Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Abhrajit Ghosh is active.

Publication


Featured researches published by Abhrajit Ghosh.


international conference on cloud computing and services science | 2018

Runtime Attestation for IAAS Clouds.

Jesse Elwell; Angelo Sapello; Alexander Poylisher; Giovanni Di Crescenzo; Abhrajit Ghosh; Ayumu Kubota; Takashi Matsunaka

We present the RIC (Runtime Attestation for Iaas Clouds) system which uses timing-based attestation to verify the integrity of a running Xen Hypervisor as well as the guest virtual machines running on top of it. As part of the RIC system we present a novel attestation technique which includes not only the guest operating system’s static code and read-only data sections but also the guest OS’ dynamically loadable kernel modules. These attestations are conducted periodically at run-time to provide a stronger guarantee of correctness than that offered by load-time verification techniques. A system such as RIC can be used in cloud computing scenarios to verify the environment in which the cloud services ultimately run. Furthermore we offer a method to decrease the performance impact that this process has on the virtual machines that run the cloud services since these services often have very strict performance and availability requirements. This scheme effectively extends the root of trust on the cloud machines from the Xen hypervisor upward to include the guest OS that runs within each virtual machine. This work represents an important step towards secure cloud computing platforms which can help cloud providers offer new services that require higher levels of security than are possible in cloud data centers today.


european conference on parallel processing | 1999

Designing Multiprocessor/Distributed Real-Time Systems Using the ASSERTS Toolkit

Kanad Ghose; Sudhir Aggarwal; Abhrajit Ghosh; David A. Goldman; Peter Sulatycke; Pavel Vasek; David R. Vogel

We describe a real-time software engineering toolkit called ASSERTS that provides complementary analysis and simulation capabilities to assist the designer of multiprocessor/distributed real-time systems. ASSERTS allows users to describe the parameters of the hardware platform, interconnection and the kernel, the programming model (shared or distributed memory) and the task system for the purpose of simulation and analysis. The simulation component of ASSERTS is quite detailed and features a number of built-in simulation models for practical real-time schedulers, interconnections as well as models of resource access protocols (such as priority inheritance and priority ceiling protocol). Users can describe the behavior of the tasks at various levels of abstraction using a fairly small set of about 20 macroinstructions for the purpose of simulation.


Archive | 2011

COGNITIVE NETWORK LOAD PREDICTION METHOD AND APPARATUS

Akshay Vashist; Alexander Poylisher; Siun-Chuon Mau; Abhrajit Ghosh; Ritu Chadha


JoWUA | 2011

Detecting Anomalies in Active Insider Stepping Stone Attacks.

Giovanni Di Crescenzo; Abhrajit Ghosh; Abhinay Kampasi; Rajesh Talpade; Yin Zhang


Archive | 2016

REMOTE INTEGRITY VERIFICATION SYSTEM, METHOD AND PROGRAM

Matsunaka Takashi; Kubota Ayumi; Christopher Angelo Sapello; Abhrajit Ghosh; Alexander Poylisher; Jason Chiang


Archive | 2015

Milcom 2015 Track 3: Milcom 2015 Track 3 - Cyber Security and Trusted Computing

Roberto Pagliari; Yitzchak M. Gottlieb; Gregory Hadynski; Patrick D. McDaniel; Robert J. Walls; Ritu Chadha; Abhrajit Ghosh; Alexander Poylisher; Zhiyong Shan; Zhiyun Qian; Xiaotao Feng; Pengfei Hu; Derya Cansever; Scott E. Brown; Richard E. Harang


Archive | 2015

SYSTEM AND METHOD FOR PERFORMING REALTIME REPORTING OF ABNORMAL INTERNET PROTOCOL ATTACK

Yitzchak M. Gottlieb; Aditya Naidu; Abhrajit Ghosh; Sawatani Yukiko; Yamada Akira; Kubota Ayumi


Archive | 2013

Creating bgp route-based network traffic profiles

Ravichander Vaidyanathan; Abhrajit Ghosh; Akira Yamada; Yukiko Sawaya; Ayumu Kubota


Archive | 2013

Real-time reporting of anomalous internet protocol attacks

Yitzchak M. Gottlieb; Aditya Naidu; Abhrajit Ghosh; Akira Yamada; Yukiko Sawaya; Ayumu Kubota


Archive | 2012

Verfahren, vorrichtung und programm zur erkennung von falschem netzwerkverkehr

Ravichander Vaidyanathan; Abhrajit Ghosh; Aditya Naidu; Akira Yamada; Ayumu Kubota; Yukiko Sawaya; Yutaka Miyake

Collaboration


Dive into the Abhrajit Ghosh's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ritu Chadha

Telcordia Technologies

View shared research outputs
Researchain Logo
Decentralizing Knowledge