• Publications
  • Influence
Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network
  • A. Raniwala, T. Chiueh
  • Computer Science
  • Proceedings IEEE 24th Annual Joint Conference of…
  • 13 March 2005
TLDR
We propose a multi-channel wireless mesh network (WMN) architecture (called Hyacinth) that equips each mesh network node with multiple 802.11 network interface cards (NICs). Expand
  • 1,741
  • 133
  • PDF
Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks
TLDR
We propose and evaluate one of the first multi-channel multi-hop wireless ad hoc network architectures that can be built using standard 802.11 hardware by equipping each node with multiple network interface cards (NICs) operating on different channels. Expand
  • 1,175
  • 127
  • PDF
Large-scale malware indexing using function-call graphs
TLDR
In this paper, we design, implement and evaluate a malware database management system called SMIT (Symantec Malware Indexing Tree) that can efficiently make such determination based on malware's function-call graphs, which is a structural representation known to be less susceptible to instruction-level obfuscations commonly employed by malware writers to evade detection of AV software. Expand
  • 287
  • 29
  • PDF
RAD: a compile-time solution to buffer overflow attacks
  • T. Chiueh, Fu-Hau Hsu
  • Computer Science
  • Proceedings 21st International Conference on…
  • 16 April 2001
TLDR
This paper presents a compiler-based solution to the notorious buffer overflow attack problem. Expand
  • 260
  • 24
  • PDF
Sequence Number-Based MAC Address Spoof Detection
TLDR
The exponential growth in the deployment of IEEE 802.11-based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Expand
  • 210
  • 16
  • PDF
Viking: a multi-spanning-tree Ethernet architecture for metropolitan area and cluster networks
TLDR
We propose a multi-spanning-tree Ethernet architecture, called Viking, that improves both aggregate throughput and fault tolerance by exploiting standard virtual LAN technology in a novel way. Expand
  • 169
  • 16
  • PDF
RICH: Automatically Protecting Against Integer-Based Vulnerabilities
TLDR
We present the design and implementation of RICH (Run-time Integer Ccking), a tool for efficiently detecting integer-based attacks against C programs at run time. Expand
  • 123
  • 15
  • PDF
A Study of the Packer Problem and Its Solutions
TLDR
An increasing percentage of malware programs distributed in the wild are packed by packers, which are programs that transform an input binary's appearance without affecting its execution semantics, to create new malware variants that can evade signature-based malware detection tools. Expand
  • 178
  • 11
  • PDF
A Binary Rewriting Defense Against Stack based Buffer Overflow Attacks
TLDR
We use a binary rewriting approach to augment existing Win32/Intel Portable Executable (PE) binary programs with a return address defense (RAD) mechanism, which protects the integrity of the return address on the stack with a redundant copy. Expand
  • 182
  • 11
  • PDF
MiNT: a miniaturized network testbed for mobile wireless research
TLDR
This paper describes a miniaturized 802.11b-based, multi-hop wireless network testbed called MiNT. Expand
  • 159
  • 10
  • PDF