Now showing items 23-42 of 91

    • Fast Flux Service Networks: Dynamics and Roles in Hosting Online Scams 

      Feamster, Nick; Konte, Maria; Jung, Jaeyeon (Georgia Institute of Technology, 2008)
      This paper studies the dynamics of fast flux service networks and their role in online scam hosting infrastructures. By monitoring changes in DNS records of over 350 distinct fast flux domains collected from URLs in ...
    • A Fast Randomized Method for Local Density-based Outlier Detection in High Dimensional Data 

      Nguyen, Minh Quoc; Omiecinski, Edward; Mark, Leo (Georgia Institute of Technology, 2010)
      Local density-based outlier (LOF) is a useful method to detect outliers because of its model free and locally based property. However, the method is very slow for high dimensional datasets. In this paper, we introduce a ...
    • A Feature Model of Coupling Technologies for Earth System Models 

      Dunlap, Rocky; Rugaber, Spencer; Mark, Leo (Georgia Institute of Technology, 2010)
      Couplers that link together two or more numerical simulations are well-known abstractions in the Earth System Modeling (ESM) community. In the past decade, reusable software assets have emerged to facilitate scientists in ...
    • A Feature-based Sampling Method to Detect Anomalous Patterns in High Dimensional Datasets 

      Nguyen, Minh Quoc; Mark, Leo; Omiecinski, Edward (Georgia Institute of Technology, 2008)
      We introduce a feature-based sampling method to detect anomalous patterns. By recognizing that an observation is considered normal because there are many observations similar to it, we formally define the problem of ...
    • Fishing for Phishing from the Network Stream 

      Ramachandran, Anirudh; Feamster, Nick; Krishnamurthy, Balachander; Spatscheck, Oliver; Van der Merwe, Jacobus (Georgia Institute of Technology, 2008)
      Phishing is an increasingly prevalent social-engineering attack that attempts identity theft using spoofed Web pages of legitimate organizations. Unfortunately, current phishing detection methods are neither complete ...
    • FlashFire: Overcoming the Performance Bottleneck of Flash Storage Technology 

      Kim, Hyojun; Ramachandran, Umakishore (Georgia Institute of Technology, 2010)
      Flash memory based Solid State Drives (SSDs) are becoming popular in the market place as a possible low-end alternative to hard disk drives (HDDs). However, SSDs have different performance characteristics compared ...
    • FlowQoS: Per-Flow Quality of Service for Broadband Access Networks 

      Seddiki, M. Said; Shahbaz, Muhammad; Donovan, Sean; Grover, Sarthak; Park, Miseon; Feamster, Nick; Song, Ye-Qiong (Georgia Institute of Technology, 2015)
      In broadband access networks, one application may compete for the bandwidth of other applications, thus degrading overall performance. One solution to this problem is to allocate bandwidth to competing flows based on ...
    • Half-Baked Cookies: Client Authentication on the Modern Web 

      Mundada, Yogesh; Feamster, Nick; Krishnamurthy, Balachander; Guha, Saikat; Levin, Dave (Georgia Institute of Technology, 2014)
      Modern websites set multiple authentication cookies during the login process to allow users to remain authenticated over the duration of a web session. Web applications use cookie-based authentication to provide different ...
    • Hierarchical Power Management in Disruption Tolerant Networks with Traffic-Aware Optimization 

      Jun, Hyewon; Ammar, Mostafa H. (Mostafa Hamed); Corner, Mark D.; Zegura, Ellen W. (Georgia Institute of Technology, 2006)
      Disruption tolerant networks (DTNs) are wireless mobile networks that are characterized by frequent partitions and long delays. Such networks can be used in highly-challenged environment in which energy resources are ...
    • How to Lease the Internet in Your Spare Time 

