Now showing items 1-10 of 2234

    • Data from: Autonomous synthesis of metastable materials 

      Ament, Sebastian; Amsler, Maximilian; Sutherland, Duncan R.; Chang, Ming-Chiang; Guevarra, Dan; Connolly, Aine B.; Gregoire, John M.; Thompson, Michael O.; Gomes, Carla P.; van Dover, R. Bruce (2021-08-13)
      Autonomous experimentation enabled by artificial intelligence (AI) offers a new paradigm for accelerating scientific discovery. Non-equilibrium materials synthesis is emblematic of complex, resource-intensive experimentation ...
    • Tamperproof Provenance-Aware Storage for Mobile Ad Hoc Networks 

      Adams, Danny; Rubambiza, Gloire; Fiori, Pablo; Wang, Xinwen; Weatherspoon, Hakim; Van Renesse, Robbert (2020-12-08)
      This paper presents a middleware for providing a mobile ad hoc network with tamperproof provenance-aware storage, even when some fraction of devices can be Byzantine. Important considerations include fast propagation of ...
    • RIF: Reactive Information Flow Labels 

      Kozyri, Elisavet; Schneider, Fred B. (2019-04-08)
      Restrictions that a reactive information flow (RIF) label imposes on a value are determined by the sequence of operations used to derive that value. This allows declassification, endorsement, and other forms of reclassification ...
    • Beyond Labels: Permissiveness for Dynamic Information Flow Enforcement 

      Kozyri, Elisavet; Schneider, Fred B.; Bedford, Andrew; Desharnais, Josée; Tawbi, Nadia (2019-02-28)
      Flow-sensitive labels used by dynamic enforcement mechanisms might themselves encode sensitive information, which can leak. Metalabels, employed to represent the sensitivity of labels, exhibit the same problem. This paper ...
    • Abstraction-Safe Effect Handlers via Tunneling: Technical Report 

      Zhang, Yizhou (2018-11-09)
      Algebraic effect handlers offer a unified approach to expressing control-flow transfer idioms such as exceptions, iteration, and async/await. Unfortunately, previous attempts to make these handlers type-safe have failed ...
    • X-Containers: Breaking Down Barriers to Improve Performance and Isolation of Cloud-Native Containers 

      Shen, Zhiming; Sun, Zhen; Sela, Gur-Eyal; Bagdasaryan, Eugene; Delimitrou, Christina; Van Renesse, Robbert; Weatherspoon, Hakim (2018-08-29)
      “Cloud-native” container platforms, such as Kubernetes, have become an integral part of production cloud environments. One of the principles in designing cloud-native applications is called “Single Concern Principle”, which ...
    • Security Results for SIRRTL, A Hardware Description Language for Information Flow Security 

      Ferraiuolo, Andrew (2017-12)
      This document establishes security results for SIRRTL, a secure variant of the FIRRTL intermediate language. We developed ChiselFlow, a variant of the Chisel hardware design language [1] for information flow security. ...
    • HyperFlow: A Processor Architecture for Timing-Safe Information-Flow Security 

      Ferraiuolo, Andrew; Zhao, Yuqi; Suh, G. Edward; Myers, Andrew C. (2018-05-01)
      This paper presents HyperFlow, a processor that enforces secure information flow, including control over timing channels. The design and implementation of HyperFlow offer security assurance because it is implemented ...
    • A Reactive Approach for Use-Based Privacy 

      Birrell, Eleanor; Schneider, Fred B. (2017-11-24)
      Use-based privacy views privacy in terms of authorized uses, a philosophy well-suited for data collection and data analysis applications that arise in networked information systems. This work takes a first step toward ...