUs and GPUs, and multiple SIMD/SIMT widths. However, the lack of a common parallel programming paradigm that provides predictable, near-optimal performance on each resource leads to the use of...

    Provided By University of Vigo

  • White Papers // Sep 2013

    BenchFriend: Correlating the Performance of GPU Benchmarks

    Graphics Processing Units (GPUs) have become an important platform for general-purpose computing, thanks to their high parallel throughput and high memory bandwidth. GPUs present significantly different architectures from CPUs and require specific mappings and optimizations to achieve high performance. This paper makes GPU workloads demonstrate application characteristics different from those...

    Provided By University of Vigo

  • White Papers // Aug 2013

    Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization

    Most modern applications are empowered by online services, so application developers frequently implement authentication and authorization. Major online providers, such as Facebook and Microsoft, provide SDKs for incorporating authentication services. This paper considers whether those SDKs enable typical developers to build secure apps. The authors work focuses on systematically explicating...

    Provided By University of Vigo

  • White Papers // Aug 2013

    Implications of the Power Wall: Dim Cores and Reconfigurable Logic

    Near-threshold operation can increase the number of simultaneously active cores, at the expense of much lower operating frequency (\"Dim silicon\"), but dim cores suffer from diminishing returns as the number of cores increases. At this point, hardware accelerators become more efficient alternatives. To explore such a broad design space, the...

    Provided By University of Vigo

  • White Papers // Aug 2013

    Pannotia: Understanding Irregular GPGPU Graph Applications

    GPUs have become popular recently to accelerate general-purpose data-parallel applications. However, most existing work has focused on GPU-friendly applications with regular data structures and access patterns. While a few prior studies have shown that some irregular workloads can also achieve speedups on GPUs, this domain has not been investigated thoroughly....

    Provided By University of Vigo

  • White Papers // May 2013

    GuarDroid: A Trusted Path for Password Entry

    Sensitive online transactions are now frequently executed using Smartphone clients. Whereas users of personal computers execute these transactions in a browser, Smartphone users tend to use installed apps. These apps use username and password pairs as the primary authentication method and may come from untrusted parties, opening users up to...

    Provided By University of Vigo

  • White Papers // May 2013

    Circuit Structures for Improving Efficiency of Security and Privacy Tools

    Several techniques in computer security, including generic protocols for secure computation and symbolic execution, depend on implementing algorithms in static circuits. Despite substantial improvements in recent years, tools built using these techniques remain too slow for most practical uses. They require transforming arbitrary programs into either Boolean logic circuits, constraint...

    Provided By University of Vigo

  • White Papers // Apr 2013

    On How to Provision Quality of Service (QoS) for Large Dataset Transfers

    For large-sized scientific dataset transfers, scientists typically invest in high-end computing systems that can source and sink data to/from their disk systems at high speeds. These transfers are referred to as flows as they dominate other flows. They also cause increased burstiness, which in turn impacts delay-sensitive real-time audio/video flows....

    Provided By University of Vigo

  • White Papers // Feb 2013

    A Performance Study on the VM Startup Time in the Cloud

    One of many advantages of the cloud is the elasticity, the ability to dynamically acquire or release computing resources in response to demand. However, this elasticity is only meaningful to the cloud users when the acquired Virtual Machines (VMs) can be provisioned in time and be ready to use within...

    Provided By University of Vigo

  • White Papers // Nov 2012

    Mechanism Design for Base Station Association and Resource Allocation in Downlink OFDMA Network

    The authors consider a resource management problem in a multi-cell downlink OFDMA network whereby the goal is to find the optimal combination of assignment of users to base stations and resource allocation strategies at each base station. Efficient resource management protocols must rely on users truthfully reporting privately held information...

    Provided By University of Vigo

  • White Papers // Nov 2012

    Multilevel Pulse-Position Modulation Based on Balanced Incomplete Block Designs

    In this paper, two new modulation schemes using multilevel Pulse-Position Modulation (PPM) for application in unipolar optical wireless systems are presented. Balanced Incomplete Block Designs (BIBD) are used for constructing the symbol alphabets. Each symbol is obtained by combining multiple code-words of a BIBD code. In one scheme the symbols...

