Executing Parallelized Dictionary Attacks on CPUs and GPUs
|
|
- Anne Grant
- 5 years ago
- Views:
Transcription
1 Executing Parallelized Dictinary Attacks n CPUs GPUs Hassan Alnn ENSIMAG Grenble, France hassan.alnn@ensimag.imag.fr Shaima Al Awadi ENSIMAG Grenble, France shayma.al-awadi@ensimag.imag.fr ABSTRACT This paper presents dictinary based attacks in additin t their crrespnding MD5 SHA implementatin n GPU CPU. All cmputatinal time testing was prgrammed in CUDA- C language. Kaapi Adaptive Stard Template Library (KASTL) was utilized t aid in perfrming parallel CPU peratins cmplimenting tday s widely spread systems with multiprcessrs r multi-cre prcessrs. Cmprehensive analysis f perfrmed dictinary attacks are detailed thrughut this paper with perfrmance results highlighted twards the cnclusin. Keywrds Dictinary Attack, Cryptgraphic Hash Functin, GPU, CPU, MD5, SHA, KASTL, CUDA, Parallel Executin, Passwrd Cracking.. INTRODUCTION In cmputer security, a dictinary attack is a technique used by cryptanalysts t break the security f the system by attempting t retrieve its decryptin passphrase by searching all likely pssibilities. Operating systems stre passwrds in their message digest frm, cmputed frm ne way functins. In cryptgraphy, ne-way functins are prcedures that are easy t cmpute fr a given input, yet cmplex t inverse in plynmial time. A hash functin takes an input prduces a string f fixed size, ften called message digest. Operating systems stre hash values f passwrds cmpare them with message digests f userentered keys. Cryptgraphic hash functins their respective implementatin in dictinary-based attacks n graphic prcessrs are receiving cnsiderable attentin wrldwide. Realtime mdeling f parallelized cryptgraphic hash functins has expedite perfrmance expectatins detected n theretical mdeling. It was fund that cryptgraphic hash functins perfrm much faster mre efficiently n GPUs than they d n CPUs. Because GPUs allw fr parallel thread executin, parallelized hash functins are the natural chice fr fastest dictinary attack results; especially when dealing with extremely lng messages. This paper takes a deeper lk at dictinary based attack n MD5 SHA based passwrds, discusses their implementatin n CPU GPU, analyzing executins cmparing results. Objectives: Detect any factrs that influence the perfrmance f dictinary based attacks n cryptgraphic hash functins n multicre prcessrs multi-prcessr systems. Determine the feasibility f perfrming dictinary based attacks n hash values n GPU cmpared t CPU. Explre the acceptability f the new rle that GPUs take in tday s cmputerized systems 2. DICTIONARY ATTACKS BASED ON MD5 AND SHA 2. DICTIONARY ATTACKS Dictinary based attacked are basically using brute frce technique t systematically g thrugh a list f wrds frm a specific wrdlist f chice. These wrds list can be based n wrds frm the dictinary r cmmnly knwn used passwrd list that are available all ver the internet. The success in a dictinary based attacks depends n the wrdlist used; that is the amunt f pssibilities t g thrugh. Tday, mst webpages sftware s stre the user passwrds hashed using ne f the many available ne-way hash functins. In ur reprt we fcused n MD5 SHA hashed passwrds, as they are frm the tp cmmnly used hashed functins. We tackled this prject by using a wrdlist that was available nline with the mst cmmnly used wrds. The idea is t hash each wrd in the wrdlist then t cmpare t the hash f the wrd that e want t crack. 2.2 Parallelizatin f Dictinary Attacks Recvery f hash digests f passwrds using dictinary wrds is ideal fr parallel cmputing. In essence the dictinary based attacked are parallel in nature due t ability t perfrm each peratin independently withut any dependencies between them., the fact that mdern iterated hash algrithms require sufficiently lng time t cmpute n single cre prcessr especially fr lng messages, extensin f dictinary based attack using hash algrithms t supprt parallel cmputing will significantly increase perfrmance f a cracking the hashed passwrd. The parallelizatin n the CPU is a bit mre cmplex then parallelizatin n GPU. CPU are made mre suited fr parallel task situatins where prcesses run parallel but require cmmunicatin pssibly have dependencies between them, where as GPU are develped t hle parallel data prcessing, due t the nature f it usage, that is hle graphics, where units f graphics peratins are dne in parallel with hardly any dependencies. 2.3 MD5 Based n the earlier hash functin MD4, MD5 was designed by Rn Rivest; last in successin f cryptgraphic hash functins. It became an internet stard has been integrated in a variety f security applicatins such as SSL/TLS IPSec. MD5 uses Merkle-Damgard paradigm such that the security f the hash functin reduces t the security f its relevant cmpressin functin.
