Browsing RPI Theses Open Access by Author "Milanova, Ana"
Now showing items 1-14 of 14
-
A context-sensitive security type system for Java
Kaiser, Benjamin (Rensselaer Polytechnic Institute, Troy, NY, 2015-05)This thesis presents the theoretical framework for A context-sensitive security type system for Java programs. The primary contribution is JSec, a two-stage protocol that prepares a program containing sensitive data to ... -
A hybrid approach to developing ontology-driven applications : a case study in describing radio spectrum usage policies
Xie, Owen (Rensselaer Polytechnic Institute, Troy, NY, 2021-05)As such, applications need a simple and stable API that abstracts much of the structure, but keeps the strengths of OWL in reasoning or clarity. To meet this need, we utilize a hybrid approach to integrating an ontology ... -
Advanced optimizations for large scale parallel discrete event simulations
LaPre, Justin M. (Rensselaer Polytechnic Institute, Troy, NY, 2015-12)This thesis has four specific contributions to parallel discrete-event simulation. First, we demonstrate the efficacy of ultra large-scale wireless networking simulations utilizing the OLSR protocol on HPC platforms. ... -
Automatic vectorization for multi-party computation
Sherman, Benjamin (Rensselaer Polytechnic Institute, Troy, NY, 2022-08)We introduce a new compiler for multi-party computation (MPC) which performs backend-independent optimizations over the MPC Source intermediate representation and outputs C++ code using the MOTION framework for MPC. We ... -
Broadening the applicability of software complexity metrics with biological analogues
Hathaway, Charles (Rensselaer Polytechnic Institute, Troy, NY, 2018-05)Software metrics represent an application of conventional computer science to itselfin an attempt to quantify the complexity of software systems. Many of the conventional metrics proposed in academia and industry find their ... -
Implementation of the transactor model : fault tolerant distributed computing using asynchronous local checkpointing
Kuang, Phillip (Rensselaer Polytechnic Institute, Troy, NY, 2014-08)The Transactor model, an extension to the Actor Model, is a well-formulated way to model distributed concurrent systems while maintaining a global distributed state. This model provides semantics to track dependencies among ... -
Middleware framework for distributed cloud storage
Hancock, Matthew B. (Rensselaer Polytechnic Institute, Troy, NY, 2015-05)The device people use to capture multimedia has changed over the years with the rise of smartphones. Smartphones are readily available, easy to use and capture multimedia with high quality. While consumers capture all of ... -
MLCryptoBox : cryptographic toolbox for distributed machine learning
Ishaq, Muhammad (Rensselaer Polytechnic Institute, Troy, NY, 2018-05)We propose a hybrid design using multiparty computation (MPC) to achieve both accuracy and speed. An ML application should compute only those primitives cryptographically securely which operate on sensitive input. Towards ... -
Obfuscation through the observer-effect : thinking outside the virtual black-box
Blackthorne, Jeremy Lee (Rensselaer Polytechnic Institute, Troy, NY, 2015-05)In this work, we initiate a theoretical study of obfuscation with regards to programs that interact with a user and an environment. We define the System-Interaction model to formally represent this additional dimension of ... -
Practical static analysis framework for inference of security-related program properties
Liu, Yin (Rensselaer Polytechnic Institute, Troy, NY, 2010-05) -
Program analysis for more efficient secure computation
Kennard, Lindsey (Rensselaer Polytechnic Institute, Troy, NY, 2020-12)The world of large scale secure computation has changed. Computational needs have far outpaced the ability of most modern companies to build and maintain their own datacenters. Cloud computation has picked up this slack ... -
Proving correctness of actor systems using FIFO communication
Dunn, Ian W. (Rensselaer Polytechnic Institute, Troy, NY, 2014-05)We are developing a hierarchy of theories to reason about actor systems, with the ability to reuse proofs formalized at an abstract level in reasoning about concrete actor programs. Several actor languages, e.g., the ABCL ... -
Real-time address leak detection on the DynamoRIO platform using dynamic taint analysis
Piazza, Toshi (Rensselaer Polytechnic Institute, Troy, NY, 2018-05)Address Space Layout Randomization, or ASLR, has long since served as one of the most effective deterrents to successful and, in particular, reliable exploits. However, a successful exploit may bypass ASLR by employing ... -
Transparently integrating debugging and dynamic binary instrumentation
Clark, Branden (Rensselaer Polytechnic Institute, Troy, NY, 2016-12)With dynamic binary instrumentation becoming increasingly popular we have seen the rise of many applications in analysis, debugging, and control. Dr. Memory, for example, aids in the debugging of memory errors by tracking ...