Now showing items 36-55 of 91

    • Kernel Data Integrity Protection via Memory Access Control 

      Srivastava, Abhinav; Erete, Ikpeme; Giffin, Jonathon (Georgia Institute of Technology, 2009)
      Operating system kernels isolate applications from other malicious software via protected memory created by virtual memory management. Even though modern kernels aggregate core kernel code with driver and module components ...
    • KIMA: Hybrid Checkpointing for Recovery from a Wide Range of Errors and Detection Latencies 

      Doudalis, Ioannis; Prvulovic, Milos (Georgia Institute of Technology, 2010)
      Full system reliability is a problem that spans multiple levels of the software/hardware stack. The normal execution of a program in a system can be disrupted by multiple factors, ranging from transient errors in a ...
    • Learning Submodular Functions 

      Balcan, Maria-Florina; Harvey, Nicholas J. A. (Georgia Institute of Technology, 2009)
      This paper considers the problem of learning submodular functions. A problem instance consists of a distribution on {0,1}[superscript n] and a real-valued function on {0,1}[superscript n] that is non-negative, monotone ...
    • Leveraging Forensic Tools for Virtual Machine Introspection 

      Dolan-Gavitt, Brendan; Payne, Bryan; Lee, Wenke (Georgia Institute of Technology, 2011)
      Virtual machine introspection (VMI) has formed the basis of a number of novel approaches to security in recent years. Although the isolation provided by a virtualized environment provides improved security, software that ...
    • Life (and routing) on the Wireless Manifold 

      Kanade, Varun; Vempala, Santosh (Georgia Institute of Technology, 2007)
      We present the wireless manifold, a 2-dimensional surface in 3-dimensional space with the property that geodesic distances accurately capture wireless signal strengths. A compact representation of the manifold can be ...
    • Lithium: Event-Driven Network Control 

      Kim, Hyojoon; Voellmy, Andreas; Burnett, Sam; Feamster, Nick; Clark, Russ (Georgia Institute of Technology, 2012)
      This paper introduces event-driven network control, a network control framework that makes networks easier to manage by automating many tasks that must currently be performed by manually modifying low-level, distributed, ...
    • LOCK: Locating Countermeasure-Capable Prefix Hijackers 

      Qiu, Tongqing; Ji, Lusheng; Pei, Dan; Wang, Jia; Xu, Jun; Ballani, Hitesh (Georgia Institute of Technology, 2008)
      Prefix hijacking is known as one of the security threats on today’s Internet. A number of measurement based solutions have been proposed to detect prefix hijacking events. In this paper we take these solutions one step ...
    • Managing BGP Routes with a BGP Session Multiplexer 

      Valancius, Vytautas; Feamster, Nick (Georgia Institute of Technology, 2008)
      This paper presents the design, implementation, and evaluation of BGP-Mux, a system for providing multiple clients access to a common set of BGP update streams from multiple BGP peers. By providing multiple clients ...
    • Message Ferries as Generalized Dominating Sets in Intermittently Connected Mobile Networks 

      Ammar, Mostafa H.; Polat, Bahadir K.; Sachdeva, Pushkar; Zegura, Ellen W. (Georgia Institute of Technology, 2009)
      Message ferrying is a technique for routing data in wireless and mobile networks in which one or more mobile nodes are tasked with storing and carrying data between sources and destinations. To achieve connectivity between ...
    • Methodical Approximate Hardware Design and Reuse 

      Yazdanbakhsh, Amir; Thwaites, Bradley; Park, Jongse; Esmaeilzadeh, Hadi (Georgia Institute of Technology, 2014)
      Design and reuse of approximate hardware components—digital circuits that may produce inaccurate results—can potentially lead to significant performance and energy improvements. Many emerging error-resilient applications ...
    • A Model of Interdomain Network Formation, Economics and Routing 

      Dhamdhere, Amogh; Dovrolis, Constantine (Georgia Institute of Technology, 2009)
      The Internet at the interdomain level is highly dynamic, as autonomous networks change their connectivity to optimize either monetary cost, profit and/or performance. Internet Service Providers (ISPs), for example, are ...
    • Models for Decision Support in Healthcare 

      Malhotra, Kunal (Georgia Institute of Technology, 2014)
      One of the many challenges in the field of medicine is to make the best decisions about optimal treatment plans for patients. Medical practitioners often have differing opinions about the best treatment among multiple ...
    • NANO: Network Access Neutrality Observatory 

      Tariq, Mukarram Bin; Motiwala, Murtaza; Feamster, Nick (Georgia Institute of Technology, 2008)
      This paper tackles a technical problem that is of growing interest in light of the ongoing network neutrality debate: We aim to develop a system that can reliably determine whether particular ISP is discriminating against ...
    • Network-Wide Prediction of BGP Routes 

      Feamster, Nick; Rexford, Jennifer (Georgia Institute of Technology, 2006)
      This paper presents provably correct algorithms for computing the outcome of the BGP route-selection process for each router in a network, without simulating the complex details of BGP message passing. The algorithms ...
    • Neural Acceleration for GPU Throughput Processors 

      Yazdanbakhsh, Amir; Park, Jongse; Sharma, Hardik; Lotfi-Kamran, Pejman; Esmaeilzadeh, Hadi (Georgia Institute of Technology, 2015)
      General-purpose computing on graphics processing units (GPGPU) accelerates the execution of diverse classes of applications, such as recognition, gaming, data analytics, weather prediction, and multimedia. Many of these ...
    • On the Congestion Responsiveness of Aggregate Internet Traffic: Open-loop vs Closed-loop Session Arrivals 

      Prasad, Ravi S.; Dovrolis, Constantinos (Georgia Institute of Technology, 2006)
      A traffic aggregate is congestion responsive if it reacts to network congestion by reducing its rate. The congestion responsiveness of Internet traffic has been largely attributed to TCP's congestion control. In this ...
    • On the Disparity of Display Security in Mobile and Traditional Web Browsers 

      Amrutkar, Chaitrali; Singh, Kapil; Verma, Arunabh; Traynor, Patrick (Georgia Institute of Technology, 2011)
      Mobile web browsers now provide nearly equivalent features when compared to their desktop counterparts. However, smaller screen size and optimized features for constrained hardware make the web experience on mobile browsers ...
    • One-Time Cookies: Preventing Session Hijacking Attacks with Disposable Credentials 

      Dacosta, Italo; Chakradeo, Saurabh; Ahamad, Mustaque; Traynor, Patrick (Georgia Institute of Technology, 2011)
      Many web applications are vulnerable to session hijacking attacks due to the insecure use of cookies for session management. The most recommended defense against this threat is to completely replace HTTP with HTTPS. ...
    • One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens 

      Dacosta, Italo; Chakradeo, Saurabh; Ahamad, Mustaque; Traynor, Patrick (Georgia Institute of Technology, 2012-02)
      HTTP cookies are the de facto mechanism for session authentication in web applications. However, their inherent security weaknesses allow attacks against the integrity of web sessions. HTTPS is often recommended to protect ...
    • Operating System Interface Obfuscation and the Revealing of Hidden Operations 

      Srivastava, Abhinav; Lanzi, Andrea; Giffin, Jonathon (Georgia Institute of Technology, 2008)
      Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of standard system call interfaces to reason about ...