Overlay ≈ Overlay
View article
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems Open
The presence of large numbers of security vulnerabilities in popular feature-rich commodity operating systems has inspired a long line of work on excluding these operating systems from the trusted computing base of applications, while reta…
View article
Virtual memory palaces: immersion aids recall Open
Virtual reality displays, such as head-mounted displays (HMD), afford us a superior spatial awareness by leveraging our vestibular and proprioceptive senses, as compared to traditional desktop displays. Since classical times, people have u…
View article
Contact graph routing in DTN space networks: overview, enhancements and performance Open
Delay- and Disruption Tolerant Networks (DTNs) are based on an overlay protocol and on the store-carry-forward paradigm. In practice, each DTN node can store information for a long time before forwarding it. DTNs are particularly suited to…
View article
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization Open
CHERI extends a conventional RISC Instruction-Set Architecture, compiler, and operating system to support fine-grained, capability-based memory protection to mitigate memory-related vulnerabilities in C-language TCBs. We describe how CHERI…
View article
Why Not a Single Image? Combining Visualizations to Facilitate Fieldwork and On-Screen Mapping Open
Visualization products computed from a raster elevation model still form the basis of most archaeological and geomorphological enquiries of lidar data. We believe there is a need to improve the existing visualizations and create meaningful…
View article
Energy efficiency across programming languages: how do energy, time, and memory relate? Open
This paper presents a study of the runtime, memory usage and energy consumption of twenty seven well-known software languages. We monitor the performance of such languages using ten different programming problems, expressed in each of the …
View article
UAV-to-UAV Communications in Cellular Networks Open
We consider a cellular network deployment where UAV-to-UAV (U2U) transmit-receive pairs share the same spectrum with the uplink (UL) of cellular ground users (GUEs). For this setup, we focus on analyzing and comparing the performance of tw…
View article
Translation leak-aside buffer : Defeating cache side-channel protections with TLB attacks Open
To stop side channel attacks on CPU caches that have allowed attackers to leak secret information and break basic security mechanisms, the security community has developed a variety of powerful defenses that effectively isolate the securit…
View article
Breaking Kernel Address Space Layout Randomization with Intel TSX Open
Kernel hardening has been an important topic since many applications and security mechanisms often consider the kernel as part of their Trusted Computing Base (TCB). Among various hardening techniques, Kernel Address Space Layout Randomiza…
View article
Attention: Theory, Principles, Models and Applications Open
We discuss two general concepts of attention: (1) As a filter of selective attention that selects and admits channels of information from the environment to be processed; (2) as a resource to enable subsequent information processing, const…
View article
Interfacial bond in concrete-to-concrete composites: A review Open
Concrete-to-concrete composites have been widely used in a broad range of applications such as buildings, bridges, pavements, dams and tunnels. Numerous studies have been carried out to characterize the structural performance of these comp…
View article
<i>Mo<sup>2</sup>Cap<sup>2</sup> </i>: Real-time Mobile 3D <i>Mo</i>tion <i>Capture</i> with a <i>Cap</i>-mounted Fisheye Camera Open
We propose the first real-time system for the egocentric estimation of 3D human body pose in a wide range of unconstrained everyday activities. This setting has a unique set of challenges, such as mobility of the hardware setup, and robust…
View article
VAULT Open
Intel's SGX offers state-of-the-art security features, including confidentiality, integrity, and authentication (CIA) when accessing sensitive pages in memory. Sensitive pages are placed in an Enclave Page Cache (EPC) within the physical m…
View article
Hoplite: Building austere overlay NoCs for FPGAs Open
Customized unidirectional, bufferless, deflection-routed torus networks can outperform classic, bidirectional, buffered mesh networks for single-flit-oriented FPGA applications by as much as 1.5× (best achievable throughputs for a 10×10 sy…
View article
Is the ROC curve a reliable tool to compare the validity of landslide susceptibility maps? Open
This study investigates how effective the receiver operating characteristic (ROC) curve is for comparing the reliability of landslide susceptibility maps (LSMs). In this regard, we selected a basin prone to landslides in northern Iran and …
View article
