Peking Duck Software

Displaying 1-19 of 19 results

  • White Papers // Oct 2013

    YuruBackup: A Space-Efficient and Highly Scalable Incremental Backup System in the Cloud

    In this paper, the authors present YuruBackup, a space-efficient and highly scalable incremental backup system in the cloud. YuruBackup enables fine-grained data de-duplication with hierarchical partitioning to improve space efficiency to reduce bandwidth of both backup and restore processes, and storage costs. On the other hand, YuruBackup explores a highly...

    Provided By Peking Duck Software

  • White Papers // Sep 2013

    Towards RSA-Based High Availability Configuration in Cloud

    In the current cloud systems, there is no RSA-based HA configuration framework. In this paper, the authors proposed an RSA-based configuration approach of the HA mechanism for a cloud platform. Further, a prototype of the proposed approach was discussed. However, the proposed approach needs to be implemented entirely and polished...

    Provided By Peking Duck Software

  • White Papers // Jun 2013

    Active SSD Design for Energy-Efficiency Improvement of Web-Scale Data Analysis

    Compared to traditional Hard Disk Drives (HDDs), NAND flash based SSDs have many advantages, such as high throughput, low power consumption, light weight, etc. NAND flash based Solid State Drives (SSDs) have been widely adopted as storage devices in modern data centers to provide high performance I/O services. Recently, researchers...

    Provided By Peking Duck Software

  • White Papers // Apr 2013

    Efficient SimRank-based Similarity Join Over Large Graphs

    Graphs have been widely used to model complex data in many real-world applications. Answering vertex join queries over large graphs is meaningful and interesting, which can benefit friend recommendation in social networks and link prediction, etc. In this paper, the authors adopt \"SimRank\" to evaluate the similarity of two vertices...

    Provided By Peking Duck Software

  • White Papers // Mar 2013

    Practical Control Flow Integrity & Randomization for Binary Executables

    Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking attacks. However, performance and compatibility issues limit its adoption. The authors propose a new practical and realistic protection method called CCFIR (Compact Control Flow Integrity and Randomization), which addresses the main barriers to CFI adoption. CCFIR collects all...

    Provided By Peking Duck Software

  • White Papers // Sep 2012

    Pairing Computation on Edwards Curves with High-Degree Twists

    In this paper, the authors propose an elaborate geometry approach to explain the group law on twisted Edwards curves which are seen as the intersection of quadric surfaces in place. Using the geometric interpretation of the group law they obtain the Miller function for Tate pairing computation on twisted Edwards...

    Provided By Peking Duck Software

  • White Papers // Sep 2012

    Faster Pairing Computation on Jacobi Quartic Curves with High-Degree Twists

    In this paper, the authors propose an elaborate geometric approach to explain the group law on Jacobi quartic curves which are seen as the intersection of two quadratic surfaces in space. Using the geometry interpretation, they construct the Miller function. Then they present explicit formulae for the addition and doubling...

    Provided By Peking Duck Software

  • White Papers // Jul 2012

    Exchanging Third-Party Information With Minimum Transmission Cost

    In this paper, the authors consider the problem of minimizing the total transmission cost for exchanging channel state information. They proposed a network coded cooperative data exchange scheme, such that the total transmission cost is minimized while each client can decode all the channel information held by all other clients....

    Provided By Peking Duck Software

  • White Papers // Jun 2012

    Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition

    Boolean functions play a very critical role in symmetric cryptographic systems. There are many criteria for a Boolean function to be a so-called "Good" function, such as balancedness, high nonlinearity, high algebraic degree, and correlation immunity. In 2003, Courtois and Meier proposed a standard algebraic attack upon some well-known stream...

    Provided By Peking Duck Software

  • White Papers // Mar 2012

    Detecting and Validating Sybil Groups in the Wild

    Sybil attacks are one of the well-known and powerful attacks against online social networks. Sybil users propagate spam or unfairly increase the influence of target users. Previous works focus on detecting Sybil users. However, Sybil users alone do not harm the system. What is really dangerous is that multiple Sybil...

