6,975 Hits in 3.3 sec

Exploiting type-awareness in a self-recovering disk

Kiron Vijayasankar, Gopalan Sivathanu, Swaminathan Sundararaman, Erez Zadok
2007 Proceedings of the 2007 ACM workshop on Storage security and survivability - StorageSS '07  
We have designed and implemented a prototype disk system that automatically ensures the integrity of stored data, and transparently recovers vital data in the event of integrity violations.  ...  We also show how semantics-aware replication of blocks can help improve the recoverability of data in the event of partial disk errors with small space overheads.  ...  We have extended Type-Safe Disks to be more robust to disk errors. We call our modified disk system Self-Recovering Disks (SRDs).  ... 
doi:10.1145/1314313.1314321 dblp:conf/storagess/VijayasankarSSZ07 fatcat:xmxc4nzeszchrlsnckas47utim

Protection Preserving Public Supportable System In Cluster Based Distributed Storage

Nivethaa Varshinie.R, Rajarajan A
2016 International Journal Of Engineering And Computer Science  
The ABCT will recover the issue of time delayness and makes the system more efficient. We randomize the encode coefficients with a pseudorandom capacity to protect information security.  ...  In this project an open examining plan for the recovering code based distributed storage is proposed and also Attribute Based Clustering Technique (ABCT) For Distributed Data.  ...  exploiting application awareness.  ... 
doi:10.18535/ijecs/v5i6.17 fatcat:yemmjpewejh63fibp3r5mjqfzu

The Impact of Hard Disk Firmware Steganography on Computer Forensics

Iain Sutherland, Gareth Davies, Nick Pringle, Andrew Blyth
2009 Journal of Digital Forensics, Security and Law  
The hard disk drive is probably the predominant form of storage media and is a primary data source in a forensic investigation.  ...  In particular, the possibility that the Platter Resident Firmware Area could be manipulated and exploited to facilitate a form of steganography, enabling information to be concealed by a user and potentially  ...  However the authors are aware of two major commercial products available for this type of analysis and modification/repair of hard disk drives.  ... 
doi:10.15394/jdfsl.2009.1059 fatcat:lvm4wcamgzfw7ixonvpsddvc5e

Remembrance of data passed: a study of disk sanitization practices

S.L. Garfinkel, A. Shelat
2003 IEEE Security and Privacy  
Professors Hal Abelson and Charles Leiserson have also been a source of encouragement and moral support.  ...  Another drive (#21) contained 3,722 credit card numbers (some of them repeated) in a different type of log format.  ...  Level 3 Retained data blocks Data that can be recovered from a disk, but which does not obviously belong to a named file.  ... 
doi:10.1109/msecp.2003.1176992 fatcat:pywpqoexbnccxf6ltonih6nfzm

Self-awareness of Cloud Applications [chapter]

Alex Iosup, Xiaoyun Zhu, Arif Merchant, Eva Kalyvianaki, Martina Maggio, Simon Spinner, Tarek Abdelzaher, Ole Mengshoel, Sara Bouchenak
2017 Self-Aware Computing Systems  
A much shorter, revised version of this material will be available in print, as part of a Springer book on "Self-Aware Computing". The book is due to appear in 2017.  ...  Last, we propose a roadmap for addressing open challenges in self-aware cloud and datacenter applications.  ...  by the Dutch STW/NWO Veni personal grant @large(#11881) and Vidi personal grant MagnaData, by the Dutch national program COM-MIT and COMMissioner sub-project, by the Dutch KIEM project KIESA, and by a  ... 
doi:10.1007/978-3-319-47474-8_20 fatcat:ckcxfmjmvvas5bhg7wp5qfmehy

ORAID: An Intelligent and Fault-Tolerant Object Storage Device [chapter]

Dan Feng, Lingfang Zeng, Fang Wang, Shunda Zhang
2005 Lecture Notes in Computer Science  
In ORAID, storage object is stored in form of original block fragments and their XOR verification fragments are among the disks of the device.  ...  ORAID consolidates disk space of individual disk into a single storage spool and implements object-sharing and fault-tolerance through the object-interface.  ...  If we use a uniform style to contain attributes for any type of object, more disk space may be wasted while saving objects with their attributes in disks.  ... 
doi:10.1007/11596042_42 fatcat:euu42kvjvbar3bxp6fk42dfjfy

A self-supervised, physics-aware, Bayesian neural network architecture for modelling galaxy emission-line kinematics [article]

James M. Dawson, Timothy A. Davis, Edward L. Gomez, Justus Schock
2021 arXiv   pre-print
In order to assist in the timely exploitation of these vast datasets we explore the use of a self-supervised, physics aware neural network capable of Bayesian kinematic modelling of galaxies.  ...  This work shows the promising use of machine learning, and in particular self-supervised neural networks, in the context of kinematically modelling galaxies.  ...  ALMA is a partnership of the ESO (representing its member states), NSF (USA), and NINS (Japan), together with the NRC (Canada), NSC, ASIAA (Taiwan), and KASI (Republic of Korea), in cooperation with the  ... 
arXiv:2102.05520v1 fatcat:5kax3nqm3bcnzit4lh67cwgh6e

