Center for Information Technology Policy (CITP)

Filter
Conference contribution

Search results

  • 2008

    The Reduced Address Space (RAS) for application memory authentication

    Champagne, D., Elbaz, R. & Lee, R. B., 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 47-63 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Trellis: A platform for building flexible, fast virtual networks on commodity hardware

    Bhatia, S., Motiwala, M., Muhlbauer, W., Mundada, Y., Valancius, V., Bavier, A., Feamster, N. G., Peterson, L. & Rexford, J. L., 2008, Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08. 72. (Proceedings of 2008 ACM CoNEXT Conference - 4th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    74 Scopus citations
  • 2007

    Architecture for a non-copyable disk (NCdisk) using a Secret-Protection (SP) SoC solution

    Wang, M. S. & Ruby, B. L., 2007, Conference Record of the 41st Asilomar Conference on Signals, Systems and Computers, ACSSC. p. 1999-2003 5 p. 4487587. (Conference Record - Asilomar Conference on Signals, Systems and Computers).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Scopus citations
  • A very modal model of a modern, major, general type system

    Appel, A. W., Melliès, P. A., Richards, C. D. & Vouillon, J., 2007, Conference Record of POPL 2007: The 34th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages - Papers Presented at the Symposium. p. 109-122 14 p. (Conference Record of the Annual ACM Symposium on Principles of Programming Languages).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    64 Scopus citations
  • DALi: A communication-centric data abstraction layer for energy-constrained devices in mobile sensor networks

    Sadler, C. M. & Martonosi, M. R., 2007, MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services. p. 99-112 14 p. (MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Detectability of traffic anomalies in two adjacent networks

    Soule, A., Ringberg, H., Silveira, F., Rexford, J. L. & Diot, C., 2007, Passive and Active Network Measurement - 8th International Conference, PAM 2007, Proceedings. Springer Verlag, p. 22-31 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4427 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    8 Scopus citations
  • Diagnosing network disruptions with network-wide analysis

    Huang, Y., Feamster, N., Lakhina, A. & Xu, J., 2007, SIGMETRICS'07 - Proceedings of the 2007 International Conference on Measurement and Modeling of Computer Systems. 1 ed. p. 61-72 12 p. (Performance Evaluation Review; vol. 35, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Scopus citations
  • Filtering spam with behavioral blacklisting

    Ramachandran, A., Feamster, N. & Vempala, S., 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 342-351 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    171 Scopus citations
  • Hardware-rooted trust for secure key management and transient trust

    Dwoskin, J. S. & Lee, R. B., 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 389-400 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    61 Scopus citations
  • Measuring the contributions of routing dynamics to prolonged end-to-end Internet path failures

    Wang, F., Feamster, N. & Gao, L., 2007, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings. p. 1855-1859 5 p. 4411267. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • MobCast: Overlay architecture for seamless IP mobility using scalable anycast proxies

    Lee, C. P., Attrey, K., Caballero, C., Feamster, N., Mihail, M. & Copeland, J. A., 2007, 2007 IEEE Wireless Communications and Networking Conference, WCNC 2007. Institute of Electrical and Electronics Engineers Inc., p. 3872-3876 5 p. 4204884. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Multiplexing BGP sessions with BGP-MUX

    Valancius, V. & Feamster, N., 2007, Proceedings of 2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT. a44. (Proceedings of 2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Mutual anonymous communications: A new covert channel based on splitting tree MAC

    Zhenghong, W., Jing, D. & Lee, R. B., 2007, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications. p. 2531-2535 5 p. 4215897. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • New cache designs for thwarting software cache-based side channel attacks

    Wang, Z. & Lee, R. B., 2007, ISCA'07: 34th Annual International Symposium on Computer Architecture, Conference Proceedings. p. 494-505 12 p. (Proceedings - International Symposium on Computer Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    441 Scopus citations
  • Performing advanced bit manipulations efficiently in general-purpose processors

    Hilewitz, Y. & Lee, R. B., 2007, Proceedings - 18th IEEE Symposium on Computer Arithmetic, ARITH 18. p. 251-260 10 p. 4272872. (Proceedings - Symposium on Computer Arithmetic).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • Rethinking Internet traffic management: From multiple decompositions to a practical protocol

    He, J., Suchara, M., Bresler, M., Rexford, J. L. & Chiang, M., 2007, Proceedings of 2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT. a17. (Proceedings of 2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    47 Scopus citations
  • Revisiting Ethernet: Plug-and-play made scalable and efficient

    Kim, C. & Rexford, J. L., 2007, LANMAN 2007 - Proceedings of the 2007 15th IEEE Workshop on Local and Metropolitan Area Networks. p. 163-169 7 p. 4295993. (LANMAN 2007 - Proceedings of the 2007 15th IEEE Workshop on Local and Metropolitan Area Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Secure key management architecture against sensor-node fabrication attacks

    Dwoskin, J., Xu, D., Huang, J., Chiang, M. & Lee, R., 2007, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings. p. 166-171 6 p. 4410949. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Securing BGP incrementally

    Suchara, M., Avramopoulos, I. & Rexford, J. L., 2007, Proceedings of 2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT. a52. (Proceedings of 2007 ACM CoNEXT Conference - 3rd International Conference on Emerging Networking EXperiments and Technologies, CoNEXT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Security vulnerabilities and solutions for packet sampling

    Goldberg, S. & Rexford, J. L., 2007, 2007 IEEE Sarnoff Symposium, SARNOFF. 4567339. (2007 IEEE Sarnoff Symposium, SARNOFF).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Sensitivity of PCA for traffic anomaly detection

    Ringberg, H., Soule, A., Rexford, J. L. & Diot, C., 2007, SIGMETRICS'07 - Proceedings of the 2007 International Conference on Measurement and Modeling of Computer Systems. 1 ed. p. 109-120 12 p. (Performance Evaluation Review; vol. 35, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    251 Scopus citations
  • Separation logic for small-step Cminor

    Appel, A. W. & Blazy, S., 2007, Theorem Proving in Higher Order Logics - 20th International Conference, TPHOLs 2007, Proceedings. Springer Verlag, p. 5-21 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4732 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    60 Scopus citations
  • Tailoring quantum architectures to implementation style: A quantum computer for mobile and persistent qubits

    Chi, E., Lyon, S. A. & Martonosi, M., 2007, ISCA'07: 34th Annual International Symposium on Computer Architecture, Conference Proceedings. p. 198-209 12 p. (Proceedings - International Symposium on Computer Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • TEC-tree: A low-cost, parallelizable tree for efficient defense against memory replay attacks

    Elbaz, R., Champagne, D., Lee, R. B., Torres, L., Sassatelli, G. & Guillemin, P., 2007, Cryptographic Hardware and Embedded Systems - CHES 2007 - 9th International Workshop, Proceedings. Springer Verlag, p. 289-302 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4727 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    44 Scopus citations
  • Usage-based DHCP lease time optimization

    Khadilkar, M., Feamster, N., Sanders, M. & Clark, R., 2007, IMC'07: Proceedings of the 2007 ACM SIGCOMM Internet Measurement Conference. p. 71-76 6 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • 2006

    A compositional logic for control flow

    Tan, G. & Appel, A. W., 2006, Verification, Model Checking, and Abstract Interpretation - 7th International Conference, VMCAI 2006, Proceedings. p. 80-94 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3855 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Scopus citations
  • A modular RCP for flexible interdomain route control

    Wang, Y. & Rexford, J., 2006, Proceedings of CoNEXT'06 - 2nd Conference on Future Networking Technologies. 56. (Proceedings of CoNEXT'06 - 2nd Conference on Future Networking Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An analysis of efficient multi-core global power management policies: Maximizing performance for a given power budget

    Isci, C., Buyuktosunoglu, A., Cher, C. Y., Bose, P. & Martonosi, M. R., 2006, Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO-39. p. 347-358 12 p. 4041859. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    473 Scopus citations
  • A supervised learning approach for routing optimizations in wireless sensor networks

    Wang, Y., Martonosi, M. R. & Peh, L. S., 2006, REALMAN 2006 - Proceedings of Second International Workshop on Multi-hop Ad Hoc Networks: from Theory to Reality. Association for Computing Machinery, p. 79-86 8 p. (REALMAN 2006 - Proceedings of Second International Workshop on Multi-hop Ad Hoc Networks: from Theory to Reality; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Can congestion control and traffic engineering be at odds?

    He, J., Chiang, M. & Rexford, J. L., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4150650. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Covert and side channels due to processor architecture

    Wang, Z. & Lee, R. B., 2006, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 473-482 10 p. 4041191. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    223 Scopus citations
  • Data compression algorithms for energy-constrained devices in delay tolerant networks

    Sadler, C. M. & Martonosi, M. R., 2006, SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems. p. 265-278 14 p. (SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    321 Scopus citations
  • Embedded systems in the wild: ZebraNet software, hardware, and deployment experiences

    Martonosi, M., 2006, LCTES 2006 - Proceedings of the 2006 ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems. p. 1 1 p. (Proceedings of the ACM SIGPLAN Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES); vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Energy adaptation techniques to optimize data delivery in store-and-forward sensor networks

    Zhang, P. & Martonosi, M., 2006, SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems. p. 405-406 2 p. (SenSys'06: Proceedings of the Fourth International Conference on Embedded Networked Sensor Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Fast bit compression and expansion with parallel extract and parallel deposit instructions

    Hilewitz, Y. & Lee, R. B., 2006, Proceedings - IEEE 17th International Conference on Application-specific Systems, Architectures and Processors, ASAP 2006. p. 65-70 6 p. 4019493. (Proceedings of the International Conference on Application-Specific Systems, Architectures and Processors).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    12 Scopus citations
  • Impact of configurability and extensibility on IPSec protocol execution on embedded processors

    Potlapally, N. R., Ravi, S., Raghunalhan, A., Lee, R. B. & Jha, N. K., 2006, Proceedings - 19th International Conference on VLSI Design held jointly with 5th International Conference on Embedded Systems Design. p. 299-304 6 p. 1581468. (Proceedings of the IEEE International Conference on VLSI Design; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Live, runtime phase monitoring and prediction on real systems with application to dynamic power management

    Isci, C., Contreras, G. & Martonosi, M., 2006, Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture, MICRO-39. p. 359-370 12 p. 4041860. (Proceedings of the Annual International Symposium on Microarchitecture, MICRO).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    220 Scopus citations
  • Memory access optimization of motion estimation algorithms on a native SIMD PLX processor

    Lin, G. H., Chen, S. J., Lee, R. B. & Hu, Y. H., 2006, APCCAS 2006 - 2006 IEEE Asia Pacific Conference on Circuits and Systems. p. 566-569 4 p. 4145456. (IEEE Asia-Pacific Conference on Circuits and Systems, Proceedings, APCCAS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Middleware for long-term deployment of delay-tolerant sensor networks

    Zhang, P., Sadler, C. M. & Martonosi, M. R., 2006, ACM International Conference Proceeding Series - Proceedings of the International Workshop on Middleware for Sensor Networks, MidSens 2006. Co-located with Middleware 2006. p. 13-18 6 p. (ACM International Conference Proceeding Series; vol. 218).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Network protocols designed for optimizability

    Rexford, J. L., Jan 1 2006, 2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 351-354 4 p. 4067832. (2006 IEEE Conference on Information Sciences and Systems, CISS 2006 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Password management strategies for online accounts

    Gaw, S. & Felten, E. W., 2006, ACM International Conference Proceeding Series - Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006. p. 44-55 12 p. (ACM International Conference Proceeding Series; vol. 149).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    201 Scopus citations
  • Phase characterization for power: Evaluating control-flow-based and event-counter-based techniques

    Isci, C. & Martonosi, M. R., 2006, Proceedings - Twelfth International Symposium on High-Performance Computer Architecture, 2006. p. 122-133 12 p. 1598119. (Proceedings - International Symposium on High-Performance Computer Architecture; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    76 Scopus citations
  • Power efficiency for variation-tolerant multicore processors

    Donald, J. & Martonosi, M. R., 2006, ISLPED'06 - Proceedings of the 2006 International Symposium on Low Power Electronics and Design. p. 304-309 6 p. (Proceedings of the International Symposium on Low Power Electronics and Design; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    51 Scopus citations
  • Pretty good BGP: Improving BGP by cautiously adopting routes

    Karlin, J., Forrest, S. & Rexford, J. L., 2006, Proceedings - 14th IEEE International Conference on Network Protocols, ICNP 2006. p. 290-299 10 p. 4110301. (Proceedings - International Conference on Network Protocols, ICNP).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    145 Scopus citations
  • Secrecy, flagging, and paranoia: Adoption criteria in encrypted e-mail

    Gaw, S., Felten, E. W. & Fernandez-Kelly, P., 2006, CHI 2006: Conference on Human Factors in Computing Systems, Conference Proceedings SIGCHI. p. 591-600 10 p. (Conference on Human Factors in Computing Systems - Proceedings; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    84 Scopus citations
  • Situation-aware caching strategies in highly varying mobile networks

    Wang, Y., Martonosi, M. R. & Peh, L. S., 2006, Proceedings - 14th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, MASCOTS 2006. p. 265-274 10 p. 1698558. (Proceedings - IEEE Computer Society's Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, MASCOTS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Supervised learning in sensor networks: New approaches with routing, reliability optimizations

    Wang, Y., Martonosi, M. R. & Peh, L. S., Jan 1 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Adhoc Communications and Networks, Secon 2006. Institute of Electrical and Electronics Engineers Inc., p. 256-265 10 p. 4068128. (2006 3rd Annual IEEE Communications Society on Sensor and Adhoc Communications and Networks, Secon 2006; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • TCP/IP interaction based on congestion price: Stability and optimality

    He, J., Chiang, M. & Rexford, J. L., 2006, 2006 IEEE International Conference on Communications, ICC 2006. Institute of Electrical and Electronics Engineers Inc., p. 1032-1039 8 p. 4024275. (IEEE International Conference on Communications; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Techniques for multicore thermal management: Classification and new exploration

    Donald, J. & Martonosi, M. R., 2006, Proceedings - 33rd International Symposium on Computer Architecture,ISCA 2006. p. 78-88 11 p. 1635942. (Proceedings - International Symposium on Computer Architecture; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    361 Scopus citations
  • Techniques for real-system characterization of Java virtual machine energy and power behavior

    Contreras, G. & Martonosi, M. R., 2006, Proceedings of the 2006 IEEE International Symposium on Workload Characterization, IISWC - 2006. p. 29-38 10 p. 4086131. (Proceedings of the 2006 IEEE International Symposium on Workload Characterization, IISWC - 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations