Matej Kacic

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
New technologies of multi-core and massively parallel processors are becoming common parts of today's desktop computers. These state-of-the-art technologies allow programming of parallel applications and systems, however , creating parallel applications puts higher demands on programmers' skills, project maintenance and modification of existing source(More)
Network traffic generation was the subject of many research projects in the past, but none of them could generate network data which has the same nature as a traffic from human or machine behavior. In this paper we introduce a related work in this field of area focusing on advantages and disadvantages, such as authenticity, inaccuracy, wrong timings and(More)
This paper is focused on preventing relay attacks on contactless devices, such as contactless smart cards or Near-Field Communication (NFC) devices. Relay attacks can be prevented by the so called distance bounding protocols, which are based on restricting the round trip time to some limit. Distance bounding protocols protect against all theoretical(More)
Nowadays we use the 802.11i standard, which is considered safe for now. In 2010, the Hole 196 vulnerability of Group Transient Key was discovered, which allows an undetectable insider ARP poisoning attack. On this ground we have founded the possibility of malware injection into wireless communication with purpose of avoiding intrusion detection system. This(More)
The importance of safety standards of software systems is increasing as the use of software grows because of its convenience and flexibility. Software safety standards are very important in aircraft, military, automotive or medical devices. We are developing parallel code generating and refactoring system for safety standards compliance, which increases(More)
This paper presents an automated detection method based on classification of network traffic using predefined set of network metrics. We proposed the set of metrics with focus on behavior of buffer overflow attacks and their sufficient description without the need of deep packet inspection. In this paper we describe two laboratory experiments of automated(More)
Nowadays wireless networks are becoming important in personal and public communication. Most of them are secured by 802.11i standard with strong AES cipher - WPA2. In many cases an attacker has the ability to listen to all encrypted network traffic, which may become a potential intrusion. Each client in wireless network is vulnerable to a variety of threats(More)
  • 1