      Feamster, Nick; Gao, Lixin; Rexford, Jennifer (Georgia Institute of Technology, 2006)
      Today's Internet Service Providers (ISPs) serve two roles: managing their network infrastructure and providing (arguably limited) services to end users. We argue that coupling these roles impedes the deployment of new ...
    • HPerf: A Lightweight Profiler for Task Distribution on CPU+GPU Platforms 

      Lee, Joo Hwan; Nigania, Nimit; Kim, Hyesoon; Brett, Bevin (Georgia Institute of Technology, 2015)
      Heterogeneous computing has emerged as one of the major computing platforms in many domains. Although there have been several proposals to aid programming for heterogeneous computing platforms, optimizing applications on ...
    • I Own, I Provide, I Decide: Generalized User-Centric Access Control Framework for Web Applications 

      Singh, Kapil; Erete, Ikpeme; Lee, Wenke (Georgia Institute of Technology, 2010)
      With the rapid growth of Web 2.0 technologies, users are contributing more and more content on the Internet, in the form of user profiles, blogs, reviews, etc. With this increased sharing comes a pressing need for access ...
    • IC-Cloud: Computation Offloading to an Intermittently-Connected Cloud 

      Shi, Cong; Pandurangan, Pranesh; Ni, Kangqi; Yang, Juyuan; Ammar, Mostafa; Naik, Mayur; Zegura, Ellen (Georgia Institute of Technology, 2013)
      Offloading computation-intensive components of mobile applications to the cloud is of great potential to speedup the execution and reduce the energy consumption for mobile devices. The gain from computation offloading ...
    • Kernel Data Integrity Protection via Memory Access Control 

      Srivastava, Abhinav; Erete, Ikpeme; Giffin, Jonathon (Georgia Institute of Technology, 2009)
      Operating system kernels isolate applications from other malicious software via protected memory created by virtual memory management. Even though modern kernels aggregate core kernel code with driver and module components ...
    • KIMA: Hybrid Checkpointing for Recovery from a Wide Range of Errors and Detection Latencies 

      Doudalis, Ioannis; Prvulovic, Milos (Georgia Institute of Technology, 2010)
      Full system reliability is a problem that spans multiple levels of the software/hardware stack. The normal execution of a program in a system can be disrupted by multiple factors, ranging from transient errors in a ...
    • Learning Submodular Functions 

      Balcan, Maria-Florina; Harvey, Nicholas J. A. (Georgia Institute of Technology, 2009)
      This paper considers the problem of learning submodular functions. A problem instance consists of a distribution on {0,1}[superscript n] and a real-valued function on {0,1}[superscript n] that is non-negative, monotone ...
    • Leveraging Forensic Tools for Virtual Machine Introspection 

      Dolan-Gavitt, Brendan; Payne, Bryan; Lee, Wenke (Georgia Institute of Technology, 2011)
      Virtual machine introspection (VMI) has formed the basis of a number of novel approaches to security in recent years. Although the isolation provided by a virtualized environment provides improved security, software that ...
    • Life (and routing) on the Wireless Manifold 

      Kanade, Varun; Vempala, Santosh (Georgia Institute of Technology, 2007)
      We present the wireless manifold, a 2-dimensional surface in 3-dimensional space with the property that geodesic distances accurately capture wireless signal strengths. A compact representation of the manifold can be ...
    • Lithium: Event-Driven Network Control 

      Kim, Hyojoon; Voellmy, Andreas; Burnett, Sam; Feamster, Nick; Clark, Russ (Georgia Institute of Technology, 2012)
      This paper introduces event-driven network control, a network control framework that makes networks easier to manage by automating many tasks that must currently be performed by manually modifying low-level, distributed, ...
    • LOCK: Locating Countermeasure-Capable Prefix Hijackers 

      Qiu, Tongqing; Ji, Lusheng; Pei, Dan; Wang, Jia; Xu, Jun; Ballani, Hitesh (Georgia Institute of Technology, 2008)
      Prefix hijacking is known as one of the security threats on today’s Internet. A number of measurement based solutions have been proposed to detect prefix hijacking events. In this paper we take these solutions one step ...