Concordia University

Displaying 41-59 of 59 results

  • White Papers // Jan 2012

    Towards a Formal Semantics for AspectJ Weaving

    This paper describes a formal semantics of advice weaving in AspectJ. Since the version 1.1, AspectJ language is developed using bytecode weaving, which combines aspects and classes to produce .class les that run in a Java Virtual Machine (JVM). In AspectJ, the advice weaving is done statically by inserting the...

    Provided By Concordia University

  • White Papers // Apr 2011

    A Unified Data Mining Solution for Authorship Analysis in Anonymous Textual Communications

    The cyber world provides an anonymous environment for criminals to conduct malicious activities such as spamming, sending ransom e-mails, and spreading botnet malware. Often, these activities involve textual communication between a criminal and a victim, or between criminals themselves. The forensic analysis of online textual documents for addressing the anonymity...

    Provided By Concordia University

  • White Papers // Jan 2012

    Mining Criminal Networks from Unstructured Text Documents

    Digital data collected for forensics analysis often contain valuable information about the suspects' social networks. However, most collected records are in the form of unstructured textual data, such as e-mails, chat messages, and text documents. An investigator often has to manually extract the useful information from the text and then...

    Provided By Concordia University

  • White Papers // Sep 2011

    A First Look on the Effects and Mitigation of VoIP SPIT Flooding in 4G Mobile Networks

    The fourth generation of mobile networks is considered a technology-opportunistic and user-centric system. Part of its new architecture, 4G networks will implement an evolved packet core. Although this will provide various critical advantages, it will however expose telecom networks to serious IP-based attacks. One often adopted solution to mitigate such...

    Provided By Concordia University

  • White Papers // Apr 2010

    Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat

    Botnets have become one of the most prevailing threats to today's Internet partly due to the underlying economic incentives of operating one. Botnet toolkits sold by their authors allow any layman to generate his/her own customized botnet and become a botmaster; botnet services sold by botmasters allow any criminal to...

    Provided By Concordia University

  • White Papers // Jun 2010

    On the Analysis of the Zeus Botnet Crimeware Toolkit

    In this paper, the authors present their reverse engineering results for the Zeus crimeware toolkit which is one of the recent and powerful crimeware tools that emerged in the Internet underground community to control botnets. Zeus has reportedly infected over 3.6 million computers in the United States. Their analysis aims...

    Provided By Concordia University

  • White Papers // Sep 2010

    Insights From the Analysis of the Mariposa Botnet

    Nowadays, botnets are among the topmost network threats by combining innovative hacking capabilities. This is due to the fact that they are constantly improved by hackers to become more resilient against detection and debugging techniques. In this respect, the authors analyze one of the most prominent botnets, namely Mariposa, which...

    Provided By Concordia University

  • White Papers // Mar 2011

    Knowledge Management Systems Development: Theory and Practice

    The intricate crafting of online educational systems lie within three principal activities: design of the system, implementation, and proper post-implementation assessment. There is not enough knowledge or experience in all regards. Efficient execution of these three major activities necessitates the use of design and pedagogical models to achieve cost and...

    Provided By Concordia University

  • White Papers // Sep 2007

    Automatic Generation of SystemC Transactors from Graphical FSM

    To specify, design, and implement complex System-on-Chip (SoC), a new modeling method, Transaction Level Modeling (TLM), has been proposed recently. TLM allows designers to focus on functionality while abstracting implementation details. At the Register Transfer Level (RTL), however, different modules communicate through detailed pin level signaling. SoC design methodologies involve...

    Provided By Concordia University

  • White Papers // Oct 2007

    A Symbolic Approach for the Safety Verification of Continuous Systems

    Embedded systems are computer-based reactive designs that interact directly and dynamically with their environment. When embedded systems are used in safety critical applications, the design process must be able to give safety guarantees to avoid any consequent risks. In this paper, the authors propose an approach to check safety properties...

    Provided By Concordia University

  • White Papers // Jul 2007

    Automatic Generation of SystemC Transactors from AsmL Specifications

    The SoC design flow consists of different levels of abstraction. At Transaction Level Modeling (TLM) different modules communicate with each other through function calls. In contrast, at the Register Transfer Level (RTL), different modules communicate through pin level signaling. The notion of transactors has been introduced recently in order to...

    Provided By Concordia University

  • White Papers // Jul 2007

    Towards Assertion Based Verification of Analog and Mixed Signal Designs Using PSL

    Analog and Mixed Signal (AMS) designs are important integrated systems that link digital circuits to the analog world. Following the success of PSL verification methodologies, recent research suggested extending PSL to support AMS systems. However, PSL has been defined initially to formalize properties about logical signals using models such as...

    Provided By Concordia University

  • White Papers // Jun 2009

    RCUBE: Parallel Multi-Dimensional ROLAP Indexing

    In this paper, the authors address the query performance issue for Relational OLAP (ROLAP) datacubes. They present RCUBE, a distributed multi-dimensional ROLAP indexing scheme which is practical to implement, requires only a small communication volume, and is fully adapted to distributed disks. Their solution is efficient for spatial searches in...

    Provided By Concordia University

  • White Papers // Oct 2013

    Integral Distinguishers for Reduced-Round Stribog

    In January 2013, the stribog hash function officially replaced GOST R 34.11-94 as the new Russian cryptographic hash standard GOST R 34.11-2012. Stribog is an AES-based primitive and is considered as an asymmetric reply to the new SHA-3 selected by NIST. In this paper the authors investigate the structural integral...

    Provided By Concordia University

  • White Papers // Aug 2013

    Rebound Attacks on Stribog

    The researcher attacks on MD5 and SHA-1 followed by the SHA-3 competition have led to a flurry in the area of hash function cryptanalysis where different design concepts and various attack strategies were introduced. In August 2012, the stribog hash function was selected as the new Russian hash standard. Stribog...

    Provided By Concordia University

  • White Papers // Jun 2013

    A Heuristic for Finding Compatible Differential Paths with Application to HAS-160

    The question of compatibility of differential paths plays a central role in second order collision attacks on hash functions. In this paper, attacks typically proceed by starting from the middle and constructing the middle-steps quartet in which the two paths are enforced on the respective faces of the quartet structure....

    Provided By Concordia University

  • White Papers // Mar 2009

    Rank Functions Based Inference System for Group Key Management Protocols Verification

    Design and verification of cryptographic protocols has been under investigation for quite some time. However, most of the attention has been paid for two parties protocols. In group key management and distribution protocols, keys are computed dynamically through cooperation of all protocol participants. Therefore regular approaches for two parties protocols...

    Provided By Concordia University

  • White Papers // Sep 2013

    Explicit Authentication Response Considered Harmful

    Automated online password guessing attacks are facilitated by the fact that most user authentication techniques provide a yes/no answer as the result of an authentication attempt. These attacks are somewhat restricted by Automated Turing Tests (ATTs, e.g., captcha challenges) that attempt to mandate human assistance. ATTs are not very difficult...

    Provided By Concordia University

  • White Papers // Jun 2013

    A Substrate Description Framework and Semantic Repository for Publication and Discovery in Cloud-Based Conferencing

    In this paper, the authors proposed a substrate description framework and semantic repository architecture for cloud-based conferencing substrates. A proof-of-concept prototype was implemented, deployed, and successfully tested. The performance results for the proposed architecture delivers satisfactory results for publication and discovery of conference substrates. However, methods for further optimization need...

    Provided By Concordia University