Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Raymond W. Lo is active.

Publication


Featured researches published by Raymond W. Lo.


Computers & Security | 1995

Refereed paper: MCF: a malicious code filter

Raymond W. Lo; Karl N. Levitt; Ronald A. Olsson

The goal of this research is to develop a method to detect malicious code (e.g. computer viruses, worms, Trojan horses, and time/logic bombs) and security-related vulnerabilities in system programs. The Malicious Code Filter (MCF) is a programmable static analysis tool developed for this purpose. It allows the examination of a program before installation, thereby avoiding damage a malicious program might inflict. This paper summarizes our work over the last few years that led us to develop MCF.


IEEE Transactions on Knowledge and Data Engineering | 1992

A probabilistic limit on the virtual size of replicated disk systems

Raymond W. Lo; Norman S. Matloff

Recently, there has been considerable interest in parallel disk drive systems, in which full or partial replication of the stored data is used for both fault tolerance and enhanced performance. The performance-enhancement derives both from the ability to do parallel reads, and from the reduction of seek time which results from being able to assign a read to whichever drive will produce the shortest seek. Although earlier work implied that for a k-drive system, mean seek distance for read converges to 0 as k to alpha , a refined analysis is presented which shows that this limit is actually nonzero. It is further shown that the system behaves probabilistically as if k were small, no matter how large the physical value of k is. >


COMPCON Spring '91 Digest of Papers | 1991

Towards a testbed for malicious code detection

Raymond W. Lo; P. Kerchen; Richard H. Crawford; W. Wilson Ho; J. Crossley; George Fink; Karl N. Levitt; Ronald A. Olsson; Myla Archer

An environment for detecting many types of malicious code, including computer viruses, Trojan horses, and time/logic bombs, is proposed. The malicious code testbed (MCT) is based upon both static and dynamic analysis tools developed at the University of California, Davis, which have been shown to be effective against certain types of malicious code. The testbed extends the usefulness of these tools by using them in a complementary fashion to detect more general cases of malicious code. Perhaps more importantly, the MCT allows administrators and security analysts to check a program before installation, thereby avoiding any damage a malicious program might inflict.<<ETX>>


international conference on data engineering | 1990

A 'greedy' approach to the write problem in shadowed disk systems

Norman S. Matloff; Raymond W. Lo

There has been considerable interest in parallel disk drive systems, in which replication of the stored data is used for both fault tolerance and enhanced performance. It has been discovered that performance gains are limited by the fact that no matter how large the number of disk drives, the system still behaves probabilistically like a small system. These findings are summarized, and a greedy, that is, anticipatory, approach is proposed to deal with the problem. In this approach idle read/write heads are moved to positions which will minimize the expected seek time of the next disk access request. Substantial performance gains are found to accrue.<<ETX>>


Software Testing, Verification & Reliability | 1997

Validation of array accesses: integration of flow analysis and program verification techniques

Raymond W. Lo; Karl N. Levitt; Ronald A. Olsson

A program that accesses an out‐of‐bound array element can cause unexpected behaviour that is unacceptable to safety‐critical or security‐critical systems. Two traditional compile‐time approaches to array bound checking are flow analysis and program verification. This paper presents a new approach, IFV, that integrates flow analysis and program verification techniques. IFV is generally about as effective as program verification yet runs in about the same time as flow analysis. Its typical runtime is proportional to the product of the program size and the number of declared variables. IFV matches loops to templates, which represent commonly occurring loop patterns, to discover loop invariants automatically, which it then uses to strengthen flow analysis. With only seven templates, it handles many common array‐access patterns. Patterns not verified by flow analysis are processed with verification techniques entirely automatically. This paper also describes a prototype IFV system that performs compile‐time array bound checking for programs in a subset of C.


Archive | 2006

System and method for drm translation

Wei Yen; John Princen; Raymond W. Lo; Wilson Ho


Archive | 2000

Method and computer program product for precise feedback data generation and updating for compile-time optimizations

David L. Stephenson; Raymond W. Lo; Sun Chan; Wilson Ho; Chandrasekhar Murthy


Archive | 1990

Static Analysis Virus Detection Tools for UNIX Systems

P. Kerchen; Raymond W. Lo; John Newsome Crossley; G. Elkinbard; Ronald A. Olsson


Archive | 2007

Content management and method

Wei Yen; Pramila Srinivasan; John Princen; Raymond W. Lo; Wilson Ho


Archive | 2013

Cloud service for making social connections

John Princen; Raymond W. Lo

Collaboration


Dive into the Raymond W. Lo's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Karl N. Levitt

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

P. Kerchen

University of California

View shared research outputs
Top Co-Authors

Avatar

George Fink

University of California

View shared research outputs
Top Co-Authors

Avatar

J. Crossley

University of California

View shared research outputs
Top Co-Authors

Avatar

Myla Archer

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

W. Wilson Ho

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge