Learn More
An important security challenge is to protect the execution of security-sensitive code on legacy systems from malware that may infect the OS, applications, or system devices. Prior work experienced a tradeoff between the level of security achieved and efficiency. In this work, we leverage the features of modern processors from AMD and Intel to overcome the(More)
We present the design, implementation, and evaluation of BeepBeep, a high-accuracy acoustic-based ranging system. It operates in a spontaneous, ad-hoc, and device-to-device context without leveraging any pre-planned infrastructure. It is a pure software-based solution and uses only the most basic set of commodity hardware -- a speaker, a microphone, and(More)
Recent research demonstrates that malware can infect peripherals' firmware in a typical x86 computer system, e.g., by exploiting vulnerabilities in the firmware itself or in the firmware update tools. Verifying the integrity of peripherals' firmware is thus an important challenge. We propose software-only attestation protocols to verify the integrity of(More)
This paper presents MiniBox, the first two-way sandbox for x86 native code. MiniBox not only isolates the memory space between OS protection modules and an application, but also provides a minimized and secure communication interface between OS protection modules and the application. MiniBox is cross-platform and can be applied in Platform-as-a-Service(More)
INTRODUCTION This study was performed to evaluate the attenuation of osteoarthritic (OA) pathogenesis via disruption of the stromal cell-derived factor-1 (SDF-1)/C-X-C chemokine receptor type 4 (CXCR4) signaling with AMD3100 in a guinea pig OA model. METHODS OA chondrocytes and cartilage explants were incubated with SDF-1, siRNA CXCR4, or anti-CXCR4(More)
We develop a special-purpose hypervisor called TrustVisor that facilitates the execution of security-sensitive code in isolation from commodity OSes and applications. TrustVisor provides code and execution integrity as well as data secrecy and integrity for protected code, even in the presence of a compromised OS. These strong properties can be attested to(More)
We envision a new <i>better-together</i> mobile application paradigm where multiple mobile devices are placed in a close proximity and study a specific <i>together-viewing</i> video application in which a higher resolution video isplayed back across screens of two mobile devices placed side by side. This new scenario imposes real-time, synchronous decoding(More)
ETHNOPHARMACOLOGICAL RELEVANCE Cortex Dictamni is used in Chinese folk medicine for the treatment of jaundice, cough, rheumatism and some skin diseases; however, its possible toxicity has not been rigorously studied. The present investigation was carried out to evaluate the safety of Cortex Dictamni aqueous extract (CDAE) by acute and sub-chronic toxicity(More)
The demo, BeepBeep, shows a high-accuracy acoustic-based ranging system without relaying on any pre-planned infrastructure or inter-device time synchronization. Moreover, the BeepBeep is a pure software-based solution and readily applicable to many low-cost sensor platforms and to most commercial-off-the-shelf mobile devices. Our demo using two common cell(More)