Encoding techniques for evading n-gram based Intrusion Detection Systems
|
|
- Alvin Hamilton
- 6 years ago
- Views:
Transcription
1 Encoding techniques for evding n-grm bsed Intrusion Detection Systems Studienrbeit Moritz Bechler Universität Tübingen Wilhelm Schickrd Institut SPRING Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 1 / 24
2 Outline 1 Introduction Intrusion Detection Systems n-grm nlysis 2 Attcks ginst n-grm bsed IDSs Trget Model 1-to-1 encoding slice-nd-pd cycle encoding Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 2 / 24
3 Introduction Intrusion Detection Systems Intrusion detection systems Aim to detect misuse of computer systems nd networks. This work focuses on network bsed content nomly detectors. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 3 / 24
4 Introduction Intrusion Detection Systems Intrusion detection systems Aim to detect misuse of computer systems nd networks. This work focuses on network bsed content nomly detectors. Two mjor types, depending on how the dt is nlyzed: Signture-bsed: known ttck ptterns re modeled, these re detected Anomly-bsed: norml ctivity is modeled, devition is detected Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 3 / 24
5 Introduction Intrusion Detection Systems Intrusion detection systems Aim to detect misuse of computer systems nd networks. This work focuses on network bsed content nomly detectors. Two mjor types, depending on how the dt is nlyzed: Signture-bsed: known ttck ptterns re modeled, these re detected Anomly-bsed: norml ctivity is modeled, devition is detected Signture-bsed IDSs re most commonly used tody, but require signture mintennce re useless ginst 0-dy ttcks smll modifictions to the ttck might render the signture useless Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 3 / 24
6 Introduction Anomly-bsed content nlysis Intrusion Detection Systems GET / HTTP/1.1..Host: sploit.org..user-agent: Mozill /5.0 (X11; Linux x86_64; rv: ) Gecko/ Firefox/ Accept: text/html,ppl iction/xhtml+xml,ppliction/ xml;q=0.9,*/*;q=0.8..accept-l nguge: en-us,en;q=0.8,de-de;q =0.5,de;q=0.3..Accept-Encoding : gzip, deflte..dnt: 1..Conne ction: keep-live.. () Innocuous HTTP Request GET / HTTP/1.1..Host: pche-s clp.c..x-ccccccc: AAAAAAAAAAA AAAAA...j.TRj.j...z..u.f.z.09u...D$.. $...u..d$....z...d$.. $..u.h.ok..4$...j.rj.j...h/sh.h/bin..1.pr..pqrp.;...x-cccccc C: AAAAAAAAAAAAAAAA...j.TRj. j...z..u.f.z.09u...d$.. $...u..d$...z...d$.. $..u.h.ok..4$... (b) Prt of Apche OpenBSD Exploit How cn we distinguish between ) nd b)? Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 4 / 24
7 Introduction Intrusion Detection Systems Anomly-bsed content nlysis (cont.) count 10 count vlue () Innocuous HTTP Request vlue (b) Prt of Apche OpenBSD Exploit Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 5 / 24
8 Introduction Intrusion Detection Systems count vlue count vlue PAYL Proposed by Wng nd Stolfo in Anomlous pylod-bsed network intrusion detection. 256 dim. feture spce good trining mlicious Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 6 / 24
9 Introduction Intrusion Detection Systems count vlue count vlue PAYL Proposed by Wng nd Stolfo in Anomlous pylod-bsed network intrusion detection. 256 dim. feture spce But: Byte frequencies cn be djusted by substitution nd pdding. This ttck type is clled mimicry ttck. good trining substitution pdding mlicious Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 6 / 24
10 Introduction n-grm nlysis n-grms n-grms re sequences of n consecutive bytes. n-grms do overlp, thereby reflecting some structurl properties. For nlysis we extrct ll n-grms from the dt. Input: j f h b c f j f h j f h b f h b c h b c f Figure: Exmple of 4-grm extrction Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 7 / 24
11 Introduction n-grm nlysis Angrm Introduced by Wng, Prekh nd Stolfo in ANAGRAM: A Content Anomly Detector Resistnt To Mimicry Attck. Content nomly detector bsed on n-grm nlysis. n = 5 nd n = 6 works best. Trining dt: bcef 3-grms: bc bce cef h2 h1 Bloom filter: Input: bcd Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 8 / 24
12 Introduction n-grm nlysis Angrm Introduced by Wng, Prekh nd Stolfo in ANAGRAM: A Content Anomly Detector Resistnt To Mimicry Attck. Content nomly detector bsed on n-grm nlysis. n = 5 nd n = 6 works best. Trining dt: bcef 3-grms: bc bce cef h2 h1 Bloom filter: h2 h1 Good: bc Input: bcd Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 8 / 24
13 Introduction n-grm nlysis Angrm Introduced by Wng, Prekh nd Stolfo in ANAGRAM: A Content Anomly Detector Resistnt To Mimicry Attck. Content nomly detector bsed on n-grm nlysis. n = 5 nd n = 6 works best. Trining dt: bcef 3-grms: bc bce cef h2 h1 Bloom filter: h1 h2 Good: bc Bd: bcd Input: bcd Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 8 / 24
14 Attcks ginst n-grm bsed IDSs This work tries to find prcticl mimicry ttck ginst Angrm. tried to find suitble byte substitutions by brute-force. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 9 / 24
15 Attcks ginst n-grm bsed IDSs This work tries to find prcticl mimicry ttck ginst Angrm. tried to find suitble byte substitutions by brute-force. explored scheme to reduce the complexity of this serch. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 9 / 24
16 Attcks ginst n-grm bsed IDSs This work tries to find prcticl mimicry ttck ginst Angrm. tried to find suitble byte substitutions by brute-force. explored scheme to reduce the complexity of this serch. generlizes nd improves previously known scheme (cycle encoding). Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 9 / 24
17 Attcks ginst n-grm bsed IDSs Obtining trget model Trget Model First step for lunching mimicry ttck is lwys hving something to mimic. For my experiments I used pcket cptures from the 1999 DARPA Intrusion Detection Evlution specificlly, HTTP requests from the clen trining dt. pproximtion rel trining Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 10 / 24
18 Attcks ginst n-grm bsed IDSs Trget Model Construction of n-grm grphs gj k jk gk Model the lnguge ccepted by the detector s deterministic finite utomton (DFA). Ech n 1-grm represents stte. Ech llowed n-grm represents trnsition. l l kl l ll l gl l g lg l Figure: 3-grm grph for the strings gjkll, gkllll nd llgll Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 11 / 24
19 1-to-1 Encoding Attcks ginst n-grm bsed IDSs 1-to-1 encoding A smll portion of code reproduces shellcode of rbitrry length. Originl Shellcode subtitution Decoder Tble Encoded Shellcode Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 12 / 24
20 Attcks ginst n-grm bsed IDSs 1-to-1 encoding 1-to-1 Encoding (cont.) gj k Simple byte substitution: b j c k g l e g g bc g cg g gg g eg e ge g gk l l jk l kl l ll l gl g l lg Figure: 1-to-1 encoding of the string bcggeggg Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 13 / 24
21 Attcks ginst n-grm bsed IDSs 1-to-1 encoding 1-to-1 Encoding (cont.) But, finding subgrph isomorphism is NP-complete problem. the trget grph is huge in rel-world scenrios. Tried brute-forcing 1-to-1 substitution with restricted lphbets. Running the tool on three shellcodes of incresing complexities with 10 hour timeout: Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 14 / 24
22 Attcks ginst n-grm bsed IDSs 1-to-1 encoding 1-to-1 Encoding (cont.) But, finding subgrph isomorphism is NP-complete problem. the trget grph is huge in rel-world scenrios. Tried brute-forcing 1-to-1 substitution with restricted lphbets. Running the tool on three shellcodes of incresing complexities with 10 hour timeout: 2-grm 3-grm 4-grm 5-grm 6-grm Shellcode s 5.915s m timeout omitted Shellcode 2 timeout omitted omitted omitted omitted Shellcode 3 timeout omitted omitted omitted omitted Tble: Running times Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 14 / 24
23 Attcks ginst n-grm bsed IDSs slice-nd-pd slice-nd-pd Tokenize the shellcode into individul instructions. Find vlid substitution for ll tokens. Connect the individul substituted tokens by NOP-equivlent pths. Tries to reduce the complexity of the substitution step. xor ex, ex mov [esi+0xb], l 0x31 0xc0 0x88 0x46 0x0b substitution 0x42 0xc43 0x44 0x45 0x46 0x42 0xc43 0x44 0x45 0x46 inverse substitution 0x31 0xc0 NOP 0x88 0x46 0x0b Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 15 / 24
24 Attcks ginst n-grm bsed IDSs slice-nd-pd: Problems slice-nd-pd 2-grm 3-grm 4-grm 5-grm 6-grm Shellcode 1 timeout s s m x 138m subst. n-grms Shellcode s timeout timeout x 47.5m x 86.10m subst. n-grms Shellcode 3 timeout timeout timeout timeout N/A subst. n-grms Tble: Running times, timeout fter 10 hours Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 16 / 24
25 Attcks ginst n-grm bsed IDSs slice-nd-pd slice-nd-pd: Problems 2-grm 3-grm 4-grm 5-grm 6-grm Shellcode 1 timeout s s m x 138m subst. n-grms Shellcode s timeout timeout x 47.5m x 86.10m subst. n-grms Shellcode 3 timeout timeout timeout timeout N/A subst. n-grms Tble: Running times, timeout fter 10 hours Other problems: Dt segments in shellcode hve to be kept intct. Offsets chnge when introducing NOPs, requires code modifictions. Checking whether sequence is NOP-equivlent is complicted. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 16 / 24
26 Attcks ginst n-grm bsed IDSs cycle encoding originl cycle encoding Proposed by Fogl, Shrif, Perdisci, Kolesnikov nd Lee in Polymorphic blending ttcks for evding 2-grm bsed systems. Encode 1-bit of informtion by choosing one of two mutully rechble cycles in the trget grph. b d cd b b c bc b c db Encoding 151 = : dbcdbbbbcdbcdbbbcdbcdbcdbc Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 17 / 24
27 Attcks ginst n-grm bsed IDSs cycle encoding improved cycle encoding db d bd b Find node tht lies on 2 k distinct cycles nd encode k-bit t time. Optimiztion: Assign the shorter cycles to the input symbols occuring more often. d b d b c d c b c Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 18 / 24
28 Attcks ginst n-grm bsed IDSs cycle encoding cycle encoding exmple db d bd Input: b d b d b d c c b c Figure: 3-grm 2-bit cycle encoding Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 19 / 24
29 Attcks ginst n-grm bsed IDSs cycle encoding cycle encoding exmple db d bd Input: b Set d d 01, 10 b, b d b c c 11 c, 00 dbd b c Figure: 3-grm 2-bit cycle encoding Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 19 / 24
30 Attcks ginst n-grm bsed IDSs cycle encoding cycle encoding exmple db d bd Input: b Set d d 01, 10 b, b d b c c 11 c, 00 dbd Encoded:.b...c b c Figure: 3-grm 2-bit cycle encoding Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 19 / 24
31 Attcks ginst n-grm bsed IDSs cycle encoding cycle-encoding: choosing k Apply cycle encoding to the shellcodes, originl sizes: 40/107/301 bytes. Expnsion fctors for 5-grm, including decoder tble: 1-bit 2-bit 4-bit 8-bit Shellcode Shellcode Shellcode Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 20 / 24
32 Attcks ginst n-grm bsed IDSs cycle encoding cycle-encoding: prcticl exmple news/cnews/pnews/cnews/clnews/denews/ednews/onews/innews/ news/snews/jnews/grnews/99news/rnews/inews/enews/grnews/ inews/jnews/pnews/inews/ednews/pnews/clnews/cnews/99news/ news/news/onews/denews/innews/cnews/rnews/news/inews/pnew s/snews/news/inews/ednews/news/cnews/snews/news/onews/dene ws/99news/cnews/cnews/grnews/grnews/cnews/snews/news/clnew s/enews/rnews/news/inews/denews/news/cnews/rnews/news/on ews/ednews/99news/cnews/rnews/99news/cnews/news/news/inew s/pnews/inews/enews/enews/enews/enews/enews/enews/enews/c news/cnews/onews/snews/onews/inews/onews/enews/cnews/cln ews/innews/news/onews Figure: Shellcode 1 encoded in 4-bit cycle encoding, including tble, 5-grm model Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 21 / 24
33 Attcks ginst n-grm bsed IDSs cycle encoding Lessons lerned The trget grphs obtined re huge. Fixed-length substitution bsed encodings re computtionlly hrd, propbly NP complete. Adding more complexity didn t help to solve this issue. The vrible-length cycle-encoding scheme works relly well, but cuses up to 20-fold spce expnsion nd requires slightly more complex decoder. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 22 / 24
