Welcome to SYSLAB! We do hands-on systems research on topics ranging from wireless ad-hoc networks to cloud computing to computer security.
Multi-Tenant Cloud Cache
Caches are the key to unlock high performance. But in a shared cache one user or application may inadvertently affect the cache performance of another. In collaboration with IBM Research, we investigate how memory caches in the cloud (such as Google's memcached service for accelerating web sites) should be fairly shared between multiple cloud tenants.
Wireless Ad-Hoc Connectivity
While today's wireless networks are effective and efficient, they must be managed by smart access points and rely on access to multiple wireless channels. The question of how one can effectively connect inexpensive wireless motes and sensors in a distributed “ad-hoc” network remains largely open. Building on pioneering work by RU's ALNET Group, we are devising and evaluating novel algorithms to connect dozens of wireless motes in a fully decentralized manner. We are also working on realistic decentralized methods to retain connectivity when the motes are mobile.
Our work is supported by a Grant of Excellence from the Iceland Research Center.
Secure In-Network Aggregation
Consider a large sensor network that are for instance measuring pollution or taking temperature readings to investigate global warming. What happens if someone tries to compromise this network? How much influence or bias would they be able to have? We have been investigating ways to secure in-networks aggregation protocols. At the core of our approach is a Trusted Sensor, which by using novel protocols allows one to guarantee the integrity of the data.
Efficient Multicast and Streaming Protocols
How can you get the identical data to a lot of recipients simultaneously? On the wide-area Internet, IP Multicast has failed to take off, forcing us to consider less efficient methods. We have devised protocols to address questions such as ”How can multicast within data centers be both stable and scalable?”, ”Can we meaningfully weave together diverse multicast protocols?” and ”What is the best way to transport a popular live video stream?”
In collaboration with researchers from around the world (e.g. at Cornell University, Technion, Peking University, etc.), we have produced systems such as Dr. Multicast, Quilt, Kevlar and recently GRADIENT.
Computer Security and Hacking
Computer security today is in dismay, begging the question of how it may be improved. We work on research projects with Syndis, an R&D focused start-up company in offensive security. While exploring how teachers could best help students understand security risks, we took the education a notch further: Teach students how hackers think and how vulnerabilities get exploited. Since 2011, the RU Hacking Contest has attracted scores of talented students to uncover the mysteries of program exploitation, as well as exceptional media attention. The event has garnered further popularity: in 2012, an exciting 30-minute hack-or-be-hacked showdown between 5 finalists took place on the largest stage in Iceland, Háskólabíó.