    Provided By University of Vigo

  • White Papers // Jul 2012

    ArchFP: Rapid Prototyping of pre-RTL Floorplans

    There has been a fundamental shift from ever more complex single cores to single Chip Multi-Processors (CMP) designs. Along with this opportunity come major challenges; notably the sheer size of the CMP design space. An integrated suite of tools is needed that provides life-cycle support from early prototyping to final...

    Provided By University of Vigo

  • White Papers // Jun 2012

    Billion-Gate Secure Computation with Malicious Adversaries

    The goal of this paper is to assess the feasibility of two-party secure computation in the presence of a malicious adversary. Prior work has shown the feasibility of billion-gate circuits in the semi-honest model, but only the 35k-gate AES circuit in the malicious model, in part because security in the...

    Provided By University of Vigo

  • White Papers // May 2012

    Link Allocation, Routing and Scheduling of FSO Augmented RF Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are designed to provide broadband wireless services; however, capacities of WMNs are fundamentally limited in bandwidth because of the scarcity of RF spectral resources. A solution is to design a WMN using multiple wireless technologies. Since the optical spectrum remains unlicensed and under-utilized, the authors propose...

    Provided By University of Vigo

  • White Papers // May 2012

    Minimizing Transponder Cost for Two-Way Data Exchange in Satellite Networking

    Two-way satellite communication that simultaneously shares spectrum, with subsequent interference cancelation, is an attractive means of efficiently using satellite resources. Systems may employ this method on full-transponder access, or with lease of a partial transponder. In this case, it is of interest to request bandwidth and power resources that minimize...

    Provided By University of Vigo

  • White Papers // May 2012

    Quid-Pro-Quo-Tocols: Strengthening Semi-Honest Protocols With Dual Execution

    Known protocols for secure two-party computation that are designed to provide full security against malicious behavior are significantly less efficient than protocols intended only to thwart semi-honest adversaries. The authors present a concrete design and implementation of protocols achieving security guarantees that are much stronger than are possible with semi-honest...

    Provided By University of Vigo

  • White Papers // Feb 2012

    A System-Aware Cyber Security Architecture

    As exemplified in the 2010 Stuxnet attack on an Iranian nuclear facility, attackers have the capabilities to embed infections in equipment that is employed in nuclear power systems. In this paper, a new systems engineering focused approach for mitigating such risks is described. This approach involves the development of a...

    Provided By University of Vigo

  • White Papers // Feb 2012

    Private Set Intersection: Are Garbled Circuits Better Than Custom Protocols?

    Cryptographic protocols for Private Set Intersection (PSI) are the basis for many important privacy-preserving applications. Over the past few years, intensive research has been devoted to designing custom protocols for PSI based on homomorphic encryption and other public-key techniques, apparently due to the belief that solutions using generic approaches would...

    Provided By University of Vigo

  • White Papers // Feb 2012

    Replacement Attacks Against VM-Protected Applications

    Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software protection). Process-level Virtual Machines (PVMs) can safeguard the application code at run time and hamper the adversary's ability to launch dynamic attacks on the application. This dynamic protection, combined...

    Provided By University of Vigo

  • White Papers // Jan 2012

    Feedback Control With Queueing-Theoretic Prediction for Relative Delay Guarantees in Web Servers

    The use of feedback control theory for performance guarantees in QoS-aware systems has gained much attention in recent years. In this paper, they authors investigate merging, within a single framework, the predictive power of queueing theory with the reactive power of feedback control to produce software systems with a superior...

    Provided By University of Vigo

  • White Papers // Dec 2011

    Efficient Secure Computation With Garbled Circuits

    Secure two-party computation enables applications in which participants compute the output of a function that depends on their private inputs, without revealing those inputs or relying on any trusted third party. In this paper, the authors show the potential of building privacy-preserving applications using garbled circuits, a generic technique that...

    Provided By University of Vigo

  • White Papers // Oct 2011

    Auditing Information Leakage for Distance Metrics

    Many useful scenarios involve allowing untrusted users to run queries against secret data, so long as the results do not leak too much information. This problem has been studied widely for statistical queries, but not for queries with more direct semantics. In this paper, the authors consider the problem of...

