The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malware detection is an important aspect of cyber security. The process of identifying malicious code in files or network traffic is very complex and requires a lot of computational resources. Most security solutions that deal with malware detection implement advanced string matching algorithms or look for certain behavioral patterns during program execution. These methods of detection can cause significant...
Network engineers and security experts are constantly confronted with new threats that have yet to be handled. Mitigation of zero day attacks requires the implementation of machine learning algorithms for the detection of abnormalities and malicious behavior on the network. These processes are often time consuming and can add significant resource cost in terms of network speed and compute power. The...
Color characteristics of computer monitors and similar display devices can significantly alter the way an image is perceived by the human eye. Modern cameras and software applications are able to create vibrant scenes and retain their original colorfulness through an embedded ICC[1] profile. Gamut differences between input and output mediums require color management techniques in order to preserve...
The current work analyzes the PcapNg format and presents a new library: LightPcapNg. Its purpose is to provide a lightweight implementation of the standard and enable modular customization. The final goal of this work is to enable other software tools to use this format and adapt it for specialized operations or other non-network specific tracing.
ChaCha20 is an encryption cipher selected by Google to replace the now obsolete RC4 in the Chrome browser and Android devices. The current article discusses the performance implications of parallelizing ChaCha20 across multicore CPU and GPU. The serial implementation used to derive the parallel code is part of BoringSSL encryption library. We used OpenMP and OpenCL to accelerate the cipher and obtain...
The current paper proposes a solution for offloading compute-intensive string matching operations performed by modern network intrusion detection systems (NIDS) or ant viruses to the GPU using OpenCL's programing model and serialized implementations of Aho-Corasick algorithm. The solution aims to provide scalability and performance in heterogeneous environments.
The current paper proposes a solution for protecting Android applications and user data through encryption. In the current context, data stored on mobile devices is often more valuable than the device itself. The security mechanism presented provides protection for software intellectual property (IP), important data and limits access to an Android device without compromising user experience.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.