A Survey on Mobile Networks for Disaster Management

L. Monisha
2018 International Journal for Research in Applied Science and Engineering Technology  
Such a class of smart phones with this facility can ascend and pass out messages in case of exigency with the region and spot details so that it is helpful the rescue operation.  ...  The self-rescue system sorts, plans and position the survivors.  ...  The teamphone comprising of messaging and self-rescue system aids rescue operation with different type of message transmission by bonding the three types of network.  ... 
doi:10.22214/ijraset.2018.2126 fatcat:7wnhy4hgrrd7feekeujo2dljyy

Secondary spectrum access networks

Xuemin Hong, Cheng-xiang Wang, Hsiao-hwa Chen, Yan Zhang
2009 IEEE Vehicular Technology Magazine  
As illustrated in Figure 1 , an exclusive region is defi ned as a circular disk centered at a primary receiver with a radius L.  ...  A well-known example of the spatial white spaces is in TV bands where multiple TV channels are interleaved to avoid self-interference so that a single channel is only used sparsely in disjoint regions.  ... 
doi:10.1109/mvt.2009.932543 fatcat:i5r5hkt2t5adbhzloihduqvpxa

An operating system independent WORM archival system

Guido Russo, Stefano Russo, Ben??it Pirenne
1995 Software, Practice & Experience  
The archival system is independent of the operating system, flat, self-consistent, does not use any write cache on magnetic disk, and allows the exploitation of auxiliary information on magnetic disk,  ...  A library in C language, called pODLIB, has been implemented as a portable interface to the archival system.  ...  fully exploited in their potential application areas.  ... 
doi:10.1002/spe.4380250504 fatcat:oi5w3eykqvd6bbmltzzbjnvsvq

Best Practices on Standards, Policies and Quality Assurance in Digital Repositories for Long Term Preservation

Olivier Rouchon, Philippe Prat, Mathieu Cloirec
2012 Zenodo  
These have played a key role in the understanding of the subsequent risks and the definition of standards in this domain.  ...  During the past twenty years, the long-term preservation of digital information has only been a matter under consideration for a few scientific or patrimonial institutions.  ...  A syntactic description is used to know how the data are organised in the file (primitive types, size, position in a table, etc., are some examples).  ... 
doi:10.5281/zenodo.6302916 fatcat:4acvglwwfrblfmt4hbxcazgmrq

Forensic Analysis of BIOS Chips [chapter]

Pavel Gershteyn, Mark Davis, Sujeet Shenoi
2006 IFIP Advances in Information and Communication Technology  
Data can be hidden in BIOS chips without hindering computer performance. This feature has been exploited by virus writers and computer game enthusiasts.  ...  It demonstrates how data may be concealed within BIOS free space and modules in a manner that makes it accessible using operating system commands.  ...  A BIOS Savior device can be used to recover from a data hiding attempt that results in a corrupted BIOS.  ... 
doi:10.1007/0-387-36891-4_24 fatcat:ntebokfbc5glpcp346qbyalwlq

Software that Learns from its Own Failures [article]

Martin Monperrus
2015 arXiv   pre-print
Instead, I propose a new paradigm in which software systems learn from their own failures. By using an advanced monitoring system they have a constant awareness of their own state and health.  ...  Their recovery capabilities are assessed by self-injection of controlled failures; this process produces knowledge in prevision of future unanticipated failures.  ...  Conclusion In this paper, I have sketched vision of software that learns to self-improve from its own failures.  ... 
arXiv:1502.00821v1 fatcat:afflzserk5fgflqcpziqktoeqe


Chaitanya Yalamanchili, Kiron Vijayasankar, Erez Zadok, Gopalan Sivathanu
2009 Proceedings of SYSTOR 2009: The Israeli Experimental Systems Conference on - SYSTOR '09  
caching policies to each type.  ...  The data placement decisions in DHIS are made in an online fashion, during data creation.  ...  In the rest of this section, we detail the basic design aspects of operating such a hierarchical storage system in a type-aware storage setup as described in Section 2.2.  ... 
doi:10.1145/1534530.1534543 dblp:conf/systor/YalamanchiliVZS09 fatcat:tgzvgrpdu5fmjlylmf4nuqsbaa

Divergence Detector: A Fine-Grained Approach to Detecting VM-Awareness Malware

Chia-Wei Hsu, Fan-Syunshih, Chi-Weiwang, Shiuhpyng Winston Shieh
2013 2013 IEEE 7th International Conference on Software Security and Reliability  
The uncertain factors play the major role in the VM-awareness detection. To reduce uncertain factors causing false positives, a method is proposed for VM-aware detection.  ...  Virtualized execution has become an effective mechanism to analyze malware in a dynamic way.  ...  Table 1 . 1 The known VM-aware samples Categories VM-aware Samples Addresses of branches in a VM check Target Hardware fin- gerprint check QEMU hard disk check 0x42e8e4 0x42dbd4 QEMU  ... 
doi:10.1109/sere.2013.23 dblp:conf/ssiri/HsuFCS13 fatcat:wjuk4wr73facbch7scwsbqjija
« Previous Showing results 1 — 15 out of 6,975 results