Publications
Mission assurance: beyond secure processing
Summary
Summary
The processor of a drone runs essential functions of sensing, communications, coordination, and control. This is the conventional view. But in today's cyber environment, the processor must also provide security to assure mission completion. We have been developing a secure processing architecture for mission assurance. A study on state-of-the-art secure...
Adversarial co-evolution of attack and defense in a segmented computer network environment
Summary
Summary
In computer security, guidance is slim on how to prioritize or configure the many available defensive measures, when guidance is available at all. We show how a competitive co-evolutionary algorithm framework can identify defensive configurations that are effective against a range of attackers. We consider network segmentation, a widely recommended...
Curator: provenance management for modern distributed systems
Summary
Summary
Data provenance is a valuable tool for protecting and troubleshooting distributed systems. Careful design of the provenance components reduces the impact on the design, implementation, and operation of the distributed system. In this paper, we present Curator, a provenance management toolkit that can be easily integrated with microservice-based systems and...
Airport Wind Observations Architectural Analysis(2.4 MB)
Summary
Summary
Airport wind information is critical for ensuring safe aircraft operations and for managing runway configurations. Airports across the National Airspace System (NAS) are served by a wide variety of wind sensing systems that have been deployed over many decades. This analysis presents a survey of existing systems and user requirements...
A secure cloud with minimal provider trust
Summary
Summary
Bolted is a new architecture for a bare metal cloud with the goal of providing security-sensitive customers of a cloud the same level of security and control that they can obtain in their own private data centers. It allows tenants to elastically allocate secure resources within a cloud while being...
Lessons learned from a decade of providing interactive, on-demand high performance computing to scientists and engineers
Summary
Summary
For decades, the use of HPC systems was limited to those in the physical sciences who had mastered their domain in conjunction with a deep understanding of HPC architectures and algorithms. During these same decades, consumer computing device advances produced tablets and smartphones that allow millions of children to interactively...
Learning network architectures of deep CNNs under resource constraints
Summary
Summary
Recent works in deep learning have been driven broadly by the desire to attain high accuracy on certain challenge problems. The network architecture and other hyperparameters of many published models are typically chosen by trial-and-error experiments with little considerations paid to resource constraints at deployment time. We propose a fully...
Influence estimation on social media networks using causal inference
Summary
Summary
Estimating influence on social media networks is an important practical and theoretical problem, especially because this new medium is widely exploited as a platform for disinformation and propaganda. This paper introduces a novel approach to influence estimation on social media networks and applies it to the real-world problem of characterizing...
Rapid Quantitative Analysis of Multiple Explosive Compound Classes on a Single Instrument via Flow-Injection Analysis Tandem Mass Spectrometry
Summary
Summary
A flow-injection analysis tandem mass spectrometry (FIA MSMS) method was developed for rapid quantitative analysis of 10 different inorganic and organic explosives. Performance is optimized by tailoring the ionization method (APCI/ESI), de-clustering potentials, and collision energies for each specific analyte. In doing so, a single instrument can be used to...
On large-scale graph generation with validation of diverse triangle statistics at edges and vertices
Summary
Summary
Researchers developing implementations of distributed graph analytic algorithms require graph generators that yield graphs sharing the challenging characteristics of real-world graphs (small-world, scale-free, heavy-tailed degree distribution) with efficiently calculable ground-truth solutions to the desired output. Reproducibility for current generators used in benchmarking are somewhat lacking in this respect due to...