Proceedings of the 10 th USENIX Security Symposium

Size: px
Start display at page:

Download "Proceedings of the 10 th USENIX Security Symposium"

Transcription

1 USENIX Associatio Proceedigs of the 0 th USENIX Security Symposium Washigto, DC, USA August 3 7, 00 THE ADVANCED COMPUTING SYSTEMS ASSOCIATION 00 by The USENIX Associatio All Rights Reserved For more iformatio about the USENIX Associatio: Phoe: FAX: office@useixorg WWW: Rights to idividual papers remai with the author or the author's employer Permissio is grated for ocommercial reproductio of the work for educatioal or research purposes This copyright otice must be icluded i the reproduced paper USENIX ackowledges all trademarks herei

2 Timig Aalysis of Keystrokes ad Timig Attacks o SSH Daw Xiaodog Sog David Wager Xuqig Tia Uiversity of Califoria, Berkeley Abstract Itroductio SSH is desiged to provide a secure chael betwee two hosts Despite the ecryptio ad autheticatio mechaisms it uses, SSH has two weakess: First, the trasmitted packets are padded oly to a eight-byte boudary (if a block cipher is i use), which reveals the approximate size of the origial data Secod, i iteractive mode, every idividual keystroke that a user types is set to the remote machie i a separate IP packet immediately after the key is pressed, which leaks the iterkeystroke timig iformatio of users typig I this paper, we show how these seemigly mior weakesses result i serious security risks First we show that eve very simple statistical techiques suffice to reveal sesitive iformatio such as the legth of users passwords or eve root passwords More importatly, we further show that by usig more advaced statistical techiques o timig iformatio collected from the etwork, the eavesdropper ca lear sigificat iformatio about what users type i SSH sessios I particular, we perform a statistical study of users typig patters ad show that these patters reveal iformatio about the keys typed By developig a Hidde Markov Model ad our key sequece predictio algorithm, we ca predict key sequeces from the iterkeystroke timigs We further develop a attacker system, Herbivore, which tries to lear users passwords by moitorig SSH sessios By collectig timig iformatio o the etwork, Herbivore ca speed up exhaustive search for passwords by a factor of 50 We also propose some coutermeasures I geeral our results apply ot oly to SSH, but also to a geeral class of protocols for ecryptig iteractive traffic We show that timig leaks ope a ew set of security risks, ad hece cautio must be take whe desigig this type of protocol This research was supported i part by the Defese Advaced Research Projects Agecy uder DARPA cotract N (uder supervisio of the Space ad Naval Warfare Systems Ceter Sa Diego) ad by the Natioal Sciece foudatio uder grats FD ad CCR Just a few years ago, people commoly used astoishigly isecure etworkig applicatios such as telet, rlogi, or ftp, which simply pass all cofidetial iformatio, icludig users passwords, i the clear over the etwork This situatio was aggravated through broadcast-based etworks that were commoly used (eg, Etheret) which allowed a malicious user to eavesdrop o the etwork ad to collect all commuicated iformatio [CB94, GS96] Fortuately, may users ad system admiistrators have become aware of this issue ad have take coutermeasures To curb eavesdroppers, security researchers desiged the Secure Shell (SSH), which offers a ecrypted chael betwee the two hosts ad strog autheticatio of both the remote host ad the user [Ylö96, SSL0, YKS 00b] Today, SSH is quite popular, ad it has largely replaced telet ad rlogi May users believe that they are secure agaist eavesdroppers if they use SSH Ufortuately, i this paper we show that despite state-of-the-art ecryptio techiques ad advaced password autheticatio protocols [YKS 00a], SSH coectios ca still leak sigificat iformatio about sesitive data such as users passwords This problem is particularly serious because it meas users may have a false cofidece of security whe they use SSH I particular we idetify that two seemigly mior weakesses of SSH lead to serious security risks First, the trasmitted packets are padded oly to a eight-byte boudary (if a block cipher is i use) Therefore a eavesdropper ca easily lear the approximate legth of the origial data Secod, i iteractive mode, every idividual keystroke that a user types is set to the remote machie i a separate IP packet immediately after the key is pressed (except for some meta keys such Shift or Ctrl) We show i the paper that this property ca eable the eavesdropper to lear the exact legth of users passwords More importatly, as we have verified, the time it takes the operatig system to sed out the packet after the key press is i geeral egligible comparig to the iter-keystroke timig Hece a eaves-

