Encoding techniques for evading n-gram based Intrusion Detection Systems

Size: px
Start display at page:

Download "Encoding techniques for evading n-gram based Intrusion Detection Systems"

Transcription

1 Encoding techniques for evding n-grm bsed Intrusion Detection Systems Studienrbeit Moritz Bechler Universität Tübingen Wilhelm Schickrd Institut SPRING Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 1 / 24

2 Outline 1 Introduction Intrusion Detection Systems n-grm nlysis 2 Attcks ginst n-grm bsed IDSs Trget Model 1-to-1 encoding slice-nd-pd cycle encoding Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 2 / 24

3 Introduction Intrusion Detection Systems Intrusion detection systems Aim to detect misuse of computer systems nd networks. This work focuses on network bsed content nomly detectors. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 3 / 24

4 Introduction Intrusion Detection Systems Intrusion detection systems Aim to detect misuse of computer systems nd networks. This work focuses on network bsed content nomly detectors. Two mjor types, depending on how the dt is nlyzed: Signture-bsed: known ttck ptterns re modeled, these re detected Anomly-bsed: norml ctivity is modeled, devition is detected Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 3 / 24

5 Introduction Intrusion Detection Systems Intrusion detection systems Aim to detect misuse of computer systems nd networks. This work focuses on network bsed content nomly detectors. Two mjor types, depending on how the dt is nlyzed: Signture-bsed: known ttck ptterns re modeled, these re detected Anomly-bsed: norml ctivity is modeled, devition is detected Signture-bsed IDSs re most commonly used tody, but require signture mintennce re useless ginst 0-dy ttcks smll modifictions to the ttck might render the signture useless Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 3 / 24

6 Introduction Anomly-bsed content nlysis Intrusion Detection Systems GET / HTTP/1.1..Host: sploit.org..user-agent: Mozill /5.0 (X11; Linux x86_64; rv: ) Gecko/ Firefox/ Accept: text/html,ppl iction/xhtml+xml,ppliction/ xml;q=0.9,*/*;q=0.8..accept-l nguge: en-us,en;q=0.8,de-de;q =0.5,de;q=0.3..Accept-Encoding : gzip, deflte..dnt: 1..Conne ction: keep-live.. () Innocuous HTTP Request GET / HTTP/1.1..Host: pche-s clp.c..x-ccccccc: AAAAAAAAAAA AAAAA...j.TRj.j...z..u.f.z.09u...D$.. $...u..d$....z...d$.. $..u.h.ok..4$...j.rj.j...h/sh.h/bin..1.pr..pqrp.;...x-cccccc C: AAAAAAAAAAAAAAAA...j.TRj. j...z..u.f.z.09u...d$.. $...u..d$...z...d$.. $..u.h.ok..4$... (b) Prt of Apche OpenBSD Exploit How cn we distinguish between ) nd b)? Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 4 / 24

7 Introduction Intrusion Detection Systems Anomly-bsed content nlysis (cont.) count 10 count vlue () Innocuous HTTP Request vlue (b) Prt of Apche OpenBSD Exploit Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 5 / 24

8 Introduction Intrusion Detection Systems count vlue count vlue PAYL Proposed by Wng nd Stolfo in Anomlous pylod-bsed network intrusion detection. 256 dim. feture spce good trining mlicious Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 6 / 24

9 Introduction Intrusion Detection Systems count vlue count vlue PAYL Proposed by Wng nd Stolfo in Anomlous pylod-bsed network intrusion detection. 256 dim. feture spce But: Byte frequencies cn be djusted by substitution nd pdding. This ttck type is clled mimicry ttck. good trining substitution pdding mlicious Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 6 / 24

10 Introduction n-grm nlysis n-grms n-grms re sequences of n consecutive bytes. n-grms do overlp, thereby reflecting some structurl properties. For nlysis we extrct ll n-grms from the dt. Input: j f h b c f j f h j f h b f h b c h b c f Figure: Exmple of 4-grm extrction Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 7 / 24

11 Introduction n-grm nlysis Angrm Introduced by Wng, Prekh nd Stolfo in ANAGRAM: A Content Anomly Detector Resistnt To Mimicry Attck. Content nomly detector bsed on n-grm nlysis. n = 5 nd n = 6 works best. Trining dt: bcef 3-grms: bc bce cef h2 h1 Bloom filter: Input: bcd Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 8 / 24

12 Introduction n-grm nlysis Angrm Introduced by Wng, Prekh nd Stolfo in ANAGRAM: A Content Anomly Detector Resistnt To Mimicry Attck. Content nomly detector bsed on n-grm nlysis. n = 5 nd n = 6 works best. Trining dt: bcef 3-grms: bc bce cef h2 h1 Bloom filter: h2 h1 Good: bc Input: bcd Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 8 / 24

13 Introduction n-grm nlysis Angrm Introduced by Wng, Prekh nd Stolfo in ANAGRAM: A Content Anomly Detector Resistnt To Mimicry Attck. Content nomly detector bsed on n-grm nlysis. n = 5 nd n = 6 works best. Trining dt: bcef 3-grms: bc bce cef h2 h1 Bloom filter: h1 h2 Good: bc Bd: bcd Input: bcd Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 8 / 24

14 Attcks ginst n-grm bsed IDSs This work tries to find prcticl mimicry ttck ginst Angrm. tried to find suitble byte substitutions by brute-force. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 9 / 24

15 Attcks ginst n-grm bsed IDSs This work tries to find prcticl mimicry ttck ginst Angrm. tried to find suitble byte substitutions by brute-force. explored scheme to reduce the complexity of this serch. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 9 / 24

16 Attcks ginst n-grm bsed IDSs This work tries to find prcticl mimicry ttck ginst Angrm. tried to find suitble byte substitutions by brute-force. explored scheme to reduce the complexity of this serch. generlizes nd improves previously known scheme (cycle encoding). Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 9 / 24

17 Attcks ginst n-grm bsed IDSs Obtining trget model Trget Model First step for lunching mimicry ttck is lwys hving something to mimic. For my experiments I used pcket cptures from the 1999 DARPA Intrusion Detection Evlution specificlly, HTTP requests from the clen trining dt. pproximtion rel trining Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 10 / 24

18 Attcks ginst n-grm bsed IDSs Trget Model Construction of n-grm grphs gj k jk gk Model the lnguge ccepted by the detector s deterministic finite utomton (DFA). Ech n 1-grm represents stte. Ech llowed n-grm represents trnsition. l l kl l ll l gl l g lg l Figure: 3-grm grph for the strings gjkll, gkllll nd llgll Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 11 / 24

19 1-to-1 Encoding Attcks ginst n-grm bsed IDSs 1-to-1 encoding A smll portion of code reproduces shellcode of rbitrry length. Originl Shellcode subtitution Decoder Tble Encoded Shellcode Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 12 / 24

20 Attcks ginst n-grm bsed IDSs 1-to-1 encoding 1-to-1 Encoding (cont.) gj k Simple byte substitution: b j c k g l e g g bc g cg g gg g eg e ge g gk l l jk l kl l ll l gl g l lg Figure: 1-to-1 encoding of the string bcggeggg Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 13 / 24

21 Attcks ginst n-grm bsed IDSs 1-to-1 encoding 1-to-1 Encoding (cont.) But, finding subgrph isomorphism is NP-complete problem. the trget grph is huge in rel-world scenrios. Tried brute-forcing 1-to-1 substitution with restricted lphbets. Running the tool on three shellcodes of incresing complexities with 10 hour timeout: Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 14 / 24

22 Attcks ginst n-grm bsed IDSs 1-to-1 encoding 1-to-1 Encoding (cont.) But, finding subgrph isomorphism is NP-complete problem. the trget grph is huge in rel-world scenrios. Tried brute-forcing 1-to-1 substitution with restricted lphbets. Running the tool on three shellcodes of incresing complexities with 10 hour timeout: 2-grm 3-grm 4-grm 5-grm 6-grm Shellcode s 5.915s m timeout omitted Shellcode 2 timeout omitted omitted omitted omitted Shellcode 3 timeout omitted omitted omitted omitted Tble: Running times Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 14 / 24

23 Attcks ginst n-grm bsed IDSs slice-nd-pd slice-nd-pd Tokenize the shellcode into individul instructions. Find vlid substitution for ll tokens. Connect the individul substituted tokens by NOP-equivlent pths. Tries to reduce the complexity of the substitution step. xor ex, ex mov [esi+0xb], l 0x31 0xc0 0x88 0x46 0x0b substitution 0x42 0xc43 0x44 0x45 0x46 0x42 0xc43 0x44 0x45 0x46 inverse substitution 0x31 0xc0 NOP 0x88 0x46 0x0b Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 15 / 24

24 Attcks ginst n-grm bsed IDSs slice-nd-pd: Problems slice-nd-pd 2-grm 3-grm 4-grm 5-grm 6-grm Shellcode 1 timeout s s m x 138m subst. n-grms Shellcode s timeout timeout x 47.5m x 86.10m subst. n-grms Shellcode 3 timeout timeout timeout timeout N/A subst. n-grms Tble: Running times, timeout fter 10 hours Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 16 / 24

25 Attcks ginst n-grm bsed IDSs slice-nd-pd slice-nd-pd: Problems 2-grm 3-grm 4-grm 5-grm 6-grm Shellcode 1 timeout s s m x 138m subst. n-grms Shellcode s timeout timeout x 47.5m x 86.10m subst. n-grms Shellcode 3 timeout timeout timeout timeout N/A subst. n-grms Tble: Running times, timeout fter 10 hours Other problems: Dt segments in shellcode hve to be kept intct. Offsets chnge when introducing NOPs, requires code modifictions. Checking whether sequence is NOP-equivlent is complicted. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 16 / 24

