1 - 25 of 134
Number of results to display per page
CreatorTitleDescriptionSubjectDate
1 Hibler, Michael J.The flask security architecture: system support for diverse security policiesOperating systems must be flexible in their support for security policies, i.e., the operating system must provide sufficient mechanisms for supporting the wide variety of real-world security policies. Systems claiming to provide this support have failed to do so in two ways: they either fail to pro...Flask; Security architecture1998
2 Brunvand, Erik L.Speculatorum OculiDescription Speculatorum Oculi (The Eyes of Spies) comments on current surveillance activities of governments and corporations through an installation that includes an architectural model surveilled with looming video cameras providing live feeds to a set of video monitors. These monitors show views...2014-01-01
3 Hibler, Michael J.Isolation of malicious external inputs in a security focused adaptive execution environmentReliable isolation of malicious application inputs is necessary for preventing the future success of an observed novel attack after the initial incident. In this paper we describe, measure and analyze, Input-Reduction, a technique that can quickly isolate malicious external inputs that embody unfore...2013-01-01
4 Kasera, Sneha K.Exploiting altruism in social networks for friend-to-friend malware detectionWe propose a novel malware detection application- SocialScan-which enables friend-to-friend (f2f) malware scanning services among social peers, with scanning resource sharing governed by levels of social altruism. We show that with f2f sharing of resources, SocialScan achieves a 65% increase in the ...2014-01-01
5 Hibler, Michael J.Microkernels meet recursive virtual machines (draft. May 10, 1996))This paper describes a novel approach to providing modular and extensible operating system functionality, and encapsulated environments, based on a synthesis of micro-kernel and virtual machine concepts. We have developed a virtualizable architecture that allows recursive virtual machines (virtual m...Microkernels; Virtual machines; Operating system functionality1996
6 Seeley, DonnPassword cracking: a game of witsA password cracking algorithm seems like a slow and bulky item to put in a worm, but the worm makes this work by being persistent and efficient. The worm is aided by some unfortunate statistics about typical password choices.Password cracking algorithm; Computer worms1989
7 Seeley, DonnA tour of the wormOn the evening of November 2, 1988, a self-replicating program was released upon the Internet 1. This program (a worm) invaded VAX and Sun-3 computers running versions of Berkeley UNIX, and used their sources to attack still more computers2. Within the space of hours this program had spread aacross ...Computer worm1989
8 Stoller, Leigh B.Low latency workstation cluster communications using sender-based protocolsThe use of workstations on a local area network to form scalable multicomputers has become quite common. A serious performance bottleneck in such "carpet clusters" is the communication protocol that is used to send data between nodes. We report on the design and implementation of a class of communic...Workstations; Scalable multicomputers; Sender-based; Communication protocols1996
9 Evans, DavidGraphical man/machine communications: November 1969Semi-Annual Technical Report 1 June 1969 - 30 November 19691969-11
10 Kasera, Sneha K.On fast and accurate detection of unauthorized wireless access points using clock skewsWe explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind using clock skews is to overcome one of the major limitations of existing solutions-the inability to effectively detect Mediu...Clock skews; Unauthorized access; Medium access control; MAC; Address spoofing; Wireless networks; Time Synchronization Function; TSF2010-03
11 Hibler, Michael J.Notes on thread models in Mach 3.0During the Mach In-Kernel Servers work, we explored two alternate thread models that could be used to support traps to in-kernel servers. In the "migrating threads" model we used, the client's thread temporarily moves into the server's task for the duration of the call. In t h e "thread switching" ...Thread models; In-kernel servers; Thread switching; Mach 3.01993
12 Carter, John B.Using khazana to support distributed application developmentOne of the most important services required by most distributed applications is some form of shared data management, e.g., a directory service manages shared directory entries while groupware manages shared documents. Each such application currently must implement its own data management mechanisms,...Khazana; Distributed applications; Development1999
13 Regehr, JohnUnderstanding integer overflow in C/C++Integer overflow bugs in C and C++ programs are difficult to track down and may lead to fatal errors or exploitable vulnerabilities. Although a number of tools for finding these bugs exist, the situation is complicated because not all overflows are bugs. Better tools need to be constructed-but a tho...2012-01-01