3 dropper ca lear the precise iter-keystroke timigs of users typig from the arrival times of packets Experiece shows that users typig follows stable patters May researchers have proposed to use the duratio of key strokes ad latecies betwee key strokes as a biometric for user autheticatio [GLPS80, UW85, LW88, LWU89, JG90, BSH90, MR97, RLCM98, MRW99] A more challegig questio which has ot yet bee addressed i the literature is whether we ca use timig iformatio about key strokes to ifer the key sequeces beig typed If we ca, ca we estimate quatitatively how may bits of iformatio are revealed by the timig iformatio? Experiece seems to idicate that the timig iformatio of keystrokes reveals some iformatio about the key sequeces beig typed For example, we might have all experieced that the elapsed time betwee typig the two letters er ca be much smaller tha betwee typig qz This observatio is particularly relevat to security Sice as we show the attacker ca get precise iter-keystroke timigs of users typig i a SSH sessio by recordig the packet arrival times, if the attacker ca ifer what users type from the iter-keystroke timigs, the he could lear what users type i a SSH sessio from the packet arrival times I this paper we study users keyboard dyamics ad show that the timig iformatio of keystrokes does leak iformatio about the key sequeces typed Through more detailed aalysis we show that the timig iformatio leaks about bit of iformatio about the cotet per keystroke pair Because the etropy of passwords is oly 4 8 bits per character, this bit per keystroke pair iformatio ca reveal sigificat iformatio about the cotet typed I order to use iter-keystroke timigs to ifer keystroke sequeces, we build a Hidde Markov Model ad develop a -Viterbi algorithm for the keystroke sequece iferece To evaluate the effectiveess of the attack, we further build a attacker system, Herbivore, which moitors the etwork ad collects timig iformatio about keystrokes of users passwords Herbivore the uses our key sequece predictio algorithm for password predictio Our experimets show that, for passwords that are chose uiformly at radom with legth of 7 to 8 characters, Herbivore ca reduce the cost of password crackig by a factor of 50 ad hece speed up exhaustive search dramatically We also propose some coutermeasures to mitigate the problem We emphasize that the attacks described i this paper are a geeral issue for ay protocol that ecrypts iteractive traffic For cocreteess, we study primarily SSH, but these issues affect ot oly SSH ad SSH, but also I this paper we oly cosider users who are familiar with keyboard typig ad use touch typig ay other protocol for ecryptig typed data The outlie of this paper is as follows I Sectio we discuss i more details about the vulerabilities of SSH ad various simple techiques a attacker ca use to lear sesitive iformatio such as the legth of users passwords ad the iter-keystroke timigs of users passwords typed I Sectio 3 we preset our statistical study o users typig patters ad show that iter-keystroke timigs reveal about bit of iformatio per keystroke pair I Sectio 4 we describe how we ca ifer key sequeces usig a Hidde Markov Model ad a -Viterbi algorithm I Sectio 5 we describe the desig, developmet ad evaluatio of a attacker system, Herbivore, which lears users passwords by moitorig SSH sessios We propose coutermeasures to prevet these attacks i Sectio 7, ad coclude i Sectio 8 Eavesdroppig SSH The Secure Shell SSH [SSL0, YKS 00b] is used to ecrypt the commuicatio lik betwee a local host ad a remote machie Despite the use of strog cryptographic algorithms, SSH still leaks iformatio i two ways: First, the trasmitted packets are padded oly to a eight-byte boudary (if a block cipher is i use), which leaks the approximate size of the origial data Secod, i iteractive mode, every idividual keystroke that a user types is set to the remote machie i a separate IP packet immediately after the key is pressed (except for some meta keys such Shift or Ctrl) Because the time it takes the operatig system to sed out the packet after the key press is i geeral egligible comparig to the iterkeystroke timig (as we have verified), this also eables a eavesdropper to lear the precise iterkeystroke timigs of users typig from the arrival times of packets The first weakess poses some obvious security risks For example, whe oe logs ito a remote site R i SSH, all the characters of the iitial logi password are batched up, padded to a eight-byte boudary if a block cipher is i use, ecrypted, ad trasmitted to R Due to the way paddig is doe, a eavesdropper ca lear oe bit of iformatio o the iitial logi password, amely, whether it is at least 7 characters log or ot The secod weakess ca lead to some potetial aoymity risks sice, as may researchers have foud previously, iter-keystroke timigs ca reveal the ide-

4 SSH Server B 0 0 "Password: " 8 Prompt N time Cliet Host A 0 "s" 0 "u" 0 Retur "J""u""l" 0 "i" "a" Retur Figure : The traffic sigature associated with ruig SU i a SSH sessio The umbers i the figure are the size (i bytes) of the correspodig packet payloads time tity of the user [GLPS80, UW85, LW88, LWU89, JG90, BSH90, MR97, RLCM98, MRW99] I this sectio, we show that several simple ad practical attacks exploitig these two weakesses I particular, a attacker ca idetify which trasmitted packets correspod to keystrokes of sesitive data such as passwords i a SSH sessio Usig this iformatio, the attacker ca easily fid out the exact legth of users passwords ad eve the precise iter-keystroke timigs of the typed passwords Learig the exact legth of users passwords allows eavesdroppers to target users with short passwords Learig the iter-keystroke timig iformatio of the typed passwords allows eavesdroppers to ifer the cotet of the passwords as we will show i Sectio 3 ad 4 Traffic Sigature Attack We ca ofte exploit properties of applicatios to idetify which packets correspod to the typig of a password Cosider, for istace, the SU commad Assume the user has already established a SSH coectio from local host A to remote host B Whe the user types the commad SU i the established SSH coectio A B, we obtai a peculiar traffic sigature as show i Figure If the SSH sessio uses SSH x ad a block cipher such as DES for the ecryptio [NBS77, NIS99], as is commo, the the local host A seds three 0-byte packets: s, u, Retur The remote host B echoes the s ad u i two 0-byte packets ad seds a 8-byte packet for the Password: prompt The A seds 0- byte packets, oe for each of the password characters, without receivig ay echo data packets B the seds some fial packets cotaiig the root prompt if SU succeeds, otherwise some failure messages Thus by checkig the traffic agaist this su sigature, the attacker ca idetify whe the user issues the SU commad ad The attack also works whe ssh x is i use Oly the packet sizes are slightly differet hece lear which packets correspod to the password keystrokes Note that similar techiques ca be used to idetify whe users type passwords to autheticate to other applicatios such as PGP [Zim95] i a SSH sessio Multi-User Attack Eve more powerful attacks exist whe the attacker also has a accout o the remote machie where the user is loggig ito through SSH For example, the process status commad ps ca list all the processes ruig o a system This allows the attacker to observe each commad that ay user is ruig Agai, if the user is ruig ay commad that requires a password iput (such as su or pgp) the attacker ca idetify the packets correspodig to the password keystrokes Nested SSH Attack Assume the user has already established a SSH sessio betwee the local host A ad remote host B The the user wats to ope aother SSH sessio from B to aother remote host C as show i Figure I this case, the user s password for C is trasmitted, oe keystroke at a time, across the SSH-ecrypted lik A B from the user to B, eve though the SSH cliet o machie B patietly waits for all characters of the password before it seds them all i oe packet to host C for autheticatio (as desiged i the SSH protocol [YKS 00a]) It is easy to idetify such a ested SSH coectio usig techiques developed by Zhag ad Paxso [ZP00b, ZP00a] Hece i this case the eavesdropper ca easily idetify the packets correspodig to the user s password o lik A B, ad from this lear the legth ad the iter-keystroke timigs of the users password o host C

5 SSH password A B SSH password eavesdrop C Adversary Our focus o passwords creates may challeges Passwords are etered very differetly from other text: passwords are typed frequetly eough that, for may users, the keystroke patter is memorized ad ofte typed almost without coscious thought Furthermore, wellchose passwords should be radom ad have little or o structure (for istace, they should ot be based o dictioary words) As a cosequece, aive measuremets of keystroke timigs will ot be represetative of how users type passwords uless great care is take i the desig of the experimetal methodology Figure : The ested SSH attack 3 Statistical Aalysis of Iter-keystroke Timigs As a first study towards iferrig key sequeces from timig iformatio, we develop techiques for statistical aalysis of the iter-keystroke timigs I this sectio, we first describe how we collect traiig data ad show some simple timig characteristics of character pairs We the show how we model the iter-keystroke timig of a give character pair as a Gaussia distributio We the describe how to estimate quatitatively the amout of iformatio about the character pair that oe ca lear usig the iter-keystroke timig iformatio Deote the set of character pairs of iterest as Q, ad let Q deote the cardiality of the set Q 3 Data Collectio The two keystrokes of a pair of characters k a k b geerates four evets: the press of k a, the release of k a, the press of k b, ad the release of k b However, because oly key presses (ot key releases) trigger packet trasmissio, a eavesdropper ca oly lear timig iformatio about the key-press evets Sice the mai focus of our study is i the sceario where a adversary lears timig iformatio o keystrokes by simply moitorig the etwork, we focus oly o key-press evets The time differece betwee two key presses is called the latecy betwee the two keystrokes We also use the term iter-keystroke timig to refer to the latecy betwee two keystrokes I order to characterize how much iformatio is leaked by iter-keystroke timigs, we have performed a umber of empirical tests to measure the typig patters of real users Because passwords are probably the most sesitive data that a user will ever type, we focus oly o iformatio revealed about passwords (rather tha other forms of iteractive traffic) Our experimetal methodology is carefully desiged to address these issues Due to security ad privacy cosideratios, we chose ot to gather data o real passwords; therefore, we have chose a data collectio procedure iteded to mimic how users type real passwords A coservative method is to pick a radom password for the user (where each character of the password is chose uiformly at radom from a set of 0 letter keys ad 5 umber keys, idepedetly of all other characters i the password), have the user practice typig this password may times without collectig ay measuremets, ad the measure iter-keystroke timig iformatio o this password oce the user has had a chace to practice it at legth However, we foud that, whe the goal is to try to idetify potetially relevat timig properties (rather tha verify cojectured properties), this coservative approach is iefficiet I particular, users typically type passwords i groups of 3 4 characters, with fairly log pauses betwee each group This distorts the digraph statistics for the pair of characters that spas the group boudary ad artificially iflates the variace of our measuremets As a result we would eed to collect a great deal of data for may radom passwords before this effect would average out I additio, it takes quite a while for users to become familiar with log radom passwords This makes the coservative approach a rather blut tool for uderstadig iter-keystroke statistics Fortuately, there is a less costly way to gather iterkeystroke timig statistics: we gather traiig data o each pair of characters k a k b as typed i isolatio We pick a character pair ad ask the user to type this pair times, returig to the home row each time betwee repetitios For each user, we repeat this for may possible pairs (4 pairs, i our experimets) ad we gather data o iter-keystroke timigs for each such pair We collected the latecy of each character pair measuremet ad computed the mea value ad the stadard deviatio I our experiece, this gives better results

6 Frequecy Frequecy Iter keystroke Timig for v o (millisecods) Iter keystroke Timig for v b (millisecods) Figure 3: The distributio of iter-keystroke timigs for two sample character pairs As a example, Figure 3 shows the latecy histogram of two sample character pairs The left model correspods to the latecy betwee the pair v, o, ad the right model correspods to v, b We ca see that the latecy betwee v, o is clearly shorter tha the latecy betwee v, b, ad the latecy distributios of these two sample character pairs are almost etirely ooverlappig The optimized data collectio approach gives us a more efficiet way to study fie-graied details of iterkeystroke statistics without requirig collectig a eormous amout of data We used data collected i this way to quickly idetify plausible cojectures, develop potetial attacks, ad to trai our attack models As far as we are aware, collectig data o keystroke pairs i isolatio does ot seem to bias the data i ay obvious way Noetheless, we also validate all our results usig the coservative measuremet method (see Sectio 5) 3 Simple Timig Characteristics Next, we divide the test character pairs ito five categories, based o whether they are typed usig the same had, the same figer, ad whether they ivolve a umber key: Two letter keys typed with alteratig hads, ie, oe with left had ad oe with right had; Two characters cotaiig oe letter key ad oe umber key typed with alteratig hads; Two letter keys, both typed with the same had but with two differet figers; Two letter keys typed with the same figer of the same had; Two characters cotaiig oe letter key ad oe umber key, both typed with the same had Figure 4 shows the histogram of latecy distributio of character pairs for each category We split the whole latecy rage ito six bis as show i the x-axis Withi each category, we put each character pair ito the correspodig bi if its mea latecy value is withi the rage of the bi Each bar i the histogram of a category represets the ratio of the umber of character pairs i the associated bi over the total umber of character pairs i the category 3 We ca see that all the character pairs that are typed usig two differet hads take less tha 50 millisecods, while pairs typed usig the same had ad particularly the same figer take substatially loger Character pairs that alterate betwee oe letter key ad oe umber key, but are typed usig the same 3 Hece the sum of all bars withi oe category is

7 Histogram of the latecy of character pairs Ratio of character pairs Two letter keys, alteratig hads A letter ad a umber, alteratig hads Two letters, same had, differet figers Two letters, same figer A letter ad a umber, same had < > 300 Latecy (millisecods) Figure 4: Iter-keystroke timigs for character pairs i five differet categories Note that some bars at some positios disappear because the correspodig height is zero had, take the logest time to type This is simply because two hads offer a certai amout of parallelism, while character pairs typed with oe had require a certai degree of sequetial movemets ad hece ted to take loger This is especially obvious i the case of oe letter ad oe umber pairs typed usig oe had They i geeral require more had movemet ad hece the logest time 4 So, if the attacker observes a character pair typed with latecy more tha 50 millisecods, he ca guess with high probability of success that the character pair is ot typed usig two differet hads ad hece ca ifer about bit of iformatio about the cotet of the character pair Because the 4 character pairs are formed from radomly selected letter keys ad umber keys, they seem likely to form a represetative sample of the whole keyboard Hece this simple classificatio exteds to the whole keyboard, ad already idicates that the iter-keystroke timig leaks substatial iformatio about what is typed The properties described above are ulikely to be exhaustive For istace, earlier work o timig attacks o multi-user machies suggested that iter-keystroke timigs may additioally reveal which characters i the 4 Note that here we oly cosider users that use touch typig password are upper-case [Tro98] 33 Gaussia Modelig From the plot of the latecy distributio of a give character pair, such as the oes show i Figure 3, we ca see that the latecy betwee the two key strokes of a give character pair forms a Gaussia-like uimodal distributio Hece a atural assumptio (which is cofirmed by our empirical observatios) is that the probability of the latecy y betwee two keystrokes of a character pair q Q, Pr y q, forms a uivariate Gaussia distributio µ q σ q, meaig Pr y q e πσ q y µ q where µ q is the mea value of the latecy for character pair q ad σ q is the stadard deviatio Give a set of traiig data q i y i i N, where q i is the i-th character pair ad y i is the correspodig latecy i the data collectio, we ca derive the parameters µ q σ q q Q based o maximum likelihood estimatio, ie, we compute the mea ad the stadard deviatio for each character pair Figure 5 shows the estimated Gaussia models of the latecies of the 4 character pairs Our empirical result σ q

8 Probability shows that most of the latecies of the character pairs lie betwee 50 ad 50 millisecods The average of the stadard deviatio of the 4 character pairs is about 30 millisecods The graph also idicates that the latecy distributios of the character pairs severely overlap, which meas the iferece of character pairs usig just latecy iformatio is a challegig task Iformatio Gai Estimatio Latecy (millisecod) Figure 5: Estimated Gaussia distributios of all 4 character pairs collected from a user Etropy (bits) Iformatio Gai (bits) Latecy (millisecods) (a) Etropy of character pairs give a latecy observatio Latecy (millisecods) (b) Iformatio gai iduced by a latecy observatio Figure 6: Etropy ad iformatio gai as a fuctio of the iter-keystroke latecy We would like to estimate quatitatively how much iformatio the latecy iformatio reveals about the character pairs typed This will be a upper boud of how much iformatio a attacker ca extract from the timig iformatio usig ay particular method We estimate it by computig the iformatio gai iduced by the latecy iformatio If we select a character pair uiformly at radom from the characterpair space, ad if the attacker does ot get ay additioal iformatio, the etropy of the probability distributio of character pairs to the attacker is H 0 q q Q Pr q log Pr q log Q If the attacker lears the latecy y 0 betwee the two keystrokes of the character pair, the estimated etropy of the probability distributio of character pairs to the attacker is H q y y 0 q Q Pr q y 0 log Pr q y 0 where Pr q y 0 Pr! y 0" q#%$ Pr! q# q& Pr! Q y 0" q#%$ Pr! q# ad Pr y 0 q is computed usig the Gaussia distributio obtaied i the parameter estimatio phase i the previous subsectio The iformatio gai iduced by the observatio of latecy y 0 is the differece betwee the two etropies, H 0 q H q y y 0 Usig the parameter estimatio of the 4 character pairs obtaied i the previous sectio, we ca compute H q y y 0 ad H 0 q H q y y 0 as show i Figure 6(a) ad Figure 6(b) The estimated iformatio gai, also called mutual iformatio, is I q;y' H 0 q H q y( H 0 q Pr y 0 *) H q y y 0 dy 0 where Pr y 0 + q Q Pr y 0 q Pr q From the umerical computatio we obtai I q;y, This meas the estimated iformatio gai available from latecy iformatio is about bits per character pair whe the character pair has uiform distributio Hece the attacker could potetially extract bits of iformatio per character pair by usig the latecy iformatio i this case Because the character pairs i our experimets are selected uiformly at radom from all letter ad umber keys, we expect that they will be represetative of the whole keyboard Ituitively, Figure 5 is a sufficietly-large radom samplig of a much deser graph cotaiig the latecy distributios of all possible character pairs More detailed aalysis shows that the estimated iformatio gai computed usig 4 sample character pairs is a good estimate of the ifor-

9 matio gai whe the character-pair space icludes all letter ad umber character pairs This estimate is comparable to the back-of-the-evelope calculatio i Sectio 3 based o our classificatio ito five categories of keystroke pairs Because the etropy of writte Eglish is so low (about 06 3 bits per character [Sha50]), the -bit iformatio gai per character pair leaked through the latecy iformatio seems to be sigificat 5 For example, we ca expect that users PGP passphrases will ofte cotai oly bit of etropy per character Hece the latecy iformatio may reveal sigificat iformatio about PGP passphrases The iformatio gai curve i Figure 6(b) shows a covex shape Note that latecies greater tha 75 millisecods are relatively rare; however, wheever we see such a log time betwee keystrokes, we lear a lot of iformatio about what was typed, because there are ot may possibilities that would lead to such a large latecy The character pairs that take loger tha 75 millisecods to type are mostly pairs cotaiig umber keys or pairs typed with oe figer Hece this aalysis suggests that passwords cotaiig umber keys or character pairs that are typed with oe figer are particularly vulerable to such timig attacks Aother iterestig observatio is that the mea of the stadard deviatios of the character pairs is oly about 30 millisecods as show i our experimets, while the stadard deviatio of roud-trip time o the Iteret i may cases is less tha 0 millisecods [Bel93] Therefore eve whe the attacker is far from the SSH cliet host, he ca still get sufficietly-precise iter-keystroke timig iformatio This makes the timig attack eve more severe 4 Iferrig Character Sequeces From Iter-Keystroke Timig Iformatio I this sectio, we describe how we ca ifer character sequeces usig the latecy iformatio I particular, we model the relatioship of latecies ad character sequeces as a Hidde Markov Model [RN95] We exted the stadard Viterbi algorithm to a -Viterbi algorithm that outputs the most likely cadidate character sequeces We further estimate how may bits of iformatio about the real character sequece this algo- 5 Note that the - -bit iformatio gai is estimated for the case of radomly selected passwords where the sequece of characters have a uiform distributio However, this is ot the case for texts More careful calculatio is eeded to estimate the iformatio gai i the case of atual text rithm extracts from the latecy iformatio ad show it is early optimal 4 Hidde Markov Model I geeral, a Markov Model is a way of describig a fiite-state stochastic process with the property that the probability of trasitioig from the curret state to aother state depeds oly o the curret state, ot o ay prior state of the process [RN95] I a Hidde Markov Model (HMM), the curret state of the process caot be directly observed Istead, some outputs from the state are observed, ad the probability distributio of possible outputs give the state is depedet oly o the state Usig a HMM, oe ca ifer iformatio about the prior path the process has take from the sequece of observed outputs of the states, ad efficiet algorithms are kow for workig with HMM s Because of this, HMM s have bee widely used i areas such as speech recogitio ad text modelig I our settig, we cosider each character pair of iterest as a hidde (o-observable) state, ad the latecy betwee the two keystrokes of the character pair as the output observatio from the character-pair state Each state correspods to a pair of characters, so that the typig of a character sequece K 0 K T, is a process that goes through T states, q q T, where q t / t / T represets the t-th character pair K t K t typed Let y t / t / T deote the observed latecy of state q t The we model the typig of a character sequece as a HMM This meas we make two assumptios First, the probability of trasitio from the curret state to aother state is oly depedet o the curret state, ot o the prior path of the process If the character sequece is a password chose uiformly at radom, this assumptio obviously holds I the case of text, this assumptio does ot hold strictly but experiece i speech recogitio ad text modelig shows that some extesios to HMM still work well [RN95] Secod, the probability distributio of the latecy observatio is oly depedet o the curret character pair ad ot o ay previous characters i the sequece This assumptio might hold for some cases ad ot for other cases where the typig of previous characters chages the positio of the had ad iflueces the typig of later character pairs However, makig this assumptio makes our aalysis ad iferece algorithm much simpler ad still gives good results as show from the experimets Hece, we use a HMM to model the typig of character sequeces as show i Figure 7 As i the previous sectio, we assume the set of possible character pairs is Q, hece the set of possible states i the HMM is Q We assume that the probability of

10 t= t= t=3 t=t q q q q T y y y 3 y T Figure 7: A represetatio of a trace of a HMM Each vertical slice represets a time step I each time slice, the top ode q t is a variable represetig a character pair, ad the bottom ode y t is the observable variable deotig the latecy betwee the two keystrokes the latecy y of a character pair q, Pr y q (q Q), is a Gaussia distributio µ q σ q, where the parameters µ q σ q 4 q Q are obtaied usig the maximum likelihood estimatio 4 The -Viterbi Algorithm for Character Sequece Iferece Give a observatio 5y y y y T, a sequece of latecies of some character sequece from a user s typig, we would like to ifer the real character sequece that the user has typed For each possible character sequece 5q q q q T, we ca compute how likely the character sequece is give the observatio, amely Pr 5q 5y The probability Pr 5q 5y essetially gives a rakig for the cadidate character sequece 5q: the higher Pr 5q 5y is, the more likely 5q is the real character sequece We use 5q 6 to deote the most-likely sequece, which is the sequece that correspods to the highest value of Pr75q 5y for all possible 5q with regard to a give 5y The Viterbi algorithm is widely used i solvig the most likely sequece of states give a sequece of observatio i HMM problems [RN95] A aive way of computig 5q 6 would compute Pr75q 5y for all possible 5q, ad hece requires O Q T ruig time The Viterbi algorithm uses dyamic programmig for a ruig time complexity O Q T I our settig, because the latecy distributios of differet character pairs highly overlap, the probability that the most likely sequece is the right sequece will be very low Hece, istead of just computig the most likely sequece, we eed to compute the most likely sequeces ad hope the real sequece will be i the most likely sequeces with high probability for greater tha a certai threshold Hece we exted the stadard Viterbi algorithm to -Viterbi algorithm to output the most-likely sequeces with ruig time complexity O Q T We give a detailed descriptio of the - Viterbi algorithm i Appedix A 43 How to Estimate the Effectiveess of the - Viterbi Algorithm We would like to estimate how big the threshold has to be such that the real character sequece will be amog the most-likely sequeces with sufficietly high probability I a experimet if the real character sequece appears i the most-likely sequeces, we say the experimet is a success with regard to the threshold, otherwise, a failure The probability of such defied success is a fuctio of It is easy to see that the fuctio is mootoically icreasig with regard to If for a small, the success probability is already high, this meas the algorithm is very effective because it filters out most of the sequeces ad hece oe oly eeds to try a small set of cadidates before fidig the real sequece O the other had, if we eed a high threshold of to get a sufficietly high success probability, the the algorithm is less effective: oe would eed to try may more cadidates before fidig the real sequece Note that from Sectio 34 we see that the timig iformatio reveals about bits of iformatio per character pair For the case of a radom password of legth T 8, which forms T cosecutive character pairs, the latecy iformatio could reveal approximately T bits of iformatio about the real password sequece Hece this is a upper boud o the effectiveess of the algorithm to ifer character sequeces usig latecy iformatio We would like to estimate how close our algorithm is compared to the upper boud First, we look at the simple case whe T Give a latecy observatio y of a character pair q, we compute the probability Pr q9 y q9: Q ad select the mostlikely character pairs Φ ; q j q j We would like to compute the probability that the real character pair q is i the set Φ over all possible values of y To simplify

11 09 Probability of Success vs Threshold sd = 5 sd = 30 sd =35 password B SSH password Probability of Success SSH A eavesdrop Herbivore HMM Viterbi C Threshold Figure 8: The probability that the -Viterbi algorithm outputs the correct password before the first guesses, graphed as a fuctio of the umerical computatio, we approximate the result by assumig that all the Gaussia distributios have the same stadard deviatio σ This is a good approximatio of the real experimet: as we see i the Figure 5, most keypairs have a stadard deviatio betwee 5 35 millisecods Figure 8 graphs the probability that the real character pair appears withi the most-likely character pairs agaist the threshold The top curve is whe σ 5, the middle curve is whe σ 30, ad the bottom curve is whe σ 35 Usig the middle curve, we get that whe 70 the probability of success is 90%, meaig that with 90% probability, the real character pair appears i the 70 most-likely sequeces output by the -Viterbi algorithm Let s deote such a threshold correspodig to the 90% success probability as 6 Thus log Q =< 6 is the approximate umber of bits of iformatio per character pair the algorithm extracts Note that from the previous sectio we see that the latecy iformatio reveals about bits of iformatio per character pair Hece our -Viterbi algorithm is earoptimal I the case of uiformly radomly chose passwords of legth T 8, the umber of bits of iformatio the algorithm ca extract is approximately T ) log Q =< 6?> T, which is close to the optimal value T bits 5 Buildig Herbivore ad Timig Attacks o SSH To evaluate the effectiveess of our timig attacks to SSH, we build a attacker program that we call Herbivore I this sectio, we describe the experimet results Cadidate Passwords Figure 9: The Herbivore architecture of usig Herbivore to lear users passwords 5 Herbivore Preyig for Passwords We built a attacker egie Herbivore as show i Figure 9 It moitors the etwork ad collects the arrival times of packets Usig the techique described i Sectio, Herbivore ifers which packets correspod to the user s SSH passwords whe the user opes a SSH sessio to aother host withi a established SSH coectio Herbivore the measures the iter-arrival times betwee packets cotaiig the password characters ad uses our -Viterbi algorithm to geerate a list of cadidate passwords The cadidate passwords are sorted i decreasig order of the probability Pr75q y, ad i our experimets we record the positio of the real password i the cadidate list We report the positio of the password as a percetage, so with m possible passwords i total, if the real password appears at positio u i the ordered cadidate list, we say the real password appears at the top 00u m % This gives a atural way to quatify the effectiveess of our approach 5 Optimizatio for Log Character Sequeces The complexity of the -Viterbi algorithm is liear i the umber of cadidates it outputs As the legth of the password grows, the space of possible passwords grows expoetially If the -Viterbi algorithm ca oly rule out a costat fractio of the password space, would also grow expoetially as the password legth grows Hece the algorithm might be iefficiet whe the password is log I particular, we observed that memory usage ca grow substatially for loger passwords Also, ad more importatly, we observed i the experimets that users ted to type log passwords i segmets of 3 to 5 letters ad pause betwee the segmets If we

12 6 400 Rakig Percetage of the correct aswer i output list (%) Elapsed Time (millisecod) Test Number Key Pair Figure 0: The percetage of the password space tried by Herbivore i 0 tests before fidig the right password use the timig betwee the segmets for the predictio, it might bias our predictios sice typically such pauses are oticeably loger tha most other iter-keystroke latecies Fortuately, this large differece meas that pauses betwee groups of password characters ca be clearly idetified before we apply the -Viterbi algorithm Hece to reduce the bias ad to reduce the memory requiremets of the algorithm, we break the timig iformatio of the password ito segmets cotaiig 3 or 4 latecy itervals We use each segmet to form a HMM ad the at the ed combie the result from differet segmets to form the cadidate password orderig 53 Experimetal Results for Password Iferece for a Sigle User We measure the effectiveess of our -Viterbi algorithm at crackig passwords through empirical measuremets I our experimet, we use traiig data compiled from isolated keypairs to trai the HMM The, we pick a radom password for the user We have the user use this password to autheticate to aother SSH sessio withi a established SSH sessio as show i Figure 9, ad we apply our -Viterbi algorithm to simulate a attack o this password Note that we have the test user type the password may times before the test to esure familiarity with the password, ad we try to deduce the user s password usig traiig data from the same user All passwords are selected uiformly at radom from the character space as i the experimet i Sectio 3, so they cotai o structure Recoverig such passwords is the hardest case for the attacker, so if timig aalysis ca recover iformatio i such a sceario, we ca expect that Figure : A compariso of two users typig patters The diamod symbols show the mea values of the latecies of oe user, with a error-bar idicatig oe stadard deviatio The x symbol idicates the mea values of the latecies of aother user timig aalysis will be a eve greater threat i settigs where passwords are chose less carefully We performed tests for 0 differet passwords, each of legth 8 Figure 0 shows the percetage of the positios of the real password i the ordered cadidate lists output by the -Viterbi algorithm For example, 0 3% meas that the real password appeared at the top 0 3% positio i the output cadidate list These experimets idicate that o average the real password is located withi the top 7% of the cadidate rakig list The media positio is about %, so about half the time the password will be i the top % of the list of cadidates produced by our -Viterbi algorithm Therefore, i order to crack the password, Herbivore oly eeds to test < 50 times as may passwords as brute-force search, o average The reductio i workfactor compared to exhaustive search correspods to a total of 5 7 bits of iformatio leared per password usig the latecy iformatio This is close to the iformatio gai aalysis i Sectios 3 ad 4, which predicted a gai of about bit per keystroke pair: recall that the passwords i this test are of legth 8, so each password cotais 7 keystroke pairs We attribute the differece to mior variatio betwee the distributios of iter-keystroke timigs i radom passwords ad the distributio of timigs for character pairs typed i isolatio For ease of testig, our experimets were o passwords with a reduced set of possible characters However, we ca expect these results to carry over to passwords chose from the full set of possible characters Assumig that the iformatio gai available from iter-keystroke timig iformatio is about bit per character pair eve

13 Traiig Test Test Cases Set Set Password Password Password 3 Password 4 Password 5 User User 5 6% 0 7% 0% 3% 6% User User 6 3% 5 % 7 0% 4 8% 0 3% User User 3 6 4% N/A 8% 3 % 4 % User User 4 9% 3 4% % 0 % 8 8% User User 4 9% 3% 6% 3% 3 % User User 30 8% 5 0% 8% 3 7% 9% User User 3 4 7% N/A 5 3% 6 7% 38 4% User User 4 0 7% 6 8% 3 9% 0 6% 5 4% Table : Success rates for password iferece with multiple users The umbers are the percetage of the search space the attacker has to search before he fids the right password whe we exted to the whole keyboard, we expect to see this 50 times reductio i workfactor for passwords of legth 7 8 eve whe the passwords are chose radomly from all letter ad umber keys This reductio ca make password crackig more practical For example, for a password cotaiig radomly-selected lower-case letter keys ad umber keys, without timig iformatio, the attacker would eed to try 36 8< cadidate passwords o average before he fids the right oe Bechmarks idicate that a 840 MHz Petium III ca check about cadidate passwords per secod i a off-lie dictioary attack Thus, exhaustive search would take about 65 PC-days to crack a password composed of radomly-selected lower-case letter keys ad umber keys If the attacker uses the timig iformatio, the computatio ca be doe i 3 days, which makes the crack more practical 54 Experimetal Results for Password Iferece for Multiple Users Oe potetial weakess i our simulatios is that realworld attackers might ot be able to get as much traiig data from the victim for the statistical aalysis as we had available i our experimets However, we argue ext that this is ulikely to pose a effective defese agaist timig attacks: there are other ways that attackers ca obtai the traiig data required for the attack Oe simple observatio is that the attacker ca easily get his ow typig statistics, or the typig statistics of a cocospirator Hece it is importat to evaluate how well the password iferece techiques perform whe usig oe perso s typig statistics to ifer passwords typed by aother perso I this experimet, we collected the typig statistics of two users, User ad User A iterestig result is that 75% of the character pairs take about the same latecy to type for both two users: i other words, the differece betwee the average latecies of the two users for such character pairs is smaller tha oe stadard deviatio Similarly, the simple timig characteristics reported i Sectio 3 eg, keypairs typed with alterate pairs ted to have much lower iter-keystroke latecy tha keypairs typed with the same had were observed to be essetially user-idepedet This suggests that typig statistics have a large compoet that is commo across a broad user populatio ad which thus ca be exploited by attackers eve i the absece of ay traiig data from the victim To test this hypothesis further, we had four users (icludig User ad, from our previous experimets) type the same set of five radomly-selected passwords Passwords ad have legth 8 Passwords 3 ad 4 have legth 7, ad password 5 has legth 6 Herbivore the rus the -Viterbi algorithm usig the typig statistics from User ad to ifer passwords typed by the four test users separately Table shows the percetage positio of the real passwords occurred i the output cadidate rakig list, which is the percetage of the password space the attacker has to search before he fids the right password User 3 did ot type Password so the etry is ot available This experimet shows several iterestig results: Usurprisigly, iferrig a user s password ca i geeral be doe somewhat more effectively if oe uses traiig data from the same user rather tha traiig data from other users The distace betwee the typig statistics of two users ca vary sigificatly accordig to how oe chooses the pair of users A user U a s typig patter might be more similar to user U b s tha to user U c s Thus it ca give better results to use U b s traiig data tha U c s traiig data to ifer passwords typed by U a I this experimet, it shows

14 that i geeral usig User s traiig data gives a better result to ifer passwords typed by User 3 tha usig User s traiig data Ad User s traiig data gives a better iferece for passwords typed by User 4 tha User s traiig data Most importatly, this experimet shows that traiig data from oe user ca be successfully applied to ifer passwords typed by aother user Hece the attack ca be effective eve whe the attacker does ot have typig statistics from the victim 55 Extesios We expect that Herbivore could also be used to ifer iformatio about text or commads that users type The etropy of writte Eglish is very low (about 06 3 bits per character [Sha50]) i compariso to the amout of iformatio leaked by iter-keystroke timigs (about bit of iformatio per key pair; see Sectio 3) However, moutig such a attack would appear to require better models of writte text [RN95] I ay case, we have ot studied such a sceario i our experimets, ad we leave this for future work 6 Related Work Timig aalysis has previously bee used by Kocher to attack cryptosystems [Koc95] Trostle exploited a similar idea, showig how a malicious user o a multiuser workstatio ca gai iformatio about other users passwords usig CPU timigs [Tro98] We expect our Hidde Markov Model techiques might fid applicatios i Trostle s threat model as well Most recetly, other researchers have idepedetly poited out the possibility of timig attacks o SSH [DS0] Some of their observatios reveal additioal weakesses i SSH: For istace, they oted that the SSH x protocol reveals the exact legth of passwords, because ciphertexts cotai a legth field set i the clear (SSH does ot have this problem); they discussed how to deal with the presece of backspace characters; ad, they iitiated a ivestigatio of the impact of timig attacks o other sessio data (such as shell commads typed i the SSH sessio) 7 Coutermeasures Although SSH provides a ecrypted ad autheticated lik betwee the local host ad the remote machie, a eavesdropper ca still lear iformatio about typed keystrokes due to two weakesses of SSH First, every idividual keystroke that a user types is set to the remote machie i a idividual IP packet (except for meta keys such as Shift ad Ctrl); secod, as soo as commad output is available o the remote machie, it is set to the local host i oe or multiple IP packets, leakig iformatio o the approximate size of the output We have show i this paper how these seemigly mior weakesses lead to severe real-world attacks Note that i our traffic sigature attack, the attacker ca tell that the user is typig passwords because there are o echo packets So oe way to fix this problem is that whe the server detects that the echo mode is tured off, the server ca retur dummy packets that will be igored by the cliet whe it receives keystroke packets from the cliet This fix ca reduce the effectiveess of the traffic sigature attack but could fail i other attacks such as our ested SSH attack where the attacker ca guess whe the user is typig his password by simply moitorig the etwork coectios This fix does ot prevet iterkeystroke timig iformatio, though To prevet the attacks, we eed to prevet the leakage of the timig iformatio of the keystrokes Oe aive approach might be to modify SSH so that upo receivig a keystroke with latecy less tha η millisecods from the previous keystroke, the program will delay the packet by a radom amout of up to η millisecods Because our experimet idicates that the spectrum of the latecy betwee two keystrokes of cotiuous typig is betwee millisecods, we could set η 500 for example, ad such a radom delay would radomize the timig iformatio of the keystrokes Such a radom delay imposes a overhead of about 50 millisecods o average Ufortuately, if the attacker ca moitor the same user logi may times ad compute the average of the latecies of the password sequeces, he ca reduce the effectiveess of the radomized oise For example, if the attacker ca get the timig iformatio of a user s SSH autheticatio for 50 times, the oise cotributed by the radom delay is oly about 0 40 millisecods So we should ot use this method A better way to prevet leakage of iter-keystroke timig iformatio is to sed traffic at a costat rate of λ packets per secod whe the lik is active Choosig λ presets a tradeoff betwee usability ad overhead: Icreasig λ reduces the dummy traffic but cause loger latecy for the user Assume, for example, that we set λ 50 millisecods Sice the latecy betwee two keystrokes is usually greater tha 50 millisecods ad the etwork delay is already at least i the tes of millisecods, this may be a reasoable tradeoff betwee commuicatio overhead ad additioal delay I such a sceario, the SSH cliet would always sed a

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Random Graphs and Complex Networks T

Random Graphs and Complex Networks T Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Normal Distributions

Normal Distributions Normal Distributios Stacey Hacock Look at these three differet data sets Each histogram is overlaid with a curve : A B C A) Weights (g) of ewly bor lab rat pups B) Mea aual temperatures ( F ) i A Arbor,

More information

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters.

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters. SD vs. SD + Oe of the most importat uses of sample statistics is to estimate the correspodig populatio parameters. The mea of a represetative sample is a good estimate of the mea of the populatio that

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals UNIT 4 Sectio 8 Estimatig Populatio Parameters usig Cofidece Itervals To make ifereces about a populatio that caot be surveyed etirely, sample statistics ca be take from a SRS of the populatio ad used

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Private Key Cryptography. TELE3119: Week2

Private Key Cryptography. TELE3119: Week2 Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

OCR Statistics 1. Working with data. Section 3: Measures of spread

OCR Statistics 1. Working with data. Section 3: Measures of spread Notes ad Eamples OCR Statistics 1 Workig with data Sectio 3: Measures of spread Just as there are several differet measures of cetral tedec (averages), there are a variet of statistical measures of spread.

