Young June Pyun

Learn More
Tracing interactive traffic that traverses stepping stones (i.e., intermediate hosts) is challenging, as the packet headers, lengths, and contents can all be changed by the stepping stones. The traffic timing has therefore been studied as a means of tracing traffic. One such technique uses traffic timing as a side channel into which a watermark, or(More)
Current peer-to-peer (P2P) file sharing applications are remarkably simple and robust, but their inefficiency can produce very high network loads. The use of super-peers has been proposed to improve the performance of unstructured P2P systems. These have the potential to approach the performance and scalability of structured systems, while retaining the(More)
Attacks launched over the Internet have become a pressing problem. Attackers make use of a variety of techniques to anonymize their traffic, in order to escape detection and prosecution. Despite much research on attack attribution, there has been little work on optimizing the number and placement of monitoring points for identifying the source of attacks(More)
Current peer-to-peer (P2P) file sharing applications are remarkably simple and robust, but their inefficiency can produce very high network loads. New P2P systems, called structured P2P systems, have been proposed and are much more efficient in terms of search time and bandwidth requirements, and are therefore more scalable. However, structured systems are(More)
This paper presents an approach to automate the preparation , the delivery, and the grading of programming assignment as isomorphs. The approach has been put to a test in a third-year one-semester course on data structures and algorithms for computer science majors, with more than 80 students in the class. Among factors that influenced our approach include(More)
  • 1