Learn More
We present the design, implementation, and evaluation of BeepBeep, a high-accuracy acoustic-based ranging system. It operates in a spontaneous, ad-hoc, and device-to-device context without leveraging any pre-planned infrastructure. It is a pure software-based solution and uses only the most basic set of commodity hardware -- a speaker, a microphone, and(More)
An important security challenge is to protect the execution of security-sensitive code on legacy systems from malware that may infect the OS, applications, or system devices. Prior work experienced a tradeoff between the level of security achieved and efficiency. In this work, we leverage the features of modern processors from AMD and Intel to overcome the(More)
This paper presents MiniBox, the first two-way sandbox for x86 native code. MiniBox not only isolates the memory space between OS protection modules and an application , but also provides a minimized and secure communication interface between OS protection modules and the application. MiniBox is cross-platform and can be applied in Platform-as-a-Service(More)
Recent research demonstrates that malware can infect peripherals' firmware in a typical x86 computer system, e.g., by exploiting vulnerabilities in the firmware itself or in the firmware update tools. Verifying the integrity of peripherals' firmware is thus an important challenge. We propose software-only attestation protocols to verify the integrity of(More)
Recent research demonstrates that adversaries can inject malicious code into a peripheral's firmware during a firmware update, which can result in password leakage or even compromise of the whole host operating system. Therefore, it is desirable for a host system to be able to verify the firmware integrity of attached peripherals. Several software-based(More)
The demo, BeepBeep, shows a high-accuracy acoustic-based ranging system without relaying on any pre-planned infrastructure or inter-device time synchronization. Moreover, the BeepBeep is a pure software-based solution and readily applicable to many low-cost sensor platforms and to most commercial-off-the-shelf mobile devices. Our demo using two common cell(More)
OBJECTIVES To investigate whether a combination of demineralized bone matrix (DBM) and bone marrow mesenchymal stem cells (BMSCs) infected with adenovirus-mediated- bone morphogenetic protein (Ad-BMP-2) and transforming growth factor-β3 (Ad-TGF-β3) promotes the repair of the full-thickness cartilage lesions in pig model. METHODS BMSCs isolated from pig(More)
Repeated exposure to addictive drugs elicits long-lasting cellular and molecular changes. It has been reported that the aberrant expression of long non-coding RNAs (lncRNAs) is involved in cocaine and heroin addiction, yet the expression profile of lncRNAs and their potential effects on methamphetamine (METH)-induced locomotor sensitization are largely(More)
INTRODUCTION This study was performed to evaluate the attenuation of osteoarthritic (OA) pathogenesis via disruption of the stromal cell-derived factor-1 (SDF-1)/C-X-C chemokine receptor type 4 (CXCR4) signaling with AMD3100 in a guinea pig OA model. METHODS OA chondrocytes and cartilage explants were incubated with SDF-1, siRNA CXCR4, or anti-CXCR4(More)
We envision a new <i>better-together</i> mobile application paradigm where multiple mobile devices are placed in a close proximity and study a specific <i>together-viewing</i> video application in which a higher resolution video isplayed back across screens of two mobile devices placed side by side. This new scenario imposes real-time, synchronous decoding(More)