2 MD5 s algrithm is designed t take an arbitrary input prduce a fixed 28-bit utput. The input is padded such that its length is 448 mdul 52, a 64-bit representing the length f the message is appended befre padding. A fur-wrd f 28-bit buffer (A, B, C, D) is initialized as fllws: A = B = 89ABCDEF C = FEDCBA98 D = Then, the message is prcessed in 6-wrd (52-bit) chunks, using 4 runds f 6-bit peratins each. The cmpressin functin f MD5 is cmpsed f runds, where each rund has 6 steps f the fllwing frm:,, Where: a, b, c, d are the fur wrds f the buffer, but are used in varied permutatins. g(b, c, d) is a different nnlinear functin in each rund (F,G,H,I). fr example, in rund,,, T[i] is a cnstant value derived frm the sin functin X[k] is derived frm a 52-blck f the message. Exp 6 wrds int eighty wrds by mixing shifting. Use 4 runds f 2 peratins n message blck buffer. The cmpressin functin has runds f 2 steps each, updates the buffer as fllws:,,,,,,, 5 _ _,, 3,, t is the step number, f(t,b,c,d) is a nn-linear functin fr the rund, W t is derived frm the message blck K t is a cnstant value derived frm the sin functin S k is a circular left shift by k bits Figure Message Digest 5 Hashing Algrithm: takes message f arbitrary size after a sequence f prcedures runds, prduces an utput f 28-bits. 2.4 SHA Unlike MD5, SHA prduces a 6-bit utput digest frm a message with a maximum length f bits. Althugh SHA is based n the same principles that Rn Rivest used fr MD5, SHA has a mre cnservative design than that f MD5. In SHA, the message we have is padded in rder t becme a multiple f 52 bits, it is split int 6 32-bit wrds, 52 blcks. A 5-wrd f 6-bit buffer is initialized as fllws: A = B = EFCDAB89 C = 98BADCFE D = E = C3D2EF The message is then prcessed in 6-wrd (52-bit) chunks as fllws: 3. EXPERMENTATION PROCEDURE T d ur experimentatin used a wide range f wrds in each wrdlist file. The number f wrds that we ested fr are arund:.5millin, millin, 2millin, 4millin, 6millin 8millin. We als tested n files smaller then millin, just t see the perfrmance between the GPU CPU in cmputatin GPU memry cpy prcedure time. But due the speed that the hashes were cmputed it was best testt n file with large amunt f data. The wrdlist were retrieved frm different surces n the net, but mainly hashkiller.cm, whichh has a list f cmbinatin f dictinary wrd als cmmnly used passwrd by users. The wrds in the file were increased by adding arbitrary wrds. There is a pssibility f the repetitiveness f the wrd in these huge files, but thesee files are used fr perfrmance testing repetitiveness f the wrd desn t affect the result. Figure 2 SHA Hash Algrithm Our main aim was t try test the time it takes t cmpares hash with the hashes f all the wrds in the list, s wrst cases scenari was taken when the hash wasn t in the list. The systems fr the test are the fllwing: Table. Systems used fr the experimentatin ID. Prcessr GPU Card INTEL Cre 2 Du 2.4 NVIDIA Quadr NVS GHZ 32M INTEL Cre 2 Du, 2.5 NVIDIA GeFrce 86 GHZ GS 8 * AMD Optern 875, 2 x NVIDIA GeFrce ttal 6 cres, 2.2 GHZ GTX 28
3 Thrughut this paper wherever required we wuld refer t the systems illustrated in Table as, idkiff. 4. DICTIONARY ATTACKS ON CPUs 4. KASTL KASTL (Kaapi Adaptive Stard Template Library) is a tl that was develped by the INRIA lab that runs n tp f KAAPI. It allws fr the parallelizatin f STL algrithms based n wrk stealing implementatin f KAAPI. In general it allws parallelizing certain tasks, especially lps that are prcessed n CPU with multi-cres. There are ther tls in the market that allw us t parallelize tasks such as Cilk++ Intel Thread Building Blcks (TBB). We had several issues trying t get Cilk++ t wrk n ur systems, due t time restrictins, we decided t perfrm ur parallelizatin with KASTL as we are als been able t get in tuch with the develper if any issues were raised. 4.2 Implementatin 4.2. MD5 T enable us t parallelize the MD5 implementatin we had t first mdify the cde we fund n the web that was develped by Mari Juric [4]. The cde has tw mde f peratins a search just a general verall hashing functin. We were interested in the search, but it was nly implemented fr GPU. Our first task was t create a functin that wuld allw us t d the search using the CPU prcessing in ne run f the prgram, als keeping in mind that we wuld like t be able t parallelize it t with KASTL. The implementatin f MD5 CPU prcessing was straightfrward but we had t a lt f issues with getting KASTL implementatin dne prperly. We tk the assistance f MR. Trare whse PHD thesis is based n KASTL. The STL algrithm that we were trying t parallelize was std::transfrm, s the lp fr the hash was mdified t make use f the transfrm functin. Once that was achieved, we cnverted the std::transfrm functin t the kastl::transfrm which takes in the same cncept but with slight mdificatin. We re basically giving it extra parameters indicating where the utput result shuld be stred SHA Fr the SHA hash implementatin we used the cde that was develped by Mr. Vilkeliskis [5]. The cde had the SHA implementatin fr the CPU straightfrward, s, we plugged it in the prgram we used fr MD5, where fr each lp thrugh the wrdlist, instead f hashing it with the MD5, we hashed it with SHA, the same we did fr the wrd that we wanted t crack. The kastl::transfrm functin stayed the same as fr MD5, s that helped speed up the implementatin fr SHA. 4.3 Experiments The experiments were dne n the three systems mentined in table as per the experimentatin prcedures mentined in sectin 3 f this reprt. Each systems ttal cre was exhausted in each test perfrmed, t make sure that we parallelize the peratin as much as pssible. Figure 3 Figure 4 shw the perfrmance f the systems upn executing MD5 SHA algrithms n each. Figure 3 MD5 Systems Perfrmance m m 2m 3m 4m 8m.5m m 2m 3m 4m 8m Figure 4 SHA System Perfrmance We can clearly see that perfrmance n idkiff was much higher then the perfrmance f the ther tw systems, as idkiff has a ttal f 6 cres available fr usage. We als nticed as was expected frm reprts read that dictinary attacks n SHA was slwer than MD5. We can definitely say that the increase in cre f the prcess almst cut the prcessing time by half. 5. PARALLEL DICTIONARY ATTACKS ON GPU 5. CUDA Graphic Prcessrs are difficult t prgram fr general-purpse uses. Prgrammers can either learn graphics APIs r cnvert their applicatins t use graphics pipeline peratins, r they can use stream prgramming abstractins n GPUs. NVIDIA released a sftware develpment kit named Cmpute Unified Device Architecture (CUDA) fr its graphics hardware in February 27. CUDA allws prgrammers t access the cmputing pwer f GPU directly. Prgrammers use C fr CUDA t develp prgrams fr executin n GPUs. CUDA s mst utilized benefits is its use f shared memry, a fast regin that can be shared amngst threads. 5.2 Implementatin 5.2. MD5 The cde used fr the GPU was mainly taken als frm the same develper wh we used the MD5 CPU implementatin frm Mr. Juric [7]. The GPU implementatin he had at a first glance seem t be wrking just as we wanted. There was slight mdificatin dne n the cde, mainly separating the CPU GPU peratins s
4 that they can be run independently, als simplify the running prcedure withut the extra parameters that the develper included fr benchmarking extra search feature. In the initial stages, a lt f wrk was dne trying t tweak the shared memry, the numbers f threads per blcks that is assigned fr each prcess t see if it wuld increase the perfrmance f the GPU peratin SHA The cde used fr the GPU implementatin f SHA was develped by Mr. Vilkeliskis. The implementatin was dne fr single hashing thrugh GPU, withut taking full effect f GPU capabilities. He did have a benchmarking technique where he ges thrugh a list f arbitrary values t check the perfrmance. These values are nt passed frm glbal functin but rather, are lped frm within the device. This technique wuldn t have been useful fr ur implementatin as it wuld mean fr each wrd we have t cpy it individually t the device then run it, als desn t take full effect GPU parallelism capabilities. Our implementatin fr SHA n GPU was then cnsistent f tw main tasks, trying t use the MD5 implementatin f GPU that is cpying the wrds as a batch t the device, t try use the shared memry that was used in the MD5 implementatin. This was basically a straightfrward implementatin frm the GPU MD5 functin with a slight tweaking t enable us t prduce SHA hashes rather than MD5 hashes. The SHA implementatin interface was als adpted t use the same interface as the MD5 implementatin. 5.3 Experiments The experiments in this sectin were als dne n the 3 systems mentined in table as per the experimentatin prcedures mentined in sectin 3 f this reprt. We have prvided figure fr bth the SHA MD5 dictinary attack times, with withut memry cnsideratin. We fund ut that memry peratin takes a lt f verhead f the verall GPU prcessing time. It was unexpected t find that even thugh the idkiff prcessing time was extremely fast cmpared t the ther systems, the memry peratin threw ff the results nce we cnsidered the memry peratin f cpying frm t the device m m 2m 3m 4m 8m Figure 5 MD5 GPU withut memry peratin cnsideratin TIme / s Figure 6 MD5 GPU with memry peratin cnsideratin m m 2m 3m 4m 8m Figure 7 SHA GPU withut memry cnsideratin m mil 2mil 3mil 4mil 8mil.5m mil 2mil 3mil 4mil 8mil Figure 8 SHA GPU with memry cnsideratin 6. COMPARATIVE ANALYSIS We nticed verall the perfrmance n the GPU were much higher than that f CPU. In exceptin is the idkiff system where even the prcessing time f each thread was prcessed extremely fast almst 5x faster than the CPU, but with the memry cnsideratin it drps it dwn t arund.5x faster. Thugh there was a prblem with the cpy t the GPU memry, as it is very slw time cnsuming which drpped the GPU perfrmance n that system much slwer than that f the CPU 6-multicre perfrmance. T sum up we added tw extra figure shwing the GPU CPU multi-cre perfrmance n the idkiff server with withut the memry cnsideratin.
5 Time/Secnd Figure 9 system CPU GPU perfrmance withut GPU memry cnsideratin Time/Secnd m m 2m 3m 4m 8m.5m m 2m 3m 4m 8m SHA CPU SHA GPU MD5 CPU MD5 GPU SHA CPU SHA GPU MD5 CPU MD5 GPU 8. REFERENCES [] Znenberg, A. 29. Distributed Hash Cracker: A Crss- Platfrm GPU-Accelerated Passwrd Recvery System. Rensselaer Plytechnic Institute. [2] Ruane, J. 26. General Purpse Cmputing with a Graphics Prcessing Unit. Dublin Institute f Technlgy. Vl. [3] Bernaschi, M. Bissn, M. Gabrielli, E. & Taccni, S. 29. An Architecture fr Distributed Dictinary Attacks n Cryptsystems. Jurnal f Cmputers. Vl 4. N. 5. [4] Vilkeliskis, T. 28. Cmputing SHA message digest n GPU (PwerPint). Retrieved frm [5] Vilkeliskis, T. 28. Cmputing SHA message digest n GPU [Sftware]. Available frm [6] Cllange, S. Daumas, M. Dass, Y. S. & Defur, D. Using Graphics Prcessrs fr Parallelizing Hash-based Data Carving. 29. Prceedings f the 42 nd Hawaii Internatinal Cnference n Cmputer Sciences. Hawaii, United States. [7] Juric, M. 28. CUDA MD5 Hashing Experiments [Sftware]. Available frm [8] Radev, R. 28. GPU Cmputing CUDA (PwerPint). Retrieved frm [9] Farber, R. 28. CUDA, Supercmputing fr the masses. Retrieved frm Figure system CPU GPU perfrmance with GPU memry cnsideratin 7. CONCLUSION AND PERSPECTIVE Finally, we were able t see the difference in perfrming dictinary based attacks n ne-way cryptgraphic hashing functins in particular MD5 SHA. Overall in bth GPU CPU tests cracking MD5 hashed passwrds are faster than that f SHA. Als using GPU t crack the hashed passwrd did give a kick t the speed, except maybe in system where the verhead in memry exchange was a lt. It wuld have been mre interesting t been able t include a wider range f ne-way hashing functins such as SHA256 SHA52 r any f the new hashing functins that have been submitted t the NIST hash functin cmpetitin such as MD6 r Skein in the test that were perfrmed.
