• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Electrical Engineering News and Products

Electronics Engineering Resources, Articles, Forums, Tear Down Videos and Technical Electronics How-To's

  • Products / Components
    • Analog ICs
    • Battery Power
    • Connectors
    • Microcontrollers
    • Power Electronics
    • Sensors
    • Test and Measurement
    • Wire / Cable
  • Applications
    • 5G
    • Automotive/Transportation
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Handbooks
    • EE Training Days
    • Tutorials
    • Learning Center
    • Tech Toolboxes
    • Webinars & Digital Events
  • Resources
    • White Papers
    • Educational Assets
    • Design Guide Library
    • Digital Issues
    • Engineering Diversity & Inclusion
    • LEAP Awards
    • Podcasts
    • DesignFast
  • Videos
    • EE Videos and Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Bill’s Blogs
  • Advertise
  • Subscribe

Computers get a better way to detect threats

September 21, 2012 By EurekAlert

UT Dallas computer scientists have developed a technique to automatically allow one computer in a virtual network to monitor another for intrusions, viruses or anything else that could cause a computer to malfunction.

The technique has been dubbed “space travel” because it sends computer data to a world outside its home, and bridges the gap between computer hardware and software systems.

“Space travel might change the daily practice for many services offered virtually for cloud providers and data centers today, and as this technology becomes more popular in a few years, for the user at home on their desktop,” said Dr. Zhiquian Lin, the research team’s leader and an assistant professor of computer science in the Erik Jonsson School of Engineering and Computer Science.

As cloud computing is becoming more popular, new techniques to protect the systems must be developed. Since this type of computing is Internet-based, skilled computer specialists can control the main part of the system virtually – using software to emulate hardware.

Lin and his team programmed space travel to use existing code to gather information in a computer’s memory and automatically transfer it to a secure virtual machine – one that is isolated and protected from outside interference.

“You have an exact copy of the operating system of the computer inside the secure virtual machine that a hacker can’t compromise,” Lin said. “Using this machine, then the user or antivirus software can understand what’s happening with the space traveled computer setting off red flags if there is any intrusion.

Previously, software developer had to manually write such tools.

“With our technique, the tools already being used on the computer become part of the defense process,” he said.

The gap between virtualized computer hardware and software operating on top of it was first characterized by Drs. Peter Chen and Brian Noble, faculty members from the University of Michigan.

“The ability to leverage existing code goes a long way in solving the gap problem inherent to many types of virtual machine services,” said Chen, Arthur F. Thurnau Professor of Electrical Engineering and Computer Science, who first proposed the gap in 2001. “Fu and Lin have developed an interesting way to take existing code from a trusted system and automatically use it to detect intrusions.”

Lin said the space travel technique will help the FBI understand what is happening inside a suspect’s computer even if they are physically miles away, instead of having to buy expensive software.

Space travel was presented at the most recent IEEE Symposium on Security and Privacy. Lin developed this with Yangchun Fu, a research assistant in computer science.

“This is the top conference in cybersecurity, said Bhavani Thuraisingham, executive director of the UT Dallas Cyber Security Research and Education Center and a Louis A. Beecherl Jr. Distinguished Professor in the Jonsson School. “It is a major breakthrough that virtual developers no longer need to write any code to bridge the gap by using the technology invented by Dr. Lin and Mr. Fu. This research has given us tremendous visibility among the cybersecurity research community around the world.”

You Might Also Like

Filed Under: Uncategorized

Primary Sidebar

EE Engineering Training Days

engineering

Featured Contributions

zonal architecture

Addressing zonal architecture challenges in the automotive industry

zonal architecture

Addressing zonal architecture challenges in the automotive industry

A2L refrigerants drive thermal drift concerns in HVAC systems

Why outdoor charging demands specialized battery connectors

How Li-ion batteries are powering the shift in off-highway equipment

More Featured Contributions

EE Tech Toolbox

“ee
Tech Toolbox: 5G Technology
This Tech Toolbox covers the basics of 5G technology plus a story about how engineers designed and built a prototype DSL router mostly from old cellphone parts. Download this first 5G/wired/wireless communications Tech Toolbox to learn more!

EE Learning Center

EE Learning Center
“ee
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.
“bills
contribute

R&D World Podcasts

R&D 100 Episode 10
See More >

Sponsored Content

Designing for Serviceability: The Role of Interconnects in HVAC Maintenance

From Control Boards to Comfort: How Signal Integrity Drives HVAC Innovation

Built to Withstand: Sealing and Thermal Protection in HVAC Sub-Systems

Revolutionizing Manufacturing with Smart Factories

Smarter HVAC Starts at the Sub-System Level

Empowering aerospace E/E design and innovation through Siemens Xcelerator and Capital in the Cloud

More Sponsored Content >>

RSS Current EDABoard.com discussions

  • Step Up Push Pull Transformer design / construction
  • Snooping Around is All
  • System for measuring the amount of Joules delivered from a capacitor discharge.
  • MoM capacitor at 36 GHz
  • How are such high-quality figures made for IEEE two-column papers? Font scaling + software advice?

RSS Current Electro-Tech-Online.com Discussions

  • More fun with ws2812 this time XC8 and CLC
  • I Wanna build a robot
  • Pickit 5
  • Pic18f25q10 osccon1 settings swordfish basic
  • The Analog Gods Hate Me
Search Millions of Parts from Thousands of Suppliers.

Search Now!
design fast globle

Footer

EE World Online

EE WORLD ONLINE NETWORK

  • 5G Technology World
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Engineer's Garage
  • EV Engineering
  • Microcontroller Tips
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

EE WORLD ONLINE

  • Subscribe to our newsletter
  • Teardown Videos
  • Advertise with us
  • Contact us
  • About Us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy