Bharat B. Madan

Learn More
Quite often failures in network based services and server systems may not be accidental, but rather caused by deliberate security intrusions. We would like such systems to either completely preclude the possibility of a security intrusion or design them to be robust enough to continue functioning despite security attacks. Not only is it important to prevent(More)
Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, theft of confidential information to loss of crucial and possibly life saving services. Not only it is(More)
Software coding practices, in the interest of efficiency, often ignore to enforce strict bound checking on buffers, arrays and pointers. This results in software code that is more vulnerable to security intrusions exploiting buffer overflow vulnerabilities. Unfortunately, such attacks form the most common type of security threats to the computer and(More)
Security is an important QoS attribute for characterizing intrusion tolerant computing systems. Frequently however, the security of computing systems is assessed in a qualitative manner based on the presence and absence of certain functional characteristics and security mechanisms. Such a characterization is not only ad hoc, it also lacks rigorous(More)
An attempt to alter protein surface charges through traditional protein engineering approaches often affects the native protein structure significantly and induces misfolding. This limitation is a major hindrance in modulating protein properties through surface charge variations. In this study, as a strategy to overcome such a limitation, we attempted to(More)
— For cellular communication systems, mobility and limited radio coverage of a cell require calls to be handed over from one base station system (BSS) to an another BSS. Due to the limited bandwidth available in various cells, there is a finite probability that an ongoing call while being handed off may get dropped. Minimizing the dropping of ongoing calls(More)
In this paper, we describe three different state space models for analyzing the security of a software system. In the first part of this paper, we utilize a semi-Markov process (SMP) to model the transitions between the security states of an abstract software system. The SMP model can be solved to obtain the probability of reaching security failed states(More)