JOSÉ CARLOS BRUSTOLONI’S PUBLICATIONS

 

 

Books

 

  1. J. Oliveira, C. Westphall and J. Brustoloni (eds.). “Proceedings of the 8th Intl. Symposium on System and Information Security (SSI'2006),” ITA/IEEE, São José dos Campos, Brazil, Nov. 2006.
  2. José Carlos Brustoloni. “Principles of Embedded Security,” Pittsburgh Digital Greenhouse, March 2004.
  3. José Carlos Brustoloni. “Hands-On Embedded Security,” Pittsburgh Digital Greenhouse, April 2004.
  4. J. Brustoloni and A. Fumagalli (eds.) “Proceedings of the High-Speed Networks Symposium, Globecom 2002,” IEEE, Taipei, Taiwan, Nov. 2002.
  5. J. Brustoloni. Effects of Data Passing Semantics and Operating System Structure on Network I/O Performance, Ph.D. Dissertation, Technical Report CMU-CS-97-176, School of Computer Science, Carnegie Mellon University, September 1997.
  6. J. Brustoloni. Continuous Trajectory Control for an Industrial Robot. Master’s Dissertation, Escola Politécnica da Universidade de São Paulo, Brazil, May 1989 (in Portuguese).
  7. J. Brustoloni and Michael Oesterreicher. Multiplexed PID Controller for Mechanical Arm. Graduation Project, Instituto Tecnológico de Aeronáutica, Brazil, Dec. 1983 (in Portuguese).

 

Peer-Refereed Journal Papers and Book Chapters

 

1.      J. Brustoloni. Laboratory Experiments for Network Security Instruction, in Journal on Educational Resources in Computing, vol. 6, nr. 4, Association for Computing Machinery (ACM), Dec. 2006.

2.      Y. Wang, P. Ajoku, J. Brustoloni and B. Nnaji. Intellectual Property Protection in Collaborative Design through Lean Information Modeling and Sharing, in Journal of Computing and Information Science in Engineering, 6(2):149-159, American Society of Mechanical Engineers (ASME), June 2006.

3.      J. Brustoloni and J. Garay. MicroISPs: Providing Convenient and Low-Cost High-Bandwidth Internet Access, in Computer Networks, 33(1-6):789-802, Elsevier, June 2000. Also appears in Proceedings of the 9th International World Wide Web Conference (WWW'9), W3C, Amsterdam, Netherlands, May 2000, pp. 789-802 (AR: 20%).

4.      S. Blott, C. Martin, Y. Breitbart, J. Brustoloni, T. Gramaglia, H. Korth, D. Kristol, R. Liao, E. Scanlon and A. Silberschatz. User-Level Billing and Accounting in IP Networks, in Bell Labs Technical Journal, 4(4):237-251, Lucent Technologies, Oct.-Dec. 1999.

5.      J. Brustoloni and P. Steenkiste. "Application Program Interfaces", in Wiley Encyclopedia of Electrical and Electronics Engineering, John G. Webster (ed.), John Wiley & Sons, 1999.

6.      J. Brustoloni and P. Steenkiste. Effects of Buffering Semantics on I/O Performance, in Operating Systems Review, 30(Special Issue):277-291, ACM, 1996. Also appears in Proceedings of the Second Symposium on Operating Systems Design and Implementation (OSDI'96), USENIX, Seattle, WA, October 1996, pp. 277-291 (AR: 17%).

 

Peer-Refereed Conference Papers (known acceptance ratios denoted by [AR])

 

  1. R. Villamarín-Salomón and J. Brustoloni. “Bayesian Bot Detection Based on DNS Traffic Similarity,” to appear in Proceedings of 24th Annual Symposium on Applied Computing – Computer Security Track (SAC’2009), ACM, Honolulu, HI, Mar. 8-12, 2009 (AR: 17%).
  2. P. Djalaliev and J. Brustoloni. “Secure Web-Based Retrieval of Documents with Usage Controls,” to appear in Proceedings of 24th Annual Symposium on Applied Computing – Computer Security Track (SAC’2009), ACM, Honolulu, HI, Mar. 8-12, 2009 (AR: 17%).
  3. P. Djalaliev, M. Jamshed, N. Farnan and J. Brustoloni. Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks, in Proceedings of the 17th Intl. Conference on Computer Communications and Networks (ICCCN’08), IEEE, St. Thomas, US Virgin Islands, Aug. 2008 (AR: 26%).
  4. J. Brustoloni, R Villamarín-Salomón, P. Djalaliev and D. Kyle. Evaluating the Usability of Usage Controls in Electronic Collaboration, in Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS’2008), ACM, Pittsburgh, PA, July 2008 (AR: 27%).
  5. J. Brustoloni and D. Kyle. Updates and Asynchronous Communication in Trusted Computing Systems, in Proceedings of the 28th International Conference on Distributed Computer Systems (ICDCS’2008), IEEE, Beijing, June 17-20, 2008 (AR:16%).
  6. R. Villamarín-Salomón and J. Brustoloni. Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic, in Proceedings of the 5th Annual Consumer Communications and Networking Conference (CCNC’2008), IEEE, Las Vegas, NV, Jan. 2008.
  7. J. Brustoloni and R. Villamarín-Salomón. Improving Security Decisions with Polymorphic and Audited Dialogs, in Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS’2007), ACM, Pittsburgh, PA, pp. 76-87, July 2007 (AR: 32%).
  8. J. Brustoloni and S. Chen. Automatically Segregating Greedy and Malicious Internet Flows, in Proceedings of the International Conference on Communications (ICC’2007), IEEE, Glasgow, Scotland, June 24-28, 2007.
  9. J. Brustoloni, S. Khattab, C. Santamaria, B. Smyth and D. Mossé. Integrated Scheduling of Application- and Network-Layer Tasks in Delay-Tolerant MANETs, in Proceedings of the 49th Annual Global Telecommunications Conference (GLOBECOM’2006), IEEE, San Francisco, CA, Nov. 27-Dec. 1, 2006.
  10. S. Gobriel, S. Khattab, D. Mossé, J. Brustoloni and R. Melhem. RideSharing: Fault-Tolerant Aggregation in Sensor Networks with Corrective Actions, in Proceedings of 3rd Annual Conference on Sensor, Mesh and Ad Hoc Communications and Networks  (SECON’2006) , IEEE, Reston, VA, Sept. 25-28, 2006 (AR:26%).
  11. H. Xia and J. Brustoloni. Secure and Flexible Support for Visitors in Enterprise Wi-Fi Networks, in Proceedings of GLOBECOM’2005, IEEE, St. Louis, MO, Nov. 2005.
  12. J. Brustoloni. Automatic VPN Client Recovery from IPsec Pass-through Failures, in Proceedings of the 30th Annual Conference on Local Computer Networks (LCN’2005), WoNS, IEEE, Sydney, Australia, pp. 756-763, Nov. 2005.
  13. H. Xia, J. Kanchana and J. Brustoloni. Enforcement of Security Policy Compliance in Virtual Private Networks, in Proceedings of the 7th International Symposium on System and Information Security (SSI'2005), ITA, São José dos Campos, Brazil, Nov. 2005 (AR:34%).
  14. H. Xia and J. Brustoloni. Hardening Web Browsers Against Man-in-the-Middle and Eavesdropping Attacks, in Proceedings of the 14th World Wide Web Conference (WWW’2005), W3C/ACM, Chiba, Japan, pp. 489-497, May 2005 (AR: 14%).
  15. H. Xia, J. Kanchana and J. Brustoloni. Using Secure Coprocessors to Protect Access to Enterprise Networks, in Proceedings of the Networking’2005 Conference, IFIP, Waterloo, ON, Canada, Lecture Notes in Computer Science, 3462:154-165, Springer-Verlag, May 2005 (AR: 25%).
  16. H. Xia and J. Brustoloni. Virtual Prepaid Tokens for Wi-Fi Hotspot Access, in Proceedings of the 29th Annual Conference on Local Computer Networks (LCN’2004), IEEE, Tampa, FL, pp. 232-239, Nov. 2004 (AR: 30%).
  17. H. Xia and J. Brustoloni. Detecting and Blocking Unauthorized Access in Wi-Fi Networks, in Proceedings of the Networking'2004 Conference, IFIP, Athens, Greece, Lecture Notes in Computer Science, 3042:795-806, Springer-Verlag, May 2004 (AR:19%).
  18. J. Brustoloni. Protecting Electronic Commerce from Distributed Denial-of-Service Attacks, in Proceedings of the 11th International World Wide Web Conference (WWW2002), ACM, Honolulu, HI, May 2002, pp. 553-561 (AR:16%).
  19. J. Brustoloni, E. Gabber, A. Silberschatz and A. Singh. Signaled Receiver Processing, in Proceedings of the 2000 USENIX Annual Technical Conference, USENIX, San Diego, CA, June 2000, pp. 211-223 (AR:29%).
  20. J. Brustoloni and J. Garay. Application-Independent End-to-End Security in Shared-Link Access Networks, in Proceedings of the Networking'2000 Conference, IFIP, Paris, France, Lecture Notes in Computer Science, 1815:608-619, Springer-Verlag, May 2000 (AR:39%).
  21. S. Blott, J. Brustoloni and C. Martin. NetTap: An Efficient and Reliable PC-Based Platform for Network Programming, in Proceedings of the Third Conference on Open Architectures and Network Programming (OPENARCH'2000), IEEE, Tel Aviv, Israel, Mar. 2000, pp. 13-22 (AR:31%).
  22. J. Bruno, J. Brustoloni, E. Gabber, B. Özden and A. Silberschatz.Retrofitting Quality of Service into a Time-Sharing Operating System, in Proceedings of the 1999 USENIX Annual Technical Conference, USENIX, Monterey, CA, June 1999, pp. 15-26 (AR:36%).
  23. E. Gabber, C. Small, J. Bruno, J. Brustoloni and A. Silberschatz. The Pebble Component-Based Operating System, in Proceedings of the 1999 USENIX Annual Technical Conference, USENIX, Monterey, CA, June 1999, pp. 267-281 (AR:36%).
  24. J. Bruno, J. Brustoloni, E. Gabber, B. Özden and A. Silberschatz. Disk Scheduling with Quality of Service Guarantees, in Proceedings of the IEEE International Conference on Multimedia Computing and Systems (ICMCS'99), IEEE, Florence, Italy, June 1999, vol. II.
  25. J. Brustoloni. Interoperation of Copy Avoidance in Network and File I/O, in Proceedings of the INFOCOM'99 Conference, IEEE, New York, NY, March 1999, pp. 534-542 (AR:31%).
  26. J. Brustoloni and P. Steenkiste. User-Level Protocol Servers with Kernel-Level Performance, in Proceedings of the INFOCOM'98 Conference, IEEE, San Francisco, CA, March 1998, pp. 463-471 (AR:22%).
  27. J. Brustoloni and P. Steenkiste. Copy Emulation in Checksummed, Multiple-Packet Communication, in Proceedings of the INFOCOM'97 Conference, IEEE, Kobe, Japan, April 1997, pp. 1124-1132 (AR:32%).
  28. J. Brustoloni. Exposed Buffering and Sub-Datagram Flow Control for ATM LANs, in Proceedings of the 19th Conference on Local Computer Networks, IEEE, Minneapolis, MN, October 1994, pp. 324-334.

 

Peer-Refereed Workshop Papers

 

1.      D. Kyle and J. Brustoloni. UCLinux: A Linux Security Module for Trusted-Computing-based Usage Controls Enforcement, in Proceedings of the 2nd Workshop on Scalable Trusted Computing (STC’07), ACM, Alexandria, VA, Nov. 2007 (AR: 13% for full papers).

2.      K. Magoutis, J. Brustoloni, E. Gabber, W.T. Ng and Avi Silberschatz. Building Appliances out of Components using Pebble, in Proceedings of the 9th SIGOPS European Workshop, ACM, Kolding, Denmark, September 2000, pp. 211-216.

3.      J. Brustoloni, E. Gabber, A. Silberschatz and A. Singh. Quality of Service Support for Legacy Applications, in Proceedings of the 9th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV'99), Basking Ridge, NJ, June 1999, pp. 3-11.

4.      J. Bruno, J. Brustoloni, E. Gabber, A. Silberschatz and C. Small. Pebble: A Component-Based Operating System for Embedded Applications, in Proceedings of the Workshop on Embedded Systems, USENIX, Cambridge, MA, March 1999.

5.      J. Brustoloni and P. Steenkiste. Evaluation of Data Passing and Scheduling Avoidance, in Proceedings of the 7th International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV'97), IEEE, St. Louis, MO, May 1997, pp. 101-111 (AR:31%).

 

Peer-Refereed Extended Abstracts

 

1.      R. Villamarín-Salomón, J. Brustoloni, M. DeSantis and A. Brooks. Improving User Decisions about Opening Potentially Dangerous Attachments in Email Clients, SOUPS’2006, Carnegie Mellon University/CyLab, July 12, 2006.

2.      D. Mossé, L. Comfort, A. Amer, J. Brustoloni, P. Chrysanthis, M. Hauskrecht, A. Labrinidis, R. Melhem, and K. Pruhs Secure-CITI Critical Information-Technology Infrastructure, in Proceedings of 2006 International Conference on Digital Government Research (dg.o'06), ACM, San Diego, CA, May 2006.

3.      H. Xia and J. Brustoloni. Improving the Usability of Web Browser Security, SOUPS’2005, Carnegie Mellon University/CyLab, July 7, 2005.

4.      J. Brustoloni and P. Steenkiste. Scaling of end-to-end latency with network transmission rate, Gigabit Networking Workshop (GBN'97), IEEE, Kobe, Japan, April 1997.

 

Internet Drafts

 

  1. J. Brustoloni. VPN Masquerade Assist (VMA): An End-to-End Mechanism for Robust NAT Interoperation with IPSec's IKE and ESP Tunnel Mode, Internet Draft submitted to IETF, July 2000.

 

Selected Technical Memoranda

 

1.      J. Brustoloni and P. Steenkiste. Application-Allocated I/O Buffering with System-Allocated Performance, Technical Report CMU-CS-96-169, School of Computer Science, Carnegie Mellon University, August 1996. (Extended version of the OSDI'96 paper, "Effects of Buffering Semantics on I/O Performance.")

2.      J. Brustoloni and B. Bershad. Simple Protocol Processing for High-Bandwidth Low-Latency Networking, Technical Report CMU-CS-93-132, School of Computer Science, Carnegie Mellon University, March 1993.

3.      J. Brustoloni. Autonomous Agents: Characterization and Requirements, Technical Report CMU-CS-91-204, School of Computer Science, Carnegie Mellon University, November 1991. (Work performed for minor in AI.)

 

Patents

  1. J. Brustoloni. “Method and Apparatus for Protecting Electronic Commerce from Distributed Denial of Service Attacks.” U.S. Patent 7,299,297, filed June 2002, issued Nov, 2007.
  2. S. Blott, J. Brustoloni and C. Martin. “Application Programming Interface for Network Applications”, U.S. Patent 7,219,157, filed March, 2001, issued May, 2007.
  3. J. Brustoloni. “Method and Apparatus for Protecting Web Sites from Distributed Denial of Service Attacks,” U.S. Patent 7,207,062, filed June 2002, issued April, 2007.
  4. J. Brustoloni. “Method and Apparatus for Robust NAT Interoperation with IPsec’s IKE and ESP Tunnel Mode.” U.S. Patent 7,155,740, filed July 2001, issued Dec., 2006.
  5. J. Brustoloni and J. Garay. “Method and Apparatus for Application-Independent End-to-End Security in Shared-Link Access Networks.” U.S. Patent 6,963,982, filed Oct. 2000, issued Nov., 2005.
  6. J. Brustoloni. “Method and Apparatus for Protecting Internet-Connected Sites from Distributed Denial of Service Attacks.” European Patent EP 1284573 B1, filed Aug. 2002, granted Oct. 2005.
  7.  J. Brustoloni and J. Garay. “Method and Apparatus for Extending Network Address Translation for Unsupported Applications.” U.S. Patent 6,886,103, filed Oct. 2000, issued April, 2005.
  8. J. Brustoloni. “Method and Apparatus for Protecting Electronic Commerce from Distributed Denial of Service Attacks.” European Patent EP 1284558 B1, filed Aug. 2002, granted Oct. 2004.
  9. J. Bruno, J. Brustoloni, E. Gabber, B. Özden and A. Silberschatz. Methods and Apparatus for Ensuring Quality of Service in an Operating System.” U.S. Patent 6,725,456, filed Nov. 1999, issued April, 2004.
  10. J. Bruno, J. Brustoloni, E. Gabber, B. Özden, A. Silberschatz and A. Singh. Methods and Apparatus for Providing Quality of Service Guarantees for Legacy Applications.” U.S. Patent 6,675,229, filed Nov. 1999, issued Jan., 2004.
  11.  J. Brustoloni, E. Gabber and A. Silberschatz. “Signaled Receiver Processing Methods and Apparatus for Improved Protocol Processing.” U.S. Patent 6,625,149, filed Nov. 1999, issued Sept., 2003.
  12. J. Bruno, J. Brustoloni, E. Gabber, A. Silberschatz and C. Small. “Operating System Transfer of Control and Parameter Manipulation Using Portals.” U.S. Patent 6,604,123, filed May 1999, issued Aug., 2003.
  13. J. Bruno, J. Brustoloni, E. Gabber, B. Özden and A. Silberschatz. Method and System for Providing Computer Storage Access with Quality of Service Guarantees.” U.S. Patent 6,434,631, filed Oct. 1999, issued Aug., 2002.

 

Patents Pending

 

1.      J. Brustoloni. “Method and Apparatus for Incrementally Deploying Ingress Filtering on the Internet.” U.S. Patent Application 20030236999, filed June 2002.