May, 2006 Archive

Automatically Generating Malicious Disks using Symbolic Execution

Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar, Dawson Engler Proceedings of the 2006 IEEE Symposium on Security and Privacy (SP ’06), May, 2006, pp. 243–257 Abstract Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant violations before using it. …

Read More

pTHINC: A Thin-Client Architecture for Mobile Wireless Web

Joeng Kim, Ricardo Baratto, Jason Nieh Proceedings of the 15th International World Wide Web Conference (WWW 2006), Edinburgh, Scotland, May 23-26, 2006, pp. 143-152 Abstract Although web applications are gaining popularity on mo- bile wireless PDAs, web browsers on these systems can be quite slow and often lack adequate functionality to access many web sites. We have developed pTHINC, a …

Read More

On the Performance of Wide-Area Thin-Client Computing

Albert Lai, Jason Nieh ACM Transactions on Computer Systems (TOCS), Volume 24, Issue 2, May, 2006, pp. 175–209 Abstract As businesses continue to grow their World Wide Web presence, it is becoming increasingly vital for them to have quantitative measures of the mean client perceived response times of their web services. We present Certes (CliEnt Response Time Estimated by the …

Read More

Columbia University Department of Computer Science