• Title/Summary/Keyword: Carnegie Mellon University

Search Result 108, Processing Time 0.041 seconds

SplitScreen: Enabling Efficient, Distributed Malware Detection

  • Cha, Sang-Kil;Moraru, Iulian;Jang, Ji-Yong;Truelove, John;Brumley, David;Andersen, David G.
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.187-200
    • /
    • 2011
  • We present the design and implementation of a novel anti-malware system called SplitScreen. SplitScreen performs an additional screening step prior to the signature matching phase found in existing approaches. The screening step filters out most non-infected files (90%) and also identifiesmalware signatures that are not of interest (99%). The screening step significantly improves end-to-end performance because safe files are quickly identified and are not processed further, and malware files can subsequently be scanned using only the signatures that are necessary. Our approach naturally leads to a network-based anti-malware solution in which clients only receive signatures they needed, not every malware signature ever created as with current approaches. We have implemented SplitScreen as an extension to ClamAV, the most popular open source anti-malware software. For the current number of signatures, our implementation is $2{\times}$ faster and requires $2{\times}$ less memory than the original ClamAV. These gaps widen as the number of signatures grows.

SLIDERS FOR THE NEXT GENERATION MAGNETIC HARD DISK DRIVE SYSTEMS-NUMERICAL SIMULATION

  • Jhon, Myung-S.;Peck, Paul-R.;Kang, Soo-Choon;Wang, Benjamin-L.;Kim, In-Eung;Park, Ki-Ook
    • Journal of the Korean Magnetics Society
    • /
    • v.5 no.5
    • /
    • pp.695-701
    • /
    • 1995
  • Fundamental issues and general procedures of modeling the head disk interface (HDI) in order to provide design criteria for future ultra-low flying sliders are given. Intermittent contact and gaseous rarefaction effects are discussed using nonconventional kinetic theory. To illustrate the simulation results, we modeled IBM 3370 taper flat sliders and positive/negative "bow tie" sliders. Several alternative HDI concepts for future disk drives - viscoelastic bearings, a hybrid system, and contact recording - are also briefly discussed.

  • PDF

Indirect structural health monitoring of a simplified laboratory-scale bridge model

  • Cerda, Fernando;Chen, Siheng;Bielak, Jacobo;Garrett, James H.;Rizzo, Piervincenzo;Kovacevic, Jelena
    • Smart Structures and Systems
    • /
    • v.13 no.5
    • /
    • pp.849-868
    • /
    • 2014
  • An indirect approach is explored for structural health bridge monitoring allowing for wide, yet cost-effective, bridge stock coverage. The detection capability of the approach is tested in a laboratory setting for three different reversible proxy types of damage scenarios: changes in the support conditions (rotational restraint), additional damping, and an added mass at the midspan. A set of frequency features is used in conjunction with a support vector machine classifier on data measured from a passing vehicle at the wheel and suspension levels, and directly from the bridge structure for comparison. For each type of damage, four levels of severity were explored. The results show that for each damage type, the classification accuracy based on data measured from the passing vehicle is, on average, as good as or better than the classification accuracy based on data measured from the bridge. Classification accuracy showed a steady trend for low (1-1.75 m/s) and high vehicle speeds (2-2.75 m/s), with a decrease of about 7% for the latter. These results show promise towards a highly mobile structural health bridge monitoring system for wide and cost-effective bridge stock coverage.

Access Right Assignment Mechanisms for Secure Home Networks

  • Kim, Tiffany Hyun-Jin;Bauer, Lujo;Newsome, James;Perrig, Adrian;Walker, Jesse
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.175-186
    • /
    • 2011
  • The proliferation of advanced technologies has been altering our lifestyle and social interactions-the next frontier is the digital home. Although the future of smart homes is promising, many technical challenges must be addressed to achieve convenience and security. In this paper, we delineate the unique combination of security challenges specifically for access control and consider the challenges of how to simply and securely assign access control policies to visitors for home devices and resources. We present a set of intuitive access control policies and suggest four access control settings based on our in-person interview results. Furthermore, we propose the automated Clairvoyant access right assignment (CARA) mechanism that utilizes home owners' social relationship to automatically deduce to which class a visitor belongs. The combination of CARA and the suggested mapping provides a promising first step for home policy assignment such that nonexpert home owners can let visitors use their home network with confidence. We anticipate that future research can build on our proposed mechanisms to provide confidence to non-expert home owners for letting visitors use their home network.