this volume contains the proceedings of the 16thinternationalconference on Rewriting Techniques and Applications (RTA2005),whichwasheldonApril19– 21, 2005, at the Nara-Ken New Public Hall in the center of the Nara ...
详细信息
ISBN:
(数字)9783540320333
ISBN:
(纸本)9783540255963
this volume contains the proceedings of the 16thinternationalconference on Rewriting Techniques and Applications (RTA2005),whichwasheldonApril19– 21, 2005, at the Nara-Ken New Public Hall in the center of the Nara National Park in Nara, Japan. RTA is the major forum for the presentation of research on all aspects of ***(1985),Bordeaux(1987), Chapel Hill (1989), Como (1991), Montreal (1993), Kaiserslautern (1995), Rutgers (1996), Sitges (1997), Tsukuba (1998), Trento (1999), Norwich (2000), Utrecht (2001), Copenhagen (2002), Valencia (2003), and Aachen (2004). this year, there were 79 submissions from 20 countries, of which 31 papers were accepted for publication (29 regular papers and 2 system descriptions). the submissions came from France (10 accepted papers of the 23.1 submitted papers), USA (5.6 of 11.7), Japan (4 of 9), Spain (2.7 of 6.5), UK (2.7 of 4.7), the Netherlands (1.7 of 3.8), Germany (1.3 of 2.3), Austria (1 of 1), Poland (1 of 1), Israel (0.5 of 0.8), Denmark (0.5 of 0.5), China (0 of 4), Korea (0 of 4), Taiwan (0 of 1.3), Australia (0 of 1), Brazil (0 of 1), Russia (0 of 1), Switzerland (0 of 1), Sweden (0 of 1), and Italy (0 of 0.3). Each submission was assigned to at least three Program Committee m- bers, who carefully reviewed the papers, withthe help of 111 external referees.
DNS redirection and URL modification are two major ways to carry out dynamic replica selections in CDN. However, the two ways may overload DNS servers or dispatchers, and exhaust the network bandwidth while there are ...
详细信息
ISBN:
(纸本)0769522491
DNS redirection and URL modification are two major ways to carry out dynamic replica selections in CDN. However, the two ways may overload DNS servers or dispatchers, and exhaust the network bandwidth while there are a large number of incoming requests. Meanwhile, the modification of DNS servers for DNS redirection harms the compatibility and troubles the management. Moreover, the two ways do not give local administrators the flexibility to customize accesses to foreign CDN applications. In the paper we propose Java Application's Packet Eavesdropper (JAPE) for CDN to improve DNS redirection and URL modification, and for local administrators to control the accesses. JAPE utilizes packet interception technologies for Java objects to process packets. Besides, objects in JAPE are Java application rather than Java applet, which not only keeps the inherent portability but also has the flexibility to use various Java libraries for creating other applications not limited to CDN. We implement JAPE in Windows 2000 and develop a CDN application with an object doing DNS redirection and URL modification. the application with location-aware features can locally resolve clients' requests toward a virtual host name and redirect them to a nearby server customized by local administrators according to the movements of clients. It proves that JAPE for CDN can free DNS servers from modifications, alleviate DNS servers' and dispatchers' loads, conserve the network bandwidth, and permit local administrators to customize the accesses.
the hardware, software, and the data present in any electronic system predominantly determine the system’s security. Just like software, hardware is equally prone to attacks leading to malfunction. Altering the circu...
详细信息
ISBN:
(纸本)9781665452724
the hardware, software, and the data present in any electronic system predominantly determine the system’s security. Just like software, hardware is equally prone to attacks leading to malfunction. Altering the circuit design via different techniques to create a secret channel that maliciously affects the functionality of the system is called Hardware Trojan (HT) insertion and can cause significant harm. therefore, it is necessary to efficiently detect the presence of Hardware Trojans in any system. this paper presents the use of a well known Hardware Trojan detection technique called Side-Channel Analysis (SCA) to detect Trojans in encryption modules like AES and RSA. the availability of a golden circuit to compare against the Circuit Under Test (CUT) is assumed to detect Trojans through side-channel analysis. For the same, Xilinx Vivado is used to program the Intellectual Properties (IPs) on the Nexys 4 DDR FPGA. It is shown that the above- mentioned technique is not accurate in certain cases especially when the size of the Trojan is not large enough. So, an alternative technique is proposed that uses machine learning algorithms - that provide an accuracy of at least 93.06% while using the side channel data-sets, thereby significantly increasing the Trojan detection accuracy.
暂无评论