26 Attcks ginst n-grm bsed IDSs cycle encoding originl cycle encoding Proposed by Fogl, Shrif, Perdisci, Kolesnikov nd Lee in Polymorphic blending ttcks for evding 2-grm bsed systems. Encode 1-bit of informtion by choosing one of two mutully rechble cycles in the trget grph. b d cd b b c bc b c db Encoding 151 = : dbcdbbbbcdbcdbbbcdbcdbcdbc Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 17 / 24

27 Attcks ginst n-grm bsed IDSs cycle encoding improved cycle encoding db d bd b Find node tht lies on 2 k distinct cycles nd encode k-bit t time. Optimiztion: Assign the shorter cycles to the input symbols occuring more often. d b d b c d c b c Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 18 / 24

28 Attcks ginst n-grm bsed IDSs cycle encoding cycle encoding exmple db d bd Input: b d b d b d c c b c Figure: 3-grm 2-bit cycle encoding Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 19 / 24

29 Attcks ginst n-grm bsed IDSs cycle encoding cycle encoding exmple db d bd Input: b Set d d 01, 10 b, b d b c c 11 c, 00 dbd b c Figure: 3-grm 2-bit cycle encoding Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 19 / 24

30 Attcks ginst n-grm bsed IDSs cycle encoding cycle encoding exmple db d bd Input: b Set d d 01, 10 b, b d b c c 11 c, 00 dbd Encoded:.b...c b c Figure: 3-grm 2-bit cycle encoding Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 19 / 24

31 Attcks ginst n-grm bsed IDSs cycle encoding cycle-encoding: choosing k Apply cycle encoding to the shellcodes, originl sizes: 40/107/301 bytes. Expnsion fctors for 5-grm, including decoder tble: 1-bit 2-bit 4-bit 8-bit Shellcode Shellcode Shellcode Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 20 / 24

32 Attcks ginst n-grm bsed IDSs cycle encoding cycle-encoding: prcticl exmple news/cnews/pnews/cnews/clnews/denews/ednews/onews/innews/ news/snews/jnews/grnews/99news/rnews/inews/enews/grnews/ inews/jnews/pnews/inews/ednews/pnews/clnews/cnews/99news/ news/news/onews/denews/innews/cnews/rnews/news/inews/pnew s/snews/news/inews/ednews/news/cnews/snews/news/onews/dene ws/99news/cnews/cnews/grnews/grnews/cnews/snews/news/clnew s/enews/rnews/news/inews/denews/news/cnews/rnews/news/on ews/ednews/99news/cnews/rnews/99news/cnews/news/news/inew s/pnews/inews/enews/enews/enews/enews/enews/enews/enews/c news/cnews/onews/snews/onews/inews/onews/enews/cnews/cln ews/innews/news/onews Figure: Shellcode 1 encoded in 4-bit cycle encoding, including tble, 5-grm model Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 21 / 24

33 Attcks ginst n-grm bsed IDSs cycle encoding Lessons lerned The trget grphs obtined re huge. Fixed-length substitution bsed encodings re computtionlly hrd, propbly NP complete. Adding more complexity didn t help to solve this issue. The vrible-length cycle-encoding scheme works relly well, but cuses up to 20-fold spce expnsion nd requires slightly more complex decoder. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 22 / 24

34 Attcks ginst n-grm bsed IDSs cycle encoding Open Issues Could highly-optimized or heuristic lgorithms be used or dpted for these problems? The construction of vlid decoder might be difficult. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 23 / 24

35 Questions? Attcks ginst n-grm bsed IDSs cycle encoding Thnk you for your ttention. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 24 / 24

36 The model Attcks ginst n-grm bsed IDSs cycle encoding 8#10 6 7#10 6 Totl pylod size: 112MB Only HTTP/1.0 GET requests 34 clients/2052 servers distinct 5-grms. 40% of these re vlid instructions. 6#10 6 5#10 6 count 4#10 6 3#10 6 2#10 6 1# vlue Figure: Pcket pylod byte distribution

37 Attcks ginst n-grm bsed IDSs Trget 5-grm grph cycle encoding Nodes: Edges: Density: Avg. in/out Degree: 1.71 Mx. Degree: 91 Avg. shortest pth lenght: Strongly connected components: 3667

38 Attcks ginst n-grm bsed IDSs slice-nd-pd: Tokeniztion cycle encoding Shellcode 1 Shellcode 2 Shellcode 3 Number of tokens Tokens of length Tokens of length Tokens of length Tokens of length Tokens of length Length of dt token Tble: Tokens occuring in shellcodes

