Cornell Systems LunchCS 754 Spring 2004
|
Sponsored by the
Information Assurance Institute (IAI),
|
||
The Systems Lunch is a seminar for discussing recent, interesting papers in the systems area, broadly defined to span operating systems, distributed systems, networking, architecture, databases, and programming languages. The goal is to foster technical discussions among the Cornell systems research community. This spring, the Systems Lunch will focus on interesting papers from the upcoming SOSP, and recent Mobisys and Oakland conferences. We will meet once a week on Fridays at noon in Rhodes 655.
The systems lunch is open to all Cornell students interested in systems. First-year graduate students are especially welcome. Student participants are expected to sign up for CS 754, Systems Research Seminar, for one credit.
Date | Paper | Presenter |
---|---|---|
January 30 |
A Trusted Open Platform
Paul England, Butler W. Lampson, John Manferdelli, Marcus Peinado, Bryan Willman IEEE Computer |
Michael Clarkson |
February 6 |
MACEDON: Methodology for Automatically Creating, Evaluating, and Designing Overlay Networks
Adolfo Rodriguez, Charles Killian, Sooraj Bhat, Dejan Kostic, and Amin Vahdat NSDI 2004, Technical Report CS-2003-09 |
Krzystof Ostrowski |
February 13 |
PlanetLab: An Overlay Testbed for Broad-Coverage Services
Brent Chun, David Culler, Timothy Roscoe, Andy Bavier, Larry Peterson, Mike Wawrzoniak, Mic Bowman SIGCOMM CCR |
Hitesh Ballani |
February 20 |
Mobile File System Support for Collaborative Data Access
Mobile and wireless-enabled devices are becoming more and more common, but
applications running on them operate under constraints which can be very
different from those on desktop hosts. For example, unpredictable network
connectivity can lead to wide variations in available bandwidth, which a
mobile host must adapt to if it is to provide efficient, highly-consistent
access to shared data. Overcoming these constraints is a vital
prerequisite for supporting an emerging application environment of mobile,
collaborative data access in the workplace. This talk will describe MFS,
an adaptive distributed file system developed at Cornell, how MFS supports
this type of collaborative data access, and results from experimental
evaluation of the system.
|
Ben Atkin |
February 27 |
Automatically characterizing large scale program behavior
Timothy Sherwood, Erez Perelman, Greg Hamerly, Brad Calder ASPLOS 2002 |
Rohit Fernandes |
March 5 |
King: Estimating Latency between Arbitrary Internet End Hosts
Gummadi, Saroiu, Gribble IMW 2002 Practical, Distributed Network Coordinates Cox, Dabek, Kaashoek, Li, Morris Hotnets 2003 |
Bernard Wong |
March 12 |
The thrifty barrier: Energy-aware synchronization in shared-memory multiprocessors
J. Li, J. F. Martínez, and M. C. Huang. HPCA 2004 |
Jian Li |
March 19 |
Service-Oriented Network Sockets
Saif and Paluska Mobisys 2003 |
Peter Sirokman |
March 26 | Spring break, no meeting. | |
April 2 |
Low-Rate TCP-Targeted Denial of Service Attacks
Aleksandar Kuzmanovic and Edward W. Knightly SIGCOMM 2003 |
Joy Zhang |
April 9 | ACSU/Faculty Lunch. | |
April 16 |
Secure Infrastructure for Networked Systems (SINS)
With the increasing dominance of service-oriented architectures, both in Industry and in the military, there is a need for distributed trust management and enforcement of policies among principals at different clearance levels and needs to know, spanning several trust domains and distributed across spatially diverse physical locations. It is also important to police and protect such an infrastructure since distribution increases the vulnerabilities of systems, amplifies the possibility of attacks, and increases the difficulty of effective monitoring, analysis, and remediation. Secure Infrastructure for Networked Systems (SINS) is an agent-based secure middleware project being executed at the Naval Research Laboratory to address some of these challenges. The SINS architecture comprises a distributed collection of agent interpreters, each capable of running agents written in the synchronous language SOL (Secure Operations Language), which has a well defined formal semantics and an associated automatic theorem proving system (Salsa). The author of each SOL agent provides an inductive invariant, using which the recipient can establish (with Salsa) its compliance with certain local policies. Other policies are enforced by locally deployed "security agents". The SINS middleware provides the necessary framework for agent deployment, communication, fault-tolerance, and migration. We are currently applying SINS to problems of Information Assurance for the US Navy's Open Architecture Computing Environment (OACE). In this talk I shall outline some of the concerns of OACE being addressed by SINS, and conclude with a set of interesting research issues. | Ramesh Bharadwaj (Naval Research Labs) |
April 23 |
A Measurement-Based Analysis of Multihoming
Aditya Akella, Bruce Maggs, Srinivasan Seshan, Anees Shaikh, Ramesh Sitaraman SIGCOMM 2003 |
Manpreet Singh |
April 30 |
Efficient Context-Sensitive Intrusion Detection
Jonathon T. Giffin, Somesh Jha, Barton P. Miller NDSS 2004 |
Lantian |
May 7 |
Pi: A Path Identification Mechanism to Defend against DDoS attacks
A. Yaar, A. Perrig, D. Song. Oakland Security Conference 2003. Defending against denial-of-service attacks with puzzle auctions X. Wang, M. Reiter. Oakland Security Conference 2003. |
John Calandrino |