    Provided By Peking Duck Software

  • White Papers // Nov 2011

    Differential Modulation for Bi-Directional Relaying With Analog Network Coding

    In this paper, the authors propose an Analog Network Coding scheme with Differential Modulation (ANCDM) using Amplify-and-Forward protocol for bidirectional relay networks when neither the source nodes nor the relay knows the Channel State Information (CSI). The performance of the proposed ANC-DM scheme is analyzed and a simple asymptotic Bit...

    Provided By Peking Duck Software

  • White Papers // Mar 2011

    WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios

    Traditional remote-server-exploiting malware is quickly evolving and adapting to the new web-centric computing paradigm. By leveraging the large population of (insecure) web sites and exploiting the vulnerabilities at client-side modern (complex) browsers (and their extensions), web-based malware becomes one of the most severe and common infection vectors nowadays. While traditional...

    Provided By Peking Duck Software

  • White Papers // Jan 2011

    MwSandbox: On Improving the Efficiency of Automated Coarse-Grained Dynamic Malware Analysis

    Malware is a major threat to the cyber world and the number of unique malware samples captured by antivirus software venders is making an explosive growth in recent years. To improve the malware analysis efficiency, researchers have developed several automated coarse-grained dynamic malware analysis systems, including Norman Sandbox, CWSandbox and...

    Provided By Peking Duck Software

  • White Papers // Dec 2010

    Secure Information Flow by Model Checking Pushdown System

    The authors propose an approach on model checking information flow for imperative language with procedures. They characterize their model with pushdown system, which has a stack of unbounded length that naturally models the execution of procedural programs. Because the type-based static analysis is sometimes too conservative and rejects safe program...

    Provided By Peking Duck Software

  • White Papers // Aug 2010

    Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy

    In this paper, the authors introduce an efficient and trustworthy conditional privacy-preserving communication protocol for VANETs based on proxy re-signature. The proposed protocol is characterized by the Trusted Authority (TA) designating the RoadSide Units (RSUs) to translate signatures computed by the On-Board Units (OBUs) into one that are valid with...

    Provided By Peking Duck Software

  • White Papers // Apr 2010

    Joint Energy and Route Optimization in MIMO Wireless Sensor Networks

    In this paper, the authors study the reliable packet forwarding in Wireless Sensor Networks (WSNs) with the Multiple-Input Multiple-Output (MIMO) and Orthogonal Space Time Block Codes (OSTBC) techniques. The objective is to propose a cross-layer optimized forwarding scheme to maximize the Successful Transmission Rate (STR) while satisfying the given end-to-end...

    Provided By Peking Duck Software

  • White Papers // Oct 2009

    SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam

    Tagging systems are known to be particularly vulnerable to tag spam. Due to the self-organization and self-maintenance nature of Peer-To-Peer (P2P) overlay networks, users in the P2P tagging systems are more vulnerable to tag spam than the centralized ones. This paper proposes Spam-Resist, a novel social reliability-based mechanism. For each...

    Provided By Peking Duck Software

  • White Papers // May 2008

    Verifying BPEL-like Programs with Hoare Logic

    The WS-BPEL language has recently become a de facto standard for modeling Web-based business processes. One of its essential features is the fully programmable compensation mechanism. To understand it better, many recent works have mainly focused on formal semantic models for WS-BPEL. In this paper, the authors make one step...

    Provided By Peking Duck Software

  • White Papers // Mar 2008

    Verifying BPEL-like Programs with Hoare Logic: Technical Report

    The WS-BPEL language has recently become a de facto standard for modeling Web-based business processes. One of its essential features is the fully programmable compensation mechanism. To understand it better, many recent works have mainly focused on formal semantic models for WS-BPEL. In this paper, the authors make one step...

