Follow

Submissions from 2011

PDF

AEG: Automatic Exploit Generation, Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao, and David Brumley

PDF

Real-time software implementation of an IEEE 802.11a baseband receiver on Intel multicore, Christian R. Berger, Volodymyr Arbatov, Yevgen Voroneko, Franz Franchetti, and Markus Puschel

PDF

Towards Automatic Identification and Delineation of Tissues and Pathologies in H&E Stained Images, Ramamurthy Bhagavatula

PDF

From Static to Dynamic Electric Power Network State Estimation: The Role of Bus Component Dynamics, Ellery A. Blood

PDF

Seeing is Believing – Enhancing Message Dissemination in Vehicular Networks Through Visual Cues, Mateo Boban, Tiago T.V. Vinhoza, Ozan K. Tonguz, and Joao Barros

PDF

Theoretical Foundations of Multicore Systems Design: A Dynamical Systems Perspective, Paul Bogdan

PDF

Investigating the Viability of Bufferless NoCs in Modern Chip Multi-processor Systems, Chris Craik and Onur Mutlu

PDF

A Multi-core High Performance Computing Framework for Distribution Power Flow, Tao Cui and Franz Franchetti

PDF

CHIPPER: A Low-complexity Bufferless Deflection Router, Chris Fallin, Chris Craik, and Onur Mutlu

PDF

A High-Performance Hierarchical Ring On-Chip Interconnect with Low-Cost Routers, Chris Fallin, Xiangyao Yu, Greg Nazario, and Onur Mutlu

PDF

Data Layout Transformation for Stencil Computations on Short-Vector SIMD Architectures, Tom Henretty, Kevin Stock, Louis-Noel Pouchet, Franz Franchetti, J. Ramanujam, and P. Sadayappan

PDF

Distributed Detection over Noisy Networks: Large Deviations Analysis, Dusan Jakovetic, José M. F. Moura, and Joao Xavier

PDF

Cooperative Convex Optimization in Networked Systems: Augmented Lagrangian Algorithms with Directed Gossip Communication, Dusan Jakovetic, Joao Xavier, and José M. F. Moura

PDF

Spin-dependent heat transport and thermal boundary resistance, Taehee Jeong

PDF

An AUTOSAR-Compliant Automotive Platform for Meeting Reliability and Timing Constraints, Junsung Kim, Gaurav Bhatia, Ragunathan (Raj) Rajkumar, and Markus Jochim

PDF

A Spectro-Temporal Framework for Compensation of Reverberation for Speech Recognition, Kshitiz Kumar

PDF

AUTOSAR Extensions for Predictable Task Synchronization in MultiCore ECUs, Karthik Lakshmanan, Gaurav Bhatia, and Ragunathan (Raj) Rajkumar

PDF

TIE: Principled Reverse Engineering of Types in Binary Programs, JongHyup Lee, Thanassis Avgerinos, and David Brumley

PDF

A domain-knowledge-inspired mathematical framework for the description and classification of H&E stained histopathology images., Melody L. Massar, Ramamurthy Bhagavatula, John A. Ozolek, Carlos A. Castro, Matthew Fickus, and Jelena Kovacevic

PDF

Stochastic Time Reversal for Radar Detection, Nicholas A. O'Donoughue

PDF

Algebraic Signal Processing Theory: Cooley–Tukey-Type Algorithms for Polynomial Transforms Based on Induction, Aliaksei Sandryhaila, Jelena Kovacevic, and Markus Puschel

PDF

Compression of QRS complexes using Hermite expansion, Aliaksei Sandryhaila, Jelena Kovacevic, and Markus Puschel

PDF

Computational Modeling of Photonic Crystal Microcavity Single-Photon Emitters, Nicole A. Saulnier

PDF

Q: Exploit Hardening Made Easy, Edward J. Schwartz, Thanassis Avgerinos, and David Brumley

PDF

Verifying Physical Endpoints to Secure Digital Systems, Ahren M. Studer

PDF

UV-CAST: An Urban Vehicular Broadcast Protocol, Wantanee Viriyasitavat, Fan Bai, and Ozan K. Tonguz

PDF

Logic-based programming for wireless sensor-actuator networks, Yizhi Wu and Anthony G. Rowe

Submissions from 2010

PDF

Distributed Detection over Random Networks: Large Deviations Performance Analysis, Dragana Bajovic, Dusan Jakovetic, Joao Xavier, Bruno Sinopoli, and José M. F. Moura

PDF

Convergence behavior of the Active Mask segmentation algorithm, Doru C. Balcan, Gowri Srinivasa, Matthew Fickus, and Jelena Kovacevic

