Sciweavers

NSDI
2008
13 years 11 months ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...
NSDI
2008
13 years 11 months ago
BFT Protocols Under Fire
Much recent work on Byzantine state machine replication focuses on protocols with improved performance under benign conditions (LANs, homogeneous replicas, limited crash faults), ...
Atul Singh, Tathagata Das, Petros Maniatis, Peter ...
NSDI
2008
13 years 11 months ago
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
Botnets, i.e., networks of compromised machines under a common control infrastructure, are commonly controlled by an attacker with the help of a central server: all compromised ma...
Thorsten Holz, Moritz Steiner, Frederic Dahl, Erns...
NSDI
2008
13 years 11 months ago
Harnessing Exposed Terminals in Wireless Networks
This paper presents the design, implementation, and experimental evaluation of CMAP (Conflict Maps), a system that increases the number of successful concurrent transmissions in a...
Mythili Vutukuru, Kyle Jamieson, Hari Balakrishnan
NSDI
2008
13 years 11 months ago
Securing Distributed Systems with Information Flow Control
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DI...
Nickolai Zeldovich, Silas Boyd-Wickizer, David Maz...
NSDI
2008
13 years 11 months ago
Uncovering Performance Differences Among Backbone ISPs with Netdiff
Ratul Mahajan, Ming Zhang, Lindsey Poole, Vivek S....
NSDI
2008
13 years 11 months ago
D3S: Debugging Deployed Distributed Systems
Xuezheng Liu, Zhenyu Guo, Xi Wang, Feibo Chen, Xia...
NSDI
2008
13 years 11 months ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...
NSDI
2008
13 years 11 months ago
Conducting Cybersecurity Research Legally and Ethically
The primary legal obstacles to conducting cybersecurity are not outright prohibitions but rather the difficulty of determining which of a large set of complex statutes might regul...
Aaron J. Burstein
NSDI
2008
13 years 11 months ago
Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services
Energy consumption in hosting Internet services is becoming a pressing issue as these services scale up. Dynamic server provisioning techniques are effective in turning off unnece...
Gong Chen, Wenbo He, Jie Liu, Suman Nath, Leonidas...