Learn More
As mobile devices become more widespread and powerful, they store more sensitive data, which includes not only users' personal information but also the data collected via sensors throughout the day. When mobile applications have access to this growing amount of sensitive information, they may leak it carelessly or maliciously. Google's Android operating(More)
In prior work on soft real-time (SRT) multiprocessor scheduling, tardiness bounds have been derived for a variety of scheduling algorithms, most notably, the global earliest-deadline-first (G-EDF) algorithm. In this paper, we devise G-EDF-like (GEL) schedulers, which have identical implementations to G-EDF and therefore the same overheads, but that provide(More)
The Earliest Deadline First (EDF) scheduling algorithm is known to be suboptimal for meeting all deadlines under global scheduling on multiprocessor platforms. However, EDF is an attractive choice for scheduling soft-real-time systems on multiprocessors. Previous work has demonstrated that the maximum tardiness is bounded, and has derived formulas for(More)
Preliminary evidence suggests that fetal movement in response to vibrotactile stimulation "habituates" with repeated exposure. If demonstrated in fetuses, the habituation paradigm may be useful as a measure of fetal well-being or as a predictor of neonatal outcome. However, the ability of the fetal response decrement phenomenon to meet criteria for(More)
The SMS4 block cipher is part of the Chinese WAPI wireless standard. This paper describes the specification and offers a specification for a toy version called simplified SMS4 (S-SMS4). We explore algebraic attacks on SMS4 and S-SMS4 using Gröbner basis attacks on equation systems over GF(2) and GF(2 8), as well as attacks using a SAT solver derived from(More)
— Analyzing Android applications for malicious behavior is an important area of research, and is made difficult, in part, by the increasingly large number of applications available for the platform. While techniques exist to perform static analysis on a large number of applications, dynamic analysis techniques are relatively limited in scale due to the(More)
Application security is a crucial problem in today's technological society. Currently, there does not exist a place for discovering, learning, and testing secure design principles. Fireaxe is the pilot competition that attempts to fill this gap. Two teams, one in New Mexico, and one in California, participated in this trial run. We successfully show that a(More)
  • 1