    Provided By Peking Duck Software

  • White Papers // Apr 2010

    Joint Energy and Route Optimization in MIMO Wireless Sensor Networks

    In this paper, the authors study the reliable packet forwarding in Wireless Sensor Networks (WSNs) with the Multiple-Input Multiple-Output (MIMO) and Orthogonal Space Time Block Codes (OSTBC) techniques. The objective is to propose a cross-layer optimized forwarding scheme to maximize the Successful Transmission Rate (STR) while satisfying the given end-to-end...

    Provided By Peking Duck Software

  • White Papers // Dec 2010

    Secure Information Flow by Model Checking Pushdown System

    The authors propose an approach on model checking information flow for imperative language with procedures. They characterize their model with pushdown system, which has a stack of unbounded length that naturally models the execution of procedural programs. Because the type-based static analysis is sometimes too conservative and rejects safe program...

    Provided By Peking Duck Software

  • White Papers // Sep 2012

    Faster Pairing Computation on Jacobi Quartic Curves with High-Degree Twists

    In this paper, the authors propose an elaborate geometric approach to explain the group law on Jacobi quartic curves which are seen as the intersection of two quadratic surfaces in space. Using the geometry interpretation, they construct the Miller function. Then they present explicit formulae for the addition and doubling...

    Provided By Peking Duck Software

  • White Papers // Sep 2012

    Pairing Computation on Edwards Curves with High-Degree Twists

    In this paper, the authors propose an elaborate geometry approach to explain the group law on twisted Edwards curves which are seen as the intersection of quadric surfaces in place. Using the geometric interpretation of the group law they obtain the Miller function for Tate pairing computation on twisted Edwards...

    Provided By Peking Duck Software

  • White Papers // Jun 2012

    Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition

    Boolean functions play a very critical role in symmetric cryptographic systems. There are many criteria for a Boolean function to be a so-called "Good" function, such as balancedness, high nonlinearity, high algebraic degree, and correlation immunity. In 2003, Courtois and Meier proposed a standard algebraic attack upon some well-known stream...

    Provided By Peking Duck Software

  • White Papers // Oct 2009

    SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam

    Tagging systems are known to be particularly vulnerable to tag spam. Due to the self-organization and self-maintenance nature of Peer-To-Peer (P2P) overlay networks, users in the P2P tagging systems are more vulnerable to tag spam than the centralized ones. This paper proposes Spam-Resist, a novel social reliability-based mechanism. For each...

    Provided By Peking Duck Software

  • White Papers // Mar 2013

    Practical Control Flow Integrity & Randomization for Binary Executables

    Control Flow Integrity (CFI) provides a strong protection against modern control-flow hijacking attacks. However, performance and compatibility issues limit its adoption. The authors propose a new practical and realistic protection method called CCFIR (Compact Control Flow Integrity and Randomization), which addresses the main barriers to CFI adoption. CCFIR collects all...

    Provided By Peking Duck Software

  • White Papers // Nov 2011

    Differential Modulation for Bi-Directional Relaying With Analog Network Coding

    In this paper, the authors propose an Analog Network Coding scheme with Differential Modulation (ANCDM) using Amplify-and-Forward protocol for bidirectional relay networks when neither the source nodes nor the relay knows the Channel State Information (CSI). The performance of the proposed ANC-DM scheme is analyzed and a simple asymptotic Bit...

    Provided By Peking Duck Software

  • White Papers // May 2008

    Verifying BPEL-like Programs with Hoare Logic

    The WS-BPEL language has recently become a de facto standard for modeling Web-based business processes. One of its essential features is the fully programmable compensation mechanism. To understand it better, many recent works have mainly focused on formal semantic models for WS-BPEL. In this paper, the authors make one step...

    Provided By Peking Duck Software

  • White Papers // Mar 2008

    Verifying BPEL-like Programs with Hoare Logic: Technical Report

    The WS-BPEL language has recently become a de facto standard for modeling Web-based business processes. One of its essential features is the fully programmable compensation mechanism. To understand it better, many recent works have mainly focused on formal semantic models for WS-BPEL. In this paper, the authors make one step...

