14,198 Hits in 5.6 sec

Guest editor's preface

Steve Schneider
2003 Journal of Computer Security  
They formulate the security properties required of such protocols, and identify different ways in which properties in the twoparty setting might extend to the multi-party situation.  ...  The objective of the workshop is to bring together researchers interested in the foundations of computer security to discuss and explore issues in access-control, cryptographic protocols, database security  ...  In "A unifying approach to the security of distributed and multi-threaded programs", Mantel and Sabelfeld are concerned with the problem of establishing secure information flow in the context of multi-threaded  ... 
doi:10.3233/jcs-2003-11401 fatcat:dh2horqk6ffmjlktuelkl5rjqy

Bunshin: Compositing Security Mechanisms through Diversification (with Appendix) [article]

Meng Xu, Kangjie Lu, Taesoo Kim, Wenke Lee
2017 arXiv   pre-print
We also present an N-version execution engine to seamlessly synchronize these variants so that all distributed security checks work together to guarantee the security of a target program.  ...  A number of security mechanisms have been proposed to harden programs written in unsafe languages, each of which mitigates a specific type of memory error.  ...  If the primitive may cause the thread to sleep study – combining ASan, MSan, and UBSan – to show (such as a mutex), the thread wakes up its next sibling in that B UNSHIN is capable of unifying  ... 
arXiv:1705.09165v2 fatcat:xcefkb7px5d3hf3fwmjn6s3deu

Task & Resource Self-adaptive Embedded Real-time Operating System Microkernel for Wireless Sensor Nodes [article]

Kexing Xing, Decheng Zuo, Haiying Zhou, Hou Kun-Mean
2014 arXiv   pre-print
In addition, this kernel implements a run-time over-the-air updating mechanism and provides a security policy to avoid the attacks and ensure the reliable operation of nodes.  ...  This paper presents a task and resource self-adaptive embedded real-time microkernel, which proposes hybrid programming model and offers a two-level scheduling strategy to support real-time multi-task  ...  The kernel provides a security policy for sensor nodes, in order to guarantee the normal operation of the nodes and support reliable and efficient code distribution.  ... 
arXiv:1403.5010v1 fatcat:tisus5lh7jdujfh5j4vkifypxq

Practical Fine-grained Privilege Separation in Multithreaded Applications [article]

Jun Wang, Xi Xiong, Peng Liu
2013 arXiv   pre-print
It remains challenging to retrofit the classic multithreaded programming model so that the security and privilege separation in multi-principal applications can be resolved.  ...  An inherent security limitation with the classic multithreaded programming model is that all the threads share the same address space and, therefore, are implicitly assumed to be mutually trusted.  ...  Conclusion Arbiter is a run-time system and a set of security primitives which can realize fine-grained and data-centric privilege separation for multi-principal multithreaded applications.  ... 
arXiv:1305.2553v1 fatcat:aqerh3nbe5dqhkdmnqavxml4zu

Towards logic programming based coordination in virtual worlds [chapter]

Paul Tarau, Veronica Dahl, Koen De Bosschere
1998 Lecture Notes in Computer Science  
We propose a unified framework for coordination in multi-user Virtual Worlds, based on our experience with LogiMOO, a BinProlog+Linda based programmable shared Virtual World.  ...  Our experiments with agent coding in LogiMOO and Java and interaction with external visual and logic components, show the practicality of our constructs for real life programming.  ...  Special thanks go to Daniel Perron for long discussions helping to come out with the initial idea of Logi-MOO and to Stephen Rochefort for his comments on the design and his help on implementing LogiMOO's  ... 
doi:10.1007/bfb0027099 fatcat:ohcoxtr2affnflyljgsugncfci

The Secure Machine: Efficient Secure Execution On Untrusted Platforms [article]

Ofir Shwartz, Yitzhak Birk
2018 arXiv   pre-print
SeM supports existing binaries of single- and multi-threaded applications running on single- or multi-core, multi-CPU.  ...  SeM provides confidentiality and integrity for a secure program without trusting the platform software or any off-chip hardware.  ...  Secure Process and Thread Migration Migration is the core of distributed multi-threading.  ... 
arXiv:1803.03951v1 fatcat:judqg442wvekdbevambchu3o6i

Scala Actors: Unifying thread-based and event-based programming

Philipp Haller, Martin Odersky
2009 Theoretical Computer Science  
In Section 3 we present an extension to our programming model that allows us to unify thread-based and event-based models of concurrency under a single abstraction of actors.  ...  In this paper we show how thread-based and event-based programming can be unified under a single actor abstraction.  ...  In the process, we review event-and thread-based solutions to common problems, such as blocking I/O operations. Our goal is then to discuss potential benefits of our unified approach.  ... 
doi:10.1016/j.tcs.2008.09.019 fatcat:spi72d6j2ja77bz54jxjqxbaoe

Software Development for Parallel and Multi-Core Processing [chapter]

Kenn R.
2012 Embedded Systems - High Performance Systems, Applications and Projects  
Also, with multiple cores on a single chip the data latencies of distributed programming are mostly negated.  ...  The directives extend the sequential C/C++ programming languages with parallel constructs. 22  Parallel Unified C, also known as Unified Parallel C, is an extension of the C programming language designed  ...  For wide-ranging embedded systems to continue their growth, a number of high-quality fundamental and applied researches are indispensable.  ... 
doi:10.5772/38261 fatcat:3zwgizqp3vgqfa2hn6gyxmuw44

On the Fly Porn Video Blocking Using Distributed Multi-Gpu and Data Mining Approach

Urvesh Devani, Valmik B. Nikam, Meshram B.B
2014 International Journal of Distributed and Parallel systems  
The video is processed on parallel and distributed platform in shortest time and decision about filtering the video is taken in real time. Track record of blocked content and websites is cached, too.  ...  In this paper, we propose a model where user is allowed to start watching any video; at the backend porn detection process using extracted video and image features shall run on distributed nodes with multiple  ...  The focus of our work is to do adult content detection and prepare a model for implementing that on distributed multi GPU System.  ... 
doi:10.5121/ijdps.2014.5401 fatcat:x6v6q3o5sfchjd2ld37cr4juhi

High Throughput Parallelization of AES-CTR Algorithm

Nhat-Phuong TRAN, Myungho LEE, Sugwon HONG, Seung-Jae LEE
2013 IEICE transactions on information and systems  
Data encryption and decryption are common operations in network-based application programs that must offer security.  ...  In this paper, we propose a new parallelization approach to improve the throughput performance for the de-facto standard data encryption and decryption algorithm, AES-CTR (Counter mode of AES).  ...  In the new approach, the cost for distributing blocks to each core and the number of procedure calls for the encryption and the synchronizations at the end decreases by a factor of E compared with the  ... 
doi:10.1587/transinf.e96.d.1685 fatcat:f4wtxwec6vaqljtrybq4zya7cm

Effective Utilization of Multicore Processor for Unified Threat Management Functions

2012 Journal of Computer Science  
Problem statement: Multicore and multithreaded CPUs have become the new approach for increase in the performance of the processor based systems.  ...  Results: Execution time for some of the UTM functions implemented was analyzed to arrive at an effective allocation and parallelization methodology that is dependent on the hardware and the workload.  ...  ACKNOWLEDGMENTS The researchers acknowledge TIFAC-CORE in Network Engineering (established under the Mission REACH program of Department of Science and Technology, Govt. of India) for providing necessary  ... 
doi:10.3844/jcssp.2012.68.75 fatcat:rwkd7y2gmfcshc5j42sr3lxqfq


Xavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham
2014 Proceedings of the 7th International Conference on Security of Information and Networks - SIN '14  
The constant increase of link speeds, threats and users, produce large volumes of log data and become increasingly difficult to analyse on a Central Processing Unit (CPU).  ...  The results show throughput of 20Gbps and demonstrate that modern GPUs can be utilised to increase the operational speed of large scale log processing scenarios, saving precious time before and after an  ...  Acknowledgment The authors would like to thank Agilent Technologies for their insightful comments and feedback as well as their support.  ... 
doi:10.1145/2659651.2659700 dblp:conf/sin/BellekensTARK14 fatcat:dctzmfj4ujerzjddykobfagsle

Endpoint Security in Networks: An OpenMP Approach for Increasing Malware Detection Speed

Igor Forain, Robson de Oliveira Albuquerque, Ana Sandoval Orozco, Luis García Villalba, Tai-Hoon Kim
2017 Symmetry  
The main contribution of this work is to propose and implement a new version of the ClamAV antivirus using parallel processing with OpenMP, easily portable to a variety of hardware platforms and operating  ...  All the tests used the same dataset constituted of 1.33 GB of data distributed among 2766 files of different sizes.  ...  Related Work This section reviews previous research on frameworks for multi-core programming and approaches to speed up ClamAV. Multi-Core CPU Programming The work of Shen et al.  ... 
doi:10.3390/sym9090172 fatcat:ib4oobx46jgyrcz5ihyprryy6a

Flexible Linear Algebra Development and Scheduling with Cholesky Factorization

Azzam Haidar, Asim YarKhan, Chongxiao Cao, Piotr Luszczek, Stanimire Tomov, Jack Dongarra
2015 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems  
In this work we are using a lightweight runtime environment to handle many of the complexities in such distributed, heterogeneous systems.  ...  On the other hand, a Xeon Phi coprocessor will work most effectively with degree of parallelism between GPUs and multicore-CPUs.  ...  Acknowledgements This material is based upon work supported by the National Science Foundation under Grants ACI-1339822 and 1137097, the Department of Energy, and the NVIDIA and Intel Corporations.  ... 
doi:10.1109/hpcc-css-icess.2015.285 dblp:conf/hpcc/HaidarYCLTD15 fatcat:x66ibo3q75gbbfgjf6k43yrynq

Architectural Support for Network Applications on Simultaneous MultiThreading Processors

Kyueun Yi, Jean-Luc Gaudiot
2007 2007 IEEE International Parallel and Distributed Processing Symposium  
The goal of this paper is to evaluate the applicability and efficiency of Simultaneous Multi-Threaded (SMT) as a network processor.  ...  Finally, a new architectural solution to cope with packet dependency is proposed and evaluated.  ...  Figure 4 shows a comparison of L2 unified cache miss rates between the execution of one-thread and the execution of three-threads.  ... 
doi:10.1109/ipdps.2007.370236 dblp:conf/ipps/YiG07 fatcat:4vropjc5w5bt3gcczn7c5dbqkm
« Previous Showing results 1 — 15 out of 14,198 results