The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The world is becoming an immense critical information infrastructure, with the fast and increasing entanglement of utilities, telecommunications, Internet, cloud, and the emerging IoT tissue. This may create enormous opportunities, but also brings about similarly extreme security and dependability risks. We predict an increase in very sophisticated targeted attacks, or advanced persistent threats...
Software-Defined Networking (SDN) is a new paradigm that is attracting significant attention from both academy and industry. In recent years, increasing research efforts have addressed the conception of programming interfaces—northbound APIs—which allow business-applications to properly communicate with SDN controllers and program the network. However, most of current SDN controllers still offer low-level...
The exponential growth of devices connected to the Internet flogged need to improve methods of network management and recently has become one of the most difficult tasks. As a result of the rapid increase in devices connected to the Internet will increase a huge amount of traffic of today's networks. The ideology of software-defined networking will significantly automate and facilitate network management...
To reduce the amount of CO2 produced from the personal cars in the world, the parking lot guidance systems are considered to be the solution in shopping malls or department stores in many countries. However, most of the current parking lot systems are located in the parking area of each shopping mall and they cannot show the parking lots information for the driver that are driving on the road. So,...
This paper demonstrates attack induced common-mode failures on an industrial-grade (Tricon) Triple-Modular-Redundant PLC (programmable logic controller) and its impact in a Nuclear Power Plant settings. The attack exploits the fact that during the configuration phase the same control logic is downloaded to all three redundant modules. We describe how an attacker can exploit this vulnerability to embed...
In access-network-chip testing and verification, problems occur mostly on I2C control interface because of its complicated protocol and high requirement on reliability, using an automated testing tool with simple operation and high testing coverage could ensure the quality of chip as well as shorten the chip development cycle. The paper designs an automated system based on 5SGXEA7N2F45C2 FPGA chip...
The Work Elf is defined as an assistant in our desktop. The software completes the data manipulation by the XML file interface in Qt. It also achieves the interactive function by the GUI controls. It combined with UDP protocol to complete the networking function. And it combined with TCP protocol and SMTP protocol to complete the mail sending function. Therefore, this software built its all modules...
A "multi-module" project involves more than onesubcomponent, with possible dependencies between components. An automotive electronics, a core course taught for the studentsof circuit branches is mainly application oriented involvingsystem level concepts. The course was introduced to cater to theneeds of automotive industries. The concepts of entire course canbe divided into five main domains,...
Current network protocol binary software testing methods cannot discover serious vulnerabilities in deep states. This article introduces a novel method based on multi-packet symbolic execution, which can drive the software to deep states, to test the whole network protocol binary software stacks. This article also presents a prototype system, S2EProtocol-multi, upon Selective Symbolic Execution (S2E)...
Traditional symbolic execution for testing software focuses on exploring the paths of the program. However, for stateful network protocol, this method is hard to explore all the protocol states. This paper proposes a novel method based on model-guided symbolic execution, which can associate the program paths with the protocol states and utilize the protocol model to guide the test to explore interesting...
Packet processing speeds in software today can hardly support the speed available on network interfaces. Consequently, many solutions that try to accelerate the processing by using programmable hardware have appeared recently. TRILL protocol is implemented by devices called RBridges which introduce Layer 3 routing features into link layer and serve for communication within a data center. However connection...
Due to the simple technical implementation, lowcost network construction and high-bandwidth wireless link capacity, WiFi networks have become popular in the last decade. Nevertheless, WiFi networks have still facing various technical challenges such as load balancing, mobility support and channel adaptation. The emerging software defined networking (SDN) has now been proposed to address the above...
With the rapid development of e-commerce, online services have become a usual part of our lives, such as online gaming, music or software downloads, pay-per-view content, and membership fees. But the amount of money spent for these services often is only a few multiple of the smallest currency unit. These kinds of payments are called micropayment. Therefore, in the field of electronic payment, micropayment...
Software Defined Networking (SDN) is getting much attention for larger network implementation adding programmable feature in the network plane. Demand of wireless networking features is growing simultaneously. With increased network complexity and sizes, security has become an issue as vulnerabilities are still prominent for such complex network and needs to be monitored properly to provide early...
There is an increasing demand in designing heterogeneous networks, where various low-power wireless radios such as ZigBee and Bluetooth devices coexist, while sensing devices may generate traffic with different intervals. In this work, we devise an architecture of a cross layer controller, encompassing a software defined radio at the data plane to manage radio access, and a software defined networking...
Manga (Japanese comics) are popular all over the world, and are created digitally. In this paper, we propose an interactive segmentation method tailored for manga. The proposed method enables annotators to select areas in manga efficiently. Our experimental results showed that the proposed framework works better than Adobe Photoshop CC, which is the most widely used commercial image editing software.
As citizens debate the morality of using global surveillance to enforce cyber security, software technologies that can proliferate illegal distribution of copyright material are evolving rapidly. One such technology is Peer-to-Peer networking which, through well-known implementations such as Napster, Bittorrent and eMule, has enabled users to share files at optimal speeds and at near infinite scale...
Inferring a correct state machine of a protocol implementation is an important problem in software engineering and security domains. The protocol state machine inference method can be widely used in various security applications, such as software vulnerability detection, intrusion detection system, protocol implementation fingerprinting, and protocol reversing. In this paper, we propose an advanced...
Secure end-to-end communication has become a necessity for many people. In this research paper we survey the most popular and widely used secure anonymous Instant Messaging (IM) services and protocols, study them from a security and anonymity point of view, and investigate how these services or protocols could be compromised.
Nowadays, most mobile devices are equipped with multiple wireless interfaces, causing an emerging research interest in device to device (D2D) communication: the idea behind the D2D paradigm is to exploit the proper interface to directly communicate with another user, without traversing any network infrastructure. A first issue related to this paradigm is the need for a coordinator, called controller,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.