PDF

Automatic identification and delineation of germ layer components in H&E stained images of teratomas derived from human and nonhuman primate embryonic stem cells, Ramamurthy Bhagavatula, Matthew Fickus, W. Kelly, Chenlei Guo, John A. Ozolek, Carlos A. Castro, and Jelena Kovacevic

PDF

QuaLe: A Quantum-Leap Inspired Model for Non-Stationary Analysis of NoC Traffic in Chip Multi-Processors, Paul Bogdan, Miray Kas, Radu Marculescu, and Onur Mutlu

PDF

Exploring Indirect Vehicle-Bridge Interaction for Bridge SHM, Fernando Cerda, James H. Garrett, Jacobo Bielak, Ramamurthy Bhagavatula, and Jelena Kovacevic

PDF

Computer Generation of Efficient Software Viterbi Decoders, Frederic de Mesmay, Srinivas Chellappa, Franz Franchetti, and Markus Puschel

PDF

Gossip Algorithms for Distributed Signal Processing, Alexandros G. Dimakis, Soummya Kar, José M. F. Moura, Michael G. Rabbat, and Anna Scaglione

PDF

Improving the Dependability of Distributed Systems through AIR Software Upgrades, Tudor Dumitraş

PDF

Topology-aware Quality-of-Service Support in Highly Integrated Chip Multiprocessors, Boris Grot, Stephen W. Keckler, and Onur Mutlu

PDF

Convergence Rate Analysis of Distributed Gossip (Linear Parameter) Estimation: Fundamental Limits and Tradeoffs, Soummya Kar and José M. F. Moura

PDF

Moderate Deviations of a Random Riccati Equation, Soummya Kar and José M. F. Moura

PDF

Kalman Filtering with Intermittent Observations: Weak Convergence to a Stationary Distribution, Soummya Kar, Bruno Sinopoli, and José M. F. Moura

PDF

Self-Healing Circuits Using Statistical Element Selection, Gokce Keskin

PDF

Thread Cluster Memory Scheduling: Exploiting Differences in Memory Access Behavior, Yoongu Kim, Michael Papamichael, Onur Mutlu, and Mor Harchol-Balter

PDF

DRAM-Aware Last-Level Cache Writeback: Reducing Write-Caused Interference in Memory Systems, Chang Joo Lee, Veynu Narasiman, Eiman Ebrahimi, Onur Mutlu, and Yale N. Patt

PDF

Concurrent Autonomous Self-Test for Uncore Components in System-on-Chips, Yanjing Li, Onur Mutlu, Donald S. Gardner, and Subhashish Mitra

PDF

Local Histograms for Classifying H&E Stained Tissues., Melody L. Massar, Ramamurthy Bhagavatula, Matthew Fickus, and Jelena Kovacevic

PDF

Hardware implementation of the discrete fourier transform with non-power-of-two problem size, Peter A. Milder, Franz Franchetti, James C. Hoe, and Markus Puschel

PDF

Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers, Bryan Parno

PDF

A Model-Based Design Approach for Wireless Sensor-Actuator Networks, Anthony G. Rowe, Gaurav Bhatia, and Raj Rajkumar

PDF

All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask), Edward J. Schwartz, Thanassis Avgerinos, and David Brumley

PDF

A Contractual Anonymity System, Edward J. Schwartz, David Brumley, and Jonathan M. McCune

PDF

Telescoping Recursive Representations and Estimation of Gauss-Markov Random Fields, Divyanshu Vats and José M. F. Moura

PDF

Computer Generation of Platform-Adapted Physical Layer Software, Yevgen Voroneko, Volodymyr Arbatov, Christian R. Berger, Ronghui Peng, Markus Puschel, and Franz Franchetti

PDF

Fast and robust active contours for image segmentation, Wei Yu, Franz Franchetti, Yao-Jen Chang, and Tsuhan Chen

PDF

Fast bilateral filtering by adapting block size, Wei Yu, Franz Franchetti, James C. Hoe, Yao-Jen Chang, and Tsuhan Chen

Submissions from 2009

PDF

Weight Optimization for Consensus Algorithms with Correlated Switching Topology, Dusan Jakovetic, Joao Xavier, and José M. F. Moura

PDF

DILAND: An Algorithm for Distributed Sensor Localization with Noisy Distance Measurements, Usman A. Khan, Soummya Kar, and José M. F. Moura

PDF

Higher Dimensional Consensus: Learning in Large-Scale Networks, Usman A. Khan, Soummya Kar, and José M. F. Moura

Submissions from 2008

PDF

Analysis-Resistant Malware, John Bethencourt, Dawn Song, and Brent Waters

PDF

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications, David Brumley, Pongsin Poosankam, Dawn Song, and Jiang Zheng