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

CSEP 573 Artificial Intelligence Winter 2016

CSEP 573 Artificial Intelligence Winter 2016 CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch

More information

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1 Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the

More information

The Search for Optimality in Automated Intrusion Response

The Search for Optimality in Automated Intrusion Response The Serch for Optimlity in Automted Intrusion Response Yu-Sung Wu nd Surbh Bgchi (DCSL) & The Center for Eduction nd Reserch in Informtion Assurnce nd Security (CERIAS) School of Electricl nd Computer

More information

CS 430 Spring Mike Lam, Professor. Parsing

CS 430 Spring Mike Lam, Professor. Parsing CS 430 Spring 2015 Mike Lm, Professor Prsing Syntx Anlysis We cn now formlly descrie lnguge's syntx Using regulr expressions nd BNF grmmrs How does tht help us? Syntx Anlysis We cn now formlly descrie

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

Fault injection attacks on cryptographic devices and countermeasures Part 2

Fault injection attacks on cryptographic devices and countermeasures Part 2 Fult injection ttcks on cryptogrphic devices nd countermesures Prt Isrel Koren Deprtment of Electricl nd Computer Engineering University of Msschusetts Amherst, MA Countermesures - Exmples Must first detect

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

LEX5: Regexps to NFA. Lexical Analysis. CMPT 379: Compilers Instructor: Anoop Sarkar. anoopsarkar.github.io/compilers-class

LEX5: Regexps to NFA. Lexical Analysis. CMPT 379: Compilers Instructor: Anoop Sarkar. anoopsarkar.github.io/compilers-class LEX5: Regexps to NFA Lexicl Anlysis CMPT 379: Compilers Instructor: Anoop Srkr noopsrkr.github.io/compilers-clss Building Lexicl Anlyzer Token POern POern Regulr Expression Regulr Expression NFA NFA DFA

More information

CSCE 531, Spring 2017, Midterm Exam Answer Key

CSCE 531, Spring 2017, Midterm Exam Answer Key CCE 531, pring 2017, Midterm Exm Answer Key 1. (15 points) Using the method descried in the ook or in clss, convert the following regulr expression into n equivlent (nondeterministic) finite utomton: (

More information

Finite Automata. Lecture 4 Sections Robb T. Koether. Hampden-Sydney College. Wed, Jan 21, 2015

Finite Automata. Lecture 4 Sections Robb T. Koether. Hampden-Sydney College. Wed, Jan 21, 2015 Finite Automt Lecture 4 Sections 3.6-3.7 Ro T. Koether Hmpden-Sydney College Wed, Jn 21, 2015 Ro T. Koether (Hmpden-Sydney College) Finite Automt Wed, Jn 21, 2015 1 / 23 1 Nondeterministic Finite Automt

More information

Lexical Analysis: Constructing a Scanner from Regular Expressions

Lexical Analysis: Constructing a Scanner from Regular Expressions Lexicl Anlysis: Constructing Scnner from Regulr Expressions Gol Show how to construct FA to recognize ny RE This Lecture Convert RE to n nondeterministic finite utomton (NFA) Use Thompson s construction

More information

CS 221: Artificial Intelligence Fall 2011

CS 221: Artificial Intelligence Fall 2011 CS 221: Artificil Intelligence Fll 2011 Lecture 2: Serch (Slides from Dn Klein, with help from Sturt Russell, Andrew Moore, Teg Grenger, Peter Norvig) Problem types! Fully observble, deterministic! single-belief-stte

More information

Graph Exploration: Taking the User into the Loop

Graph Exploration: Taking the User into the Loop Grph Explortion: Tking the User into the Loop Dvide Mottin, Anj Jentzsch, Emmnuel Müller Hsso Plttner Institute, Potsdm, Germny 2016/10/24 CIKM2016, Indinpolis, US Who we re Dvide Mottin grph mining, novel

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

2014 Haskell January Test Regular Expressions and Finite Automata

2014 Haskell January Test Regular Expressions and Finite Automata 0 Hskell Jnury Test Regulr Expressions nd Finite Automt This test comprises four prts nd the mximum mrk is 5. Prts I, II nd III re worth 3 of the 5 mrks vilble. The 0 Hskell Progrmming Prize will be wrded

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

CS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata

CS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata CS 432 Fll 2017 Mike Lm, Professor (c)* Regulr Expressions nd Finite Automt Compiltion Current focus "Bck end" Source code Tokens Syntx tree Mchine code chr dt[20]; int min() { flot x = 42.0; return 7;

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Languages. L((a (b)(c))*) = { ε,a,bc,aa,abc,bca,... } εw = wε = w. εabba = abbaε = abba. (a (b)(c)) *

Languages. L((a (b)(c))*) = { ε,a,bc,aa,abc,bca,... } εw = wε = w. εabba = abbaε = abba. (a (b)(c)) * Pln for Tody nd Beginning Next week Interpreter nd Compiler Structure, or Softwre Architecture Overview of Progrmming Assignments The MeggyJv compiler we will e uilding. Regulr Expressions Finite Stte

More information

Chapter Spline Method of Interpolation More Examples Electrical Engineering

Chapter Spline Method of Interpolation More Examples Electrical Engineering Chpter. Spline Method of Interpoltion More Exmples Electricl Engineering Exmple Thermistors re used to mesure the temperture of bodies. Thermistors re bsed on mterils chnge in resistnce with temperture.

More information

Regular Expression Matching with Multi-Strings and Intervals. Philip Bille Mikkel Thorup

Regular Expression Matching with Multi-Strings and Intervals. Philip Bille Mikkel Thorup Regulr Expression Mtching with Multi-Strings nd Intervls Philip Bille Mikkel Thorup Outline Definition Applictions Previous work Two new problems: Multi-strings nd chrcter clss intervls Algorithms Thompson

More information

Semistructured Data Management Part 2 - Graph Databases

Semistructured Data Management Part 2 - Graph Databases Semistructured Dt Mngement Prt 2 - Grph Dtbses 2003/4, Krl Aberer, EPFL-SSC, Lbortoire de systèmes d'informtions réprtis Semi-structured Dt - 1 1 Tody's Questions 1. Schems for Semi-structured Dt 2. Grph

More information

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop

More information

Control-Flow Analysis and Loop Detection

Control-Flow Analysis and Loop Detection ! Control-Flow Anlysis nd Loop Detection!Lst time! PRE!Tody! Control-flow nlysis! Loops! Identifying loops using domintors! Reducibility! Using loop identifiction to identify induction vribles CS553 Lecture

More information

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08

CS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08 CS412/413 Introduction to Compilers Tim Teitelum Lecture 4: Lexicl Anlyzers 28 Jn 08 Outline DFA stte minimiztion Lexicl nlyzers Automting lexicl nlysis Jlex lexicl nlyzer genertor CS 412/413 Spring 2008

More information

CSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline

CSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline CSCI1950 Z Comput4onl Methods for Biology Lecture 2 Ben Rphel Jnury 26, 2009 hhp://cs.brown.edu/courses/csci1950 z/ Outline Review of trees. Coun4ng fetures. Chrcter bsed phylogeny Mximum prsimony Mximum

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

CSE 401 Midterm Exam 11/5/10 Sample Solution

CSE 401 Midterm Exam 11/5/10 Sample Solution Question 1. egulr expressions (20 points) In the Ad Progrmming lnguge n integer constnt contins one or more digits, but it my lso contin embedded underscores. Any underscores must be preceded nd followed

More information

Math 142, Exam 1 Information.

Math 142, Exam 1 Information. Mth 14, Exm 1 Informtion. 9/14/10, LC 41, 9:30-10:45. Exm 1 will be bsed on: Sections 7.1-7.5. The corresponding ssigned homework problems (see http://www.mth.sc.edu/ boyln/sccourses/14f10/14.html) At

More information

CS 241. Fall 2017 Midterm Review Solutions. October 24, Bits and Bytes 1. 3 MIPS Assembler 6. 4 Regular Languages 7.

CS 241. Fall 2017 Midterm Review Solutions. October 24, Bits and Bytes 1. 3 MIPS Assembler 6. 4 Regular Languages 7. CS 241 Fll 2017 Midterm Review Solutions Octoer 24, 2017 Contents 1 Bits nd Bytes 1 2 MIPS Assemly Lnguge Progrmming 2 3 MIPS Assemler 6 4 Regulr Lnguges 7 5 Scnning 9 1 Bits nd Bytes 1. Give two s complement

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

CMPSC 470: Compiler Construction

CMPSC 470: Compiler Construction CMPSC 47: Compiler Construction Plese complete the following: Midterm (Type A) Nme Instruction: Mke sure you hve ll pges including this cover nd lnk pge t the end. Answer ech question in the spce provided.

More information

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

Theory of Computation CSE 105

Theory of Computation CSE 105 $ $ $ Theory of Computtion CSE 105 Regulr Lnguges Study Guide nd Homework I Homework I: Solutions to the following problems should be turned in clss on July 1, 1999. Instructions: Write your nswers clerly

More information

Topic: Software Model Checking via Counter-Example Guided Abstraction Refinement. Having a BLAST with SLAM. Combining Strengths. SLAM Overview SLAM

Topic: Software Model Checking via Counter-Example Guided Abstraction Refinement. Having a BLAST with SLAM. Combining Strengths. SLAM Overview SLAM Hving BLAST with SLAM Topic: Softwre Model Checking vi Counter-Exmple Guided Abstrction Refinement There re esily two dozen SLAM/BLAST/MAGIC ppers; I will skim. # # Theorem Proving Combining Strengths

