Attacking an Obfuscated Cipher by Injecting Faults

Size: px
Start display at page:

Download "Attacking an Obfuscated Cipher by Injecting Faults"

Transcription

1 Attacking an Obfuscated Ciphe by Injecting Faults Matthias Jacob 1, Dan Boneh 2, and Edwad Felten 1 1 Pinceton Univesity {mjacob,felten}@cs.pinceton.edu 2 Stanfod Univesity dabo@cs.stanfod.edu Abstact. We study the stength of cetain obfuscation techniques used to potect softwae fom evese engineeing and tampeing. We show that some common obfuscation methods can be defeated using a fault injection attack, namely an attack whee duing pogam execution an attacke injects eos into the pogam envionment. By obseving how the pogam fails unde cetain eos the attacke can deduce the obfuscated infomation in the pogam code without having to unavel the obfuscation mechanism. We apply this technique to extact a secet key fom a block ciphe obfuscated using a commecial obfuscation tool and daw conclusions on peventing this weakness. 1 Intoduction In ecent yeas the advent of mass distibution of digital content fueled the demand fo tools to pevent softwae and digital media fom illegal copying. The goal is to make it hade fo a malicious peson to evese enginee o modify a given piece of softwae. One well known technique fo peventing illegal use of digital media is watemaking fo audio and video content [1] which had only limited success. Anothe common appoach is to only distibute encypted content (see, e.g., CSS [2], Intetust [3], MS Windows Media Technologies [4], Adobe EBooks [5]). Uses un content playes on thei machines and these playes enfoce access pemissions associated with the content. In most of these systems the softwae playe contains some secet infomation that enables it to decypt the content intenally. Clealy the whole point is that the use should not be able to emulate the playe and decypt the content by heself. As a esult, the secet infomation that enables the playe to decypt the content must be hidden somehow in the playe s binay code. We note that hadwae solutions, whee the decyption key is embedded in tampe-esistant hadwae [6,7,8], have had some success [9,10], but clealy a softwae only solution, assuming it is secue, is supeio because it is moe cost efficient and easie to deploy. This bings us to one of the main challenges facing content potection vendos: is it possible to hide a decyption key in the implementation of a block ciphe (e.g. AES) in such a way that given the binay code it is had to extact the decyption key. In othe wods, suppose D k (c) is an algoithm fo decypting J. Feigenbaum (Ed.): DRM 2002, LNCS 2696, pp , c Spinge-Velag Belin Heidelbeg 2003

2 Attacking an Obfuscated Ciphe by Injecting Faults 17 the ciphetext c using the key k. Is it possible to modify the implementation of D k (c) so that extacting k by evese engineeing is sufficiently had? If hiding the key in a binay is possible, it has a cucial advantage ove altenative key hiding techniques: in ode to decypt content the binay needs to be executed, and efficient access contol mechanisms exist in the opeating system in ode to pevent unauthoized execution, wheeas hiding a stoed key in memoy is difficult [11]. Key obfuscation is a vey old question aleady mentioned in the classic pape of Diffie and Hellman [12]. Code obfuscation is a common technique fo potecting softwae against evese engineeing and is commonly used fo hiding popietay softwae systems and sensitive system components such as a ciphe. Commecial obfuscation tools often wok by taking as input abitay pogam souce code, and they output obfuscated binay o souce code that is hade to evese enginee and thus to manipulate than the oiginal softwae [13,14,15,16,17]. Howeve, it is unclea whethe obfuscation techniques can be stong enough to potect sensitive softwae systems such as a ciphe implementation. In this pape we investigate a commecial state-of-the-at obfuscated cyptosystem [18] that hides a secet key. An ideal obfuscation tool tuns pogam code into a black-box, and theefoe it is impossible to find out any popeties of the pogam. In pactice howeve, obfuscation tools often only appoximate the ideal case. When obfuscating a cyptosystem the obfuscato embeds a secet key into the pogam code and obfuscates the code. It should be had to figue out any popeties about the key by just investigating the code. Howeve, we show how to extact the secet key fom the system in only a few cyptogaphic opeations and come to the conclusion that cuent obfuscation techniques fo hiding a secet key ae not stong enough to esist cetain attacks. Ou attack is based on diffeential fault analysis [19] in which an attacke injects eos into the code in ode to get infomation about the secet key. The impact of this attack is compaable to an attack on an RSA implementation based on the Chinese Remainde Theoem that equies only one faulty RSA signatue in ode to extact the pivate key [20]. Fault attacks ae a theat on tampe-esistant hadwae [9], and in this pape we show that an advesay can also inject faults to extact a key fom obfuscated softwae. Based on ou expeience in attacking an obfuscated cyptosystem we popose techniques fo stengthening code obfuscation to make fault attacks moe difficult and make a fist step in undestanding the limits of pactical softwae obfuscation. 2 Attacking an Obfuscated Ciphe Implementation In this section we descibe ou attack on a state-of-the-at obfuscato [18] illustated in Figue 1. We wee given the obfuscated souce code fo both DES encyption and decyption of the iteated block ciphe. Ou goal was to evese enginee the system only based on knowledge of this obfuscated souce code. Fo the given obfuscated code the attacke does not lean moe popeties about the

