Vrigar Technologies Ltd

Displaying 1-17 of 17 results

  • White Papers // May 2012

    Body Armor for Binaries: Preventing Buffer Overflows without Recompilation

    BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. The authors' approach hardens binaries against both kinds of overflow, without requiring the programs' source...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2012

    System-Level Support for Intrusion Recovery

    Recovering from attacks is hard and gets harder as the time between the initial infection and its detection increases. Which files did the attackers modify? Did any of user data depend on malicious inputs? Can the user still trust their own documents or binaries? When malcode has been active for...

    Provided By Vrigar Technologies Ltd

  • White Papers // Apr 2012

    Integrated System and Process Crash Recovery in the Loris Storage Stack

    In this paper, the authors look at two important failure classes in the storage stack: system crashes, where the whole system shuts down unexpectedly, and process crashes, where a part of the storage stack software fails due to an implementation bug. They investigate these two problems in the context of...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jul 2011

    Minemu: The World's Fastest Taint Tracker

    Dynamic taint analysis is a powerful technique to detect memory corruption attacks. However, with typical overheads of an order of magnitude, current implementations are not suitable for most production systems. The research question the authors address in this paper is whether the slow-down is a fundamental speed barrier, or an...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jun 2011

    Efficient, Modular Metadata Management With Loris

    With the amount of data increasing at an alarming rate, domain-specific user-level metadata management systems have emerged in several application areas to compensate for the shortcomings of file systems. Such systems provide domain specific storage formats for performance-optimized metadata storage, search-based access interfaces for enabling declarative queries, and type-specific indexing...

    Provided By Vrigar Technologies Ltd

  • White Papers // Apr 2011

    Integrated End-to-End Dependability in the Loris Storage Stack

    The storage stack in an operating system faces a number of dependability threats. The importance of keeping users' data safe makes this area particularly worth investigating. The authors briefly describe the main threats (disk device failures, whole-system failures, software bugs, and memory corruption), and outline the Loris storage stack that...

    Provided By Vrigar Technologies Ltd

  • White Papers // Sep 2010

    Loris - A Dependable, Modular File-Based Storage Stack

    The arrangement of file systems and volume management/RAID systems, together commonly referred to as the storage stack, has remained the same for several decades, despite significant changes in hardware, software and usage scenarios. In this paper, the authors evaluate the traditional storage stack along three dimensions: reliability, heterogeneity and flexibility....

    Provided By Vrigar Technologies Ltd

  • White Papers // Aug 2010

    The Smartphone and the Cloud: Power to the User

    In the last decade the people have seen a shift in the use of computers. Their personal computers no longer stand on the desks in their homes, but are located in the pockets of their trousers. They use these pocket devices, called Smartphone's, to access their multimedia data, to communicate...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jul 2010

    Jungle Computing: Distributed Supercomputing beyond Clusters, Grids, and Clouds

    In recent years, the application of high-performance and distributed computing in scientific practice has become increasingly wide-spread. Among the most widely available platforms to scientists are clusters, grids, and cloud systems. Such infrastructures currently are undergoing revolutionary change due to the integration of many-core technologies, providing orders-of-magnitude speed improvements for...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jun 2010

    Block-Level RAID Is Dead

    The concept of RAID is a landmark in the history of storage systems. Taking advantage of the traditional block interface used by file systems, RAID algorithms were integrated at the block level, thus, retaining perfect backward compatibility with existing installations. The common storage stack as found in most operating systems...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jun 2009

    Dealing with Driver Failures in the Storage Stack

    In this paper, the authors augment MINIX 3's failure-resilience mechanisms with novel disk-driver recovery strategies and guaranteed filesystem data integrity. They propose a flexible filter-driver framework that operates transparently to both the file system and the disk driver and enforces different protection strategies. The filter uses checksumming and mirroring in...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2009

    Using Area Hierarchy for Multi-Resolution Storage and Search in Large Wireless Sensor Networks

    The authors consider multi-resolution storage, a technique for providing scalable adaptive data fidelity, necessary for many applications of large Wireless Sensor Networks (WSNs). Although the previously proposed design of multi-resolution storage, based on quad trees and geographic routing, is conceptually simple, it exhibits inherent problems if applied to real-world WSNs....