B Tech Project First Stage Report on
B Tech Prject First Stage Reprt n GPU Based Image Prcessing Submitted by Sumit Shekhar (05007028) Under the guidance f Prf Subhasis Chaudhari 1. Intrductin 1.1 Graphic Prcessr Units A graphic prcessr unit
More informationIt has hardware. It has application software.
Q.1 What is System? Explain with an example A system is an arrangement in which all its unit assemble wrk tgether accrding t a set f rules. It can als be defined as a way f wrking, rganizing r ding ne
More informationUFuRT: A Work-Centered Framework and Process for Design and Evaluation of Information Systems
In: Prceedings f HCI Internatinal 2007 UFuRT: A Wrk-Centered Framewrk and Prcess fr Design and Evaluatin f Infrmatin Systems Jiajie Zhang 1, Keith A. Butler 2 1 University f Texas at Hustn, 7000 Fannin,
More informationUsing SPLAY Tree s for state-full packet classification
Curse Prject Using SPLAY Tree s fr state-full packet classificatin 1- What is a Splay Tree? These ntes discuss the splay tree, a frm f self-adjusting search tree in which the amrtized time fr an access,
More informationExploring the Viability of the Cell Broadband Engine for Bioinformatics Applications
Explring the Viability f the Cell Bradband Engine fr Biinfrmatics Applicatins Authrs: Vipin Sachdeva, Michael Kistler, Evan Speight and Tzy-Hwa Kathy Tzeng Presentatin by: Keyur Malaviya Dept f Cmputer
More informationOperating systems. Module 7 IPC (Interprocess communication) PART I. Tami Sorgente 1
Operating systems Mdule 7 IPC (Interprcess cmmunicatin) PART I Tami Srgente 1 INTERPROCESS COMMUNICATION Prcesses within a system may be independent r cperating Cperating prcess can affect r be affected
More informationParallel Processing in NCAR Command Language for Performance Improvement
Parallel Prcessing in NCAR Cmmand Language fr Perfrmance Imprvement Ping Gu, University f Wyming Mentr: Wei Huang, NCAR C- Mentr: Dave Brwn, NCAR August 1, 2013 Intrductin and Mtivatin ² The NCAR Cmmand
More informationINSTALLING CCRQINVOICE
INSTALLING CCRQINVOICE Thank yu fr selecting CCRQInvice. This dcument prvides a quick review f hw t install CCRQInvice. Detailed instructins can be fund in the prgram manual. While this may seem like a
More informationDue Date: Lab report is due on Mar 6 (PRA 01) or Mar 7 (PRA 02)
Lab 3 Packet Scheduling Due Date: Lab reprt is due n Mar 6 (PRA 01) r Mar 7 (PRA 02) Teams: This lab may be cmpleted in teams f 2 students (Teams f three r mre are nt permitted. All members receive the
More informationPastry dough mixing. Problems with traditional systems. Data Encryption Standard. CS349 Cryptography
Pastry dugh mixing Data Encryptin Standard CS349 Cryptgraphy Department f Cmputer Science Wellesley Cllege Prblems with traditinal systems We assume that an attacker has at least sme knwledge f the statistical
More informationRetrieval Effectiveness Measures. Overview
Retrieval Effectiveness Measures Vasu Sathu 25th March 2001 Overview Evaluatin in IR Types f Evaluatin Retrieval Perfrmance Evaluatin Measures f Retrieval Effectiveness Single Valued Measures Alternative
More informationOn the road again. The network layer. Data and control planes. Router forwarding tables. The network layer data plane. CS242 Computer Networks
On the rad again The netwrk layer data plane CS242 Cmputer Netwrks The netwrk layer The transprt layer is respnsible fr applicatin t applicatin transprt. The netwrk layer is respnsible fr hst t hst transprt.
More informationThe UNIVERSITY of NORTH CAROLINA at CHAPEL HILL
Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Cmp 541 Digital Lgic and Cmputer Design Spring 2016 Lab Prject (PART A): A Full Cmputer! Issued Fri 4/8/16; Suggested
More informationStealing passwords via browser refresh
Stealing passwrds via brwser refresh Authr: Karmendra Khli [karmendra.khli@paladin.net] Date: August 07, 2004 Versin: 1.1 The brwser s back and refresh features can be used t steal passwrds frm insecurely
More informationCS510 Concurrent Systems Class 2. A Lock-Free Multiprocessor OS Kernel
CS510 Cncurrent Systems Class 2 A Lck-Free Multiprcessr OS Kernel The Synthesis kernel A research prject at Clumbia University Synthesis V.0 ( 68020 Uniprcessr (Mtrla N virtual memry 1991 - Synthesis V.1
More informationChapter 14. Basic Planning Methodology
Chapter 14 Basic Planning Methdlgy This chapter prvides a basic and generic methdlgy fr planning prtectin requirements. It fcuses n the primary cnsideratins fr designing and implementing a basic strage
More informationCS4500/5500 Operating Systems Computer and Operating Systems Overview
Operating Systems Cmputer and Operating Systems Overview Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOS4E, OS@Austin, Clumbia, UWisc Overview Recap
More informationComputer Organization and Architecture
Campus de Gualtar 4710-057 Braga UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA Departament de Infrmática Cmputer Organizatin and Architecture 5th Editin, 2000 by William Stallings Table f Cntents I. OVERVIEW.
More informationNVIDIA S KEPLER ARCHITECTURE. Tony Chen 2015
NVIDIA S KEPLER ARCHITECTURE Tny Chen 2015 Overview 1. Fermi 2. Kepler a. SMX Architecture b. Memry Hierarchy c. Features 3. Imprvements 4. Cnclusin 5. Brief verlk int Maxwell Fermi ~2010 40 nm TSMC (sme
More informationContents: Module. Objectives. Lesson 1: Lesson 2: appropriately. As benefit of good. with almost any planning. it places on the.
