FM Backscatter: Enabling connected cities and smart fabrics Wang et al., NSDI'17 If we want to connect all the things, then we need a means of sending and/or receiving information at each thing. These transmissions require power, and no-one wants to have to plug in chargers or keep swapping batteries for endless everyday objects. So … Continue reading FM Backscatter: Enabling connected cities and smart fabrics
Month: April 2017
ViewMap: Sharing private in-vehicle dashcam videos
ViewMap: Sharing private in-vehicle dashcam videos Kim et al., NSDI'17 In the world of sensor-laden connected cars that we're rushing towards, ViewMap addresses an interesting question: how can we use the information collected by those cars for common good, without significant invasion of privacy? It raises deeper questions too about the limits of state surveillance … Continue reading ViewMap: Sharing private in-vehicle dashcam videos
Improving user perceived page load time using gaze
Improving user perceived page load time using gaze Kelton, Ryoo, et al., NSDI 2017 I feel like I'm stretching things a little bit including this paper in an IoT flavoured week, but it does use at least bridge from the physical world to the virtual, if only via a webcam. What's really interesting here to … Continue reading Improving user perceived page load time using gaze
FarmBeats: An IoT platform for data-driven agriculture
FarmBeats: An IoT platform for data-driven agriculture Vasisht et al., NSDI '17 Today we have another pragmatic, low cost, IoT system case study. And it's addressing a problem almost as important as cricket: how can we help to meet the burgeoning demand for food across the globe by increasing farm productivity? [Just in case British … Continue reading FarmBeats: An IoT platform for data-driven agriculture
Bringing IoT to sports analytics
Bringing IoT to sports analytics Gowda et al., NSDI 17 Welcome back to the summer term of #themorningpaper! To kick things off, we'll be looking at a selection of papers from last month's NSDI'17 conference. We haven't looked at an IoT paper for a while, and this one happens to be about cricket - how … Continue reading Bringing IoT to sports analytics
End of term, and thank you to the ACM
We've reached the end of term again, and The Morning Paper will be taking a two week break to recharge my batteries and my paper backlog! We covered a lot of ground over the last few months, and I've selected a few highlighted papers/posts at the end of this piece to tide you over until … Continue reading End of term, and thank you to the ACM
SGXIO: Generic trusted I/O path for Intel SGX
SGXIO: Generic trusted I/O path for Intel SGX Weiser & Werner, CODASPY '17 Intel's SGX provides hardware-secured enclaves for trusted execution of applications in an untrusted environment. Previously we've looked at Haven, which uses SGX in the context of cloud infrastructure, SCONE which shows how to run docker containers under SGX, and Panoply which looks at … Continue reading SGXIO: Generic trusted I/O path for Intel SGX
Detecting ROP with statistical learning of program characteristics
Detecting ROP with statistical learning of program characteristics Elsabagh et al., CODASPY '17 Return-oriented programming (ROP) attacks work by finding short instruction sequences in a process' executable memory (called gadgets) and chaining them together to achieve some goal of the attacker. For a quick introduction to ROP, see "The geometry of innocent flesh on the … Continue reading Detecting ROP with statistical learning of program characteristics
The curious case of the PDF converter that likes Mozart
The curious case of the PDF converter that likes Mozart: dissecting and mitigating the privacy risk of personal cloud apps Harkous et al., PoPET '16 This is the paper that preceded "If you can't beat them, join them" we looked at yesterday, and well worth interrupting our coverage of CODASPY '17 for. Harkous et al., … Continue reading The curious case of the PDF converter that likes Mozart
If you can’t beat them, join them: a usability approach to interdependent privacy in cloud apps
If you can't beat them, join them: a usability approach to interdependent privacy in cloud apps Harkous & Aberer, CODASPY '17 I'm quite used to thinking carefully about permissions before installing a Chrome browser extensions (they all seem to want permission to see absolutely everything - no thank you!). A similar issue comes up with … Continue reading If you can’t beat them, join them: a usability approach to interdependent privacy in cloud apps