Denial-of-service attacks are the second most costly type of computer crime, after viruses, according to the 2008 Computer Security Institute survey of security professional's at large organizations. Until recently, denial-of-service attacks were usually weapons used by novice attackers in vendettas against enemies. But like other types of malicious… (More)
The SciFinance Ì Å software synthesis system automates the programming task for financial risk management activities ranging from algorithms research to production pricing to risk control. Introduced commercially in late 1998, the system is currently licensed to a number of major investment banks. SciFinance's high-level, extensible specification language,… (More)
Ad hoc networks represent a promising communication technology that targets the ensuring of connectivity in special scenarios in which dedicated infrastructure cannot be used. The core of ad hoc networks is represented by the ad hoc routing protocols. These routing protocols raise specific security aspects that need to be taken care of. Many propositions of… (More)
—IP multicast has proved to be the best approach for large scale multimedia communications enhancing video transmissions for applications like IPTV, video conferencing or other best-effort real-time audio/video applications. IP multicast connectivity, unfortunately, relays on certain network technologies and protocols and is present only in some areas of… (More)
As the number of mobile devices surpassed the one of personal computers, since 2014, it is obvious that smartphones have become a successful alternative for desktop PCs. Unfortunately, threats that target them evolved, too, and the Information Security domain needs to readapt quickly to this dynamic and rebalance its efforts towards mobile devices security.
ChaCha20 is an encryption cipher selected by Google to replace the now obsolete RC4 in the Chrome browser and Android devices. The current article discusses the performance implications of parallelizing ChaCha20 across multicore CPU and GPU. The serial implementation used to derive the parallel code is part of BoringSSL encryption library. We used OpenMP… (More)
Research in security of ad hoc networks consists mainly of classifications and new protocol propositions. But formal verification should also be used in order to be able to prove the properties intended for the protocols. In this paper we present our work in formally verifying the group password-based authenticated key exchange protocol proposed in 2000 by… (More)
As a collaborative network for distribution of multimedia streams to a potentially large number of hosts, P2P networking relays on efficient application layer multicast distribution services. As for centralized streaming application, delivery constraints are also stringent requirements for P2P networks in order to prevent playback glitches or service… (More)