Publications

Refine Results

(Filters Applied) Clear All

Airspace Flow Rate Forecast Algorithms, Validation, and Implementation(6.29 MB)

Date:
December 15, 2015
Published in:
Project Report ATC-428, MIT Lincoln Laboratory
Type:
Project Report
Topic:

Summary

This technical report summarizes work performed by MIT Lincoln Laboratory during the period 1 February 2015 – 30 November 2015 focused on developing and improving algorithms to estimate the impact of convective weather on air traffic flows.

Analysis of Factors Affecting System Performance in the ASpIRE Challenge(696.44 KB)

Date:
December 13, 2015
Published in:
Proceedings of the 2015 Automatic Speech Recognition and Understanding Workshop (ASRU), Scottsdale, Ariz.
Type:
Conference Paper

Summary

This paper presents an analysis of factors affecting system performance in the ASpIRE (Automatic Speech recognition In Reverberant Environments) challenge. In particular, overall word error rate (WER) of the solver systems is analyzed as a function of room, distance between talker and microphone, and microphone type.

The MITLL-AFRL IWSLT 2015 Systems(127.22 KB)

Date:
December 3, 2015
Published in:
12th International Workshop on Spoken Language Translation (IWSLT’15)
Type:
Conference Paper

Summary

This report summarizes the MITLL-AFRL MT, ASR and SLT systems and the experiments run using them during the 2015 IWSLT evaluation campaign. We build on the progress made last year, and additionally experimented with neural MT, unknown word processing, and system combination. We applied these techniques to translating Chinese to English and English to Chinese.

Spyglass: Demand-Provisioned Linux Containers for Private Network Access(1.26 MB)

Author:
Date:
November 8, 2015
Published in:
Proceedings of the 29th Large Installation System Administration conference (LISA15), Washington D.C.
Type:
Conference Paper

Summary

System administrators have super-user access to the low level infrastructure of the systems and networks they maintain. Given the typical administrator’s breadth of access to this infrastructure, administrators or the client devices they use are a prime target for compromise by a motivated adversary. In this paper, we describe Spyglass, a tool for managing, securing, and auditing administrator access to private or sensitive infrastructure networks by creating on-demand bastion hosts inside of Linux containers.

Residuals-Based Subgraph Detection with Cue Vertices(308.27 KB)

Date:
November 8, 2015
Published in:
Proceedings of Asilomar Conference on Signals, Systems and Computers
Type:
Conference Paper

Summary

A common problem in modern graph analysis is the detection of communities, an example of which is the detection of a single anomalously dense subgraph. Recent results have demonstrated a fundamental limit for this problem when using spectral analysis of modularity. In this paper, we demonstrate the implication of these results on subgraph detection when a cue vertex is provided, indicating one of the vertices in the community of interest.

Improved Hidden Clique Detection by Optimal Fusion of Multiple Adjacency Matrices(636.33 KB)

Date:
November 8, 2015
Published in:
Proceedings of Asilomar Conference on Signals, Systems and Computers
Type:
Conference Paper

Summary

Graph fusion has emerged as a promising research area for addressing challenges associated with noisy, uncertain, multi-source data. We consider the setting where we are given multiple Erdos-Renyi modeled adjacency matrices containing a common hidden or planted clique. The objective is to combine them linearly so that the principal eigenvectors of the resulting matrix best reveal the vertices associated with the clique.

Unlocking user-centered design methods for building cyber security visualizations(3.93 MB)

Date:
October 26, 2015
Published in:
Proceedings of 2015 IEEE Symposium on Visualization for Cyber Security (VizSec)
Type:
Conference Paper
Topic:

Summary

User-centered design can aid visualization designers to build better, more practical tools that meet the needs of cyber security users. In this paper, we discuss three design methods and illustrate how each method informed two real-world cyber security visualization projects which resulted in successful deployments to users.

VAST Challenge 2015: Mayhem at Dinofun World(757.94 KB)

Date:
October 25, 2015
Published in:
Proceedings of 2015 IEEE Conference on Visual Analytics Science and Technology (VAST)
Type:
Conference Paper
Topic:

Summary

A fictitious amusement park and a larger-than-life hometown football hero provided participants in the VAST Challenge 2015 with an engaging yet complex storyline and setting in which to analyze movement and communication patterns.

Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity(280.86 KB)

Date:
October 12, 2015
Published in:
Proceedings of ACM Conference on Computer and Communications Security (CCS)
Type:
Conference Paper

Summary

Control flow integrity (CFI) has been proposed as an approach to defend against control-hijacking memory corruption attacks. CFI works by assigning tags to indirect branch targets statically and checking them at runtime. In this work, we show that even a fine grained form of CFI with unlimited number of tags and a shadow stack (to check calls and returns) is ineffective in protecting against malicious attacks.

Timely Rerandomization for Mitigating Memory Disclosures(215.65 KB)

Date:
October 12, 2015
Published in:
Proceedings of ACM Conference on Computer and Communications Security (CCS)
Type:
Conference Paper

Summary

Address Space Layout Randomization (ASLR) can increase the cost of exploiting memory corruption vulnerabilities. One major weakness of ASLR is that it assumes the secrecy of memory addresses and is thus ineffective in the face of memory disclosure vulnerabilities. In this paper we present an approach that synchronizes randomization with potential runtime disclosure.