Holland, David A., Ada T. Lim, and Margo I. Seltzer. 2004. “An Architecture A Day Keeps The Hacker Away.” 2004 Workshop on Architectural Support for Security and Anti-Virus. Boston, Massachusetts. Publisher's Version Abstract
System security as it is practiced today is a losing battle. In this paper, we outline a possible comprehensive solution for binary-based attacks, using virtual machines, machine descriptions, and randomization to achieve broad heterogeneity at the machine level. This heterogeneity increases the ‘‘cost’’ of broad-based binary attacks to a sufficiently high level that they cease to become feasible. The convergence of several recent technologies appears to make our approach achievable at a reasonable cost, with only moderate run-time overhead.
Mesnier, Michael, Eno Thereska, Daniel Ellard, Gregory R. Ganger, and Margo Seltzer. 2004. “File classification in self-* storage systems.” 2004 International Conference on Autonomic Computing (ICAC-04). Publisher's Version Abstract
To tune and manage themselves, file and storage systems must understand key properties (e.g., access pattern, lifetime, size) of their various files. This paper describes how systems can automatically learn to classify the properties of files (e.g., read-only access pattern, short-lived, small in size) and predict the properties of new files, as they are created, by exploiting the strong associations between a file’s properties and the names and attributes assigned to it. These associations exist, strongly but differently, in each of four real NFS environments studied. Decision tree classifiers can automatically identify and model such associations, providing prediction accuracies that often exceed 90%. Such predictions can be used to select storage policies (e.g., disk allocation schemes and replication factors) for individual files. Further, changes in associations can expose information about applications, helping autonomic system components distinguish growth from fundamental change.
Malan, David, Thaddeus Fulford-Jones, Matt Welsh, and Steve Moulton. 2004. “CodeBlue: An Ad Hoc Sensor Network Infrastructure for Emergency Medical Care.” MobiSys 2004 Workshop on Applications of Mobile Embedded Systems (WAMES 2004). Publisher's Version
Welsh, Matt, and Geoff Mainland. 2004. “Programming Sensor Networks Using Abstract Regions.” First USENIX/ACM Symposium on Networked Systems Design and Implementation (NSDI ’04). Publisher's Version
Levis, Philip, Sam Madden, Joseph Polastre, Robert Szewczyk, Kamin Whitehouse, Alec Woo, David Gay, et al. 2004. TinyOS: An Operating System for Wireless Sensor Networks. Ambient Intelligence. Springer-Verlag. Publisher's Version
Welsh, Matt, Sam Madden, Nirupama Bulusu, and Sanjay Jha. 2004. A Whole-Network Approach to Sensor Network Programming. Wireless Sensor Networks: A Systems Perspective. Artech House. Publisher's Version
Ledlie, Jonathan, Jeff Shneidman, Matt Welsh, Mema Roussopoulos, and Margo Seltzer. 2004. “Open Problems in Data Collection Networks.” 11th ACM SIGOPS European Workshop. Publisher's Version
Fulford-Jones, Thaddeus R. F., Gu-Yeon Wei, and Matt Welsh. 2004. “A Portable, Low-Power, Wireless Two-Lead EKG System.” 26th IEEE EMBS Annual International Conference. Publisher's Version
Malan, David, Matt Welsh, and Michael SMITH. 2004. “A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography.” First IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON). Publisher's Version
Newton, Ryan, and Matt Welsh. 2004. “Region Streams: Functional Macroprogramming for Sensor Networks.” First International Workshop on Data Management for Sensor Networks (DMSN). Publisher's Version
Shnayder, Victor, Mark Hempstead, Bor-Rong Chen, Geoff Werner-Allen, and Matt Welsh. 2004. “Simulating the Power Consumption of Large-Scale Sensor Network Applications.” Second ACM Conference on Embedded Networked Sensor Systems (SenSys’04). Publisher's Version
Mainland, Geoff, Laura Kang, Sebastien Lahaie, David C. Parkes, and Matt Welsh. 2004. “Using Virtual Markets to Program Global Behavior in Sensor Networks.” 11th ACM SIGOPS European Workshop. Publisher's Version
Gaynor, Mark, Steve Moulton, Matt Welsh, Austin Rowan, and John Wynne and Ed LaCombe. 2004. “Wireless Sensor Network Applications.” Americas Conference on Information Systems (AMCIS 2004).
Shneidman, Jeffrey, David C Parkes, and Margo I Seltzer. 2003. “Overcoming rational manipulation in distributed mechanism implementations”.
Ng, Chaki, David C Parkes, and Margo I Seltzer. 2003. “Strategyproof computing: Systems infrastructures for self-interested parties”.
Ng, Chaki, David C Parkes, and Margo Seltzer. 2003. “Virtual worlds: Fast and strategyproof auctions for dynamic resource allocation.” Proceedings of the 4th ACM Conference on Electronic Commerce, 238–239. ACM.
Magoutis, Kostas, Salimah Addetia, Alexandra Fedorova, and Margo I Seltzer. 2003. “Making the Most Out of Direct-Access Network Attached Storage.” FAST.
Ledlie, Jonathan, Jeff Shneidman, Margo Seltzer, and John Huth. 2003. “Scooped, again.” International Workshop on Peer-to-Peer Systems, 129–138. Springer Berlin Heidelberg.
Ledlie, Jonathan, Jeff Shneidman, Matthew Amis, Michael Mitzenmacher, and Margo Seltzer. 2003. “Reliability-and capacity-based selection in distributed hash tables.” Harvard University Computer Science, Tech. Rep.
Huth, John, Jonathan Ledlie, Jeff Shneidman, and Margo Seltzer. 2003. “Scooped, Again.” Springer Verlag.