3 18 Matthias Jacob, Dan Boneh, and Edwad Felten + Key Obfuscato Fig. 1. Opeation of the obfuscato on the ound-based ciphe: It tansfoms the key and the oiginal souce code into code that implements evey ound as a lookup table of pecomputed values. The intemediate esults afte each ound ae encoded pogam by investigating the obfuscated souce code than by just disassembling the binay because most of the pogam is composed of lookup tables. In this paticula appoach the obfuscation method hides the secet key of a ound-based ciphe in the code. Because a ound-based ciphe exposes the secet key evey time it combines the key with the input data of a ound, the obfuscato injects andomness and edundancies and efines the esulting boolean opeations into lookup tables. Instead of executing algoithmic code, the pogam steps though a chain of pecomputed values in lookup tables and etieves the coect esult. Theefoe it is difficult to obtain any infomation about the single ounds by just looking at the souce code o binay code, but in ou attack we obtain infomation by obseving and changing data duing the encyption pocess. 2.1 Obfuscating an Iteated Block Ciphe The obfuscation pocess of the ciphe implementation is shown in Figue 1. The obfuscato tansfoms the oiginal souce code and the key into a ciphe in which the key is embedded and hidden in the ounds. The single ounds of the ciphe ae unolled, but the boundaies of each ound ae clealy ecognizable. The ciphe contains n ounds πi k fo each i =1,.., n with the key k. Including the initial pemutation λ the ciphe computes the function E k (M) := [ λ 1 π k n π k n 1... π k 1 λ ] (M). Howeve, intepetation of any intecepted intemediate esults is difficult since the obfuscato maps the oiginal intemediate esults afte each ound to a new epesentation. This tansfomation is descibed in detail in [18]. In the following paagaphs we give an algebaic definition fo the tansfomation into the 96-bit intemediate epesentation of the obfuscato in [18]. In the fist step we define some basic opeations. x m i extacts bits i though i + m fom a bit sting. EP(x) computes the DES expansion pemutation. x 1 x 2...x n m i = x i x i+1...x i+m x 1 x 2...x n i = x i EP i (x) =EP(x) 6 6i

4 Attacking an Obfuscated Ciphe by Injecting Faults 19 R k R k = EP(R k ),i = EP i(r k ) The t-box T,i k (L,R k ) computes the i-th DES s-box in ound fo i =0..7 and appends R(L,R k ) which takes the fist and sixth bit fom R,i k and appends two andom bits fom L. The bits fom L ae used to fowad the left hand side infomation in the t-boxes, and the fist and sixth bit fom R,i k to econstuct R k fom the s-box esult in ode to fowad it to ound + 1 as the left hand side input. T,i(L k,r k )=S,i(R k,i) k R(L,R,i) k T k (L,R k )=T k,γ (0) (L,R k ) T k,γ (1) (L,R k )... T k,γ (11) (L,R k ) Fo i = T,i k (L, R k ) outputs eithe andom dummy values o bits fom L. In ode to obfuscate the esult γ pemutes the ode of the t-boxes on T = {T,0...T k,11}. k Additionally, φ applies a bijective non-linea encoding on 4-bit blocks x j fo j = whee φ (x) =(φ,1 (x 1 ),φ,2 (x 2 ),..., φ,24 (x 24 )) and x = x 1 x 2...x 24. Since a single t- box consists of 8 bit outputs, two diffeent bijective non-linea encodings belong to one t-box. In ode to do the second step the obfuscated DES implementation needs to be able to ecove the oiginal ight hand side input to ound, and this gets implemented using function α,i k (y) which takes the fowaded bits x 1 and x 2 that descibe the ow of the s-box. α k,i(y, x 1,x 2 )=EP 1 i ((S k,i) 1 (y, x 1,x 2 )) L = L 0 L 1 L 2... L 7 R = R 0 R 1 R 2... R 7 The second step then implements the function τ k,i in which µ (n) descibes the coesponding position of the bit in the output of the t-boxes, and PB is the DES p-box opeation: τ,i k (x)(li,r i ) =α,i(x k 4 8γ,x (i) 8γ (i)+4, x 8γ(i)+5) }{{} [ depends on R 1 only EP i PB (x 4 γ(0) x 4 γ... (1) x 4 γ }{{ (11) ) } depends on R 1 only (x µ(0)... x µ(32) ) ] }{{} depends on L 1 only τ k (x) =τ k,0(x) τ k,1(x)... τ k,11(x) ψ and φ ae diffeent non-linea bijective encodings on 4-bit blocks, and δ

5 20 Matthias Jacob, Dan Boneh, and Edwad Felten δ (L, R )=γ (µ ((L 0 24 ),R )) µ (x 0 x 1...x 47,y 0...y 47 )=y 0...y 5 x µ 1 x µ 1 γ (z 0 z 1...z 95 )=z γ 1 The obfuscated t-box is (22) x µ 1 (0) x µ 1 (23)...x µ 1 (1) y 6...y 11 x µ 1 (47) (2) x µ 1 (0)...z (γ 1 (0)+5) z 6z 7...z γ 1 (11)...z (γ 1 T k (x) =(φ T k ψ 1 1 )(x). Hence the tansfomed function is: E k (x) = [ (λ 1 δn 1 ψn 1 (( ) ( (( ψ n δ n τnφ k 1 n φn Tn k ψn 1))... ψ1 δ 1 τ1 k φ 1 ) ( 1 φ1 T1 k ψ0 1 ) (ψ0 δ 0 βλ) )] (x) with β(l, R) =L EP(R) By setting ψ 0 δ 0 βλ =0 τ k = ψ δ τ k φ 1 =1,.., n λ 1 δn 1 ψn 1 = n +1 the esulting encyption opeation is E k (x) = [ τ n+1 k (τ k n T n k ) (... τ k 1 T 1 k ) ] τ k 0 (x) (3)...y 42...y 47 (11)+5) z 94z 95 Evey component τ i k and T i k is implemented within a sepaate lookup table. Fo convenience set and obtain τ k = { τ k =0,= n +1 τ k T k =1,.., n E k (x) = [ τ n+1 k τ n k... τ 0 k ] (x) Figue 2 shows the deobfuscation poblem. Given one DES ound and the obfuscated intemediate epesentations an attacke wants to find out the intemediate epesentation which is encoded by the unknown function σ. This σ is the invese of the encoded input to the t-box (by ψ), the pemutation of the t-boxes γ, and the andom distibution of the left hand side µ : σ (L,R )=ψ (δ (L,EP(R ))) E k (x) contains the key k implicitly in τ k (in [18] τ k τ n+1 k to M 3 and all othe τ k hides the decomposition into its components σ 1 0 coesponds to M 1, to M 2 ). In othe wods, the implementation of τ k 1, πk, and σ. Hence, ecoveing the key boils down to the poblem of extacting π k out of τ. In any futhe explanations we emove λ fom any computation since it does not play any ole in the attack and can be easily inveted. Theefoe τ 0 k = ψ 0 and τ n+1 k = ψ n.