PDF

Would Diversity Really Increase the Robustness of the Routing Infrastructure Against Software Defects?, Juan Caballero, Theocharis Kampouris, Dawn Song, and Jia Wang

PDF

Cell Shape and Patterning Considerations for Magnetic Random Access Memory (MRAM) Fabrication, Robert Ditizio, Paul Werbaneth, Tegal Corporation, and Jian-Gang Zhu

PDF

Distributed Parameter Estimation in Sensor Networks: Nonlinear Observation Models and Imperfect Communication, Soummya Kar, José M. F. Moura, and Kavita Ramanan

PDF

HookFinder: Identifying and Understanding Malware Hooking Behaviors, Zhenkai Liang, Heng Yin, and Dawn Song

PDF

Limits of Learning-Based Signature Generation with Adversaries, Shobha Venkataraman, Avrim Blum, and Dawn Song

Submissions from 2007

PDF

Provable Data Possession at Untrusted Stores, Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song

PDF

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation, David Brumley, Juan Caballero, Zhenkai Liang, James Newsome, and Dawn Song

PDF

RICH: Automatically Protecting Against Integer-Based Vulnerabilities, David Brumley, Tzi-cker Chiueh, Robert Johnson, Huijia Lin, and Dawn Song

PDF

Creating Vulnerability Signatures Using Weakest Preconditions, David Brumley, Hao Wang, Somesh Somesh, and Dawn Song

PDF

FiG: Automatic Fingerprint Generation, Juan Caballero, Shobha Venkataraman, Pongsin Poosankam, Min G. Kang, Dawn Song, and Avrim Blum

PDF

Polyglot: Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis, Juan Caballero, Heng Yin, Zhenkai Liang, and Dawn Song

PDF

Dynamic Spyware Analysis, Manuel Egele, Christopher Kruegel, Engin Kirda, Heng Yin, and Dawn Song

PDF

Distributed Evasive Scan Techniques and Countermeasures, Min G. Kang, Juan Caballero, and Dawn Song

PDF

Distributed Consensus Algorithms in Sensor Networks: Quantized Data and Random Link Failures, Soummya Kar and José M. F. Moura

PDF

Multi-Dimensional Range Query over Encrypted Data, Elaine Shi, John Bethencourt, T-H. H. Chan, Dawn Song, and Adrian Perrig

PDF

Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms, Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou, James Newsome, David Brumley, and Dawn Song

PDF

Exploiting Network Structure for Proactive Spam Mitigation, Shoba Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, and Dawn Song

PDF

Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis, Heng Yin, Dawn Song, Manuel Egele, Christopher Kruegel, and Engin Kirda

Submissions from 2006

PDF

New Constructions and Practical Applications for Private Stream Searching (Extended Abstract), John Bethencourt, Dawn Song, and Brent Waters

PDF

Towards Automatic Generation of Vulnerability-Based Signatures, David Brumley, James Newsome, Dawn Song, Hao Wang, and Somesh Jha

PDF

Towards Attack-Agnostic Defenses, David Brumley and Dawn Song

PDF

Secure Hierarchical In-Network Aggregation in Sensor Networks, Haowen Chan, Adrian Perrig, and Dawn Song

PDF

Behavioral Distance for Intrusion Detection, Debin Gao, Michael K. Reiter, and Dawn Song

PDF

Behavioral Distance Measurement Using Hidden Markov Models, Debin Gao, Michael K. Reiter, and Dawn Song

PDF

Replayer: Automatic Protocol Replay by Binary Analysis, James Newsome, David Brumley, Jason Franklin, and Dawn Song

PDF

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software, James Newsome, David Brumley, and Dawn Song

PDF

Paragraph: Thwarting Signature Learning by Training Maliciously, James Newsome, Brad Karp, and Dawn Song

PDF

Black Box Anomaly Detection: is it Utopian?, Shobha Venkataraman, Juan Caballero, Dawn Song, Avrim Blum, and Jennifer Yates

Submissions from 2005

PDF

Semantics-Aware Malware Detection, Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Song, and Randal E. Bryant

PDF

Privacy-Preserving Set Operations, Lea Kissner and Dawn Song

PDF

Polygraph: Automatically Generating Signatures for Polymorphic Worms, James Newsome, Brad Karp, and Dawn Song

PDF

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software, James Newsome and Dawn Song

PDF

FIT: Fast Internet Traceback, Adrian Perrig, Abraham Yaar, and Dawn Song

PDF

Modeling the Dispersion and Gain of RF Wireless Channels inside Reverberent Enclosures, Jonathan P. Van't Hof

PDF

New Streaming Algorithms for Fast Detection of Superspreaders, Shoba Venkataraman, Dawn Song, Phillip B. Gibbons, and Avrim Blum