34 Attcks ginst n-grm bsed IDSs cycle encoding Open Issues Could highly-optimized or heuristic lgorithms be used or dpted for these problems? The construction of vlid decoder might be difficult. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 23 / 24
35 Questions? Attcks ginst n-grm bsed IDSs cycle encoding Thnk you for your ttention. Moritz Bechler (Universität Tübingen) Evding Angrm SPRING 7 24 / 24
36 The model Attcks ginst n-grm bsed IDSs cycle encoding 8#10 6 7#10 6 Totl pylod size: 112MB Only HTTP/1.0 GET requests 34 clients/2052 servers distinct 5-grms. 40% of these re vlid instructions. 6#10 6 5#10 6 count 4#10 6 3#10 6 2#10 6 1# vlue Figure: Pcket pylod byte distribution
37 Attcks ginst n-grm bsed IDSs Trget 5-grm grph cycle encoding Nodes: Edges: Density: Avg. in/out Degree: 1.71 Mx. Degree: 91 Avg. shortest pth lenght: Strongly connected components: 3667
38 Attcks ginst n-grm bsed IDSs slice-nd-pd: Tokeniztion cycle encoding Shellcode 1 Shellcode 2 Shellcode 3 Number of tokens Tokens of length Tokens of length Tokens of length Tokens of length Tokens of length Length of dt token Tble: Tokens occuring in shellcodes
In the last lecture, we discussed how valid tokens may be specified by regular expressions.
LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.
More informationCSEP 573 Artificial Intelligence Winter 2016
CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch
More informationa < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1
Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the
More informationThe Search for Optimality in Automated Intrusion Response
The Serch for Optimlity in Automted Intrusion Response Yu-Sung Wu nd Surbh Bgchi (DCSL) & The Center for Eduction nd Reserch in Informtion Assurnce nd Security (CERIAS) School of Electricl nd Computer
More informationCS 430 Spring Mike Lam, Professor. Parsing
CS 430 Spring 2015 Mike Lm, Professor Prsing Syntx Anlysis We cn now formlly descrie lnguge's syntx Using regulr expressions nd BNF grmmrs How does tht help us? Syntx Anlysis We cn now formlly descrie
More informationCS321 Languages and Compiler Design I. Winter 2012 Lecture 5
CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,
More informationFault injection attacks on cryptographic devices and countermeasures Part 2
Fult injection ttcks on cryptogrphic devices nd countermesures Prt Isrel Koren Deprtment of Electricl nd Computer Engineering University of Msschusetts Amherst, MA Countermesures - Exmples Must first detect
More informationThe Distributed Data Access Schemes in Lambda Grid Networks
The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn
More informationLEX5: Regexps to NFA. Lexical Analysis. CMPT 379: Compilers Instructor: Anoop Sarkar. anoopsarkar.github.io/compilers-class
LEX5: Regexps to NFA Lexicl Anlysis CMPT 379: Compilers Instructor: Anoop Srkr noopsrkr.github.io/compilers-clss Building Lexicl Anlyzer Token POern POern Regulr Expression Regulr Expression NFA NFA DFA
More informationCSCE 531, Spring 2017, Midterm Exam Answer Key
CCE 531, pring 2017, Midterm Exm Answer Key 1. (15 points) Using the method descried in the ook or in clss, convert the following regulr expression into n equivlent (nondeterministic) finite utomton: (
More informationFinite Automata. Lecture 4 Sections Robb T. Koether. Hampden-Sydney College. Wed, Jan 21, 2015
Finite Automt Lecture 4 Sections 3.6-3.7 Ro T. Koether Hmpden-Sydney College Wed, Jn 21, 2015 Ro T. Koether (Hmpden-Sydney College) Finite Automt Wed, Jn 21, 2015 1 / 23 1 Nondeterministic Finite Automt
More informationLexical Analysis: Constructing a Scanner from Regular Expressions
Lexicl Anlysis: Constructing Scnner from Regulr Expressions Gol Show how to construct FA to recognize ny RE This Lecture Convert RE to n nondeterministic finite utomton (NFA) Use Thompson s construction
More informationCS 221: Artificial Intelligence Fall 2011
