• Publications
  • Influence
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
TLDR
This paper presents a lightweight countermeasure for the wormhole attack, called LITEWORP, which does not require specialized hardware and is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks. Expand
Stream: Low Overhead Wireless Reprogramming for Sensor Networks
TLDR
Stream pre-installs the reprogramming protocol as one image and the application program equipped with the ability to listen to new code updates as the second image, which significantly reduces the size of the program image. Expand
Addressing failures in exascale computing
TLDR
This report presents a report produced by a workshop on ‘Addressing failures in exascale computing’ held in Park City, Utah, 4–11 August 2012, which summarizes and builds on discussions on resilience. Expand
ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environment
TLDR
This paper presents the design of automated response mechanisms in an intrusion tolerant system called ADEPTS, which focuses on enforcing containment in the system, thus localizing the intrusion and allowing the system to provide service, albeit degraded. Expand
Zephyr: efficient incremental reprogramming of sensor nodes using function call indirections and difference computation
TLDR
A multi-hop incremental reprogramming protocol called Zephyr that transfers the delta between the old and the new software and lets the sensor nodes rebuild thenew software using the received delta and the old software. Expand
The MG-RAST metagenomics database and portal in 2015
TLDR
This work presents several examples integrating data and analyses from MG-RAST into popular third-party analysis tools or sequence alignment tools, and reports changes to the analysis workflow and the technologies used to scale the pipeline up to the required throughput levels. Expand
Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage
TLDR
This paper proposes a novel distributed reconstruction technique, called Partial Parallel Repair (PPR), which divides the reconstruction operation to small partial operations and schedules them on multiple nodes already involved in the data reconstruction, and reduces repair time and degraded read time significantly. Expand
Hermes: Fast and Energy Efficient Incremental Code Updates for Wireless Sensor Networks
TLDR
A multi-hop incre- mental reprogramming protocol called Hermes that transfers over the network the delta between the old and new software and lets the sensor nodes rebuild the new software using the received delta and the old software. Expand
Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian
TLDR
It is found that despite high cyclomatic complexity, the bug densities in Android and Symbian are surprisingly low, however, the support for customizability does impact the reliability of mobile OSes and there are cautionary tales for their further development. Expand
TCP/IP Timing Channels: Theory to Implementation
TLDR
This work designs and implements a covert TCP/IP timing channel and is able to quantify the achievable data rate (or leak rate) of such a covert channel, and shows that by sacrificing data rate, the traffic patterns of the covert timing channel can be made computationally indistinguishable from that of normal traffic, which makes detecting such communication virtually impossible. Expand
...
1
2
3
4
5
...