    Provided By University of Vigo

  • White Papers // Sep 2011

    Using Cycle Stacks to Understand Scaling Bottlenecks in Multi-Threaded Workloads

    In this paper, the authors propose a methodology for analyzing parallel performance by building cycle stacks. A cycle stack quantifies where the cycles have gone, and provides hints towards optimization opportunities. They make the case that this is particularly interesting for analyzing parallel performance: understanding how cycle components scale with...

    Provided By University of Vigo

  • White Papers // Sep 2011

    Protecting Private Web Content From Embedded Scripts

    Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. The authors present a browser modification that provides fine-grained control over what parts of a document are visible to different scripts, and...

    Provided By University of Vigo

  • White Papers // Sep 2011

    Dymaxion: Optimizing Memory Access Patterns for Heterogeneous Systems

    Graphics Processor Units (GPUs) have emerged as an important platform for general purpose computing. GPUs offer a large number of parallel cores and have access to high memory bandwidth; however, data structure layouts in GPU memory often lead to suboptimal performance for programs designed with a CPU memory interface -...

    Provided By University of Vigo

  • White Papers // Aug 2011

    The STeTSiMS STT-RAM Simulation and Modeling System

    There is growing interest in emerging non-volatile memory technologies such as Phase-Change Memory, Memristors, and Spin-Transfer Torque RAM (STT-RAM). STT-RAM, in particular, is experiencing rapid development that can be difficult for memory systems researchers to take advantage of. What is needed are techniques that enable designers to explore the potential...

    Provided By University of Vigo

  • White Papers // Aug 2011

    Privacy-Preserving Applications on Smartphones

    Smartphones are becoming some of the people most trusted computing devices. People use them to store highly sensitive information including email, passwords, financial accounts, and medical records. These properties make Smartphones an essential platform for privacy-preserving applications. To date, this area remains largely unexplored mainly because privacy-preserving computation protocols were...

    Provided By University of Vigo

  • White Papers // Jun 2011

    Delivering on the Promise of Universal Memory for Spin-Transfer Torque RAM (STT-RAM)

    Spin-Transfer Torque RAM (STT-RAM) has emerged as a potential candidate for Universal memory. However, there are two challenges to using STT-RAM in memory system design: the intrinsic variation in the storage element, the Magnetic Tunnel Junction (MTJ), and the high write energy. In this paper, the authors present a physically...

    Provided By University of Vigo

  • White Papers // Jun 2011

    An Analytical Model for Performance Yield of Nanoscale SRAM Accounting for the Sense Amplifier Strobe Signal

    Process variations are one of the biggest obstacles to overcome for high performance SRAM designs. One of the places worst affected is the timing of the \"Strobe,\" referring to the Sense Amp (SA) enable, a signal whose transition indicates that a sufficient voltage differential has developed on the Bit-Lines (BLs)...

    Provided By University of Vigo

  • White Papers // Jun 2011

    Faster Secure Two-Party Computation Using Garbled Circuits

    Secure two-party computation enables two parties to evaluate a function cooperatively without revealing to either party anything beyond the function's output. The garbled-circuit technique, a generic approach to secure two-party computation for semi-honest participants, was developed by Yao in the 1980s, but has been viewed as being of limited practical...

    Provided By University of Vigo

  • White Papers // May 2011

    Scaling With Design Constraints - Predicting the Future of Big Chips

    The last few years have witnessed high-end processors with increasing number of cores and increasingly larger dies. Limited Instruction-Level Parallelism (ILP), chip power constraints and technology scaling limitations caused designers to embrace multiple cores rather than single-core performance scaling to improve chip throughput. In this paper, the authors try to...

    Provided By University of Vigo

  • White Papers // Apr 2011

    The e-Commerce Sandbox: An Interactive Learning Tool with Real-Time Feedback

    The e-Commerce Sandbox is an interactive learning tool developed to supplement a course on the technology and business aspects of e-commerce taught at the University of Virginia. The sandbox is spatio-temporally independent, allowing students to complete modules outside of the classroom on their own schedules. Essential to the success of...

    Provided By University of Vigo

  • White Papers // Feb 2011

    Detection Diversity of Multiantenna Spectrum Sensors

    Spectrum sensing is a key task in the Cognitive Radio (CR) paradigm in order to limit harmful interference to licensed users of the frequency band. By using multiple antennas (either co-located or spatially distributed), the sensing system can substantially improve its detection performance. In order to quantify and compare the...

    Provided By University of Vigo

  • White Papers // Oct 2010

    A Characterization of the Rodinia Benchmark Suite With Comparison to Contemporary CMP Workloads

    The recently released Rodinia benchmark suite enables users to evaluate heterogeneous systems including both accelerators, such as GPUs, and multicore CPUs. As Rodinia sees higher levels of acceptance, it becomes important that researchers understand this new set of benchmarks, especially in how they differ from previous paper. In this paper,...

    Provided By University of Vigo

  • White Papers // Oct 2010

    Multiantenna Detection Under Noise Uncertainty and Primary User's Spatial Structure

    Spectrum sensing is a challenging key component of the Cognitive Radio paradigm, since primary signals must be detected in the face of noise uncertainty and at Signal-to-Noise Ratios (SNRs) well below decodability levels. Multiantenna detectors exploit spatial independence of receiver thermal noise to boost detection performance and robustness. Here, the...

    Provided By University of Vigo

  • White Papers // Jul 2012

    ArchFP: Rapid Prototyping of pre-RTL Floorplans

    There has been a fundamental shift from ever more complex single cores to single Chip Multi-Processors (CMP) designs. Along with this opportunity come major challenges; notably the sheer size of the CMP design space. An integrated suite of tools is needed that provides life-cycle support from early prototyping to final...

    Provided By University of Vigo

  • White Papers // Sep 2011

    Dymaxion: Optimizing Memory Access Patterns for Heterogeneous Systems

    Graphics Processor Units (GPUs) have emerged as an important platform for general purpose computing. GPUs offer a large number of parallel cores and have access to high memory bandwidth; however, data structure layouts in GPU memory often lead to suboptimal performance for programs designed with a CPU memory interface -...

    Provided By University of Vigo

  • White Papers // May 2011

    Scaling With Design Constraints - Predicting the Future of Big Chips

    The last few years have witnessed high-end processors with increasing number of cores and increasingly larger dies. Limited Instruction-Level Parallelism (ILP), chip power constraints and technology scaling limitations caused designers to embrace multiple cores rather than single-core performance scaling to improve chip throughput. In this paper, the authors try to...

    Provided By University of Vigo

  • White Papers // Oct 2010

    A Characterization of the Rodinia Benchmark Suite With Comparison to Contemporary CMP Workloads

    The recently released Rodinia benchmark suite enables users to evaluate heterogeneous systems including both accelerators, such as GPUs, and multicore CPUs. As Rodinia sees higher levels of acceptance, it becomes important that researchers understand this new set of benchmarks, especially in how they differ from previous paper. In this paper,...

    Provided By University of Vigo

  • White Papers // Feb 2011

    Detection Diversity of Multiantenna Spectrum Sensors

    Spectrum sensing is a key task in the Cognitive Radio (CR) paradigm in order to limit harmful interference to licensed users of the frequency band. By using multiple antennas (either co-located or spatially distributed), the sensing system can substantially improve its detection performance. In order to quantify and compare the...

    Provided By University of Vigo

  • White Papers // Oct 2010

    Multiantenna Detection Under Noise Uncertainty and Primary User's Spatial Structure

    Spectrum sensing is a challenging key component of the Cognitive Radio paradigm, since primary signals must be detected in the face of noise uncertainty and at Signal-to-Noise Ratios (SNRs) well below decodability levels. Multiantenna detectors exploit spatial independence of receiver thermal noise to boost detection performance and robustness. Here, the...

    Provided By University of Vigo

  • White Papers // Feb 2010

    Multiantenna Spectrum Sensing for Cognitive Radio: Overcoming Noise Uncertainty

    Spectrum sensing is a key ingredient of the dynamic spectrum access paradigm, but it needs powerful detectors operating at SNRs well below the decodability levels of primary signals. Noise uncertainty poses a significant challenge to the development of such schemes, requiring some degree of diversity (spatial, temporal, or in distribution)...

    Provided By University of Vigo

  • White Papers // Apr 2010

    On the Impact of Primary User Localization on Rrate Performance of CR Systems

    This paper investigates how localization knowledge of primary users impacts the sum-rate performance of a secondary system in an underlay cognitive radio setting. Two different probabilistic models for the primary users' location information are assumed, one uniform distribution and the other with Gaussian distribution. The interplay between the achievable rate...

    Provided By University of Vigo

  • White Papers // May 2012

    Link Allocation, Routing and Scheduling of FSO Augmented RF Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are designed to provide broadband wireless services; however, capacities of WMNs are fundamentally limited in bandwidth because of the scarcity of RF spectral resources. A solution is to design a WMN using multiple wireless technologies. Since the optical spectrum remains unlicensed and under-utilized, the authors propose...

    Provided By University of Vigo

  • White Papers // May 2012

    Minimizing Transponder Cost for Two-Way Data Exchange in Satellite Networking

    Two-way satellite communication that simultaneously shares spectrum, with subsequent interference cancelation, is an attractive means of efficiently using satellite resources. Systems may employ this method on full-transponder access, or with lease of a partial transponder. In this case, it is of interest to request bandwidth and power resources that minimize...

    Provided By University of Vigo

  • White Papers // Jan 2012

    Feedback Control With Queueing-Theoretic Prediction for Relative Delay Guarantees in Web Servers

    The use of feedback control theory for performance guarantees in QoS-aware systems has gained much attention in recent years. In this paper, they authors investigate merging, within a single framework, the predictive power of queueing theory with the reactive power of feedback control to produce software systems with a superior...

    Provided By University of Vigo

  • White Papers // Nov 2012

    Mechanism Design for Base Station Association and Resource Allocation in Downlink OFDMA Network

    The authors consider a resource management problem in a multi-cell downlink OFDMA network whereby the goal is to find the optimal combination of assignment of users to base stations and resource allocation strategies at each base station. Efficient resource management protocols must rely on users truthfully reporting privately held information...

    Provided By University of Vigo

  • White Papers // Feb 2012

    Private Set Intersection: Are Garbled Circuits Better Than Custom Protocols?

    Cryptographic protocols for Private Set Intersection (PSI) are the basis for many important privacy-preserving applications. Over the past few years, intensive research has been devoted to designing custom protocols for PSI based on homomorphic encryption and other public-key techniques, apparently due to the belief that solutions using generic approaches would...

    Provided By University of Vigo

  • White Papers // Sep 2011

    Protecting Private Web Content From Embedded Scripts

    Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. The authors present a browser modification that provides fine-grained control over what parts of a document are visible to different scripts, and...

    Provided By University of Vigo

  • White Papers // Aug 2011

    Privacy-Preserving Applications on Smartphones

    Smartphones are becoming some of the people most trusted computing devices. People use them to store highly sensitive information including email, passwords, financial accounts, and medical records. These properties make Smartphones an essential platform for privacy-preserving applications. To date, this area remains largely unexplored mainly because privacy-preserving computation protocols were...

    Provided By University of Vigo

  • White Papers // Jun 2011

    Faster Secure Two-Party Computation Using Garbled Circuits

    Secure two-party computation enables two parties to evaluate a function cooperatively without revealing to either party anything beyond the function's output. The garbled-circuit technique, a generic approach to secure two-party computation for semi-honest participants, was developed by Yao in the 1980s, but has been viewed as being of limited practical...

    Provided By University of Vigo

  • White Papers // Jun 2012

    Billion-Gate Secure Computation with Malicious Adversaries

    The goal of this paper is to assess the feasibility of two-party secure computation in the presence of a malicious adversary. Prior work has shown the feasibility of billion-gate circuits in the semi-honest model, but only the 35k-gate AES circuit in the malicious model, in part because security in the...

    Provided By University of Vigo

  • White Papers // Jul 2010

    The Network Empowered Internetwork (NEI): An Architecture Overview

    After classifying internetworks into type internetworks, protocol internetworks, and organization internetworks, this paper focuses on the last of these. A key problem with organization internetworking is global routing scalability. In developing the NEI architecture to address this problem, some basic mechanisms/tenets of IP internetworking are upended. In NEI, internetworking addresses...

