skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


This content will become publicly available on March 3, 2026

Title: MORF: A Post-Mortem
There has been increasing interest in data enclaves in recent years, both in education and other fields. Data enclaves make it possible to conduct analysis on large-scale and higher-risk data sets, while protecting the privacy of the individuals whose data is included in the data sets, thus mitigating risks around data disclosure. In this article, we provide a post-mortem on the MORF (MOoc Replication Framework) 2.1 infrastructure, a data enclave expected to sunset and be replaced in the upcoming years, reviewing the core factors that reduced its usefulness for the community. We discuss challenges to researchers in terms of usability, including challenges involving learning to use core technologies, working with data that cannot be directly viewed, debugging, and working with restricted outputs. Our post-mortem discusses possibilities for ways that future infrastructures could get past these challenges.  more » « less
Award ID(s):
1931419
PAR ID:
10648068
Author(s) / Creator(s):
 ;  
Publisher / Repository:
ACM
Date Published:
Page Range / eLocation ID:
797 to 802
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Localization is one form of cooperative spectrum sensing that lets multiple sensors work together to estimate the location of a target transmitter. However, the requisite exchange of spectrum measurements leads to exposure of the physical loca- tion of participating sensors. Furthermore, in some cases, a com- promised participant can reveal the sensitive characteristics of all participants. Accordingly, a lack of sufficient guarantees about data handling discourages such devices from working together. In this paper, we provide the missing data protections by processing spectrum measurements within attestable containers or enclaves. Enclaves provide runtime memory integrity and confidentiality using hardware extensions and have been used to secure various applications [1]–[8]. We use these enclave features as building blocks for new privacy-preserving particle filter protocols that minimize disruption of the spectrum sensing ecosystem. We then instantiate this enclave using ARM TrustZone and Intel SGX, and we show that enclave-based particle filter protocols incur minimal overhead (adding 16 milliseconds of processing to the measurement processing function when using SGX versus unprotected computation) and can be deployed on resource-constrained platforms that support TrustZone (incurring only a 1.01x increase in processing time when doubling particle count from 10,000 to 20,000), whereas cryptographically-based approaches suffer from multiple orders of magnitude higher costs. We effectively deploy enclaves in a distributed environment, dramatically improving current data handling techniques. To our best knowledge, this is the first work to demonstrate privacy-preserving localization in a multi-party environment with reasonable overhead. 
    more » « less
  2. Public transit systems are crucial to mobility and access in cities throughout the world. This article addresses the importance of these transit systems in San Antonio, Texas. We show how transit systems exacerbate race and class inequality and the accessibility of city spaces with a focus on San Antonio’s buses. Using mixed methods (surveys, interviews, ethnography, and document analysis) we illustrate that poor and working-class Latinx communities experience reduced access to resource rich areas of the city when they are dependent upon the city’s public transportation. To better describe this experience we use the concepts, enclaves of exclusion and enclaves of inaccessibility. Our findings show that mobility through San Antonio for poor and working class Latinxs is limited especially for people in these communities who rely on public transit. This experience with these public transit systems often renders them as individuals who do not belong in certain neighborhoods, and ultimately reinforces the longstanding histories of race and class segregation in San Antonio. 
    more » « less
  3. IntroductionBatrachochytrium salamandrivorans(Bsal) poses a major threat to global amphibian biodiversity. It is essential we understandBsaltransmission to develop better-informed management strategies. Infected carcasses are an important source of transmission for several human and wildlife disease systems; however, they have not been examined as sources forBsalexposure. Here, we evaluated whether infected newt carcasses could contribute toBsaltransmission dynamics. MethodsWe cohoused infected carcasses with susceptible newts in two cohousing chamber types (partitioned or non-partitioned) at three timepoints post-mortem ([0,24[, [24,48, [48,72] hrs). The partitioned chamber prevented newt-to-newt contact hence only allowed indirect, waterborne transmission of zoospores. We measured shedding rates of infected carcasses at each post-mortem timepoint and monitored infection status and mortality of susceptible newts which were exposed during cohousing events. ResultsOur results indicate carcasses are capable of transmittingBsalto susceptible newts up to at least 72 hrs post-mortem, even without live newts directly contacting carcasses. All susceptible newts in each chamber type and post-mortem period became infected and >90% experienced disease-induced mortality.Bsalgenomic copies/uL in skin swabs taken from infected carcasses were high, averaging 7.4x105, 8.6x105, and 2.0x106at 24, 48, and 72 hrs post-mortem, respectively. Water samples collected from cohousing chambers averaged 2743Bsalgenomic copies/uL (approximately 1357 zoospores) and did not decline over 72 hrs. DiscussionOur results indicateBsalinfection can occur rapidly between infected carcasses and susceptible aquatic salamanders via indirect and direct transmission pathways, and carcasses may prolong outbreaks by increasing the duration that infected individuals remain infectious. Carcass removal may be a strategy to reduceBsaltransmission and the impacts of outbreaks. 
    more » « less
  4. null (Ed.)
    Debugging big data analytics often requires a root cause analysis to pinpoint the precise culprit records in an input dataset responsible for incorrect or anomalous output. Existing debugging or data provenance approaches do not track fine-grained control and data flows in user-defined application code; thus, the returned culprit data is often too large for manual inspection and expensive post-mortem analysis is required. We design FlowDebug to identify a highly precise set of input records based on two key insights. First, FlowDebug precisely tracks control and data flow within user-defined functions to propagate taints at a fine-grained level by inserting custom data abstractions through automated source to source transformation. Second, it introduces a novel notion of influence-based provenance for many-to-one dependencies to prioritize which input records are more responsible than others by analyzing the semantics of a user-defined function used for aggregation. By design, our approach does not require any modification to the framework's runtime and can be applied to existing applications easily. FlowDebug significantly improves the precision of debugging results by up to 99.9 percentage points and avoids repetitive re-runs required for post-mortem analysis by a factor of 33 while incurring an instrumentation overhead of 0.4X - 6.1X on vanilla Spark. 
    more » « less
  5. null (Ed.)
    There is a growing need for post-mortem analysis in forensics investigations involving mobile devices, particularly when application-specific behaviors must be analyzed. This is especially true for architectures such as Android, where traditional kernel-level memory analysis frameworks such as Volatility face serious challenges recovering and providing context for user-space artifacts. In this research work, we developed an app-agnostic userland memory analysis technique that targets the new Android Runtime (ART). Leveraging its latest memory allocation algorithms, called region-based memory management, we develop a system called DroidScraper that recovers vital runtime data structures for applications by enumerating and reconstructing allocated objects from a process memory image. The result of our evaluation shows DroidScraper can recover and decode nearly 90% of all live objects in all allocated memory regions. 
    more » « less