Learn More
Cryptographic function implementations are known to leak information about private keys through timing information. By using statistical analysis of the variations in runtime required to encrypt different messages, an attacker can relatively easily determine the key with high probability. There are many mitigation techniques to combat these side channels;(More)
Many kinds of huge amount of tweets about real-world events are generated everyday in Twitter. However, the disorganization messages required to be classified by topics and events are one of challenges to get knowledge effectively. To solve the problem, we propose a novel method that combines the cluster algorithm with label propagation algorithm to detect(More)
Information flow tracking is an effective tool in computer security for detecting unintended information flows. However, software based information flow tracking implementations have drawbacks in preciseness and performance. As a result, researchers have begun to explore tracking information flow in hardware, and more specifically, understanding the(More)
Hardware-based side channels are known to expose hard-to-detect security holes enabling attackers to get a foothold into the system to perform malicious activities. Despite this fact, security is rarely accounted for in hardware design flows. As a result, security holes are often only identified after significant damage has been inflicted. Recently, gate(More)
—High-assurance systems, such as flight control and banking systems require strict guarantees on information flows or else face catastrophic consequences. Information flow tracking (IFT) is a frequently used security measure for preventing unintended information flows in such systems. Recently, Gate Level Information Flow Tracking (GLIFT) has been proposed(More)
This paper considers providing two types of QoS guarantees, proportional delay differentiation (PDD) and absolute delay guarantee (ADG), in the database connection pool (DBCP) for Web application servers using the classical feedback control theory. PDD aims to maintain the average queuing delay ratio between different classes of requests according to(More)
Most of flooding algorithm of recent Ad Hoc multicast routing protocols are suitable under specific networks conditions. If the condition changes like increasing the number of multicast source nodes and networks nodes or having higher node speed and more traffic loads, they will not work well. To provide multicast routing support for a wide range of(More)