    Provided By University of Vigo

  • White Papers // Nov 2012

    Multilevel Pulse-Position Modulation Based on Balanced Incomplete Block Designs

    In this paper, two new modulation schemes using multilevel Pulse-Position Modulation (PPM) for application in unipolar optical wireless systems are presented. Balanced Incomplete Block Designs (BIBD) are used for constructing the symbol alphabets. Each symbol is obtained by combining multiple code-words of a BIBD code. In one scheme the symbols...

    Provided By University of Vigo

  • White Papers // Apr 2011

    The e-Commerce Sandbox: An Interactive Learning Tool with Real-Time Feedback

    The e-Commerce Sandbox is an interactive learning tool developed to supplement a course on the technology and business aspects of e-commerce taught at the University of Virginia. The sandbox is spatio-temporally independent, allowing students to complete modules outside of the classroom on their own schedules. Essential to the success of...

    Provided By University of Vigo

  • White Papers // Apr 2013

    On How to Provision Quality of Service (QoS) for Large Dataset Transfers

    For large-sized scientific dataset transfers, scientists typically invest in high-end computing systems that can source and sink data to/from their disk systems at high speeds. These transfers are referred to as flows as they dominate other flows. They also cause increased burstiness, which in turn impacts delay-sensitive real-time audio/video flows....

    Provided By University of Vigo

  • White Papers // Feb 2012

    Replacement Attacks Against VM-Protected Applications

    Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software protection). Process-level Virtual Machines (PVMs) can safeguard the application code at run time and hamper the adversary's ability to launch dynamic attacks on the application. This dynamic protection, combined...

    Provided By University of Vigo

  • White Papers // Feb 2012

    A System-Aware Cyber Security Architecture

    As exemplified in the 2010 Stuxnet attack on an Iranian nuclear facility, attackers have the capabilities to embed infections in equipment that is employed in nuclear power systems. In this paper, a new systems engineering focused approach for mitigating such risks is described. This approach involves the development of a...

    Provided By University of Vigo

  • White Papers // Apr 2010

    Monitoring User Actions for Better Malware Specifications

    Malware authors have used the open nature of the web to distribute malicious software more quickly than security software manufacturers can respond using static signature-based detection mechanisms. Current behavioral techniques suffer from high false positive rates because of the difficulty of distinguishing between benign and malicious behaviors based only on...

    Provided By University of Vigo

  • White Papers // Aug 2013

    Explicating SDKs: Uncovering Assumptions Underlying Secure Authentication and Authorization

    Most modern applications are empowered by online services, so application developers frequently implement authentication and authorization. Major online providers, such as Facebook and Microsoft, provide SDKs for incorporating authentication services. This paper considers whether those SDKs enable typical developers to build secure apps. The authors work focuses on systematically explicating...

    Provided By University of Vigo

  • White Papers // May 2013

    GuarDroid: A Trusted Path for Password Entry

    Sensitive online transactions are now frequently executed using Smartphone clients. Whereas users of personal computers execute these transactions in a browser, Smartphone users tend to use installed apps. These apps use username and password pairs as the primary authentication method and may come from untrusted parties, opening users up to...

    Provided By University of Vigo

  • White Papers // May 2013

    Circuit Structures for Improving Efficiency of Security and Privacy Tools

    Several techniques in computer security, including generic protocols for secure computation and symbolic execution, depend on implementing algorithms in static circuits. Despite substantial improvements in recent years, tools built using these techniques remain too slow for most practical uses. They require transforming arbitrary programs into either Boolean logic circuits, constraint...

    Provided By University of Vigo

  • White Papers // Oct 2011

    Auditing Information Leakage for Distance Metrics

    Many useful scenarios involve allowing untrusted users to run queries against secret data, so long as the results do not leak too much information. This problem has been studied widely for statistical queries, but not for queries with more direct semantics. In this paper, the authors consider the problem of...

    Provided By University of Vigo

  • White Papers // Dec 2011

    Efficient Secure Computation With Garbled Circuits

    Secure two-party computation enables applications in which participants compute the output of a function that depends on their private inputs, without revealing those inputs or relying on any trusted third party. In this paper, the authors show the potential of building privacy-preserving applications using garbled circuits, a generic technique that...

