The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data processing at high-speed is a direction of the development of FPGA. This is an age of NIC popularity, the majority problems of data processing could be solved with the network cards, but some particular requirements of the data processing often could not be met with normal network cards. This paper involved in data processing card which requires one ethernet interface to send and receive data,...
One of the most dangerous forms of the memory manipulation based attacks is the code reuse based attack type. In this type of attack the malwares do not need to place own malicious code in the memory space, they use the already linked code to achieve the aim. The present study discusses a critical part of the jump oriented programming which is nowadays the most up-to-date memory manipulation attack...
The today computers, as taught in the elementary computer architecture courses, are based essentially on the principles, suggested by von Neumann in a 1946 report. Since that, only minor improvements have been carried out, although the impressive technical developments seem to hide this fact. In the meantime, also a whole software industry has grown up, and masses of society are using computers, sometimes...
Dropbox, a popular cloud storage provider, pose several threats especially in terms of file security and unauthorized access. An Android and a web application which implemented Serpent cryptographic algorithm and One-Time Password (OTP) mechanism to secure files on Dropbox and a web application was built as a solution by utilizing Dropbox Application Programming Interface (API) and Bouncy Castle library...
Recent developments in computational sciences, involving both hardware and software, allow reflection on the way that computers of the future will be assembled and software for them written. In this contribution we combine recent results concerning possible designs of future processors, ways they will be combined to build scalable (super)computers, and generalized matrix multiplication. As a result...
The paper considers application of the AVX (Advanced Vector Extensions) technique to improve the performance of the PARFES parallel finite element solver, intended for finite element analysis of large-scale problems of structural and solid mechanics using multi-core computers. The basis for this paper was the fact that the dgemm matrix multiplication procedure implemented in the Intel MKL (Math Kernel...
Machine-code decompilation is a reverse-engineering discipline focused on reverse compilation. It performs an application recovery from binary executable files back into the high level language (HLL) representation. One of its critical tasks is to produce an accurate and well-readable code. However, this is a challenging task since the executable code may be produced by one of the modern compilers...
This paper describes a PhD proposal aiming at dealing with obfuscation in polymorphic virus. The major characteristic of polymorphic virus is the capability of infinitely self-modifying when infecting victim programs. It makes the traditional signature-based virus detection technique ineffective since this approach needs to collect all of signature instances. A recent emerging approach to counter...
As the window system are affected by the malicious code, the vulnerability on the system are more. The behavior based monitoring is used to avoid the polymorphic malicious code. Signature based detection system or fixing these vulnerabilities are not the efficient method. Thus the behavior based monitoring is used to avoid malicious code in window system. Some of them hook high level system APIs to...
Buffer overflow attack is most common and dangerous attack method at present. So the analysis is useful in studying the principle of buffer overflow and buffer overflow exploits. In the paper a didactic example is included to illustrate one method of buffer overflow exploits, and though adding a jmp esp instruction into the process space as a springboard, it makes the shell code successfully to be...
This paper relates Mandelbugs and Bohrbugs to the problem of exhaustive testing. A Bohrbug is only related to the set of input data whereas a Mandelbug depends on the input data and the interaction of this data with the state of the system (computer storage). A simple Mandelbug example is given. The paper concludes with a speculation that unintended auto acceleration may be due to a Mandelbug.
In an introductory course of computer architecture, it is of high value that students use a simple and special CPU designed for this purpose and also its graphical simulator for better understanding of the computer hardware operation. In this paper, we present Abu-Reiahn, a simple 8-bit processor which we have specifically designed and built as the introduction part of computer architecture course...
We consider a notion of computer capacity as a novel approach to evaluation of computer performance. Computer capacity is based on the number of different tasks that can be executed in a given time. This characteristic does not depend on any particular task and is determined only by the computer architecture. It can be easily computed at the design stage and used for optimizing architectural decisions.
High performance and low power consumption have traditionally been the primary design goals for computer architects. With computer systems facing a wave of attacks that disrupt their normal execution or leak sensitive data, computer security is no longer an afterthought. Dynamic integrity checking has emerged as a possible solution to protect computer systems by thwarting various attacks. Dynamic...
Major advances in Merged Logic DRAM (MLD) technology coupled with the popularization of memory-intensive applications provide fertile ground for architectures based on Intelligent Memory (IRAM) or Processors-in-Memory (PIM). The contribution of this paper is to explore one way to use the current state-of-the-art MLD technology for general-purpose computers. To satisfy requirements of general purpose...
We propose application of method, based on notion of computer capacity, for evaluating the performance of computer systems. Computer capacity is based on the number of different tasks that can be executed in a given time. This characteristic determined only by the computer architecture, and it can be easily computed at the design stage and used for optimizing architectural decisions.
This paper analyzes the basic principle of buffer overflow, and describes the basic methods of using the buffer overflow to attack the computer system. Through two sections of programs, this paper shows the process of the buffer overflow and its attacking actions in details. At last, several effective countermeasures to avoid the buffer overflow attacks are discussed.
High-speed image capture technology is widely used in image signal transmission, processing, pattern recognition and industrial control. LVDS signal transmission technology and Hotlink transmission technology are two kinds of image signal transmission method who has been widely used in different areas because its own strengths. Because of its high-speed and strong interference immunity, LVDS signals...
Reducing power consumption and increasing effi- ciency is a key concern for many applications. It is well-accepted that specialization and heterogeneity are crucial strategies to improve both power and performance. Yet, how to design highly efficient processing elements while maintaining enough flexibility within a domain of applications is a fundamental question. In this paper, we present the design...
This paper presents a Computer Architecture Lab based on a hypothetical pedagogical computer and its corresponding software simulator designed at the University of Vigo. This computer simulator permits to access both the architecture and microarchitecture level of the computer. The paper shows the simulator features at both levels, and introduces the use of embedded core for the learning of SoC (System...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.