Alexander Crowell

Learn More
As digital data sources grow in number and size, they pose an opportunity for computational investigation by means of text mining, natural language processing (NLP), and other text analysis techniques. In this paper we propose a virtual machine (VM) framework and methodology for non-consumptive text analysis. Using a remote VM model, the VM is configured(More)
A major vector of computer infection is through exploiting vulnerable software or design flaws in networked applications such as the browser. Malicious code can be fetched and executed on a victim's machine without the user's permission, as in drive-by download (DBD) attacks. In this paper, we describe a new tool called DeWare (standing for Detection of(More)
The confinement problem was first noted four decades ago. Since then, a huge amount of efforts have been spent on defining and mitigating the problem. The evolution of technologies from traditional operating systems to mobile and cloud computing brings about new security challenges. It is perhaps timely that we review the work that has been done. We discuss(More)
The Federal Aviation Administration (FAA) and supporting organizations are developing new concepts to improve efficiency and safety of the National Airspace System (NAS). Some of these concepts change current restrictions, introduce new maneuvers, or provide better decision support to air traffic controllers. Each of these concepts requires extensive(More)
In the concept development and validation process, fast-time simulation and modeling exercises are performed to examine system performance, obtain initial assessments of potential benefits, and to identify potential problem areas where real-time simulation studies are necessary for further exploration [1]. Despite the immense impact weather has on the(More)
The problem of malware has become significant on Android devices. Library operating systems and application virtualization are both possible solutions for confining malware. Unfortunately, such solutions do not exist for Android. Designing mechanisms for application virtualization is a significant challenge for several reasons: (1) graphics performance is(More)
Current operating system designs require applications (apps) to implicitly place trust in a large amount of code. Taking Android as an example, apps must trust both the kernel as well as privileged userspace services that consist of hundreds of thousands of lines of code. Malware apps, on the other hand, aim to exploit any vulnerabilities in the above large(More)
  • 1