More information

Epson Projector Content Manager Operation Guide

Epson Projector Content Manager Operation Guide Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time

More information

HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations

HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations 2017 IEEE Symposium on Security nd Privcy HVLern: Automted Blck-box Anlysis of Hostnme Verifiction in SSL/TLS Implementtions Suphnnee Sivkorn, George Argyros, Kexin Pei, Angelos D. Keromytis, nd Sumn Jn

More information

EECS 281: Homework #4 Due: Thursday, October 7, 2004

EECS 281: Homework #4 Due: Thursday, October 7, 2004 EECS 28: Homework #4 Due: Thursdy, October 7, 24 Nme: Emil:. Convert the 24-bit number x44243 to mime bse64: QUJD First, set is to brek 8-bit blocks into 6-bit blocks, nd then convert: x44243 b b 6 2 9

More information

CSCI 446: Artificial Intelligence

CSCI 446: Artificial Intelligence CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]

More information

CS201 Discussion 10 DRAWTREE + TRIES

CS201 Discussion 10 DRAWTREE + TRIES CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

Applied Databases. Sebastian Maneth. Lecture 13 Online Pattern Matching on Strings. University of Edinburgh - February 29th, 2016

Applied Databases. Sebastian Maneth. Lecture 13 Online Pattern Matching on Strings. University of Edinburgh - February 29th, 2016 Applied Dtses Lecture 13 Online Pttern Mtching on Strings Sestin Mneth University of Edinurgh - Ferury 29th, 2016 2 Outline 1. Nive Method 2. Automton Method 3. Knuth-Morris-Prtt Algorithm 4. Boyer-Moore

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona CSc 453 Compilers nd Systems Softwre 4 : Lexicl Anlysis II Deprtment of Computer Science University of Arizon collerg@gmil.com Copyright c 2009 Christin Collerg Implementing Automt NFAs nd DFAs cn e hrd-coded

More information

Midterm I Solutions CS164, Spring 2006

Midterm I Solutions CS164, Spring 2006 Midterm I Solutions CS164, Spring 2006 Februry 23, 2006 Plese red ll instructions (including these) crefully. Write your nme, login, SID, nd circle the section time. There re 8 pges in this exm nd 4 questions,

More information

Eliminating left recursion grammar transformation. The transformed expression grammar

Eliminating left recursion grammar transformation. The transformed expression grammar Eliminting left recursion grmmr trnsformtion Originl! rnsformed! 0 0! 0 α β α α α α α α α α β he two grmmrs generte the sme lnguge, but the one on the right genertes the rst, nd then string of s, using

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

CS 321 Programming Languages and Compilers. Bottom Up Parsing

CS 321 Programming Languages and Compilers. Bottom Up Parsing CS 321 Progrmming nguges nd Compilers Bottom Up Prsing Bottom-up Prsing: Shift-reduce prsing Grmmr H: fi ; fi b Input: ;;b hs prse tree ; ; b 2 Dt for Shift-reduce Prser Input string: sequence of tokens

More information

Assignment 4. Due 09/18/17

Assignment 4. Due 09/18/17 Assignment 4. ue 09/18/17 1. ). Write regulr expressions tht define the strings recognized by the following finite utomt: b d b b b c c b) Write FA tht recognizes the tokens defined by the following regulr

More information

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe CSCI 0 fel Ferreir d Silv rfsilv@isi.edu Slides dpted from: Mrk edekopp nd Dvid Kempe LOG STUCTUED MEGE TEES Series Summtion eview Let n = + + + + k $ = #%& #. Wht is n? n = k+ - Wht is log () + log ()

More information

Digital Design. Chapter 6: Optimizations and Tradeoffs

Digital Design. Chapter 6: Optimizations and Tradeoffs Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com

More information

MA 124 (Calculus II) Lecture 2: January 24, 2019 Section A3. Professor Jennifer Balakrishnan,

MA 124 (Calculus II) Lecture 2: January 24, 2019 Section A3. Professor Jennifer Balakrishnan, Wht is on tody Professor Jennifer Blkrishnn, jbl@bu.edu 1 Velocity nd net chnge 1 2 Regions between curves 3 1 Velocity nd net chnge Briggs-Cochrn-Gillett 6.1 pp. 398-46 Suppose you re driving long stright

More information

9.1 apply the distance and midpoint formulas

9.1 apply the distance and midpoint formulas 9.1 pply the distnce nd midpoint formuls DISTANCE FORMULA MIDPOINT FORMULA To find the midpoint between two points x, y nd x y 1 1,, we Exmple 1: Find the distnce between the two points. Then, find the

More information

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed

More information

Automata Processor. Tobias Markus Computer Architecture Group, University of Heidelberg