    Provided By Vrigar Technologies Ltd

  • White Papers // Mar 2009

    Memory Sharing Revisited

    Although several UNIX techniques for sharing memory exist, such as System V IPC Shared Memory and POSIX Shared Memory, these schemes are not suitable for use internal to the operating system and cannot protect against all threats posed by memory sharing. Therefore, the authors propose a novel, flexible memory-protection scheme...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jan 2009

    Multi-Hop Cluster Hierarchy Maintenance in Wireless Sensor Networks: A Case for Gossip-Based Protocols

    Multi-hop cluster hierarchy has been presented as an organization for large Wireless Sensor Networks (WSNs) that can provide scalable routing, data aggregation, and querying. In this paper, the authors revisit the fundamental problem of maintenance of such a hierarchy. To this end, they observe that, due to tightly coupling their...

    Provided By Vrigar Technologies Ltd

  • White Papers // Feb 2007

    A Hybrid PKI-IBC Based Ephemerizer System

    The concept of an ephemerizer system has been introduced in earlier works as a mechanism to ensure that a file deleted from the persistent storage remains unrecoverable. The principle involved storing the data in an encrypted form in the user's machine and the key to decrypt the data in a...

    Provided By Vrigar Technologies Ltd

  • White Papers // Aug 2006

    Towards a Reference Ontology for Business Models

    Ontologies are viewed as increasingly important tools for structuring domains of interests. In this paper, the authors propose reference ontology of business models using concepts from three established business model ontologies; the REA, BMO, and e3-value. The basic concepts in the reference ontology concern actors, resources, and the transfer of...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2006

    Supporting Reconfigurable Parallel Multimedia Applications

    Programming multimedia applications for System-on-Chip (SoC) architectures is difficult because streaming communication, user event handling, reconfiguration, and parallelism have to be dealt with. The authors present Hinch, a runtime system for multimedia applications that efficiently exploits parallelism by running the application in a dataflow style. The application has to be...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2012

    System-Level Support for Intrusion Recovery

    Recovering from attacks is hard and gets harder as the time between the initial infection and its detection increases. Which files did the attackers modify? Did any of user data depend on malicious inputs? Can the user still trust their own documents or binaries? When malcode has been active for...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jul 2011

    Minemu: The World's Fastest Taint Tracker

    Dynamic taint analysis is a powerful technique to detect memory corruption attacks. However, with typical overheads of an order of magnitude, current implementations are not suitable for most production systems. The research question the authors address in this paper is whether the slow-down is a fundamental speed barrier, or an...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jul 2010

    Jungle Computing: Distributed Supercomputing beyond Clusters, Grids, and Clouds

    In recent years, the application of high-performance and distributed computing in scientific practice has become increasingly wide-spread. Among the most widely available platforms to scientists are clusters, grids, and cloud systems. Such infrastructures currently are undergoing revolutionary change due to the integration of many-core technologies, providing orders-of-magnitude speed improvements for...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2009

    Using Area Hierarchy for Multi-Resolution Storage and Search in Large Wireless Sensor Networks

    The authors consider multi-resolution storage, a technique for providing scalable adaptive data fidelity, necessary for many applications of large Wireless Sensor Networks (WSNs). Although the previously proposed design of multi-resolution storage, based on quad trees and geographic routing, is conceptually simple, it exhibits inherent problems if applied to real-world WSNs....

    Provided By Vrigar Technologies Ltd

  • White Papers // Jan 2009

    Multi-Hop Cluster Hierarchy Maintenance in Wireless Sensor Networks: A Case for Gossip-Based Protocols

    Multi-hop cluster hierarchy has been presented as an organization for large Wireless Sensor Networks (WSNs) that can provide scalable routing, data aggregation, and querying. In this paper, the authors revisit the fundamental problem of maintenance of such a hierarchy. To this end, they observe that, due to tightly coupling their...