14 Kasera, Sneha K.Secret key extraction using Bluetooth wireless signal strength measurementsBluetooth has found widespread adoption in phones, wireless headsets, stethoscopes, glucose monitors, and oximeters for communication of, at times, very critical information. However, the link keys and encryption keys in Bluetooth are ultimately generated from a short 4 digit PIN, which can be crack...2014-01-01
15 Yang, HaoriDetection of hidden materials using nuclear resonance fluorescence technique: simulation and measurementsAbstract-The measured value of the 2.176 MeV 238U Nuclear Resonance Fluorescence (NRF) peak count rate were compared with simulation results. The simulation methods studied include GEANT4, MCNP5 and MCNPX. The simulation results were found out to be consistent but one order of magnitude higher than ...2010-01-01
16 Back, Godmar V.Java operating systems: design and implementationLanguage-based extensible systems such as Java use type safety to provide memory safety in a single address space. Memory safety alone, however, is not sufficient to protect different applications from each other. such systems must support a process model that enables the control and management of c...Java operating systems; Language-based systems1998
17 Regehr, JohnEdicts: implementing features with flexible binding timesIn a software product line, the binding time of a feature is the time at which one decides to include or exclude a feature from a product. Typical binding site implementations are intended to support a single binding time only, e.g., compile time or run time. Sometimes, however, a product line must...2008-01-01
18 Yang, HaoriDetection of concealed special nuclear material using nuclear resonance fluorescence techniqueAbstract-Detection method based on Nuclear Resonance Fluorescence (NRF) technique targeting concealed Special Nuclear Material (SNM) has been discussed. Customized DAQ system has been developed to handle high rate events in NRF measurements by implementing real-time DSP on fast ADC and FPGA chip. ...2009
19 Evans, DavidGraphical man/machine communications: June 1971Semi-Annual Technical Report for period 1 January 1971 to 31 May 1971. This document includes a summary of research activities and facilities at the University of Utah under Contract F30602-70-C-0300. Information conveys important research milestones attained during this period by each of the fo...Curved surfaces; Digital waveform processing1971
20 Kasera, Sneha K.; Patwari, NealHigh-rate uncorrelated bit extraction for shared secret key generation from channel measurementsSecret keys can be generated and shared between two wireless nodes by measuring and encoding radio channel characteristics without ever revealing the secret key to an eavesdropper at a third location. This paper addresses bit extraction, i.e., the extraction of secret key bits from noisy radio chan...Wireless networks; Multipath fading; Physical layer; Key generation; Secret keys; Bit extraction2010-01
21 Furse, Cynthia M.A comparative study on two types of transparent patch antennasProperties of optically transparent patch antennas designed from meshed conductor and transparent conductive films are studied and compared. It is shown that at S band, meshed antenna provides the best antenna efficiency for the highest transparency. It is practical to design a 90% transparent mesh...2011
22 Yang, HaoriPulsed photofission delayed gamma ray detection for nuclear material identificationInnovative systems with increased sensitivity and resolution are in great demand to detect diversion and to prevent misuse in support of nuclear materials management for the U.S. fuel cycle. Nuclear fission is the most important multiplicative process involved in non-destructive active interrogation...2012-01-01
23 Evans, DavidGraphical man/machine communications: May 1971Final technical report 1 December 1969 to 30 June 1970.1971-05
24 Carter, John; Susarla, Sai R.Khazana An infrastructure for building distributed servicesEssentially all distributed systems?? applications?? and services at some level boil down to the problem of man aging distributed shared state Unfortunately?? while the problem of managing distributed shared state is shared by many applications?? there is no common means of managing the data ...Khazana; Distributed shared state1998
25 Carter, John B.Khazana an infrastructure for building distributed servicesEssentially all distributed systems, applications and service at some level boil down to the problem of managing distributed shared state. Unfortunately, while the problem of managing distributed shared state is shared by man applications, there is no common means of managing the data - every applic...Khazana; Distributed shared state1998
1 - 25 of 134