Automata Processor. Tobias Markus Computer Architecture Group, University of Heidelberg 1 Automt Processor Tobis Mrkus Computer Architecture Group, University of Heidelberg Abstrct This pper gives brief overview over nondeterministic utomt nd the Automt Processor n rchitecture implemented

More information

CMSC 331 First Midterm Exam

CMSC 331 First Midterm Exam 0 00/ 1 20/ 2 05/ 3 15/ 4 15/ 5 15/ 6 20/ 7 30/ 8 30/ 150/ 331 First Midterm Exm 7 October 2003 CMC 331 First Midterm Exm Nme: mple Answers tudent ID#: You will hve seventy-five (75) minutes to complete

More information

Nearest Keyword Set Search in Multi-dimensional Datasets

Nearest Keyword Set Search in Multi-dimensional Datasets Nerest Keyword Set Serch in Multi-dimensionl Dtsets Vishwkrm Singh Deprtment of Computer Science University of Cliforni Snt Brbr, USA Emil: vsingh014@gmil.com Ambuj K. Singh Deprtment of Computer Science

More information

Introduction to Computer Engineering EECS 203 dickrp/eecs203/ CMOS transmission gate (TG) TG example

Introduction to Computer Engineering EECS 203  dickrp/eecs203/ CMOS transmission gate (TG) TG example Introduction to Computer Engineering EECS 23 http://ziyng.eecs.northwestern.edu/ dickrp/eecs23/ CMOS trnsmission gte TG Instructor: Robert Dick Office: L477 Tech Emil: dickrp@northwestern.edu Phone: 847

More information

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

Some Thoughts on Grad School. Undergraduate Compilers Review and Intro to MJC. Structure of a Typical Compiler. Lexing and Parsing

Some Thoughts on Grad School. Undergraduate Compilers Review and Intro to MJC. Structure of a Typical Compiler. Lexing and Parsing Undergrdute Compilers Review nd Intro to MJC Announcements Miling list is in full swing Tody Some thoughts on grd school Finish prsing Semntic nlysis Visitor pttern for bstrct syntx trees Some Thoughts

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte

More information

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona

Implementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona Implementing utomt Sc 5 ompilers nd Systems Softwre : Lexicl nlysis II Deprtment of omputer Science University of rizon collerg@gmil.com opyright c 009 hristin ollerg NFs nd DFs cn e hrd-coded using this

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute

More information

pdfapilot Server 2 Manual

pdfapilot Server 2 Manual pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:

More information

? Statistical model for normal network behavior and for abnormal traffic patterns. ? Comparison with majority voting scheme

? Statistical model for normal network behavior and for abnormal traffic patterns. ? Comparison with majority voting scheme Anomly Detection in IP Network Using Sttisticl Signl Processing Introduction? Why re Signl Processing Techniques effective t detecting severl network nomlies? Introducing Sttisticl Signl Processing techniques

More information

From Indexing Data Structures to de Bruijn Graphs

From Indexing Data Structures to de Bruijn Graphs From Indexing Dt Structures to de Bruijn Grphs Bstien Czux, Thierry Lecroq, Eric Rivls LIRMM & IBC, Montpellier - LITIS Rouen June 1, 201 Czux, Lecroq, Rivls (LIRMM) Generlized Suffix Tree & DBG June 1,

More information

An introduction to model checking

An introduction to model checking An introduction to model checking Slide 1 University of Albert Edmonton July 3rd, 2002 Guy Trembly Dépt d informtique UQAM Outline Wht re forml specifiction nd verifiction methods? Slide 2 Wht is model

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

Comparative Study of Universities Web Structure Mining

Comparative Study of Universities Web Structure Mining Comprtive Study of Universities Web Structure Mining Z. Abdullh, A. R. Hmdn Abstrct This pper is ment to nlyze the rnking of University of Mlysi Terenggnu, UMT s website in the World Wide Web. There re

More information

12 <= rm <digit> 2 <= rm <no> 2 <= rm <no> <digit> <= rm <no> <= rm <number>

12 <= rm <digit> 2 <= rm <no> 2 <= rm <no> <digit> <= rm <no> <= rm <number> DDD16 Compilers nd Interpreters DDB44 Compiler Construction R Prsing Prt 1 R prsing concept Using prser genertor Prse ree Genertion Wht is R-prsing? eft-to-right scnning R Rigthmost derivtion in reverse

More information

Deterministic. Finite Automata. And Regular Languages. Fall 2018 Costas Busch - RPI 1

Deterministic. Finite Automata. And Regular Languages. Fall 2018 Costas Busch - RPI 1 Deterministic Finite Automt And Regulr Lnguges Fll 2018 Costs Busch - RPI 1 Deterministic Finite Automton (DFA) Input Tpe String Finite Automton Output Accept or Reject Fll 2018 Costs Busch - RPI 2 Trnsition