    Provided By Vrigar Technologies Ltd

  • White Papers // Apr 2012

    Integrated System and Process Crash Recovery in the Loris Storage Stack

    In this paper, the authors look at two important failure classes in the storage stack: system crashes, where the whole system shuts down unexpectedly, and process crashes, where a part of the storage stack software fails due to an implementation bug. They investigate these two problems in the context of...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jun 2011

    Efficient, Modular Metadata Management With Loris

    With the amount of data increasing at an alarming rate, domain-specific user-level metadata management systems have emerged in several application areas to compensate for the shortcomings of file systems. Such systems provide domain specific storage formats for performance-optimized metadata storage, search-based access interfaces for enabling declarative queries, and type-specific indexing...

    Provided By Vrigar Technologies Ltd

  • White Papers // Apr 2011

    Integrated End-to-End Dependability in the Loris Storage Stack

    The storage stack in an operating system faces a number of dependability threats. The importance of keeping users' data safe makes this area particularly worth investigating. The authors briefly describe the main threats (disk device failures, whole-system failures, software bugs, and memory corruption), and outline the Loris storage stack that...

    Provided By Vrigar Technologies Ltd

  • White Papers // Sep 2010

    Loris - A Dependable, Modular File-Based Storage Stack

    The arrangement of file systems and volume management/RAID systems, together commonly referred to as the storage stack, has remained the same for several decades, despite significant changes in hardware, software and usage scenarios. In this paper, the authors evaluate the traditional storage stack along three dimensions: reliability, heterogeneity and flexibility....

    Provided By Vrigar Technologies Ltd

  • White Papers // Jun 2010

    Block-Level RAID Is Dead

    The concept of RAID is a landmark in the history of storage systems. Taking advantage of the traditional block interface used by file systems, RAID algorithms were integrated at the block level, thus, retaining perfect backward compatibility with existing installations. The common storage stack as found in most operating systems...

    Provided By Vrigar Technologies Ltd

  • White Papers // Mar 2009

    Memory Sharing Revisited

    Although several UNIX techniques for sharing memory exist, such as System V IPC Shared Memory and POSIX Shared Memory, these schemes are not suitable for use internal to the operating system and cannot protect against all threats posed by memory sharing. Therefore, the authors propose a novel, flexible memory-protection scheme...

    Provided By Vrigar Technologies Ltd

  • White Papers // Jun 2009

    Dealing with Driver Failures in the Storage Stack

    In this paper, the authors augment MINIX 3's failure-resilience mechanisms with novel disk-driver recovery strategies and guaranteed filesystem data integrity. They propose a flexible filter-driver framework that operates transparently to both the file system and the disk driver and enforces different protection strategies. The filter uses checksumming and mirroring in...

    Provided By Vrigar Technologies Ltd

  • White Papers // Aug 2010

    The Smartphone and the Cloud: Power to the User

    In the last decade the people have seen a shift in the use of computers. Their personal computers no longer stand on the desks in their homes, but are located in the pockets of their trousers. They use these pocket devices, called Smartphone's, to access their multimedia data, to communicate...

    Provided By Vrigar Technologies Ltd

  • White Papers // Aug 2006

    Towards a Reference Ontology for Business Models

    Ontologies are viewed as increasingly important tools for structuring domains of interests. In this paper, the authors propose reference ontology of business models using concepts from three established business model ontologies; the REA, BMO, and e3-value. The basic concepts in the reference ontology concern actors, resources, and the transfer of...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2006

    Supporting Reconfigurable Parallel Multimedia Applications

    Programming multimedia applications for System-on-Chip (SoC) architectures is difficult because streaming communication, user event handling, reconfiguration, and parallelism have to be dealt with. The authors present Hinch, a runtime system for multimedia applications that efficiently exploits parallelism by running the application in a dataflow style. The application has to be...

    Provided By Vrigar Technologies Ltd

  • White Papers // May 2012

    Body Armor for Binaries: Preventing Buffer Overflows without Recompilation

    BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. The authors' approach hardens binaries against both kinds of overflow, without requiring the programs' source...

    Provided By Vrigar Technologies Ltd

  • White Papers // Feb 2007

    A Hybrid PKI-IBC Based Ephemerizer System

    The concept of an ephemerizer system has been introduced in earlier works as a mechanism to ensure that a file deleted from the persistent storage remains unrecoverable. The principle involved storing the data in an encrypted form in the user's machine and the key to decrypt the data in a...

    Provided By Vrigar Technologies Ltd