6 Attacking an Obfuscated Ciphe by Injecting Faults 21 L 1 32 σ 1 ( L ) 1,R 1 96 R 1 32 f k 32 L 96 σ (L,R) R Fig. 2. Round with the function f k hiding the key k. σ is the intemediate epesentation and L and R ae the left hand and the ight hand side of the intemediate esult espectively. The ounds π k coespond to π k = f k (R 1 L 1,R 1) fo =1..n 2.2 Attacking an Obfuscated Iteated Block Ciphe In an example fo a naive appoach fo attacking the obfuscated ciphe an advesay encypts some abitay plaintext and intecepts intemediate esults to obtain σ (L,R ). The advesay stats the attack by encypting plaintexts p that have one single bit set, and aftewad examines the obfuscated intemediate esults afte the fist ound π1 k duing encyption. By heuistically computing the diffeences between (τ 1 τ 0 )(p) and (τ 1 τ 0 )(0) fo p 0 we find that (τ 1 τ 0 )(p) changes deteministically fo all p that have one bit set in the left hand side of the plaintext L 0 due to the constuction of the t-boxes. Howeve, since the advesay is not able to compute σ 1 1 in ode to etieve R 1 any knowledge of R 0 and L 0 is meaningless if she wants to extact the key. An attack that woks on the fist ound by ecoveing σ1 1 of the ciphe is the statistical bucketing attack [18]. This attack exploits some popeties of the DES s-boxes and equies about 2 13 encyptions. In contast ou attack woks fo any ound-based block ciphe and equies only dozens of encyptions. We now descibe how we use a simplified diffeential cyptanalysis called diffeential fault analysis [19] to ecove the key in a few opeations. In this attack an advesay flips bits in the input to the last ound function fn k and computes the diffeent outputs to find out the ound function fn k of the last ound n. When injecting single bit faults into the last ound using chosen ciphetexts only dozens of cyptogaphic opeations ae necessay in ode to find fn. k The implementation of this attack equies less infomation about the intemediate epesentation than the naive attack since an attacke only needs to flip a single bit in the obfuscated intemediate epesentation, and it is not necessay to figue out any invese mappings σ 1. Also, this attack is independent fom the DES stuctue and can be applied to any ound-based block ciphe. We ty to apply deteministic changes to σ n 1 (L n 1,R n 1 ), the state going into the last ound, and then un the last ound opeation.

7 22 Matthias Jacob, Dan Boneh, and Edwad Felten L n 1 R n f n k 32 L n R n Fig. 3. Last ound with the ound function f k n. In the last ound the ight hand side and the left hand side of the output ae usually not cossed ove Figue 3 shows the last ound of the ciphe. An attacke knows R n = R n 1 fom the ciphetext which is also the input to the ound function of the last ound. In addition an attacke can modify R n 1 even if the mapping of σ n 1 is unknown by changing R n in the ciphetext, decypting the ciphetext, and encypting the esulting plaintext aftewad. Theefoe we have two peconditions fo the attack: Fist, both encyption and decyption opeations need to be available, and second, the attacke needs to be able to modify the ciphetext abitaily. Using this technique we can find out the positions of µ (i) fo i = which descibe the bits fo the left-hand side. Fom the definition of T,i k it is clea, that if the attacke keeps the ight-hand side input constant, the obseved changes in the input to the t-boxes uniquely efe to changes in the left-hand side of the input. The attacke is not able to set L n 1 to 0 since she would need to know the ound function and hence the key. Theefoe, R n =0 and L n 1 = fn(0) k L n. Now the attacke builds a table of (c) :=σ n 1 (c, 0) σ n 1 (0, 0) fo c = Since σ contains the unknown non-linea bijection δ 1 it is not possible to build a linea opeato in. Howeve, using the table the attacke can always econstuct the left-hand side of the input in the scenaio whee the ight-hand side is 0. Futhemoe, diffeent bits of the left-hand side L n 1 can coespond to the same t-box, and in this case the encoding depends on two bits. Theefoe, in the fist pat the attacke tests which bits coespond to the same t-box and then ties all possible bit combinations into this t-box. In this way the attacke gets all possible values fo σ induced by the left-hand side L n 1. Detemining the oiginal value L n 1 f k n(0) given the intemediate epesentation is just a table lookup. The idea now is to inject faults into the input to the s-box and obseve the output. Unfotunately, the attacke does not know how the ight-hand side gets encoded in σ. In ode to get aound this poblem the attacke feeds a value x into R n 1 that is diffeent fom 0 and then esets L n 1 to 0. Finally, L n contains f k n(x) f k n(0), and the attacke can extact the key fo the last ound

8 Attacking an Obfuscated Ciphe by Injecting Faults 23 using diffeential cyptanalysis. Getting the DES key fom the ound key equies a2 8 bute-foce seach. The poblem is that if the ight hand side R n 1 changes to some value 0 the t-box inputs collide with the 16 bits of the left-hand side L n 1. Theefoe it is not possible to decode the left-hand side L n 1 uniquely since complete new values might show up in the t-boxes that ae taking as input bits fom the left-hand side. Howeve, if the attacke sets only one bit in R n 1 at most two diffeent t-box outputs ae affected, and hence the attacke can simply count the occuences of the encoded 4-bit values at a cetain position in σ. We descibe the algoithm fo the attack when the specification of the ound function is known. We will explain at the end of the algoithm how the algoithm needs to be changed to attack an unknown ound function. Fo convenience we use D k (c) to descibe the decyption of ciphetext c using key k, and E k i (p) =(L i,r i ) to descibe iteation of plaintext p fo i ounds in the encyption opeation using key k. s n (k) = s 1 n(k)... s 8 n(k) is the key schedule fo key k in ound n, m is the size of the input wod, and the sboxes sb n (x) =sb 1 n(x 1 )... sb 8 n(x 8 ): f k n(x 1... x 8 ):=sb 1 n(x 1 s 1 n(k))... sb 8 n(x 8 s 8 n(k)) In ou simplified model the in- and outputs of the s-box have the same size, and the system computes the xo of the key and the input to the s-box. The algoithm consists of 3 basic opeations: A Set opeation changes any abitay vaiable. When we do a Compute we execute an opeation in the iteated block ciphe. This can be encyption, decyption, o just a single ound of the ciphe. Deive computes values on known vaiables without executing the ciphe. Figue 4 illustates the single steps of the algoithm. Ou attack algoithm woks as follows: 1. Initialization: (Figue 4 top left) Set L n := 0, R n := 0 Compute σ n 1 (L n 1,R n 1 )=E k n 1(D k (L n,r n )) Result: L n 1 = f k n(0), R n 1 =0 Deive Ω = σ n 1 (L n 1,R n 1 )=σ n 1 (f k n(0), 0) 2. Reconstuct (x): (Figue 4 top ight) Fo j =0to 23: Set m(j) :=0 Fo i =0to 31: Set L n := 2 i, R n := 0 Compute σ n 1 (L n 1,R n 1 )=E k n 1(D k (L n,r n )) Set (L n ):=σ n 1 (L n 1,R n 1 ) Ω Fo j =0to 23: If ( (L n ) 4 4j 0) Set b[j][m(j)] := i Set m(j) :=m(j)+1

9 24 Matthias Jacob, Dan Boneh, and Edwad Felten fn k (0) 0 fn k (0) 2 i 0 f n k f n k 0 0 i i fn k ( ) i 2 f k n ( 0) i 2 f n k f n k 0 i 2 2 i fn k ( ) fn k ( 0) i 2 Fig. 4. Attacking the last ound of the iteated block ciphe. Boxes having a white backgound indicate that the attacke changed values. The pictue on the top left shows the initialization of the algoithm (step 1). Aftewad, on the top ight we change L n to 2 i in ode to econstuct ψ n 1(x) (step 2). In the bottom left we set 2 i to be input to the ound function. The fault injection takes place on the bottom ight (step 3): We eset L n 1 to f k n(0) and obtain the diffeence f k n(2 i ) f k n(0) in L n Fo j =0to 23: Fo l =0to 2 m(j) 1: Set e := 0 Fo k =0to m(j): If (((l >>k)&1)=1) Set e := e +2 b[j][k] Set L n := e, R n := 0 Compute σ n 1 (L n 1,R n 1 )=E k n 1(D k (L n,r n )) Set (L n ):=σ n 1 (L n 1,R n 1 ) Ω 3. Reset L n 1 to fn(0): k (Figue 4 bottom left) Fo i =0to 31: Set L n := 0, R n := 2 i Compute σ n 1 (L n 1,R n 1 )=En 1(D k k (L n,r n )), Result: L n 1 = fn(2 k i ), R n 1 =2 i Deive w := σ n 1 (L n 1,R n 1 ) Ω = σ n 1 (fn(2 k i ), 2 i ) σ n 1 (0, 0) Fo x in 1 Fo j =0to 23 If ( (x) 4 4j = ) w 4 4j w 4 4j := 0 Compute (L n,r n)=(τ n τ n+1)(w) =(σn 1 1 πk n)(w) Result: L n fn(2 k i ) fn(0), k R n 2 i

10 Attacking an Obfuscated Ciphe by Injecting Faults Do diffeential cyptanalysis to extact the key fo the ound function f k n: l s = L n 4 4(s 1), s = EP(R n) 6 6(s 1) Fo s =1to 8: d s =0 Fo s =1to 8: Fo i =0to 31: Compute c s [i]: sb s n( s [i] c s [i]) = l s [i] Compute d s [i] =d s [i]+1 Set c s := c s [max m i=1 ds [i]] 5. Reconstuct the oiginal key: k:= c 1 c 2... c 8 Compute s n (k) 1 to etieve oiginal key bute-foce seach on the emaining bits of the key. Step 2 of the algoithm econstucts (x), in step 3 we inject the fault by esetting L n 1 to fn(0) k and computing L n = fn(r k n ) fn(0). k In steps 4 and 5 we compute the key given a ound function fn k by concatenating the components going into the s-boxes, inveting the key schedule, and unning a bute-foce seach on the emaining key bits. If the key schedule s n (k) fo ound n is unknown, we cannot do step 5 to get the key out. In this case we have to compute the key fo ound n and then use this key to attack ound n 1 until we extact all ound keys. If the ound function fi k is unknown, we can fist ty out diffeent known ound functions (e.g. Skipjack, Blowfish, DES etc) fo fi k. If none of them woks, we have to do cyptanalysis to ecove the s-boxes fom scatch. We make the basic assumption that the ound function is based on an s-box with fixed inputs. This attack is fully automated and can be un without any knowledge of the system. Given the plaintext length as 2n and the length of the intemediate epesentation as 4m the attack in steps 1-5 extacts the key in O(max(m, n)) cyptogaphic opeations, and theefoe undemines the secuity of the obfuscation system. 2.3 Summaizing the Attack We exploit two weaknesses in this attack: Fist, the boundaies of the ounds ae identifiable and potection of intemediate esults against tampeing is not stong enough. This means that a) hiding the ounds can stengthen the implementation and b) data needs to be safe against leaking of infomation duing execution. In this attack we show that faults in ciphes ae a cheap and efficient technique to extact a secet key fom an obfuscated ciphe implementation in softwae. Ou attack on obfuscated ciphe implementations in softwae equies only a few cyptogaphic opeations, and theefoe an advesay can un the attack on any inexpensive hadwae.

