• Publications
  • Influence
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
This paper describes PowerBooter, an automated power model construction technique that uses built-in battery voltage sensors and knowledge of battery discharge behavior to monitor power consumptionExpand
A close examination of performance and power characteristics of 4G LTE networks
This paper develops the first empirically derived comprehensive power model of a commercial LTE network with less than 6% error rate and state transitions matching the specifications, and identifies that the performance bottleneck for web-based applications lies less in the network, compared to the previous study in 3G. Expand
COMET: Code Offload by Migrating Execution Transparently
The prototype of COMET (Code Offload by Migrating Execution Transparently), a realization of this design built on top of the Dalvik Virtual Machine, leverages the underlying memory model of the runtime to implement distributed shared memory (DSM) with as few interactions between machines as possible. Expand
Automated Classification and Analysis of Internet Malware
This paper examines the ability of existing host-based anti-virus products to provide semantically meaningful information about the malicious software and tools used by attackers and proposes a new classification technique that describes malware behavior in terms of system state changes rather than in sequences or patterns of system calls. Expand
An in-depth study of LTE: effect of network protocol and application behavior on performance
It is observed that LTE has significantly shorter state promotion delays and lower RTTs than those of 3G networks, and various inefficiencies in TCP over LTE such as undesired slow start and limited TCP receive window are discovered. Expand
Characterizing radio resource allocation for 3G networks
This work is the first to accurately infer, for any UMTS network, the state machine that guides the radio resource allocation policy through a light-weight probing scheme, and explores the optimal state machine settings in terms of several critical timer values evaluated using real network traces. Expand
Identifying diverse usage behaviors of smartphone apps
This paper presents results on app usage at a national level using anonymized network measurements from a tier-1 cellular carrier in the U.S. and identifies traffic from distinct marketplace apps based on HTTP signatures and presents aggregate results on their spatial and temporal prevalence, locality, and correlation. Expand
Toward Software-Defined Cellular Networks
It is argued that software defined networking (SDN) can simplify the design and management of cellular data networks, while enabling new services, but supporting many subscribers, frequent mobility, fine-grained measurement and control, and real-time adaptation introduces new scalability challenges that future SDN architectures should address. Expand
Profiling resource usage for mobile applications: a cross-layer approach
ARO, the mobile Application Resource Optimizer, is the first tool that efficiently and accurately exposes the cross-layer interaction among various layers including radio resource channel state, transport layer, application layer, and the user interaction layer to enable the discovery of inefficient resource usage for smartphone applications. Expand
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
This work has undertaken a robust analysis of current malware and developed a detailed taxonomy of malware defender fingerprinting methods, which is used to characterize the prevalence of these avoidance methods, to generate a novel fingerprinting method that can assist malware propagation, and to create an effective new technique to protect production systems. Expand