Publications

Refine Results

(Filters Applied) Clear All

The MIT-LL/AFRL IWSLT-2010 MT system

Published in:
Proc. Int. Workshop on Spoken Language Translation, IWSLT, 2 December 2010.

Summary

This paper describes the MIT-LUAFRL statistical MT system and the improvements that were developed during the IWSLT 2010 evaluation campaign. As part of these efforts, we experimented with a number of extensions to the standard phrase-based model that improve performance on the Arabic and Turkish to English translation tasks. We also participated in the new French to English BTEC and English to French TALK tasks. We discuss the architecture of the MIT-LL/AFRL MT system, improvements over our 2008 system, and experiments we ran during the IWSLT-2010 evaluation. Specifically, we focus on 1) cross-domain translation using MAP adaptation, 2) Turkish morphological processing and translation, 3) improved Arabic morphology for MT preprocessing, and 4) system combination methods for machine translation.
READ LESS

Summary

This paper describes the MIT-LUAFRL statistical MT system and the improvements that were developed during the IWSLT 2010 evaluation campaign. As part of these efforts, we experimented with a number of extensions to the standard phrase-based model that improve performance on the Arabic and Turkish to English translation tasks. We...

READ MORE

Analysis of ground-based radar low-altitude wind-shear detection in OEP terminal airspace for NextGen

Author:
Published in:
MIT Lincoln Laboratory Report ATC-375

Summary

To support the Next Generation Air Transportation System (NextGen), the Reduce Weather Impact Sensor RightSizing program is identifying and analyzing gaps in the current sensor network coverage relative to the Four-Dimensional Weather Data Cube Single Authoritative Source performance requirements. In this study, we look for shortfalls in low-altitude wind-shear sensing by ground-based radars and lidar in the NextGen super-density operations (SDO) terminal airspace. Specifically, 2D gridded wind-shear visibility (an upper bound to detection probability) data are generated for microbursts and gust fronts separately for different sensors, namely the Terminal Doppler Weather Radar, Next Generation Weather Radar, Airport Surveillance Radar-9 with Weather Systems Processor, and Doppler lidar.
READ LESS

Summary

To support the Next Generation Air Transportation System (NextGen), the Reduce Weather Impact Sensor RightSizing program is identifying and analyzing gaps in the current sensor network coverage relative to the Four-Dimensional Weather Data Cube Single Authoritative Source performance requirements. In this study, we look for shortfalls in low-altitude wind-shear sensing...

READ MORE

Microwave photonic applications of slab-coupled optical waveguide devices

Published in:
2010 23rd Annual Mtg. of the IEEE Photonics Society, 10 November 2010, pp. 479-480.
Topic:

Summary

The semiconductor slab-coupled optical waveguide (SCOW) concept is a versatile device platform that has enabled new classes of high-power, low-noise single-frequency lasers, mode-locked lasers, optical amplifiers, and photodiodes for analog optical links and photonic analog-to-digital converters.
READ LESS

Summary

The semiconductor slab-coupled optical waveguide (SCOW) concept is a versatile device platform that has enabled new classes of high-power, low-noise single-frequency lasers, mode-locked lasers, optical amplifiers, and photodiodes for analog optical links and photonic analog-to-digital converters.

READ MORE

Design, implementation and evaluation of covert channel attacks

Published in:
2010 IEEE Int. Conf. on Technologies for Homeland Security, 8 November 2010, pp. 481-487.