11 26 Matthias Jacob, Dan Boneh, and Edwad Felten We had to modify the oiginal algoithm fo diffeential fault analysis [19] in seveal steps. The main diffeence is that it is not possible to inject andom faults since the intemediate epesentation is obfuscated and has multiple points of failue. Howeve, it is still possible to find out a sufficient amount of infomation about the obfuscated intemediate epesentation that make it possible fo an attacke to inject faults. In the undelying attack model it is the goal to decypt some media steam on diffeent machines at the same time. To do this we assume that copy potection of the decyption system is sufficiently stong, and theefoe an attacke has to extact the secet key. In the cuent implementation ou attack equies that a decyption system colludes with an encyption system, but actually an attacke only needs to obtain plaintexts fo 2m chosen plaintexts and the decyption system. O, since the system is a symmetic block ciphe, we un the attack on the encyption system and need 2m chosen ciphetexts fom the decyption opeation. Futhemoe, it is an open question how difficult it is to tun an obfuscated decyption system into an encyption system. In this case having the decyption system is sufficient fo the attack. In the ecommended vaiant the system executes the encyption opeation E (x) =(f 1 Eg)(x) and the decyption opeation D (x) =(g 1 Df)(x) whee f and g ae non-linea bijective encodings. The cuent attack is now impossible, but the disadvantage is that given a ciphetext it is only possible to decypt when f, g, and the key k ae known, o the obfuscated decyption pogam is being used. It is not implementing DES anymoe. It is cucial to fix the weaknesses in the system o implement othe techniques to pevent any common attacks that ecove the secet key. In the following sections we exploe what we can do about the weaknesses and investigate how to stengthen obfuscation techniques against common attacks. 3 Theoetical Consideations The weaknesses in this attack ae specific to the implementation of the obfuscated ciphe. We wee able to use specific popeties of the DES ciphe and the obfuscation method in ode to extact the secet key. Howeve, theoetical consideations do not necessaily limit any stonge obfuscation techniques. Hee we give a simple agument why the geneal poblem of etieving embedded data fom a cicuit is NP-had, and theefoe no efficient geneal deobfuscato exists fo this poblem. In MATCH-FIXED-INPUT we ae given two cicuits, one of which has additional input k. It is the goal to find a k such that the two cicuits ae equivalent. Definition: MATCH-FIXED-INPUT: Given cicuits two C(x, k) and C (x) whee x {0, 1} n and k {0, 1} c whee c N is constant, find k {0, 1} c such that x : C(x, k )=C(x). Theoem: MATCH-FIXED-INPUT is NP-had.

12 Attacking an Obfuscated Ciphe by Injecting Faults 27 Poof: We educe SAT to MATCH-FIXED-INPUT which is almost tivial. In ode to test satisfiability of cicuit D(x), set C(x, k) = D(k) and C (x) = tue, and un MATCH-FIXED-INPUT. IfMATCH-FIXED-INPUT etuns a k such that C(x, k )=C (x), then accoding to the definition thee exists an x such that D(x) = tue. IfMATCH-FIXED-INPUT does not etun a k, then fo all x D(x) = false. Hence, we educe SAT to MATCH-FIXED-INPUT. Fo pactical puposes, howeve, this theoetical obsevation is not much of a elevance since the poblem is had in the wost case but can still be easy fo pactical puposes. On the aveage the poblem MATCH-FIXED-INPUT is NPhad, but in seveal cases heuistic methods can extact the fixed input as in the example of this obfuscated DES ciphe. 4 Stengthening Obfuscation In this section we biefly discuss vaious mechanisms fo defending against ou attack using softwae faults. We fist descibe some common attacke goals when attacking obfuscated code: Hide data in the pogam: The attacke wants to find out cetain data values. This case subdivides into the possibility of tacing values duing untime and discoveing static values in the code. Potect the pogam fom contolled manipulation: In this case the attacke wants to foce the pogam to behave in a cetain way, e.g. to emove copy potection mechanisms o to cause damage on a system. Hide algoithms of the pogam: Accoding to Keckhoff s pinciple cyptogaphic algoithms ae usually public, but in some cases it is useful to hide cetain popeties by which an attacke can ecognize the algoithm, i.e. distinguish fo example between AES, IDEA o Blowfish [21,22,23]. Often when obfuscating a ciphe, commecial tools fist encode the plaintext using some hidden encoding function, then un the ciphe, and finally decode the ciphetext using some othe hidden decoding function. Moe pecisely, the encyption pocess looks like E k (x) =(F E k G 1 )(x) whee E k is the oiginal DES encyption [18]. Note that F and G must be one-to-one functions so that decyption is possible. The decyption pocess is simila: D k (x) = (G D k F 1 )(x). This pe- and post-encoding makes chosen ciphetext attacks moe difficult since an advesay fist needs to ecove G. As a esult, these encoding makes ou fault attack hade to mount. One can still potentially attack the system by using a fault attack against innes levels of the Feistel ciphe. 4.1 Defending against a Fault-Based Attack We mention a few mechanisms fo potecting obfuscated systems fom a fault attack. One appoach is to potect all intemediate esults using checksums. These checksums ae fequently checked by the obfuscated code. We efe to this

13 28 Matthias Jacob, Dan Boneh, and Edwad Felten appoach as local checking. Clealy the code fo checking these checksums must be hidden in the total pogam code so that an attacke cannot disable these checkes. One appoach fo using checksums to ensue code integity is explained in [24]. In this appoach we compute checksums fo pats of the pogam and veify them duing pogam execution. In the exteme we veify a checksum fo evey single instuction and evey data element. Anothe appoach fo checking the computation of obfuscated code is to use global checking. The idea is to execute the obfuscated pogam k times (e.g. k = 3) by inteleaving the k executions. At the end of the computation the code veifies that all k executions esulted in the same value. As befoe, the checke must be obfuscated in the code so that it cannot be tageted by the attacke. This global checking appoach makes ou attack hade since the attacke now has to modify intenal data consistently in all k executions of the code. The poblem with the checking appoaches is the vulneability of the checke since it is unpotected against any tampeing attack. One appoach to make the checke moe obust is to obfuscate it and have it veify its own integity epeatedly while it is checking the pogam. This vaiant educes the maximum time inteval an attacke has to un the modified pogam. In any case the attacke needs to modify to system at moe than one place. We note that if the integity check fails the pogam should not stop execution immediately since this will tell an attacke whee the checke is. Anothe appoach fo making the fault attack moe difficult is to divesify the obfuscation mechanism. In othe wods, each use gets a vesion of the code that is obfuscated diffeently (e.g. by using diffeent encoding functions). In divesification we add andomness to the obfuscation methods, and theefoe two obfuscated pogams ae always diffeent afte obfuscation. Especially vulneable places in a pogam such as the intemediate esults of the iteated ound-based ciphe need to be divesified. 5 Related Wok Infomally tampe-esistance of a softwae implementation measues to what extent the implementation esists abitay o delibeate modifications. Fo example, an implementation can be potected fom emoving a copy potection mechanism. Thus, obfuscation is a common technique fo impoving tampe-esistance. Baak et al. [25] give a fomal definition of obfuscation using a black-box appoach which is the ideal case. They show that in thei model, that obfuscation is not possible. Encypting the executable binay [26] is the most common appoach fo hiding code. In binay encyption the pogam is encypted and decypts itself duing untime. The poblem is that the pogam is available in the clea at some point befoe it gets executed on the pocesso, and it can be intecepted. Futhemoe, the system needs to hide the decyption key, and that educes ecusively to the key obfuscation poblem itself. A common appoach fo obfuscation is to obstuct common static pogam analysis [27,28,29]. The main technique fo doing this is to inset of additional

14 Attacking an Obfuscated Ciphe by Injecting Faults 29 code that ceates pointe aliasing situations. Applying static pogam analysis to analyze a pogam containing possible pointe aliasing tuns out to be NPhad [30]. This obfuscation technique only potects against attacks by static pogam analysis. It is still possible to do dynamic attacks with a debugge o any type of tampeing. The goal of obfuscation is to hide as many pogam popeties as possible. The pinciple of impoving tampe-esistance by obfuscation is that if an attacke cannot find the location fo manipulating a value, it is impossible to change this value. In addition an obfuscato can eliminate single points of failue. On the othe hand obfuscation neve potects against existential modification. Collbeg et al define some metics fo obfuscation in [28]. They classify obfuscation schemes by the confusion of a human eade ( potency ), the successfulness of automatic deobfuscation ( esilience ), the time/space ovehead ( cost ), and the blending of obfuscated code with oiginal code ( stealth ). But obfuscation of a secet key equies stonge popeties of obfuscation, since any definition of tampe-esistance is missing. A pogam that is a good obfuscato in these metics can still have a single point of failue, and theefoe it does not potect the pogam against fault attacks. Tampe-esistance can also be impoved by techniques othe than obfuscation. We aleady mentioned self-checking of code as one possibility [24,31,16]. Potection by softwae guads is anothe technique to pevent tampeing [32]. Softwae guads ae secuity modules that implement diffeent tasks of a pogam and thus eliminate single points of failue. In addition a pogam can implement anti-debugging techniques in ode to pevent tampeing with a debugge [33]. Anti-debugging insets instuctions into a pogam o changes popeties in ode to confuse a debugge. Fo example a pogam can abitaily set beak points o misalign code. Futhemoe, vitual softwae pocessos ae ae a technique fo making tampeing difficult [13]. Vitual softwae pocessos un the oiginal pogam on a softwae pocesso, and in ode to evese enginee the oiginal pogam, an attacke needs to compomise any potection mechanism of the vitual softwae pocesso as well. Goldeich and Ostovsky show in [34] that softwae potection against eavesdopping can be educed to oblivious simulation of RAMs. In thei definition a RAM is oblivious if two diffeent inputs with the same unning time ceate equivalent sequences of memoy accesses. Oblivious RAM potects against any passive attack and theefoe stengthens an obfuscato because it is impossible to find out the memoy locations a pogam accesses. Howeve, it does not potect against the fault injection attack. Cuent hadwae dongles ae based on the idea of oblivious RAM, since the code implementing the license check sits on the dongle. 6 Open Poblems In othe aeas of infomation hiding techniques, such as watemaking, benchmak pogams ae available to measue the stength of a technique to hide

15 30 Matthias Jacob, Dan Boneh, and Edwad Felten infomation. Fo example, StiMaks [35] uses a vaiety of diffeent geneic attacks on a watemaked image to make the watemak illegible. It is an open poblem to build such a benchmak fo code obfuscation and tampe esistance tools. Such a benchmak would take as input some tampe esistant code and attempt to beak the tampe esistance. Cuently no such benchmak exists and thee is no clea model fo building such a benchmak. One of the main open poblems in code obfuscation is to come up with a model fo obfuscation that can be ealized in pactice. [25] defines obfuscation using a black-box model that hides all popeties of a pogam. They show that it is not possible to achieve obfuscation in that model. Fo pactical puposes a black box model might not always be necessay. In the example of the obfuscated DES ciphe in this pape we only need to make sue that it is impossible to get infomation about the secet key. The open eseach poblem is to find the most geneal definition fo obfuscation that can be ealized in pactice. 7 Conclusion Code obfuscation povides some potection against attackes who want to find out secet data o popeties of a pogam, but it is not sufficient as a standalone system. In this study we evaluate the usability of obfuscation when hiding a secet key in an iteated ound-based softwae ciphe. We find weaknesses in a commecial state-of-the-at obfuscato. Ou attack enables automated extaction of the secet key fom the obfuscated pogam code. We discuss a few methods fo defending against these attacks. Refeences 1. Cave, S.A., Wu, M., Liu, B., Stubblefield, A., Swatzlande, B., Wallach, D.S., Dean, D., Felten, E.W.: Reading between the lines: Lessons fom the SDMI challenge. In: Poceedings of the 10th USENIX Secuity Symposium. (2001) 2. CSS: (2002) 3. Intetust: (2002) 4. Micosoft Windows Media Technologies: (2002) 5. Adobe EBooks: (2002) 6. Abaham, D.G., Dolan, G.M., Double, G.P., Stevens, J.V.: Tansaction Secuity System. IBM Systems Jounal 30 (1991) Dallas Semiconducto: Soft Micocontolle Data Book. (1993) 8. Tusted Computing Platfom Alliance: (2002) 9. Andeson, R., Kuhn, M.: Low cost attacks on tampe esistant devices. In: Poceedings of the 5th Intenational Secuity Potocols Confeence. (1997) Koche, P., Jaffe, J., Jun, B.: Diffeential powe analysis. Lectue Notes in Compute Science 1666 (1999) Shami, A., van Someen, N.: Playing hide and seek with stoed keys. Lectue Notes in Compute Science 1648 (1999) Diffie, W., Hellman, M.: New diections in cyptogaphy. IEEE Tansactions on Infomation Theoy IT-22 (1976)