More information

Polymorphic Blending Attacks. Slides by Jelena Mirkovic

Polymorphic Blending Attacks. Slides by Jelena Mirkovic Polymorphic Blending Attacks Slides by Jelena Mirkovic 1 Motivation! Polymorphism is used by malicious code to evade signature-based IDSs Anomaly-based IDSs detect polymorphic attacks because their byte

More information

Uninformed Search. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 31 Jan 2012

Uninformed Search. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 31 Jan 2012 1 Hl Dumé III (me@hl3.nme) Uninformed Serch Hl Dumé III Comuter Science University of Mrylnd me@hl3.nme CS 421: Introduction to Artificil Intelligence 31 Jn 2012 Mny slides courtesy of Dn Klein, Sturt

More information

5/9/17. Lesson 51 - FTC PART 2. Review FTC, PART 1. statement as the Integral Evaluation Theorem as it tells us HOW to evaluate the definite integral

5/9/17. Lesson 51 - FTC PART 2. Review FTC, PART 1. statement as the Integral Evaluation Theorem as it tells us HOW to evaluate the definite integral Lesson - FTC PART 2 Review! We hve seen definition/formul for definite integrl s n b A() = lim f ( i )Δ = f ()d = F() = F(b) F() n i=! where F () = f() (or F() is the ntiderivtive of f() b! And hve seen

More information

Synchronizability of Conversations Among Web Services

Synchronizability of Conversations Among Web Services 1 Synchronizbility of Converstions Among Web Services Xing Fu, Tevfik Bultn, Jinwen Su Abstrct We present frmework for nlyzing interctions mong web services tht communicte with synchronous messges. We

More information

Phylogeny and Molecular Evolution

Phylogeny and Molecular Evolution Phylogeny nd Moleculr Evolution Chrcter Bsed Phylogeny 1/50 Credit Ron Shmir s lecture notes Notes by Nir Friedmn Dn Geiger, Shlomo Morn, Sgi Snir nd Ron Shmir Durbin et l. Jones nd Pevzner s presenttion

More information

Text mining: bag of words representation and beyond it

Text mining: bag of words representation and beyond it Text mining: bg of words representtion nd beyond it Jsmink Dobš Fculty of Orgniztion nd Informtics University of Zgreb 1 Outline Definition of text mining Vector spce model or Bg of words representtion

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

CPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls

CPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls Redings for Next Two Lectures Text CPSC 213 Switch Sttements, Understnding Pointers - 2nd ed: 3.6.7, 3.10-1st ed: 3.6.6, 3.11 Introduction to Computer Systems Unit 1f Dynmic Control Flow Polymorphism nd

More information

Cone Cluster Labeling for Support Vector Clustering

Cone Cluster Labeling for Support Vector Clustering Cone Cluster Lbeling for Support Vector Clustering Sei-Hyung Lee Deprtment of Computer Science University of Msschusetts Lowell MA 1854, U.S.A. slee@cs.uml.edu Kren M. Dniels Deprtment of Computer Science

More information

Parameterless Outlier Detection in Data Streams

Parameterless Outlier Detection in Data Streams Prmeterless Outlier Detection in Dt Strems Alice Mrscu nd Florent Mssegli INRIA AxIS Project-Tem 2004 route des lucioles - BP 93 {first.lst}@sophi.inri.fr ABSTRACT Outlyingness is subjective concept relying

More information

Address Register Assignment for Reducing Code Size

Address Register Assignment for Reducing Code Size Address Register Assignment for Reducing Code Size M. Kndemir 1, M.J. Irwin 1, G. Chen 1, nd J. Rmnujm 2 1 CSE Deprtment Pennsylvni Stte University University Prk, PA 16802 {kndemir,mji,guilchen}@cse.psu.edu

More information

Local Search Heuristics for NFA State Minimization Problem *

Local Search Heuristics for NFA State Minimization Problem * Int. J. Communictions, etwork nd System Sciences, 0, 5, 638-63 http://dx.doi.org/0.36/ijcns.0.5907 Pulished Online Septemer 0 (http://www.scirp.org/journl/ijcns) Locl Serch Heuristics for FA Stte inimiztion

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

Efficient Techniques for Tree Similarity Queries 1

Efficient Techniques for Tree Similarity Queries 1 Efficient Techniques for Tree Similrity Queries 1 Nikolus Augsten Dtbse Reserch Group Deprtment of Computer Sciences University of Slzburg, Austri July 6, 2017 Austrin Computer Science Dy 2017 / IMAGINE

More information

Topic 2: Lexing and Flexing

Topic 2: Lexing and Flexing Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

Application-Level Traffic Monitoring and an Analysis on IP Networks

Application-Level Traffic Monitoring and an Analysis on IP Networks Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for

More information