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Arithmetic Sequences

Arithmetic Sequences . Arithmetic Sequeces COMMON CORE Learig Stadards HSF-IF.A. HSF-BF.A.1a HSF-BF.A. HSF-LE.A. Essetial Questio How ca you use a arithmetic sequece to describe a patter? A arithmetic sequece is a ordered

More information

Data Analysis. Concepts and Techniques. Chapter 2. Chapter 2: Getting to Know Your Data. Data Objects and Attribute Types

Data Analysis. Concepts and Techniques. Chapter 2. Chapter 2: Getting to Know Your Data. Data Objects and Attribute Types Data Aalysis Cocepts ad Techiques Chapter 2 1 Chapter 2: Gettig to Kow Your Data Data Objects ad Attribute Types Basic Statistical Descriptios of Data Data Visualizatio Measurig Data Similarity ad Dissimilarity

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Guide to Applying Online

Guide to Applying Online Guide to Applyig Olie Itroductio Respodig to requests for additioal iformatio Reportig: submittig your moitorig or ed of grat Pledges: submittig your Itroductio This guide is to help charities submit their

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

SECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME

SECURITY PROOF FOR SHENGBAO WANG S IDENTITY-BASED ENCRYPTION SCHEME SCURITY PROOF FOR SNGBAO WANG S IDNTITY-BASD NCRYPTION SCM Suder Lal ad Priyam Sharma Derpartmet of Mathematics, Dr. B.R.A.(Agra), Uiversity, Agra-800(UP), Idia. -mail- suder_lal@rediffmail.com, priyam_sharma.ibs@rediffmail.com

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

On Computing the Fuzzy Weighted Average Using the KM Algorithms

On Computing the Fuzzy Weighted Average Using the KM Algorithms O Computig the Fuzzy Weighted Average Usig the KM Algorithms Feilog iu ad Jerry M Medel Sigal ad Image Processig Istitute, Departmet of Electrical Egieerig Uiversity of Souther Califoria, 3740 McClitock

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

ENGI 4421 Probability and Statistics Faculty of Engineering and Applied Science Problem Set 1 Descriptive Statistics

ENGI 4421 Probability and Statistics Faculty of Engineering and Applied Science Problem Set 1 Descriptive Statistics ENGI 44 Probability ad Statistics Faculty of Egieerig ad Applied Sciece Problem Set Descriptive Statistics. If, i the set of values {,, 3, 4, 5, 6, 7 } a error causes the value 5 to be replaced by 50,

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Bike MS: 2013 Participant Center guide

Bike MS: 2013 Participant Center guide Bike MS: 2013 Participat Ceter guide bikems.org 1 Why use Olie Fudraisig Tools? Usig olie tools makes fudraisig easier Table of Cotets Participats who use persoal pages raise more moey! Bike MS $883 v.

More information

Bike MS: 2014 Participant Center guide

Bike MS: 2014 Participant Center guide Bike MS: 2014 Participat Ceter guide bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

Learning to Shoot a Goal Lecture 8: Learning Models and Skills

Learning to Shoot a Goal Lecture 8: Learning Models and Skills Learig to Shoot a Goal Lecture 8: Learig Models ad Skills How do we acquire skill at shootig goals? CS 344R/393R: Robotics Bejami Kuipers Learig to Shoot a Goal The robot eeds to shoot the ball i the goal.

More information

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees.

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees. Comp 135 Machie Learig Computer Sciece Tufts Uiversity Fall 2017 Roi Khardo Some of these slides were adapted from previous slides by Carla Brodley Our secod algorithm Let s look at a simple dataset for

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell

Message Authentication Codes. Reading: Chapter 4 of Katz & Lindell Message Autheticatio Codes Readig: Chapter 4 of Katz & Lidell 1 Message autheticatio Bob receives a message m from Alice, he wats to ow (Data origi autheticatio) whether the message was really set by Alice.

More information

Capability Analysis (Variable Data)

Capability Analysis (Variable Data) Capability Aalysis (Variable Data) Revised: 0/0/07 Summary... Data Iput... 3 Capability Plot... 5 Aalysis Summary... 6 Aalysis Optios... 8 Capability Idices... Prefereces... 6 Tests for Normality... 7

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

EE123 Digital Signal Processing

EE123 Digital Signal Processing Last Time EE Digital Sigal Processig Lecture 7 Block Covolutio, Overlap ad Add, FFT Discrete Fourier Trasform Properties of the Liear covolutio through circular Today Liear covolutio with Overlap ad add

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery Adaptive ad Based Proxy Cachig for Streamig Media Delivery Sogqig Che Dept. of Computer Sciece College of William ad Mary Williamsburg, VA 23187 sqche@cs.wm.edu Susie Wee Mobile ad Media System Lab Hewlett-Packard

More information

BIKE MS: 2015 PARTICIPANT CENTER GUIDE

BIKE MS: 2015 PARTICIPANT CENTER GUIDE BIKE MS: 2015 PARTICIPANT CENTER GUIDE bikems.org 1 Table of Cotets Why Use Olie Fudraisig Tools... 2 Participat Ceter... 3 Guide to Olie Fudraisig... 3 Edit Persoal Page... 5 Address Book... 7 Email Messages...

More information

Weston Anniversary Fund

Weston Anniversary Fund Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue

More information

Octahedral Graph Scaling

Octahedral Graph Scaling Octahedral Graph Scalig Peter Russell Jauary 1, 2015 Abstract There is presetly o strog iterpretatio for the otio of -vertex graph scalig. This paper presets a ew defiitio for the term i the cotext of

More information

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Iteratioal Joural o Natural Laguage Computig (IJNLC) Vol. 2, No., February 203 EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Raj Kishor Bisht ad Ila Pat Bisht 2 Departmet of Computer Sciece &

More information

Designing a learning system

Designing a learning system CS 75 Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@cs.pitt.edu 539 Seott Square, x-5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please try

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Getting Started. Getting Started - 1

Getting Started. Getting Started - 1 Gettig Started Gettig Started - 1 Issue 1 Overview of Gettig Started Overview of Gettig Started This sectio explais the basic operatios of the AUDIX system. It describes how to: Log i ad log out of the

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein

Lecture 6. Lecturer: Ronitt Rubinfeld Scribes: Chen Ziv, Eliav Buchnik, Ophir Arie, Jonathan Gradstein 068.670 Subliear Time Algorithms November, 0 Lecture 6 Lecturer: Roitt Rubifeld Scribes: Che Ziv, Eliav Buchik, Ophir Arie, Joatha Gradstei Lesso overview. Usig the oracle reductio framework for approximatig

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Designing a learning system

Designing a learning system CS 75 Itro to Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@pitt.edu 539 Seott Square, -5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Investigation Monitoring Inventory

Investigation Monitoring Inventory Ivestigatio Moitorig Ivetory Name Period Date Art Smith has bee providig the prits of a egravig to FieArt Gallery. He plas to make just 2000 more prits. FieArt has already received 70 of Art s prits. The

More information