Summary

Covert channel attacks pose a threat to the security of critical infrastructure and key resources (CIKR). To design defenses and countermeasures against this threat, we must understand all classes of covert channel attacks along with their properties. Network-based covert channels have been studied in great detail in previous work, although several other classes of covert channels (hardware based and operating system-based) are largely unexplored. One of our contributions is investigating these classes by designing, implementing, and experimentally evaluating several specific covert channel attacks. We implement and evaluate hardware-based and operating system-based attacks and show significant differences in their properties and mechanisms. We also present channel capacity differences among the various attacks, which span three orders of magnitude. Furthermore, we present the concept of hybrid covert channel attacks which use two or more communication categories to transport data. Hybrid covert channels can be qualitatively harder to detect and counter than traditional covert channels. Finally, we summarize the lessons learned through covert channel attack design and implementation, which have important implications for critical asset protection and risk analysis. The study also facilitates the development of countermeasures to protect CIKR systems against covert channel attacks.
READ LESS

Summary

Covert channel attacks pose a threat to the security of critical infrastructure and key resources (CIKR). To design defenses and countermeasures against this threat, we must understand all classes of covert channel attacks along with their properties. Network-based covert channels have been studied in great detail in previous work, although...

READ MORE

Temporally oblivious anomaly detection on large networks using functional peers

Published in:
IMC'10, Proc. of the ACM SIGCOMM Internet Measurement Conf., 1 November 2010, pp. 465-471.

Summary

Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not fit into this pre-trained construct. When monitoring traffic to and from IP addresses on a large network, this problem can become computationally complex, and potentially intractable, as a state model must be maintained for each address. In this paper, we present a method of detecting anomalous network activity without providing any historical context. By exploiting the size of the network along with the minimal overhead of NetFlow data, we are able to model groups of hosts performing similar functions to discover anomalous behavior. As a collection, these anomalies can be further described with a few high-level characterizations and we provide a means for creating and labeling these categories. We demonstrate our method on a very large-scale network consisting of 30 million unique addresses, focusing specifically on traffic related to web servers.
READ LESS

Summary

Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not fit into this pre-trained construct. When monitoring traffic to and from IP addresses on a large network, this problem can become computationally complex, and potentially...

READ MORE

Secure channel establishment in disadvantaged networks: optimizing TLS using intercepting proxies

Published in:
MILCOM 2010, IEEE Military Communications Conference , 31 October-3 November 2010.

Summary

Transport Layer Security (TLS) is a secure communication protocol that is used in many secure electronic applications. In order to establish a TLS connection, a client and server engage in a handshake, which usually involves the transmission of digital certificates. In this paper we present a practical speedup of TLS handshakes over bandwidth-constrained, high-latency (i .e. disadvantaged) links by reducing the communication overhead associated with the transmission of digital certificates. This speedup is achieved by deploying two specialized TLS proxies across such links. Working in tandem, one proxy replaces certificate data in packets being sent across the disadvantaged link with a short reference, while the proxy on the other side of the link restores the certificate data in the packet. Local or remote caches supply the certificate data. Our solution preserves the end-to-end security of TLS and is designed to be transparent to third-party applications, and will thus facilitate rapid deployment by removing the need to modify existing installations of TLS clients and TLS servers. Testing shows that this technique can reduce the overall bandwidth used during a handshake by 50% in test emulation and by over 20% of TLS session volume in practice. In addition, it can reduce the time required to establish a secure channel by over 40% across Iridium, a widely used satellite link in practice.
READ LESS

Summary

Transport Layer Security (TLS) is a secure communication protocol that is used in many secure electronic applications. In order to establish a TLS connection, a client and server engage in a handshake, which usually involves the transmission of digital certificates. In this paper we present a practical speedup of TLS...

READ MORE

Physical layer considerations for wideband cognitive radio

Published in:
MILCOM 2010, IEEE Military Communications Conference , 31 October-3 November 2010, pp. 2113-2118.

Summary

Next generation cognitive radios will benefit from the capability of transmitting and receiving communications waveforms across many disjoint frequency channels spanning hundreds of megahertz of bandwidth. The information theoretic advantages of multi-channel operation for cognitive radio (CR), however, come at the expense of stringent linearity requirements on the analog transmit and receive hardware. This paper presents the quantitative advantages of multi-channel operation for next generation CR, and the advanced digital compensation algorithms to mitigate transmit and receive nonlinearities that enable broadband multi-channel operation. Laboratory measurements of the improvement in the performance of a multi-channel CR communications system operating below 2 GHz in over 500 MHz of instantaneous bandwidth are presented.
READ LESS

Summary

Next generation cognitive radios will benefit from the capability of transmitting and receiving communications waveforms across many disjoint frequency channels spanning hundreds of megahertz of bandwidth. The information theoretic advantages of multi-channel operation for cognitive radio (CR), however, come at the expense of stringent linearity requirements on the analog transmit...

READ MORE

TALENT: dynamic platform heterogeneity for cyber survivability of mission critical applications

Published in:
Proc. Secure and Resilient Cyber Architecture Conf., SRCA, 29 October 2010.

Summary

Despite the significant amount of effort that often goes into securing mission critical systems, many remain vulnerable to advanced, targeted cyber attacks. In this work, we design and implement TALENT (Trusted dynAmic Logical hEterogeNeity sysTem), a framework to live-migrate mission critical applications across heterogeneous platforms. TALENT enables us to change the hardware and operating system on top of which a sensitive application is running, thus providing cyber survivability through platform diversity. Using containers (a.k.a. operating system-level virtualization) and a portable checkpoint compiler, TALENT creates a virtual execution environment and migrates a running application across different platforms while preserving the state of the application. The state, here, refers to the execution state of the process as well as its open files and sockets. TALENT is designed to support a general C application. By changing the platform on-the-fly, TALENT creates a moving target against cyber attacks and significantly raises the bar for a successful attack against a critical application. Our measurements show that a full migration can be completed in about one second.
READ LESS

Summary

Despite the significant amount of effort that often goes into securing mission critical systems, many remain vulnerable to advanced, targeted cyber attacks. In this work, we design and implement TALENT (Trusted dynAmic Logical hEterogeNeity sysTem), a framework to live-migrate mission critical applications across heterogeneous platforms. TALENT enables us to change...

READ MORE

Low cost multifunction phased array radar concept

Summary

MIT Lincoln Laboratory and M/A-COM are jointly conducting a technology demonstration of affordable Multifunction Phased Array Radar (MPAR) technology for Next Generation air traffic control and national weather surveillance services. Aggressive cost and performance goals have been established for the system. The array architecture and its realization using custom Transmit and Receive Integrated Circuits and a panel-based Line Replaceable Unit (LRU) will be presented. A program plan for risk reduction and system demonstration will be outlined.
READ LESS

Summary

MIT Lincoln Laboratory and M/A-COM are jointly conducting a technology demonstration of affordable Multifunction Phased Array Radar (MPAR) technology for Next Generation air traffic control and national weather surveillance services. Aggressive cost and performance goals have been established for the system. The array architecture and its realization using custom Transmit...

READ MORE

Low-profile dual-polarized UHF array antenna

Published in:
2010 IEEE Int. Symp. on Phased Array Systems & Technology, 12 October 2010, p. 599-602.

Summary

A low-profile dual-polarized UHF array antenna has been developed for wide field-of-view dual sector coverage in the 250 to 450 MHz frequency range for communications or radar applications. The antenna utilizes a pair of parasitically-tuned dipole arrays for horizontal polarization and a pair of parasitically-tuned monopole arrays for vertical polarization, and both arrays are mounted on a common ground plane. The thickness of the antenna is 18.2 cm. Numerical electromagnetic simulations were used to analyze and optimize the antenna parameters prior to fabrication. Measurements of the dual-polarized prototype in an anechoic chamber demonstrate the antenna?s return loss and dual-polarized radiation gain pattern performance.
READ LESS

Summary

A low-profile dual-polarized UHF array antenna has been developed for wide field-of-view dual sector coverage in the 250 to 450 MHz frequency range for communications or radar applications. The antenna utilizes a pair of parasitically-tuned dipole arrays for horizontal polarization and a pair of parasitically-tuned monopole arrays for vertical polarization...

READ MORE