    Provided By Peking Duck Software

  • White Papers // Aug 2010

    Efficient Privacy-Preserving Authentication Protocol for Vehicular Communications with Trustworthy

    In this paper, the authors introduce an efficient and trustworthy conditional privacy-preserving communication protocol for VANETs based on proxy re-signature. The proposed protocol is characterized by the Trusted Authority (TA) designating the RoadSide Units (RSUs) to translate signatures computed by the On-Board Units (OBUs) into one that are valid with...

    Provided By Peking Duck Software

  • White Papers // Mar 2011

    WebPatrol: Automated Collection and Replay of Web-based Malware Scenarios

    Traditional remote-server-exploiting malware is quickly evolving and adapting to the new web-centric computing paradigm. By leveraging the large population of (insecure) web sites and exploiting the vulnerabilities at client-side modern (complex) browsers (and their extensions), web-based malware becomes one of the most severe and common infection vectors nowadays. While traditional...

    Provided By Peking Duck Software

  • White Papers // Jan 2011

    MwSandbox: On Improving the Efficiency of Automated Coarse-Grained Dynamic Malware Analysis

    Malware is a major threat to the cyber world and the number of unique malware samples captured by antivirus software venders is making an explosive growth in recent years. To improve the malware analysis efficiency, researchers have developed several automated coarse-grained dynamic malware analysis systems, including Norman Sandbox, CWSandbox and...

    Provided By Peking Duck Software

  • White Papers // Sep 2013

    Towards RSA-Based High Availability Configuration in Cloud

    In the current cloud systems, there is no RSA-based HA configuration framework. In this paper, the authors proposed an RSA-based configuration approach of the HA mechanism for a cloud platform. Further, a prototype of the proposed approach was discussed. However, the proposed approach needs to be implemented entirely and polished...

    Provided By Peking Duck Software

  • White Papers // Mar 2012

    Detecting and Validating Sybil Groups in the Wild

    Sybil attacks are one of the well-known and powerful attacks against online social networks. Sybil users propagate spam or unfairly increase the influence of target users. Previous works focus on detecting Sybil users. However, Sybil users alone do not harm the system. What is really dangerous is that multiple Sybil...

    Provided By Peking Duck Software

  • White Papers // Apr 2013

    Efficient SimRank-based Similarity Join Over Large Graphs

    Graphs have been widely used to model complex data in many real-world applications. Answering vertex join queries over large graphs is meaningful and interesting, which can benefit friend recommendation in social networks and link prediction, etc. In this paper, the authors adopt \"SimRank\" to evaluate the similarity of two vertices...

    Provided By Peking Duck Software

  • White Papers // Jun 2013

    Active SSD Design for Energy-Efficiency Improvement of Web-Scale Data Analysis

    Compared to traditional Hard Disk Drives (HDDs), NAND flash based SSDs have many advantages, such as high throughput, low power consumption, light weight, etc. NAND flash based Solid State Drives (SSDs) have been widely adopted as storage devices in modern data centers to provide high performance I/O services. Recently, researchers...

    Provided By Peking Duck Software

  • White Papers // Oct 2013

    YuruBackup: A Space-Efficient and Highly Scalable Incremental Backup System in the Cloud

    In this paper, the authors present YuruBackup, a space-efficient and highly scalable incremental backup system in the cloud. YuruBackup enables fine-grained data de-duplication with hierarchical partitioning to improve space efficiency to reduce bandwidth of both backup and restore processes, and storage costs. On the other hand, YuruBackup explores a highly...

    Provided By Peking Duck Software

  • White Papers // Jul 2012

    Exchanging Third-Party Information With Minimum Transmission Cost

    In this paper, the authors consider the problem of minimizing the total transmission cost for exchanging channel state information. They proposed a network coded cooperative data exchange scheme, such that the total transmission cost is minimized while each client can decode all the channel information held by all other clients....

    Provided By Peking Duck Software