MEERKATS: Maintaining EnterprisE Resiliency
via Kaleidoscopic Adaptation and
Transformation of Software Services

logo
 
Description →
Participants →
Publications →
News →

News

09/19/14
New York Times Technology Blog coverage of XRay project: "XRay: A New Tool for Tracking the Use of Personal Data on the Web," Steve Lohr, August 2014.
09/03/14
Our paper "Model Aggregation for Distributed Content Anomaly Detection" is to appear in the 7th ACM Workshop on Artificial Intelligence and Security (AISec).
07/24/14
Our paper "Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems" is to appear in the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI).
05/27/14
Our paper "Unsupervised Anomaly-based Malware Detection using Hardware Features" is to appear in the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
05/27/14
Our paper "Synthetic Data Generation and Defense in Depth Measurement of Web Applications" is to appear in the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
05/15/14
Our paper "XRay: Increasing the Web's Transparency with Differential Correlation" is to appear in the 23rd USENIX Security Symposium.
10/03/13
Our paper "SAuth: Protecting User Accounts from Password Database Leaks" is to appear in the 20th ACM Conference on Computer and Communications Security (CCS).
10/03/13
Our paper "Parrot: a Practical Runtime for Deterministic, Stable, and Reliable Threads" is to appear in the 24th ACM Symposium on Operating Systems Principles (SOSP).
10/03/13
Our paper "Determinism Is Not Enough: Making Parallel Programs Reliable with Stable Multithreading" is to appear in the Communications of the ACM.
10/01/13
Our paper "vTube: Efficient Streaming of Virtual Appliances Over Last-Mile Networks" is to appear in the ACM Symposium on Cloud Computing (SOCC).
09/01/13
Our paper "CellFlood: Attacking Tor Onion Routers on the Cheap" is to appear in the 18th European Symposium on Research in Computer Security (ESORICS).
08/03/13
Our paper "Effective Dynamic Detection of Alias Analysis Errors" is to appear in the 9th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC-FSE).
07/19/13
Our paper "Cloud resiliency and security via diversified replica execution and monitoring" is to appear in the 6th International Symposium on Resilient Control Systems (ISRCS).
05/23/13
Our paper "CloudFence: Data Flow Tracking as a Cloud Service" is to appear in the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
04/19/13
Our paper "MOTAG: Moving Target Defense Against Internet Denial of Service Attacks" is to appear in the 22nd International Conference on Computer Communications and Networks (ICCCN).
04/10/13
Our paper "Cloudopsy: an Autopsy of Data Flows in the Cloud" is to appear in the Human Computer Interaction International 2013 (HCI).
04/10/13
Our paper "On the Feasibility of Online Malware Detection with Performance Counters" is to appear in the 40th International Symposium on Computer Architecture (ISCA).
10/22/12
Our paper "Sound and Precise Analysis of Parallel Programs through Schedule Specialization" is to appear in the 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI).
10/22/12
Our paper "Concurrency Attacks" is to appear in the 4th USENIX Workshop on Hot Topics in Parallelism (HOTPAR).
10/22/12
Our paper "CleanOS: Limiting Mobile Data Exposure with Idle Eviction" is to appear in the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI).
08/17/12
Our paper "Self-healing Multitier Architectures Using Cascading Rescue Points" is to appear in the 2012 Annual Computer Security Applications Conference (ACSAC).
08/13/12
Our paper "Exploiting Split Browsers for Efficiently Protecting User Data" is to appear in the CCSW 2012: The ACM Cloud Computing Security Workshop.
07/10/12
Our paper "Adaptive Defenses for Commodity Software through Virtual Application Partitioning" is to appear in the 19th ACM Conference on Computer and Communications Security (CCS).
04/01/12
Our paper "Lost in Translation: Improving Decoy Documents via Automated Translation" is to appear in the Workshop on Research for Insider Threat (WRIT).
03/21/12
Our paper "Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud" is to appear in the Workshop on Research for Insider Threat (WRIT).
03/13/12
Our paper "Position Paper: The MEERKATS Cloud Security Architecture" is to appear in the International Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC).
03/01/12
Our paper "Towards a Universal Data Provenance Framework using Dynamic Instrumentation" is to appear in the International Information Security and Privacy Conference (SEC).
10/24/11
The MEERKATS website is online!

Latest News

09/19/14
New York Times Technology Blog coverage of XRay project: "XRay: A New Tool for Tracking the Use of Personal Data on the Web," Steve Lohr, August 2014.
09/03/14
Our paper "Model Aggregation for Distributed Content Anomaly Detection" is to appear in the 7th ACM Workshop on Artificial Intelligence and Security (AISec).
07/24/14
Our paper "Pebbles: Fine-Grained Data Management Abstractions for Modern Operating Systems" is to appear in the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI).
05/27/14
Our paper "Unsupervised Anomaly-based Malware Detection using Hardware Features" is to appear in the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
05/27/14
Our paper "Synthetic Data Generation and Defense in Depth Measurement of Web Applications" is to appear in the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
This work is supported by the United States Defense Advanced Research Projects Agency (DARPA) through Contract FA8650-11-C-7190. Opinions, findings, conclusions and recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the US Government, or DARPA.