1 f 22 26/09/2016 15:58 Mdule Cnsideratins Cntents: Lessn 1: Lessn 2: Mdule Befre yu start with almst any planning. apprpriately. As benefit f gd T appreciate architecture. it places n the understanding
More informationHierarchical Classification of Amazon Products
Hierarchical Classificatin f Amazn Prducts Bin Wang Stanfrd University, bwang4@stanfrd.edu Shaming Feng Stanfrd University, superfsm@ stanfrd.edu Abstract - This prjects prpsed a hierarchical classificatin
More informationComputer Organization and Architecture
Campus de Gualtar 4710-057 Braga UNIVERSIDADE DO MINHO ESCOLA DE ENGENHARIA Departament de Infrmática Cmputer Organizatin and Architecture 5th Editin, 2000 by William Stallings Table f Cntents I. OVERVIEW.
More informationWEB LAB - Subset Extraction
WEB LAB - Subset Extractin Fall 2005 Authrs: Megha Siddavanahalli Swati Singhal Table f Cntents: Sl. N. Tpic Page N. 1 Abstract 2 2 Intrductin 2 3 Backgrund 2 4 Scpe and Cnstraints 3 5 Basic Subset Extractin
More informationChapter 6: Lgic Based Testing LOGIC BASED TESTING: This unit gives an indepth verview f lgic based testing and its implementatin. At the end f this unit, the student will be able t: Understand the cncept
More informationScatter Search And Bionomic Algorithms For The Aircraft Landing Problem
Scatter Search And Binmic Algrithms Fr The Aircraft Landing Prblem J. E. Beasley Mathematical Sciences Brunel University Uxbridge UB8 3PH United Kingdm http://peple.brunel.ac.uk/~mastjjb/jeb/jeb.html Abstract:
More informationUsing CppSim to Generate Neural Network Modules in Simulink using the simulink_neural_net_gen command
Using CppSim t Generate Neural Netwrk Mdules in Simulink using the simulink_neural_net_gen cmmand Michael H. Perrtt http://www.cppsim.cm June 24, 2008 Cpyright 2008 by Michael H. Perrtt All rights reserved.
More informationAn Introduction to Crescendo s Maestro Application Delivery Platform
An Intrductin t Crescend s Maestr Applicatin Delivery Platfrm Intrductin This dcument is intended t serve as a shrt intrductin t Crescend s Maestr Platfrm and its cre features/benefits. The dcument will
More informationPerformance of VSA in VMware vsphere 5
Perfrmance f VSA in VMware vsphere 5 Perfrmance Study TECHNICAL WHITE PAPER Table f Cntents Intrductin... 3 Executive Summary... 3 Test Envirnment... 3 Key Factrs f VSA Perfrmance... 4 Cmmn Strage Perfrmance
More informationGreg Dias, Alex Wilson. Fermi
Greg Dias, Alex Wilsn Fermi Agenda Cmputer Graphics and Parallelism Basic GPU structure NVIDIA Fermi and CUDA Graphics Rendering Methds Plygn Rendering Ray Tracing Plygn Rendering Apprximatin f cmplex
More informationECE 545 Project Deliverables
Tp-level flder: _ Secnd-level flders: 1_assumptins 2_blck_diagrams 3_interface 4_ASM_charts 5_surce_cdes 6_verificatin 7_timing_analysis 8_results 9_benchmarking 10_bug_reprts
More informationImplementation of Authentication Mechanism for a Virtual File System
Implementatin f Authenticatin Mechanism fr a Virtual File System Prject fr Operating Systems Curse (CS 5204) Implemented by- Vinth Jagannathan Abhishek Ram Under the guidance f Dr Dennis Kafura Abstract
More informationPlease contact technical support if you have questions about the directory that your organization uses for user management.
Overview ACTIVE DATA CALENDAR LDAP/AD IMPLEMENTATION GUIDE Active Data Calendar allws fr the use f single authenticatin fr users lgging int the administrative area f the applicatin thrugh LDAP/AD. LDAP
More informationMcGill University School of Computer Science COMP-206. Software Systems. Due: September 29, 2008 on WEB CT at 23:55.
Schl f Cmputer Science McGill University Schl f Cmputer Science COMP-206 Sftware Systems Due: September 29, 2008 n WEB CT at 23:55 Operating Systems This assignment explres the Unix perating system and
More informationIn-Class Exercise. Hashing Used in: Hashing Algorithm
In-Class Exercise Hashing Used in: Encryptin fr authenticatin Hash a digital signature, get the value assciated with the digital signature,and bth are sent separately t receiver. The receiver then uses
More informationCS4500/5500 Operating Systems Synchronization
Operating Systems Synchrnizatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Recap f the Last Class Multiprcessr scheduling Tw implementatins f the ready
More informationSummary. Server environment: Subversion 1.4.6
Surce Management Tl Server Envirnment Operatin Summary In the e- gvernment standard framewrk, Subversin, an pen surce, is used as the surce management tl fr develpment envirnment. Subversin (SVN, versin
More informationBecause this underlying hardware is dedicated to processing graphics commands, OpenGL drawing is typically very fast.
The Open Graphics Library (OpenGL) is used fr visualizing 2D and 3D data. It is a multipurpse pen-standard graphics library that supprts applicatins fr 2D and 3D digital cntent creatin, mechanical and
More informationCSE 361S Intro to Systems Software Lab #2
Due: Thursday, September 22, 2011 CSE 361S Intr t Systems Sftware Lab #2 Intrductin This lab will intrduce yu t the GNU tls in the Linux prgramming envirnment we will be using fr CSE 361S this semester,
More informationIT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016
IT Essentials (ITE v6.0) Chapter 5 Exam Answers 100% 2016 1. What are tw functins f an perating system? (Chse tw.) cntrlling hardware access managing applicatins text prcessing flw chart editing prgram
More informationUML : MODELS, VIEWS, AND DIAGRAMS
UML : MODELS, VIEWS, AND DIAGRAMS Purpse and Target Grup f a Mdel In real life we ften bserve that the results f cumbersme, tedius, and expensive mdeling simply disappear in a stack f paper n smene's desk.
More informationThe UNIVERSITY of NORTH CAROLINA at CHAPEL HILL
Yu will learn the fllwing in this lab: The UNIVERSITY f NORTH CAROLINA at CHAPEL HILL Designing a mdule with multiple memries Designing and using a bitmap fnt Designing a memry-mapped display Cmp 541 Digital
More informationNVIDIA Tesla K20X GPU Accelerator. Breton Minnehan, Beau Sattora
NVIDIA Tesla K20X GPU Acceleratr Bretn Minnehan, Beau Sattra Overview Jb f the GPU Histry What is the K20X GK110 Benchmark Perfrmance Jb f the GPU Vertex Shader Applies transfrms n each vertex Applies
More informationUiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash
UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the
More informationHigh Security SaaS Concept Software as a Service (SaaS) for Life Science
Sftware as a Service (SaaS) fr Life Science Cpyright Cunesft GmbH Cntents Intrductin... 3 Data Security and Islatin in the Clud... 3 Strage System Security and Islatin... 3 Database Security and Islatin...
More informationLab 1 - Calculator. K&R All of Chapter 1, 7.4, and Appendix B1.2
UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 1 - Calculatr Intrductin In this lab yu will be writing yur first
More informationSystems & Operating Systems
McGill University COMP-206 Sftware Systems Due: Octber 1, 2011 n WEB CT at 23:55 (tw late days, -5% each day) Systems & Operating Systems Graphical user interfaces have advanced enugh t permit sftware
More informationSpeculative Parallelization. Devarshi Ghoshal
Speculative Parallelizatin Devarshi Ghshal Indiana University, Blmingtn 10/10/2011 1 Agenda Speculative Parallelizatin FastFrward-A Speculatin using Checkpint/Restart System Design Sftware-based Speculatin
More informationRapid Implementation Package
Implementatin Package Implementatin 1 Purpse The purpse f this dcument is t detail thse services BuildingPint NrthEast ( BPNE ) will prvide as part f the Prlg Rapid Implementatin Package. This package
More information1 Binary Trees and Adaptive Data Compression
University f Illinis at Chicag CS 202: Data Structures and Discrete Mathematics II Handut 5 Prfessr Rbert H. Slan September 18, 2002 A Little Bttle... with the wrds DRINK ME, (r Adaptive data cmpressin
More informationTekmos. TK68020 Microprocessor. Features. General Description. 9/03/14 1
Tekms TK68020 Micrprcessr September 3, 2014 Prduct Overview Features Addressing Mde Extensins fr Enhanced Supprt f High-Level Languages Object-Cde Cmpatible with Earlier M68000 Micrprcessrs Addressing
More informationOverview of Data Furnisher Batch Processing
Overview f Data Furnisher Batch Prcessing Nvember 2018 Page 1 f 9 Table f Cntents 1. Purpse... 3 2. Overview... 3 3. Batch Interface Implementatin Variatins... 4 4. Batch Interface Implementatin Stages...
More informationAn Efficient Low Area Implementation of 2-D DCT on FPGA
An Efficient Lw Area Implementatin f 2-D DCT n FPGA Atakan Dğan Anadlu University, Electrical and Electrnics Engineering, Eskişehir, Turkey atdgan@anadlu.edu.tr Abstract This paper presents the design
More informationChapter-10 INHERITANCE
Chapter-10 INHERITANCE Intrductin: Inheritance is anther imprtant aspect f bject riented prgramming. C++ allws the user t create a new class (derived class) frm an existing class (base class). Inheritance:
More informationXilinx Answer Xilinx PCI Express DMA Drivers and Software Guide
Xilinx Answer 65444 Xilinx PCI Express DMA Drivers and Sftware Guide Imprtant Nte: This dwnladable PDF f an Answer Recrd is prvided t enhance its usability and readability. It is imprtant t nte that Answer
More informationUsing the Swiftpage Connect List Manager
Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts
More informationInfrastructure Series
Infrastructure Series TechDc WebSphere Message Brker / IBM Integratin Bus Parallel Prcessing (Aggregatin) (Message Flw Develpment) February 2015 Authr(s): - IBM Message Brker - Develpment Parallel Prcessing
More informationAssignment #5: Rootkit. ECE 650 Fall 2018
General Instructins Assignment #5: Rtkit ECE 650 Fall 2018 See curse site fr due date Updated 4/10/2018, changes nted in green 1. Yu will wrk individually n this assignment. 2. The cde fr this assignment
More informationLow-Cost Solutions for Video Compression Systems
Overview Lw-Cst Slutins fr Cmpressin Systems Brian Jentz Altera Crpratin 101 Innvatin Drive San Jse, CA 9505, USA (08) 5-7709 bjentz@altera.cm Many device applicatins utilize vide cmpressin t reduce the
More informationLab 0: Compiling, Running, and Debugging
UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C SPRING 2012 Lab 0: Cmpiling, Running, and Debugging Intrductin Reading This is the
More informationHow to use DCI Contract Alerts
Hw t use DCI Cntract Alerts Welcme t the MyDCI Help Guide series Hw t use DCI Cntract Alerts In here, yu will find a lt f useful infrmatin abut hw t make the mst f yur DCI Alerts which will help yu t fully
More informationAustralian Statistics API Specification
Australian Statistics API Specificatin Versin: 1.2 Date Mdified: 23 March 2017 Page 1 The cntext... 2 Functins f the API... 2 2.1 Retail Trade API... 2 Input Parameters fr API... 3 Output Specificatin
More informationStudio Software Update 7.7 Release Notes
Studi Sftware Update 7.7 Release Ntes Summary: Previus Studi Release: 2013.10.17/2015.01.07 All included Studi applicatins have been validated fr cmpatibility with previusly created Akrmetrix Studi file
More informationLab 5 Sorting with Linked Lists