16 Attacking an Obfuscated Ciphe by Injecting Faults Micosoft Copoation: Wold Intellectual Popety Oganization, WO 02/01327 A2 (2002) 14. Cloakwae Copoation: Wold Intellectual Popety Oganization, WO 00/77596 A1 (2000) 15. Intetust Copoation: US Patent Office, US 6,157,721 (2000) 16. Intel Copoation: US Patent Office, US 6,205,550 (2000) 17. RetoGuad Java Obfuscato: (2002) 18. Chow, S., Johnson, H., van Ooschot, P.C., Eisen, P.: A White-Box DES Implementation fo DRM Applications. In: Poceedings of Wokshop on Digital Rights Management (2002) 19. Biham, E., Shami, A.: Diffeential fault analysis of secet key cyptosystems. Lectue Notes in Compute Science 1294 (1997) Boneh, D., DeMillo, R.A., J.Lipton, R.: On the impotance of checking cyptogaphic potocols fo faults. Lectue Notes in Compute Science 1233 (1997) Schneie, B.: Applied Cyptogaphy. Wiley (1994) 22. Menezes, A.J., Van Ooschot, P.C., Vanstone, S.A.: Handbook of applied cyptogaphy. CRC Pess (1997) 23. Daemen, J., Rijmen, V.: Rijndael fo AES. In NIST, ed.: The Thid Advanced Encyption Standad Candidate Confeence, National Institute fo Standads and Technology (2000) Aucsmith, D.: Tampe-esistant softwae: An implementation. Lectue Notes in Compute Science 1174 (1996) Baak, B., Goldeich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K.: On the (im)possibility of obfuscating pogams. Lectue Notes in Compute Science 2139 (2001) gugq, scut: Amouing the ELF: Binay encyption on the UNIX platfom. Phack Inc. 58 (2001) 27. Wang, C., Davidson, J., Hill, J., Knight, J.: Potection of softwae-based suvivability mechanisms. Poceedings of the 2001 Dependable Systems and Netwoks (DSN 01) (2001) 28. Collbeg, C., Thomboson, C., Low, D.: Manufactuing cheap, esilient, and stealthy opaque constucts. In: The 25th Symposium on Pinciples of Pogamming Languages (POPL 98), Association fo Computing Machiney (1998) Steensgaad, B.: Points-to analysis in almost linea time. In: The 23th Symposium on Pinciples of Pogamming Languages (POPL 96), Association fo Computing Machiney (1996) Landi, W.: Undecidability of static analysis. ACM Lettes on Pogamming Languages and Systems 1 (1992) Hone, B., Matheson, L., Sheehan, C., Tajan, R.E.: Dynamic self-checking techniques fo impoved tampe-esistance. Lectue Notes in Compute Science 2320 (2001) Chang, H., Atallah, M.J.: Potecting softwae code by guads. Lectue Notes in Compute Science 2320 (2001) Cesae, S.: Linux anti-debugging techniques (fooling the debugge). Secuity Focus (2000) 34. Goldeich, O., Ostovsky, R.: Softwae potection and simulation on oblivious RAMs. Jounal of the Association fo Computing Machiney 43 (1996) Petitcolas, F.A.P., Andeson, R.J., Kuhn, M.G.: Attacks on copyight making systems. Lectue Notes in Compute Science 1525 (1998)

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

An Identification Protocol based the secure USB

An Identification Protocol based the secure USB An Identification otocol based the secue UB Chol-Un KIM ok-jun AN and u-nam HAN Faculty of Mathematics Kim Il ung Univesity yongyang..r.k. Abstact In this pape we poposed an identification potocol which

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

( N) ( P 1)( P 1)...( P r. M (mod P) (mod P ) (mod N) (mod... )

( N) ( P 1)( P 1)...( P r. M (mod P) (mod P ) (mod N) (mod... ) M-RSA igital Signatue Scheme with one Public Key and one Pivate Key 1 K.Suesh Kuma Reddy, 2 E.Madhusudhana Reddy, 3 M.Padmavathamma 1,3 ept.of Compute Science, S.V.Univesity, Tiupati, A.P, India. 2, ept.of

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines 1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3 A PMW-EX1/PMW-EX3 Getting Stated Oveview This document descibes how to use the XDCAM EX Vesion Up Tool (heeafte Vesion Up Tool ) to upgade the PMW-EX1 and PMW-EX3 to vesion 1.20 (PMW-EX1) o vesion 1.10

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Topic -3 Image Enhancement

Topic -3 Image Enhancement Topic -3 Image Enhancement (Pat 1) DIP: Details Digital Image Pocessing Digital Image Chaacteistics Spatial Spectal Gay-level Histogam DFT DCT Pe-Pocessing Enhancement Restoation Point Pocessing Masking

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

COSC 6385 Computer Architecture. - Pipelining

COSC 6385 Computer Architecture. - Pipelining COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped

More information

I.J.E.M.S., VOL. 1(1): ISSN X

I.J.E.M.S., VOL. 1(1): ISSN X I.J.E.M.S., VOL. 1(1): 34-41 ISSN 2229-600X NEW VARIANT MJ2 RSA CRYPTOSYSTEM WITH ONE PUBLIC KEY AND TWO PRIVATE KEYS *K. Suesh Kuma Reddy & M. Padmavathamma Depatment of Compute Science, S.V.Univesity,

