skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Telescoping Filter: A Practical Adaptive Filter
Award ID(s):
2103813 1947789
PAR ID:
10318091
Author(s) / Creator(s):
; ; ;
Editor(s):
Mutzel, Petra; Pagh, Rasmus; Herman, Grzegorz
Date Published:
Journal Name:
Leibniz international proceedings in informatics
Volume:
204
ISSN:
1868-8969
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. null (Ed.)
    A microstrip bandstop filter (BSF) based on an optimum BSF is presented. The original BSF has three open stubs. One narrow stub is attached onto the left open stub, and the length of the right open stub is reduced to form the new BSF. The filter is simulated on Sonnet Lite software. Simulation results show the new filter generates a wider stopband without increasing the circuit size. 
    more » « less
  2. We demonstrate efficient filtering of coherent light from a broad spectral background. A Michelson interferometer is used to effectively filter out the coherent emission of mid-infrared lasers from the co-propagating incoherent emission of a broadband thermal source. We show coherent light suppression as high as 16.9 dB without any modification of the broadband incoherent background spectrum. In addition, we demonstrate the ability to measure the spatially dependent (incoherent) thermal emission from a patterned surface, using our filter to remove a coherent signal which would otherwise overload our detection system. The demonstrated filter is rapidly tunable and wavelength-flexible, and has potential for imaging and spectroscopy applications in the presence of an otherwise overpowering coherent signal. 
    more » « less
  3. null (Ed.)
    Modern visual data exploration systems are designed as client-server applications where the front-end interface generates a large number of queries to the back-end which are handled by a database server. As data exploration being a trial and error process, a significant amount of these queries return an empty result, which does not change the state of the visualization. These requests still add a significant overhead on network communication, request handling, and data processing. Moreover, given the virtually unlimited query space, it is impractical to enumerate and send all empty (or all non-empty) queries to the client to filter them. This paper introduces HQ-Filter, a hierarchy-aware filter for empty resulting queries, which utilizes the hierarchical nature of the data to construct a configurable and probabilistic filter. HQ-Filter can filter out empty-resulting queries at the client-side with a minimal size and processing overhead. HQ-Filter is applied to two existing data exploration systems for geospatial data, UCR-Star and Cloudberry. In both cases, it can successfully eliminate hundreds of queries per user which results in up-to 66% increase in server capacity by providing up to 15x speedup for average response time and up to 90% decrease in the server workload. 
    more » « less
  4. The OS kernel is at the forefront of a system's security. Therefore, its own security is crucial for the correctness and integrity of user applications. With a plethora of bugs continuously discovered in OS kernel code, defenses and mitigations are essential for practical kernel security. One important defense strategy is to isolate user-controlled memory from kernel-accessible memory, in order to mitigate attacks like ret2usr and ret2dir. We present EPF (Evil Packet Filter): a new method for bypassing various (both deployed and proposed) kernel isolation techniques by abusing the BPF infrastructure of the Linux kernel: i.e., by leveraging BPF code, provided by unprivileged users/programs, as attack payloads. We demonstrate two different EPF instances, namely BPF-Reuse and BPF-ROP, which utilize malicious BPF payloads to mount privilege escalation attacks in both 32- and 64-bit x86 platforms. We also present the design, implementation, and evaluation of a set of defenses to enforce the isolation between BPF instructions and benign kernel data, and the integrity of BPF program execution, effectively providing protection against EPF-based attacks. Our implemented defenses show minimal overhead (<3%) in BPF-heavy tasks. 
    more » « less