UNIVERSITY OF CALIFORNIA, SANTA CRUZ BOARD OF STUDIES IN COMPUTER ENGINEERING CMPE13/L: INTRODUCTION TO PROGRAMMING IN C WINTER 2013 Lab 5 Srting with Linked Lists Intrductin Reading This lab intrduces
More informationCustomized RTU for Local and Remote Supervision
AUSTRALIAN JOURNAL OF BASIC AND APPLIED SCIENCES ISSN:1991-8178 EISSN: 2309-8414 Jurnal hme page: www.ajbasweb.cm Custmized RTU fr Lcal and Remte Supervisin 1 Mayssa Hajar, 2 Raed ElRafei, 3 Khaled Muchref
More informationCCNA 1 Chapter v5.1 Answers 100%
CCNA 1 Chapter 11 2016 v5.1 Answers 100% 1. A newly hired netwrk technician is given the task f rdering new hardware fr a small business with a large grwth frecast. Which primary factr shuld the technician
More informationProject 4: System Calls 1
CMPT 300 1. Preparatin Prject 4: System Calls 1 T cmplete this assignment, it is vital that yu have carefully cmpleted and understd the cntent in the fllwing guides which are psted n the curse website:
More informationTeaching Operating Systems Scheduling
Prceedings f Infrming Science & IT Educatin Cnference (InSITE) 2010 Teaching Operating Systems Scheduling Shimn Chen MLA Academic Learning Center, Israel shamn51@gmail.cm Abstract The Operating System
More informationGetting Started with the SDAccel Environment on Nimbix Cloud
Getting Started with the SDAccel Envirnment n Nimbix Clud Revisin Histry The fllwing table shws the revisin histry fr this dcument. Date Versin Changes 09/17/2018 201809 Updated figures thrughut Updated
More informationCSE 3320 Operating Systems Synchronization Jia Rao
CSE 3320 Operating Systems Synchrnizatin Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Recap f the Last Class Multiprcessr scheduling Tw implementatins f the ready queue
More informationCAMPBELL COUNTY GILLETTE, WYOMING
CAMPBELL COUNTY GILLETTE, WYOMING System Supprt Analyst I System Supprt Analyst II Senir System Supprt Analyst Class specificatins are intended t present a descriptive list f the range f duties perfrmed
More informationUpdate: Users are updated when their information changes (examples: Job Title or Department). o
Learn Basic User Integratin Batch File Prcessing The Learn Basic User Integratin is designed t manage the rganizatinal changes cmpanies are challenged with n a daily basis. Withut a basic type f integratin,
More informationMICRO Graphicionado. A High-Performance and Energy-Efficient Graph Analytics Accelerator
MICRO 2016 Graphicinad A High-Perfrmance and Energy-Efficient Graph Analytics Acceleratr Tae Jun Ham Lisa Wu Narayanan Sundaram Nadathur Satish Margaret Martnsi Slide: http://tiny.cc/graphicinad Graph
More informationTo over come these problems collections are recommended to use. Collections Arrays
Q1. What are limitatins f bject Arrays? The main limitatins f Object arrays are These are fixed in size ie nce we created an array bject there is n chance f increasing r decreasing size based n ur requirement.
More informationM. Tavera, M. Alfonseca and J. Rojas IBM Madrid Scientific Center P. Castellana, 4. Madrid-l. SPAIN.
THE IBM PERSONAL COMPUTER APL SYSTEM M. Tavera, M. Alfnseca and J. Rjas IBM Madrid Scientific Center P. Castellana, 4. Madrid-l. SPAIN. INTRODUCTION AND HISTORY The Cmputer Science Department f the IBM
More informationUiPath Automation. Walkthrough. Walkthrough Calculate Client Security Hash
UiPath Autmatin Walkthrugh Walkthrugh Calculate Client Security Hash Walkthrugh Calculate Client Security Hash Start with the REFramewrk template. We start ff with a simple implementatin t demnstrate the
More informationPRECISION DMX USER GUIDE
PRECISION DMX USER GUIDE The Precisin DMX is the wrld s smallest DMX cntrllable theatrical fldlight. This RGB fixture is smaller than a fist yet packs cmparable punch t traditinal fixtures several times
More informationYou may receive a total of two GSA graduate student grants in your entire academic career, regardless of what program you are currently enrolled in.
GSA Research Grant Applicatin GUIDELINES & INSTRUCTIONS GENERAL INFORMATION T apply fr this grant, yu must be a GSA student member wh has renewed r is active thrugh the end f the award year (which is the
More informationCS4500/5500 Operating Systems Page Replacement Algorithms and Segmentation
Operating Systems Page Replacement Algrithms and Segmentatin Yanyan Zhuang Department f Cmputer Science http://www.cs.uccs.edu/~yzhuang UC. Clrad Springs Ref. MOSE, OS@Austin, Clumbia, Rchester Recap f
More informationUsing the DOCUMENT Procedure to Expand the Output Flexibility of the Output Delivery System with Very Little Programming Effort
Paper 11864-2016 Using the DOCUMENT Prcedure t Expand the Output Flexibility f the Output Delivery System with Very Little Prgramming Effrt ABSTRACT Rger D. Muller, Ph.D., Data T Events Inc. The DOCUMENT
More information- Replacement of a single statement with a sequence of statements(promotes regularity)
ALGOL - Java and C built using ALGOL 60 - Simple and cncise and elegance - Universal - Clse as pssible t mathematical ntatin - Language can describe the algrithms - Mechanically translatable t machine
More informationNORTHERN ILLINOIS UNIVERSITY
NORTHERN ILLINOIS UNIVERSITY Simulatr f IBM Mainframe Prgramming Envirnment A Thesis Submitted t the University Hnrs Prgram In Partial Fulfillment f the Requirements f the Baccalaureate Degree With University
More informationCSE 3320 Operating Systems Computer and Operating Systems Overview Jia Rao
CSE 3320 Operating Systems Cmputer and Operating Systems Overview Jia Ra Department f Cmputer Science and Engineering http://ranger.uta.edu/~jra Overview Recap f last class What is an perating system?
