The Systems Software Research Group is breaking new ground in research on Data-Intensive Computing, Operating Systems; Mobile Computing Group Management, Reputation, Tagging, and Games; Security and Cell Phones, Root Kits, Hypervisors, SCADA Systems; Location Awareness; and 3-D Immersive Technology.
Welcome! Our work in distributed systems spans multiple core areas. From cloud operating systems and software defined architectures to dynamic mobile computing – we have people working on it.
We are evaluating and comparing different architectures from popular Scheduling frameworks in Cloud Computing including Apache Mesos and Hadoop YARN. We are also analyzing workload observed by Schedulers working on clusters with tens of thousands of machines.
At it’s core, any distributed system is built upon years of research in operating systems. From schedulers to memory management and network control, this is where it started. We are interested in learning from traditional operating systems to bring these concepts to cloud platforms to make distributed applications more modular, resilient, and scalable.
Mobile computing has changed the way we interact with one another, the way we work, and how we consume media. Mobile computing has innovated the entire landscape of smart devices – IoT devices can rely on the computational power of mobile devices, enabling a whole new set of technologies. This form of ubiquitous computing allows for unique innovations when combined with our cloud computing research.
The internet of things (IoT). Thermometers, door locks, yes, even refrigerators. While this has been the first way of what is becoming pervasive computing, we believe there is more. How can we make lives more seamless? Pervasive computing, enabled by mobiles and IoT devices, will allow us to make the “User Experience” (UX) of life as seamless as possible.
Our group is working on the emerging topic of software-defined network. We are investigating in what ways this new paradigm of network deployment and control can impact the security, policy enforcement, performance, and operation of modern networks and the applications that use them.
Data analytics is driving innovation and improving the decision making process across industries. Making this as seamless as possible is one of our main goals. Data growth makes Moore’s law look paltry – we’re here to make sure tomorrow’s systems can continue to drive insight in the face of such growth.
Genomics plays a role in nine of the 10 leading causes of death in the United States. For people who are at increased risk for hereditary breast and ovarian cancer, or hereditary colorectal cancer, genetic testing may reduce illness risks by guiding evidence-based interventions. Such interventions involve the emergent practice of precision medicine that uses an individual’s genetic profile to guide decisions made in regard to the prevention, diagnosis, and treatment of disease.
The goal is to design a programmable software-defined architecture that gets feedback from applications and network to provide better application performance and improved network management.
The research in this field is focused on studying the security and consistency issues during SDN deployment along with exploring its potential in a cloud environment.
Our group focuses on security vulnerabilities in multiple real-world situations. This ranges in the form of evaluating the power grid to presenting education curriculum to students near and far. Our goal is to not only contribute to the security research community but also create better security researchers for the future.
Digital Forensics Education Initiative
As information technology has become pervasive, instances of digital crime and the need to use digital evidence in investigations have grown significantly. Digital forensics is now a major part of many criminal investigations; its tools are frequently used by local, state, and federal law enforcement agencies. Illinois educators are developing a standard undergraduate curriculum, which will focus on evidence collection, evidence preservation, evidence presentation, and forensic preparation.
Assessment and Forensics for Large-Scale Smart Networks
The infrastructure that supports the power grid is vulnerable to attack by intruders who could potentially take control of certain points and cause great damage to systems. The SCADA systems and other components in the smart grid are complex, and many systems rely on information from other sources. If machines such as those in SCADA are compromised, we want to know as much about the attacks as possible, and understand what the effects will be on the power grid.
Reasoning About Digital Evidence
The goal is to determine the best possible methods to draw conclusions from digital evidence. This can be accomplished through various statistical methods however, reasoning requires previous knowledge of possible information created by the device. In order to determine this, a framework is being developed in order to enhance the reasoning about evidence.
Cloud Computing Security
Cloud computing has become pervasive in industry however, its security implications are not well known. Our research group approach cloud computing security implications through multiple paths: hypervisor-based intrusion detection, virtual machine introspection, and leveraging legacy security applications in software-defined networks.