Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

William & Mary

2012

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Detecting Abnormal Behavior In Web Applications, Zi Chu Jan 2012

Detecting Abnormal Behavior In Web Applications, Zi Chu

Dissertations, Theses, and Masters Projects

The rapid advance of web technologies has made the Web an essential part of our daily lives. However, network attacks have exploited vulnerabilities of web applications, and caused substantial damages to Internet users. Detecting network attacks is the first and important step in network security. A major branch in this area is anomaly detection. This dissertation concentrates on detecting abnormal behaviors in web applications by employing the following methodology. For a web application, we conduct a set of measurements to reveal the existence of abnormal behaviors in it. We observe the differences between normal and abnormal behaviors. By applying a …


Discovering New Vulnerabilities In Computer Systems, Zhenyu Wu Jan 2012

Discovering New Vulnerabilities In Computer Systems, Zhenyu Wu

Dissertations, Theses, and Masters Projects

Vulnerability research plays a key role in preventing and defending against malicious computer system exploitations. Driven by a multi-billion dollar underground economy, cyber criminals today tirelessly launch malicious exploitations, threatening every aspect of daily computing. to effectively protect computer systems from devastation, it is imperative to discover and mitigate vulnerabilities before they fall into the offensive parties' hands. This dissertation is dedicated to the research and discovery of new design and deployment vulnerabilities in three very different types of computer systems.;The first vulnerability is found in the automatic malicious binary (malware) detection system. Binary analysis, a central piece of technology …


An Input Centric Paradigm For Program Dynamic Optimizations And Lifetime Evolvement, Kai Tian Jan 2012

An Input Centric Paradigm For Program Dynamic Optimizations And Lifetime Evolvement, Kai Tian

Dissertations, Theses, and Masters Projects

Accurately predicting program behaviors (e.g., memory locality, method calling frequency) is fundamental for program optimizations and runtime adaptations. Despite decades of remarkable progress, prior studies have not systematically exploited the use of program inputs, a deciding factor of program behaviors, to help in program dynamic optimizations. Triggered by the strong and predictive correlations between program inputs and program behaviors that recent studies have uncovered, the dissertation work aims to bring program inputs into the focus of program behavior analysis and program dynamic optimization, cultivating a new paradigm named input-centric program behavior analysis and dynamic optimization.;The new optimization paradigm consists of …


Locality Enhancement And Dynamic Optimizations On Multi-Core And Gpu, Zheng Zhang Jan 2012

Locality Enhancement And Dynamic Optimizations On Multi-Core And Gpu, Zheng Zhang

Dissertations, Theses, and Masters Projects

Enhancing the match between software executions and hardware features is key to computing efficiency. The match is a continuously evolving and challenging problem. This dissertation focuses on the development of programming system support for exploiting two key features of modern hardware development: the massive parallelism of emerging computational accelerators such as Graphic Processing Units (GPU), and the non-uniformity of cache sharing in modern multicore processors. They are respectively driven by the important role of accelerators in today's general-purpose computing and the ultimate importance of memory performance. This dissertation particularly concentrates on optimizing control flows and memory references, at both compilation …


Towards Confident Body Sensor Networking, Zhen Ren Jan 2012

Towards Confident Body Sensor Networking, Zhen Ren

Dissertations, Theses, and Masters Projects

With the recent technology advances of wireless communication and lightweight low-power sensors, Body Sensor Network (BSN) is made possible. More and more researchers are interested in developing numerous novel BSN applications, such as remote health/fitness monitoring, military and sport training, interactive gaming, personal information sharing, and secure authentication. Despite the unstable wireless communication, various confidence requirements are placed on the BSN networking service. This thesis aims to provide Quality of Service (QoS) solutions for BSN communication, in order to achieve the required confidence goals.;We develop communication quality solutions to satisfy confidence requirements from both the communication and application levels, in …


Searching, Selecting, And Synthesizing Source Code Components, Collin Mcmillan Jan 2012

Searching, Selecting, And Synthesizing Source Code Components, Collin Mcmillan

Dissertations, Theses, and Masters Projects

As programmers develop software, they instinctively sense that source code exists that could be reused if found --- many programming tasks are common to many software projects across different domains. oftentimes, a programmer will attempt to create new software from this existing source code, such as third-party libraries or code from online repositories. Unfortunately, several major challenges make it difficult to locate the relevant source code and to reuse it. First, there is a fundamental mismatch between the high-level intent reflected in the descriptions of source code, and the low-level implementation details. This mismatch is known as the concept assignment …


Understanding And Leveraging Virtualization Technology In Commodity Computing Systems, Duy Le Jan 2012

Understanding And Leveraging Virtualization Technology In Commodity Computing Systems, Duy Le

Dissertations, Theses, and Masters Projects

Commodity computing platforms are imperfect, requiring various enhancements for performance and security purposes. In the past decade, virtualization technology has emerged as a promising trend for commodity computing platforms, ushering many opportunities to optimize the allocation of hardware resources. However, many abstractions offered by virtualization not only make enhancements more challenging, but also complicate the proper understanding of virtualized systems. The current understanding and analysis of these abstractions are far from being satisfactory. This dissertation aims to tackle this problem from a holistic view, by systematically studying the system behaviors. The focus of our work lies in performance implication and …


A Learning-Based Approach To Exploiting Sensing Diversity In Performance Critical Sensor Networks, Matthew Alexander Keally Jan 2012

A Learning-Based Approach To Exploiting Sensing Diversity In Performance Critical Sensor Networks, Matthew Alexander Keally

Dissertations, Theses, and Masters Projects

Wireless sensor networks for human health monitoring, military surveillance, and disaster warning all have stringent accuracy requirements for detecting and classifying events while maximizing system lifetime. to meet high accuracy requirements and maximize system lifetime, we must address sensing diversity: sensing capability differences among both heterogeneous and homogeneous sensors in a specific deployment. Existing approaches either ignore sensing diversity entirely and assume all sensors have similar capabilities or attempt to overcome sensing diversity through calibration. Instead, we use machine learning to take advantage of sensing differences among heterogeneous sensors to provide high accuracy and energy savings for performance critical applications.;In …