More information

UCB CS61C : Machine Structures

UCB CS61C : Machine Structures inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

SHA-3 and The Hash Function Keccak

SHA-3 and The Hash Function Keccak Chistof Paa Jan Pelzl SHA-3 and The Hash Function Keccak An extension chapte fo Undestanding Cyptogaphy A Textbook fo Students and Pactitiones www.cypto-textbook.com Spinge 2 Table of Contents 1 The Hash

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18 Copyight (c) 2016-2018 Young W. Lim. Pemission is ganted to copy, distibute and/o modify this document unde the tems of the GNU Fee Documentation License, Vesion 1.2 o any late vesion published by the

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

Lecture #22 Pipelining II, Cache I

Lecture #22 Pipelining II, Cache I inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html

More information

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

JPEG 2000 Wireless Image Transmission System using Encryption Domain Authentication

JPEG 2000 Wireless Image Transmission System using Encryption Domain Authentication JPEG 000 Wieless Image Tansmission System using Encyption Domain Authentication Ryo Ito*, Muneaki Matsuo*, Yuya Miyaoka*, Koji Inoue**, Shoma Eguchi**, Masayuki Kuosaki*, Hioshi Ochi*, Yoshimitsu Kuoki**,

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

PROBABILITY-BASED OPTIMAL PATH PLANNING FOR TWO-WHEELED MOBILE ROBOTS

PROBABILITY-BASED OPTIMAL PATH PLANNING FOR TWO-WHEELED MOBILE ROBOTS Poceedings of the ASME 215 Dynamic Systems and Contol Confeence DSCC215 Octobe 28-3, 215, Columbus, Ohio, USA DSCC215-999 PROBABILITY-BASED OPTIMAL PATH PLANNING FOR TWO-WHEELED MOBILE ROBOTS Jaeyeon Lee

More information

Undecidability of Static Analysis. William Landi. Siemens Corporate Research Inc. 755 College Rd East.

Undecidability of Static Analysis. William Landi. Siemens Corporate Research Inc. 755 College Rd East. Undecidability of Static Analysis William Landi Siemens Copoate Reseach Inc 755 College Rd East Pinceton, NJ 08540 wlandi@sc.siemens.com Abstact Static Analysis of pogams is indispensable to any softwae

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

Extract Object Boundaries in Noisy Images using Level Set. Final Report

Extract Object Boundaries in Noisy Images using Level Set. Final Report Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Method of controlling access to intellectual switching nodes of telecommunication networks and systems

Method of controlling access to intellectual switching nodes of telecommunication networks and systems ISSN (e): 2250 3005 Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

Parametric Query Optimization for Linear and Piecewise Linear Cost Functions

Parametric Query Optimization for Linear and Piecewise Linear Cost Functions Paametic Quey Oimization fo Linea and Piecewise Linea Cost Functions Avind Hulgei S. Sudashan Indian Institute of Technology, Bombay {au, sudasha}@cse.iitb.ac.in Abstact The of a quey an depends on many

More information

dc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc

dc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc - CentOS 5.2 - Linux Uses Guide - Linux Command SYNOPSIS [-V] [--vesion] [-h] [--help] [-e sciptexpession] [--expession=sciptexpession] [-f sciptfile] [--file=sciptfile] [file...] DESCRIPTION is a evese-polish

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

Performing real-time image processing on distributed computer systems

Performing real-time image processing on distributed computer systems Pefoming eal-time image pocessing on distibuted compute systems RADU DOBRESCU, MATEI DOBRESCU, DAN POPESCU "Politehnica" Univesity of Buchaest, Faculty of Contol and Computes, 313 Splaiul Independentei,

More information

Parallel processing model for XML parsing

Parallel processing model for XML parsing Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Elliptic Generation Systems

Elliptic Generation Systems 4 Elliptic Geneation Systems Stefan P. Spekeijse 4.1 Intoduction 4.1 Intoduction 4.2 Two-Dimensional Gid Geneation Hamonic Maps, Gid Contol Maps, and Poisson Systems Discetization and Solution Method Constuction

More information

ZERO-KNOWLEDGE PROTOCOLS IMPLEMENTED WITH ELLIPTIC CURVES

ZERO-KNOWLEDGE PROTOCOLS IMPLEMENTED WITH ELLIPTIC CURVES U.P.B. Sci. Bull., Seies C, Vol. 7, Iss. 3, 00 ISSN 454-34x ZERO-KNOWLEDGE PROTOCOLS IMPLEMENTED WITH ELLIPTIC CURVES Bogdan TUDOR În acest mateial se abodează potocoalele de tip cunoastee zeo în pespectiva

More information

A Novel Image-Based Rendering System With A Longitudinally Aligned Camera Array

A Novel Image-Based Rendering System With A Longitudinally Aligned Camera Array EUOGAPHICS 2 / A. de Sousa, J.C. Toes Shot Pesentations A Novel Image-Based endeing System With A Longitudinally Aligned Camea Aay Jiang Li, Kun Zhou, Yong Wang and Heung-Yeung Shum Micosoft eseach, China

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

Introduction to Medical Imaging. Cone-Beam CT. Introduction. Available cone-beam reconstruction methods: Our discussion:

Introduction to Medical Imaging. Cone-Beam CT. Introduction. Available cone-beam reconstruction methods: Our discussion: Intoduction Intoduction to Medical Imaging Cone-Beam CT Klaus Muelle Available cone-beam econstuction methods: exact appoximate Ou discussion: exact (now) appoximate (next) The Radon tansfom and its invese

More information

High Performance Computing on GPU for Electromagnetic Logging

High Performance Computing on GPU for Electromagnetic Logging Intenational Confeence "Paallel and Distiuted Computing Systems" High Pefomance Computing on GPU fo lectomagnetic Logging Glinskikh V.N. Kontoovich A.. pov M.I. Tofimuk Institute of Petoleum Geology and

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.

More information