More informationWinEst 15.2 Installation Guide
WinEst 15.2 Installatin Guide This installatin guide prvides yu with step-by-step instructins n hw t install r upgrade WinEst. Fr a successful installatin, ensure that all machines meet the requirements.
More informationCreating a TES Encounter/Transaction Entry Batch
Creating a TES Encunter/Transactin Entry Batch Overview Intrductin This mdule fcuses n hw t create batches fr transactin entry in TES. Charges (transactins) are entered int the system in grups called batches.
More informationFIPS Level 1 Security Policy Version Number: 1.5 Date: February 29, 2016
Nn-Prprietary Bx JCA Cryptgraphic Mdule 1.0 FIPS 140-2 Level 1 Security Plicy Versin Number: 1.5 Date: February 29, 2016 Table f Cntents 1. MODULE OVERVIEW 3 2. MODES OF OPERATION 5 2.1 APPROVED CRYPTOGRAPHIC
More informationEastern Mediterranean University School of Computing and Technology Information Technology Lecture2 Functions
Eastern Mediterranean University Schl f Cmputing and Technlgy Infrmatin Technlgy Lecture2 Functins User Defined Functins Why d we need functins? T make yur prgram readable and rganized T reduce repeated
More informationAloha Offshore SDLC Process
Alha Sftware Develpment Life Cycle Alha Offshre SDLC Prcess Alha Technlgy fllws a sftware develpment methdlgy that is derived frm Micrsft Slutins Framewrk and Ratinal Unified Prcess (RUP). Our prcess methdlgy
More informationSetting up the ncipher nshield HSM for use with Kerberized Certificate Authority
Setting up the ncipher nshield HSM fr use with Kerberized Certificate Authrity Intrductin This dcument cntains instructins fr setting up ncipher nshield hardware security mdules (HSM) fr use with the Kerberized
More informationImagine for MSDNAA Student SetUp Instructions
Imagine fr MSDNAA Student SetUp Instructins --2016-- September 2016 Genesee Cmmunity Cllege 2004. Micrsft and MSDN Academic Alliance are registered trademarks f Micrsft Crpratin. All rights reserved. ELMS
More informationMunicode Website Instructions
Municde Website instructins Municde Website Instructins The new and imprved Municde site allws yu t navigate t, print, save, e-mail and link t desired sectins f the Online Cde f Ordinances with greater
More informationQuerying Data with Transact SQL
Querying Data with Transact SQL Curse Cde: 20761 Certificatin Exam: 70-761 Duratin: 5 Days Certificatin Track: MCSA: SQL 2016 Database Develpment Frmat: Classrm Level: 200 Abut this curse: This curse is
More informationRelius Documents ASP Checklist Entry
Relius Dcuments ASP Checklist Entry Overview Checklist Entry is the main data entry interface fr the Relius Dcuments ASP system. The data that is cllected within this prgram is used primarily t build dcuments,
More informationThe programming for this lab is done in Java and requires the use of Java datagrams.
Lab 2 Traffic Regulatin This lab must be cmpleted individually Purpse f this lab: In this lab yu will build (prgram) a netwrk element fr traffic regulatin, called a leaky bucket, that runs ver a real netwrk.
More informationGuidance for Applicants: Submitting an application in AAS Ishango Grants Management
Guidance fr Applicants: Submitting an applicatin in AAS Ishang Grants Management Histry f changes Versin Date Changes 1 Nv 2016 Current versin Pushing the centre f gravity t Africa 1 Table f Cntents 1
More information$ARCSIGHT_HOME/current/user/agent/map. The files are named in sequential order such as:
Lcatin f the map.x.prperties files $ARCSIGHT_HOME/current/user/agent/map File naming cnventin The files are named in sequential rder such as: Sme examples: 1. map.1.prperties 2. map.2.prperties 3. map.3.prperties
More informationLaboratory #13: Trigger
Schl f Infrmatin and Cmputer Technlgy Sirindhrn Internatinal Institute f Technlgy Thammasat University ITS351 Database Prgramming Labratry Labratry #13: Trigger Objective: - T learn build in trigger in
More informationUsing the Swiftpage Connect List Manager
Quick Start Guide T: Using the Swiftpage Cnnect List Manager The Swiftpage Cnnect List Manager can be used t imprt yur cntacts, mdify cntact infrmatin, create grups ut f thse cntacts, filter yur cntacts
More informationIteration Part 2. Review: Iteration [Part 1] Flow charts for two loop constructs. Review: Syntax of loops. while continuation_condition : statement1
Review: Iteratin [Part 1] Iteratin Part 2 CS111 Cmputer Prgramming Department f Cmputer Science Wellesley Cllege Iteratin is the repeated executin f a set f statements until a stpping cnditin is reached.
More informationSoftware Toolbox Extender.NET Component. Development Best Practices
Page 1 f 16 Sftware Tlbx Extender.NET Cmpnent Develpment Best Practices Table f Cntents Purpse... 3 Intended Audience and Assumptins Made... 4 Seeking Help... 5 Using the ErrrPrvider Cmpnent... 6 What
More informationProcurement Contract Portal. User Guide
Prcurement Cntract Prtal User Guide Cntents Intrductin...2 Access the Prtal...2 Hme Page...2 End User My Cntracts...2 Buttns, Icns, and the Actin Bar...3 Create a New Cntract Request...5 Requester Infrmatin...5
More information