Multi-terminal DC grids: challenges and prospects Open
A few multi-terminal direct current (MTDC) systems are in operation around the world today. However, MTDC grids overlaying their AC counterpart might a reality in a near future. The main drivers for constructing such direct current grids a…
View article
Large pages and lightweight memory management in virtualized environments Open
Large pages have long been used to mitigate address translation overheads on big-memory systems, particularly in virtualized environments where TLB miss overheads are severe. We show, however, that far from being a panacea, large pages are…
View article
Functions and Applications of Geosynthetics In Roadways Open
Geosynthetics have been successfully used to fulfill a number of functions that contribute significantly to the good performance of roadways. They include the functions of separation, filtration, reinforcement, stiffening, drainage, barrie…
View article
Protecting Bare-Metal Embedded Systems with Privilege Overlays Open
Embedded systems are ubiquitous in every aspect of modern life. As the Internet of Thing expands, our dependence on these systems increases. Many of these interconnected systems are and will be low cost bare-metal systems, executing withou…
View article
‘A blessing in disguise’ or ‘as if it wasn’t hard enough already’: reciprocal and aggravate vulnerabilities in the supply chain Open
We investigate the interrelations of structural and operational vulnerabilities in the supply chain (SC) using discrete-event simulation for a real life case study. We theorise a notion of SC overlays and explore conditions surrounding the…
View article
Rethinking software runtimes for disaggregated memory Open
Disaggregated memory can address resource provisioning inefficiencies in current datacenters. Multiple software runtimes for disaggregated memory have been proposed in an attempt to make disaggregated memory practical. These systems rely o…
View article
A comparison study of intel SGX and AMD memory encryption technology Open
Hardware-assisted trusted execution environments are secure isolation technologies that have been engineered to serve as efficient defense mechanisms to provide a security boundary at the system level. Hardware vendors have introduced a va…
View article
Multi-Touch Skin Open
Skin-based touch input opens up new opportunities for direct, subtle, and expressive interaction. However, existing skin-worn sensors are restricted to single-touch input and limited by a low resolution. We present the first skin overlay t…
View article
Outage Performance of NOMA-Based Cognitive Hybrid Satellite-Terrestrial Overlay Networks by Amplify-and-Forward Protocols Open
In this paper, we investigate the outage probability (OP) performance of amplify-and-forward (AF) cognitive hybrid satellite-terrestrial overlay networks (CHSTONs) with the non-orthogonal multiple access (NOMA) scheme, in which half-duplex…
View article
Transmission Capacity Analysis of Relay-Assisted Device-to-Device Overlay/Underlay Communication Open
Device-to-device (D2D) communication can effectively meet the demanding high data rate by providing direct links among mobile users in cellular networks. In this paper, we analyze the transmission capacity of relay-assisted D2D communicati…
View article
How the Type of Content in Educative Augmented Reality Application Affects the Learning Experience Open
Nowadays, the use of technology to improve teaching and learning experiences in the classroom has been promoted. One of these technologies is augmented reality, which allows overlaying layers of virtual information on real scene with the a…
View article
State-of-the-art survey on P2P overlay networks in pervasive computing environments Open
P2P overlay networks have attracted significant research interest due to their utility as virtualized abstractions of complex network infrastructures, optimized to satisfy specific criteria, e.g. minimum delay or shortest diameter. In the …
View article
Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Open
The implementation of device-to-device (D2D) underlaying or overlaying pre-existing cellular networks has received much attention due to the potential of enhancing the total cell throughput, reducing power consumption and increasing the in…
View article
libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK). Open
Intel Memory Protection Keys (MPK) is a new hardware primitive to support thread-local permission control on groups of pages without requiring modification of page tables. Unfortunately, its current hardware implementation and software sup…
View article
Mitigation strategies for reflection cracking in rehabilitated pavements – A synthesis Open
The placement of an asphalt overlay on top of an existing pavement is rarely a lasting solution. Due to continuous movement of the existing pavement, existing discontinuities such as cracks and joints propagate through the overlay causing …