CS 221: Artificil Intelligence Fll 2011 Lecture 2: Serch (Slides from Dn Klein, with help from Sturt Russell, Andrew Moore, Teg Grenger, Peter Norvig) Problem types! Fully observble, deterministic! single-belief-stte
More informationGraph Exploration: Taking the User into the Loop
Grph Explortion: Tking the User into the Loop Dvide Mottin, Anj Jentzsch, Emmnuel Müller Hsso Plttner Institute, Potsdm, Germny 2016/10/24 CIKM2016, Indinpolis, US Who we re Dvide Mottin grph mining, novel
More informationUNIT 11. Query Optimization
UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,
More information2014 Haskell January Test Regular Expressions and Finite Automata
0 Hskell Jnury Test Regulr Expressions nd Finite Automt This test comprises four prts nd the mximum mrk is 5. Prts I, II nd III re worth 3 of the 5 mrks vilble. The 0 Hskell Progrmming Prize will be wrded
More informationDefinition of Regular Expression
Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll
More informationOn the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis
On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es
More informationCS 432 Fall Mike Lam, Professor a (bc)* Regular Expressions and Finite Automata
CS 432 Fll 2017 Mike Lm, Professor (c)* Regulr Expressions nd Finite Automt Compiltion Current focus "Bck end" Source code Tokens Syntx tree Mchine code chr dt[20]; int min() { flot x = 42.0; return 7;
More informationA New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method
A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,
More informationLanguages. L((a (b)(c))*) = { ε,a,bc,aa,abc,bca,... } εw = wε = w. εabba = abbaε = abba. (a (b)(c)) *
Pln for Tody nd Beginning Next week Interpreter nd Compiler Structure, or Softwre Architecture Overview of Progrmming Assignments The MeggyJv compiler we will e uilding. Regulr Expressions Finite Stte
More informationChapter Spline Method of Interpolation More Examples Electrical Engineering
Chpter. Spline Method of Interpoltion More Exmples Electricl Engineering Exmple Thermistors re used to mesure the temperture of bodies. Thermistors re bsed on mterils chnge in resistnce with temperture.
More informationRegular Expression Matching with Multi-Strings and Intervals. Philip Bille Mikkel Thorup
Regulr Expression Mtching with Multi-Strings nd Intervls Philip Bille Mikkel Thorup Outline Definition Applictions Previous work Two new problems: Multi-strings nd chrcter clss intervls Algorithms Thompson
More informationSemistructured Data Management Part 2 - Graph Databases
Semistructured Dt Mngement Prt 2 - Grph Dtbses 2003/4, Krl Aberer, EPFL-SSC, Lbortoire de systèmes d'informtions réprtis Semi-structured Dt - 1 1 Tody's Questions 1. Schems for Semi-structured Dt 2. Grph
More informationEfficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc
4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl
More informationComplete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li
2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min
More informationΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών
ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop
More informationControl-Flow Analysis and Loop Detection
! Control-Flow Anlysis nd Loop Detection!Lst time! PRE!Tody! Control-flow nlysis! Loops! Identifying loops using domintors! Reducibility! Using loop identifiction to identify induction vribles CS553 Lecture
More informationCS412/413. Introduction to Compilers Tim Teitelbaum. Lecture 4: Lexical Analyzers 28 Jan 08
CS412/413 Introduction to Compilers Tim Teitelum Lecture 4: Lexicl Anlyzers 28 Jn 08 Outline DFA stte minimiztion Lexicl nlyzers Automting lexicl nlysis Jlex lexicl nlyzer genertor CS 412/413 Spring 2008
More informationCSCI1950 Z Computa4onal Methods for Biology Lecture 2. Ben Raphael January 26, hhp://cs.brown.edu/courses/csci1950 z/ Outline
CSCI1950 Z Comput4onl Methods for Biology Lecture 2 Ben Rphel Jnury 26, 2009 hhp://cs.brown.edu/courses/csci1950 z/ Outline Review of trees. Coun4ng fetures. Chrcter bsed phylogeny Mximum prsimony Mximum
More informationFig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.
Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution
More informationCSE 401 Midterm Exam 11/5/10 Sample Solution
Question 1. egulr expressions (20 points) In the Ad Progrmming lnguge n integer constnt contins one or more digits, but it my lso contin embedded underscores. Any underscores must be preceded nd followed
More informationMath 142, Exam 1 Information.
Mth 14, Exm 1 Informtion. 9/14/10, LC 41, 9:30-10:45. Exm 1 will be bsed on: Sections 7.1-7.5. The corresponding ssigned homework problems (see http://www.mth.sc.edu/ boyln/sccourses/14f10/14.html) At
More informationCS 241. Fall 2017 Midterm Review Solutions. October 24, Bits and Bytes 1. 3 MIPS Assembler 6. 4 Regular Languages 7.
CS 241 Fll 2017 Midterm Review Solutions Octoer 24, 2017 Contents 1 Bits nd Bytes 1 2 MIPS Assemly Lnguge Progrmming 2 3 MIPS Assemler 6 4 Regulr Lnguges 7 5 Scnning 9 1 Bits nd Bytes 1. Give two s complement
More informationFig.25: the Role of LEX
The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing
More informationUnit #9 : Definite Integral Properties, Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationECE 468/573 Midterm 1 September 28, 2012
ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other
More informationAn Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization
An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction
More informationCMPSC 470: Compiler Construction
CMPSC 47: Compiler Construction Plese complete the following: Midterm (Type A) Nme Instruction: Mke sure you hve ll pges including this cover nd lnk pge t the end. Answer ech question in the spce provided.
More informationCompression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv
Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions
More informationUnit 5 Vocabulary. A function is a special relationship where each input has a single output.
MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with
More informationTheory of Computation CSE 105
$ $ $ Theory of Computtion CSE 105 Regulr Lnguges Study Guide nd Homework I Homework I: Solutions to the following problems should be turned in clss on July 1, 1999. Instructions: Write your nswers clerly
More informationTopic: Software Model Checking via Counter-Example Guided Abstraction Refinement. Having a BLAST with SLAM. Combining Strengths. SLAM Overview SLAM
Hving BLAST with SLAM Topic: Softwre Model Checking vi Counter-Exmple Guided Abstrction Refinement There re esily two dozen SLAM/BLAST/MAGIC ppers; I will skim. # # Theorem Proving Combining Strengths
More informationEpson Projector Content Manager Operation Guide
Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time
More informationHVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations
2017 IEEE Symposium on Security nd Privcy HVLern: Automted Blck-box Anlysis of Hostnme Verifiction in SSL/TLS Implementtions Suphnnee Sivkorn, George Argyros, Kexin Pei, Angelos D. Keromytis, nd Sumn Jn
More informationEECS 281: Homework #4 Due: Thursday, October 7, 2004
EECS 28: Homework #4 Due: Thursdy, October 7, 24 Nme: Emil:. Convert the 24-bit number x44243 to mime bse64: QUJD First, set is to brek 8-bit blocks into 6-bit blocks, nd then convert: x44243 b b 6 2 9
More informationCSCI 446: Artificial Intelligence
CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]
More informationCS201 Discussion 10 DRAWTREE + TRIES
CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the
More informationStained Glass Design. Teaching Goals:
Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to
More informationApplied Databases. Sebastian Maneth. Lecture 13 Online Pattern Matching on Strings. University of Edinburgh - February 29th, 2016
Applied Dtses Lecture 13 Online Pttern Mtching on Strings Sestin Mneth University of Edinurgh - Ferury 29th, 2016 2 Outline 1. Nive Method 2. Automton Method 3. Knuth-Morris-Prtt Algorithm 4. Boyer-Moore
More informationMidterm 2 Sample solution
Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the
More informationCSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona
CSc 453 Compilers nd Systems Softwre 4 : Lexicl Anlysis II Deprtment of Computer Science University of Arizon collerg@gmil.com Copyright c 2009 Christin Collerg Implementing Automt NFAs nd DFAs cn e hrd-coded
More informationMidterm I Solutions CS164, Spring 2006