    Provided By University of Vigo

  • White Papers // Mar 2008

    Phishing for the Answer: Recent Developments in Combating Phishing

    In this paper, the authors discuss some legal implications of phishing. First, it provides an introduction on phishing and its variants. Then it discusses various efforts to combat phishing, ranging from consumer education, private sector efforts, and law enforcement. Lastly, the paper details recent legislative developments concerning phishing at both...

    Provided By University of Vigo

  • White Papers // Apr 2010

    Cryptanalysis of the DECT Standard Cipher

    Cordless phones using the Digital Enhanced Cordless Telecommunications standard (DECT) are among the most widely deployed security technologies with 90 million new handsets shipping every year. However, DECT does not provide sufficient security for its intended application 'Cordless telephony' as it fails to deliver confidentiality and access control. The DECT...

    Provided By University of Vigo

  • White Papers // Jan 2014

    Integrated Security and Quality of Service Support in E-Commerce

    One of the main challenges against successful ecommerce in an open environment is security and QoS (Quality of Service) support. A security compromise can lead to the failure of an e-business in the worst case. At the same time, an e-commerce system needs to process service requests with a certain...

    Provided By University of Vigo

  • White Papers // Nov 2007

    CPS-IP: Cyber Physical Systems Interconnection Protocol

    As sensing, wireless communication, and embedded computing technologies evolve, more and more special-purpose cyber physical systems are emerging in the users' daily lives, such as mobile tracking and health care system, emplaced environmental monitoring systems, and building maintenance control systems. In these systems, heterogeneity is a fundamental research issue. To...

    Provided By University of Vigo

  • White Papers // Nov 2007

    Towards Verifiable Deeply Embedded Systems

    An important class of Deeply Embedded Systems (DES) involves interlocking cyber-physical control loops, each with its own dynamics and correctness constraints. For instance, in medical systems which monitor a patient's vital signs and control drug infusion rates, multiple sensing and control systems may be implicitly coupled. These systems present new...

    Provided By University of Vigo

  • White Papers // Nov 2007

    A Hybrid Framework for Resource Verification in Executable Model-Based Embedded System Development

    Model-based development has focused on verification and testing for functional or timing aspects, yet embedded software also involves para-functional resource-related aspects, termed resource (bound) properties. In this paper, the authors consider the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems....

    Provided By University of Vigo

  • White Papers // Dec 2006

    Bringing Embedded Software Closer to Computer Science Students

    Computer Science (CS) students have often shied away from the field of embedded systems owing to their perception of this area as \"Hardware\" oriented, not without reason. But recent trends in embedded systems, with the growing importance of the software component, has brought about new opportunities for computer science students...

    Provided By University of Vigo

  • White Papers // Dec 2006

    Incorporating Embedded Programming Skills into an ECE Curriculum

    In this paper, the typical Electrical and Computer Engineering (ECE) curriculum is examined to determine its effectiveness at presenting embedded programming skills. The software concepts and programming techniques necessary for embedded systems are somewhat different than those seen in other engineering domains. Thus, it makes sense to specifically address embedded...

    Provided By University of Vigo

  • White Papers // Dec 2006

    Hardware Platform Design Decisions in Embedded Systems - A Systematic Teaching Approach

    Designers of embedded systems can choose between a large varieties of different hardware platforms. The question often arising is which hardware platform is suited best for a certain application. This decision is usually made by an expert in industry being familiar with a variety of hardware platforms. Therefore, it is...

    Provided By University of Vigo

  • White Papers // Jul 2006

    Towards Formally Verifiable Resource Bounds for Real-Time Embedded Systems

    In this paper, the authors describe ongoing work aimed at the construction of formal cost models and analyses that are capable of producing verifiable guarantees of resource usage (space, time and ultimately power consumption) in the context of real-time embedded systems. Their paper is conducted in terms of the domain-specific...

    Provided By University of Vigo

  • White Papers // Jul 2006

    Research Trends in Real-Time Computing for Embedded Systems

    Most of today's embedded systems are required to work in dynamic environments, where the characteristics of the computational load cannot always be predicted in advance. Still timely responses to events have to be provided within precise timing constraints in order to guarantee a desired level of performance. Hence, embedded systems...

    Provided By University of Vigo