Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cold War (1)
- Communications infrastructure (1)
- Communications networks (1)
- Debuggers (1)
- Decentralized networks (1)
-
- Decompilers (1)
- Disassemblers (1)
- Distributed networks (1)
- Hierarchical architecture (1)
- Hypervisor (1)
- Internet architecture (1)
- Internet history (1)
- Isolation (1)
- Malware (1)
- Malware Analysis (1)
- Multicore platform (1)
- Network architecture (1)
- Network centralization (1)
- Network flattening (1)
- Network security (1)
- Obfuscation (1)
- Sandbox (1)
- Virtualization (1)
- Windows (1)
Articles 1 - 5 of 5
Full-Text Articles in Systems Architecture
Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo
Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo
All Faculty Scholarship
Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the Internet …
Cross-Referencing Social Media And Public Surveillance Camera Data For Disaster Response, Chittayong Surakitbanharn,, Calvin Yau, Guizhen Wang, Aniesh Chawla, Yinuo Pan, Zhaoya Sun, Sam Yellin, David Ebert, Yung-Hsiang Lu, George K. Thiruvathukal
Cross-Referencing Social Media And Public Surveillance Camera Data For Disaster Response, Chittayong Surakitbanharn,, Calvin Yau, Guizhen Wang, Aniesh Chawla, Yinuo Pan, Zhaoya Sun, Sam Yellin, David Ebert, Yung-Hsiang Lu, George K. Thiruvathukal
Computer Science: Faculty Publications and Other Works
Physical media (like surveillance cameras) and social media (like Instagram and Twitter) may both be useful in attaining on-the-ground information during an emergency or disaster situation. However, the intersection and reliability of both surveillance cameras and social media during a natural disaster are not fully understood. To address this gap, we tested whether social media is of utility when physical surveillance cameras went off-line during Hurricane Irma in 2017. Specifically, we collected and compared geo-tagged Instagram and Twitter posts in the state of Florida during times and in areas where public surveillance cameras went off-line. We report social media content …
Fimce: A Fully Isolated Micro-Computing Environment For Multicore Systems, Siqi Zhao, Xuhua Ding
Fimce: A Fully Isolated Micro-Computing Environment For Multicore Systems, Siqi Zhao, Xuhua Ding
Research Collection School Of Computing and Information Systems
Virtualization-based memory isolation has been widely used as a security primitive in various security systems to counter kernel-level attacks. In this article, our in-depth analysis on this primitive shows that its security is significantly undermined in the multicore setting when other hardware resources for computing are not enclosed within the isolation boundary. We thus propose to construct a fully isolated micro-computing environment (FIMCE) as a new primitive. By virtue of its architectural niche, FIMCE not only offers stronger security assurance than its predecessor, but also features a flexible and composable environment with support for peripheral device isolation, thus greatly expanding …
The Legacy Of Multics And Secure Operating Systems Today, John Schriner
The Legacy Of Multics And Secure Operating Systems Today, John Schriner
Publications and Research
This paper looks to the legacy of Multics from 1963 and its influence on computer security. It discusses kernel-based and virtualization-based containment in projects like SELinux and Qubes, respectively. The paper notes the importance of collaborative and research-driven projects like Qubes and Tor Project.
A Malware Analysis And Artifact Capture Tool, Dallas Wright, Josh Stroschein
A Malware Analysis And Artifact Capture Tool, Dallas Wright, Josh Stroschein
Research & Publications
Malware authors attempt to obfuscate and hide their code in its static and dynamic states. This paper provides a novel approach to aid analysis by intercepting and capturing malware artifacts and providing dynamic control of process flow. Capturing malware artifacts allows an analyst to more quickly and comprehensively understand malware behavior and obfuscation techniques and doing so interactively allows multiple code paths to be explored. The faster that malware can be analyzed the quicker the systems and data compromised by it can be determined and its infection stopped. This research proposes an instantiation of an interactive malware analysis and artifact …