Publications
On-orbit pointing performance of the Modular Agile Scalable Optical Terminal (MAScOT) for the ILLUMA-T mission
Summary
Summary
The Integrated LCRD LEO User Modem and Amplifier Terminal (ILLUMA-T) payload was the first space-based user terminal to demonstrate successful two-way optical communications with a ground terminal via NASA's Laser Communications Relay Demonstration (LCRD). In order to acquire the link, the ILLUMA-T optical module open loop points a wide beacon...
Software vulnerability detection using LLM: does additional information help?
Summary
Summary
Unlike conventional machine learning (ML) or deep learning (DL) methods, Large Language Models (LLM) possess the ability to tackle complex tasks through intricate chains of reasoning, a facet often overlooked in existing work on vulnerability detection. Nevertheless, these models have demonstrated variable performance when presented with different prompts (inputs), motivating...
Exploiting temporal vulnerabilities for unauthorized access in intent-based networking
Summary
Summary
Intent-based networking (IBN) enables network administrators to express high-level goals and network policies without needing to specify low-level forwarding configurations, topologies, or protocols. Administrators can define intents that capture the overall behavior they want from the network, and an IBN controller compiles such intents into low-level configurations that get installed...
Exploiting temporal vulnerabilities for unauthorized access in intent-based networking
Summary
Summary
Intent-based networking (IBN) enables network administrators to express high-level goals and network policies without needing to specify low-level forwarding configurations, topologies, or protocols. Administrators can define intents that capture the overall behavior they want from the network, and an IBN controller compiles such intents into low-level configurations that get installed...
Manipulative interference attacks
Summary
Summary
A μ-kernel is an operating system (OS) paradigm that facilitates a strong cybersecurity posture for embedded systems. Unlike a monolithic OS such as Linux, a μ-kernel reduces overall system privilege by deploying most OS functionality within isolated, userspace protection domains. Moreover, a μ-kernel ensures confidentiality and integrity between protection domains...
ECP 0857P final report for the NEXRAD ROC: Modified VCP 35
Summary
Summary
This report responds to a request by the NEXRAD ROC through the FAA to close out ECP0857P in their records. It details the motivation for the modification to the radar coverage pattern called VCP 35, its deployment, and use coordinated with nearby in situ ICICLE flight missions or independent of...
Variability of speech timing features across repeated recordings: a comparison of open-source extraction techniques
Summary
translation; extracted speech features are susceptible to methodological variations in the recording and processing pipeline. Investigating this, we compared exemplar timing features extracted via three different techniques from recordings of healthy speech. Our results show that features extracted via an intensity-based method differ from those produced by forced alignment. Different extraction methods also led to differing estimates of within-speaker feature variability over time in an analysis of recordings repeated systematically over three sessions in one day (n=26) and in one week (n=28). Our findings highlight the importance of feature extraction in study design and interpretation, and the need for consistent, accurate extraction techniques for clinical research.
Summary
Variations in speech timing features have been reliably linked to symptoms of various health conditions, demonstrating clinical potential. However, replication challenges hinder their
translation; extracted speech features are susceptible to methodological variations in the recording and processing pipeline. Investigating this, we compared exemplar timing features extracted via three different techniques...
VulSim: Leveraging similarity of multi-dimensional neighbor embeddings for vulnerability detection
Summary
Summary
Despite decades of research in vulnerability detection, vulnerabilities in source code remain a growing problem, and more effective techniques are needed in this domain. To enhance software vulnerability detection, in this paper, we first show that various vulnerability classes in the C programming language share common characteristics, encompassing semantic, contextual...
Building digital twins for cardiovascular health: From principles to clinical impact
Summary
Summary
The past several decades have seen rapid advances in diagnosis and treatment of cardiovascular diseases and stroke, enabled by technological breakthroughs in imaging, genomics, and physiological monitoring, coupled with therapeutic interventions. We now face the challenge of how to (1) rapidly process large, complex multimodal and multiscale medical measurements; (2)...
Impacts of WSR-88D SAILS and MRLE VCP options on severe weather warning performance
Summary
Summary
The impacts of supplemental adaptive intra-volume low-level scan (SAILS) and mid-volume rescan of low-level elevations (MRLE) usage on the Weather Surveillance Radar 1988-Doppler (WSR-88D) with respect to severe weather warning performance were evaluated. This is an update and expansion of an earlier study by Cho et al. (2022). Statistical methods...