Neurosurgeon: collaborative intelligence between the cloud and the mobile edge

Neurosurgeon: collaborative intelligence between the cloud and mobile edge Kang et al., ASPLOS'17 For a whole class of new intelligent personal assistant applications that process images, videos, speech, and text using deep neural networks, the common wisdom is that you really need to run the processing in the cloud to take advantage of powerful clusters … Continue reading Neurosurgeon: collaborative intelligence between the cloud and the mobile edge

MaMaDroid: Detecting Android malware by building Markov chains of behavorial models

MaMaDroid: Detecting Android malware by building Markov chains of behavioral models, Mariconti et al., NDSS 2017 Pick any security conference of your choosing, and you're sure to find plenty of papers examining the security of Android. It can paint a pretty bleak picture, but at the same time the Android ecosystem also seems to have … Continue reading MaMaDroid: Detecting Android malware by building Markov chains of behavorial models

Diamond: Automating data management and storage for wide-area, reactive applications

Diamond: Automating data management and storage for wide-area, reactive applications Zhang et al., OSDI 2016 Diamond tackles the end-to-end problem of building reactive applications, defined here as those that update end-user visible state without requiring any explicit user action: … today’s popular applications are reactive: they provide users with the illusion of continuous synchronization across … Continue reading Diamond: Automating data management and storage for wide-area, reactive applications

Moving Fast with Software Verification

Moving Fast with Software Verification - Calcagno et al. 2015 This is a story of transporting ideas from recent theoretical research in reasoning about programs into the fast-moving engineering culture of Facebook. The context is that most of the authors landed at Facebook in September of 2013, when we brought the INFER static analyser with … Continue reading Moving Fast with Software Verification

Information-Flow Analysis of Android Applications in DroidSafe

Information-Flow Analysis of Android Applications in DroidSafe - Gordon et al. 2015 This is the first of three papers we'll be looking at this week from the NDSS'15 conference that took place earlier this month. DroidSafe is a tool that looks for potential leaks of sensitive information in Android applications. And it works incredibly well! … Continue reading Information-Flow Analysis of Android Applications in DroidSafe

SwiftCloud: Fault-tolerant geo-replication integrated all the way to the client

SwiftCloud: Fault-tolerant geo-replication integrated all the way to the client machine - Zawirski et al. 2013 Data is stored in the cloud, presentation is on mobile devices, and application processing is increasingly split between the two. As mobile devices get more and more capable, we would like to exploit more and more of that capability. … Continue reading SwiftCloud: Fault-tolerant geo-replication integrated all the way to the client