Now showing items 21-40 of 91

    • Fishing for Phishing from the Network Stream 

      Ramachandran, Anirudh; Feamster, Nick; Krishnamurthy, Balachander; Spatscheck, Oliver; Van der Merwe, Jacobus (Georgia Institute of Technology, 2008)
      Phishing is an increasingly prevalent social-engineering attack that attempts identity theft using spoofed Web pages of legitimate organizations. Unfortunately, current phishing detection methods are neither complete ...
    • Secure Observation of Kernel Behavior 

      Srivastava, Abhinav; Singh, Kapil; Giffin, Jonathon (Georgia Institute of Technology, 2008)
      Operating system kernels are difficult to understand and monitor. Hardware virtualization provides a layer where security tools can observe a kernel, but the gap between operating system abstractions and hardware accesses ...
    • NANO: Network Access Neutrality Observatory 

      Tariq, Mukarram Bin; Motiwala, Murtaza; Feamster, Nick (Georgia Institute of Technology, 2008)
      This paper tackles a technical problem that is of growing interest in light of the ongoing network neutrality debate: We aim to develop a system that can reliably determine whether particular ISP is discriminating against ...
    • Evaluating Bluetooth as a Medium for Botnet Command and Control 

      Jain, Nehil; Lee, Wenke; Sangal, Samrit; Singh, Kapil; Traynor, Patrick (Georgia Institute of Technology, 2009)
      Malware targeting mobile phones is being studied with increasing interest by the research community. While such attention has previously focused on viruses and worms, many of which use near-field communications in order ...
    • Spending Constraint Utilities, With Applications To The Adwords Market 

      Vazirani, Vijay V. (Georgia Institute of Technology, 2009)
      The notion of a "market" has undergone a paradigm shift with the Internet - totally new and highly successful markets have been defined and launched by Internet companies, which already form an important part of today's ...
    • A Model of Interdomain Network Formation, Economics and Routing 

      Dhamdhere, Amogh; Dovrolis, Constantine (Georgia Institute of Technology, 2009)
      The Internet at the interdomain level is highly dynamic, as autonomous networks change their connectivity to optimize either monetary cost, profit and/or performance. Internet Service Providers (ISPs), for example, are ...
    • Derandomization of Probabilistic Auxiliary Pushdown Automata Classes 

      Venkateswaran, H. (Georgia Institute of Technology, 2009)
    • Kernel Data Integrity Protection via Memory Access Control 

      Srivastava, Abhinav; Erete, Ikpeme; Giffin, Jonathon (Georgia Institute of Technology, 2009)
      Operating system kernels isolate applications from other malicious software via protected memory created by virtual memory management. Even though modern kernels aggregate core kernel code with driver and module components ...
    • Rotalumè: A Tool for Automatic Reverse Engineering of Malware Emulators 

      Sharif, Monirul I.; Lanzi, Andrea; Giffin, Jonathon; Lee, Wenke (Georgia Institute of Technology, 2009)
      Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated instruction set and paired with a ...
    • Pushing Enterprise Security Down the Network Stack 

      Clark, Russ; Feamster, Nick; Nayak, Ankur; Reimers, Alex (Georgia Institute of Technology, 2009)
      Network security is typically reactive: Networks provide connectivity and subsequently alter this connectivity according to various security policies, as implemented in middleboxes, or at higher layers. This approach ...
    • Designing Enforceable Network Contracts 

      Lychev, Robert; Feamster, Nick (Georgia Institute of Technology, 2009)
      Internet connectivity depends on contractual agreements between cooperating entities, such as administrative domains (AD), where an agreement over a certain level of service is made. Contracts (e.g., SLAs) for providing ...
    • Towards an Internet Connectivity Market 

      Feamster, Nick; Hassan, Umayr; Sundaresan, Srikanth; Valancius, Vytautas; Johari, Ramesh; Vazirani, Vijay (Georgia Institute of Technology, 2009)
      Today’s Internet achieves end-to-end connectivity through bilateral contracts between neighboring networks; unfortunately, this “one size fits all” connectivity results in less efficient paths, unsold capacity and unmet ...
    • Privacy Preserving Grapevines: Capturing Social Network Interactions Using Delegatable Anonymous Credentials 

      Balasubramaniyan, Vijay A.; Lee, Younho; Ahamad, Mustaque (Georgia Institute of Technology, 2009)
      A wide variety of services allow users to meet online and communicate with each other, building new social relationships and reinforcing older ones. Unfortunately, malicious entities can exploit such services for fraudulent ...
    • Learning Submodular Functions 

      Balcan, Maria-Florina; Harvey, Nicholas J. A. (Georgia Institute of Technology, 2009)
      This paper considers the problem of learning submodular functions. A problem instance consists of a distribution on {0,1}[superscript n] and a real-valued function on {0,1}[superscript n] that is non-negative, monotone ...
    • Message Ferries as Generalized Dominating Sets in Intermittently Connected Mobile Networks 

      Ammar, Mostafa H.; Polat, Bahadir K.; Sachdeva, Pushkar; Zegura, Ellen W. (Georgia Institute of Technology, 2009)
      Message ferrying is a technique for routing data in wireless and mobile networks in which one or more mobile nodes are tasked with storing and carrying data between sources and destinations. To achieve connectivity between ...
    • Visualization of Exception Handling Constructs to Support Program Understanding 

      Shah, Hina; Görg, Carsten; Harrold, Mary Jean (Georgia Institute of Technology, 2009)
      This paper presents a new visualization technique for supporting the understanding of exception-handling constructs in Java programs. To understand the requirements for such a visualization, we surveyed a group of software ...
    • KIMA: Hybrid Checkpointing for Recovery from a Wide Range of Errors and Detection Latencies 

      Doudalis, Ioannis; Prvulovic, Milos (Georgia Institute of Technology, 2010)
      Full system reliability is a problem that spans multiple levels of the software/hardware stack. The normal execution of a program in a system can be disrupted by multiple factors, ranging from transient errors in a ...
    • Replacing Oblivious Computation with Private Search for Context Sensitive Communications 

      Amrutkar, Chaitrali; Naik, Rishikesh; Dacosta, Italo; Traynor, Patrick (Georgia Institute of Technology, 2010)
      Context aware applications provide users with an increasingly rich set of services. From services such as interactive maps to restaurant guides and social networking tools, the use of information including location, ...
    • TowerDefense: Deployment Strategies for Battling against IP Prefix Hijacking 

      Qiu, Tongqing; Ji, Lusheng; Pei, Dan; Wang, Jia; Xu, Jun (Georgia Institute of Technology, 2010)
      IP prefix hijacking is known as one of the top security threats targeting today's Internet routing infrastructure. Several schemes have been proposed to either detect or mitigate prefix hijacking events. However, none ...
    • Which Factors Affect Access Network Performance? 

      Sundaresan, Srikanth; Feamster, Nick; Dicioccio, Lucas; Teixeira, Renata (Georgia Institute of Technology, 2010)
      This paper presents an analysis of the performance of residential access networks using over four months of round-trip, download, and upload measurements from more than 7,000 users across four ADSL and cable providers ...