Midterm I Solutions CS164, Spring 2006 Februry 23, 2006 Plese red ll instructions (including these) crefully. Write your nme, login, SID, nd circle the section time. There re 8 pges in this exm nd 4 questions,
More informationEliminating left recursion grammar transformation. The transformed expression grammar
Eliminting left recursion grmmr trnsformtion Originl! rnsformed! 0 0! 0 α β α α α α α α α α β he two grmmrs generte the sme lnguge, but the one on the right genertes the rst, nd then string of s, using
More informationDr. D.M. Akbar Hussain
Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence
More informationII. THE ALGORITHM. A. Depth Map Processing
Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A
More informationToday. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search
Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods
More informationCS 321 Programming Languages and Compilers. Bottom Up Parsing
CS 321 Progrmming nguges nd Compilers Bottom Up Prsing Bottom-up Prsing: Shift-reduce prsing Grmmr H: fi ; fi b Input: ;;b hs prse tree ; ; b 2 Dt for Shift-reduce Prser Input string: sequence of tokens
More informationAssignment 4. Due 09/18/17
Assignment 4. ue 09/18/17 1. ). Write regulr expressions tht define the strings recognized by the following finite utomt: b d b b b c c b) Write FA tht recognizes the tokens defined by the following regulr
More informationCSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe
CSCI 0 fel Ferreir d Silv rfsilv@isi.edu Slides dpted from: Mrk edekopp nd Dvid Kempe LOG STUCTUED MEGE TEES Series Summtion eview Let n = + + + + k $ = #%& #. Wht is n? n = k+ - Wht is log () + log ()
More informationDigital Design. Chapter 6: Optimizations and Tradeoffs
Digitl Design Chpter 6: Optimiztions nd Trdeoffs Slides to ccompny the tetbook Digitl Design, with RTL Design, VHDL, nd Verilog, 2nd Edition, by Frnk Vhid, John Wiley nd Sons Publishers, 2. http://www.ddvhid.com
More informationMA 124 (Calculus II) Lecture 2: January 24, 2019 Section A3. Professor Jennifer Balakrishnan,
Wht is on tody Professor Jennifer Blkrishnn, jbl@bu.edu 1 Velocity nd net chnge 1 2 Regions between curves 3 1 Velocity nd net chnge Briggs-Cochrn-Gillett 6.1 pp. 398-46 Suppose you re driving long stright
More information9.1 apply the distance and midpoint formulas
9.1 pply the distnce nd midpoint formuls DISTANCE FORMULA MIDPOINT FORMULA To find the midpoint between two points x, y nd x y 1 1,, we Exmple 1: Find the distnce between the two points. Then, find the
More informationRepresentation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation
Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed
More informationAutomata Processor. Tobias Markus Computer Architecture Group, University of Heidelberg
1 Automt Processor Tobis Mrkus Computer Architecture Group, University of Heidelberg Abstrct This pper gives brief overview over nondeterministic utomt nd the Automt Processor n rchitecture implemented
More informationCMSC 331 First Midterm Exam
0 00/ 1 20/ 2 05/ 3 15/ 4 15/ 5 15/ 6 20/ 7 30/ 8 30/ 150/ 331 First Midterm Exm 7 October 2003 CMC 331 First Midterm Exm Nme: mple Answers tudent ID#: You will hve seventy-five (75) minutes to complete
More informationNearest Keyword Set Search in Multi-dimensional Datasets
Nerest Keyword Set Serch in Multi-dimensionl Dtsets Vishwkrm Singh Deprtment of Computer Science University of Cliforni Snt Brbr, USA Emil: vsingh014@gmil.com Ambuj K. Singh Deprtment of Computer Science
More informationIntroduction to Computer Engineering EECS 203 dickrp/eecs203/ CMOS transmission gate (TG) TG example
Introduction to Computer Engineering EECS 23 http://ziyng.eecs.northwestern.edu/ dickrp/eecs23/ CMOS trnsmission gte TG Instructor: Robert Dick Office: L477 Tech Emil: dickrp@northwestern.edu Phone: 847
More informationLR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table
TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph
More informationToday. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.
CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke
More informationSome Thoughts on Grad School. Undergraduate Compilers Review and Intro to MJC. Structure of a Typical Compiler. Lexing and Parsing
Undergrdute Compilers Review nd Intro to MJC Announcements Miling list is in full swing Tody Some thoughts on grd school Finish prsing Semntic nlysis Visitor pttern for bstrct syntx trees Some Thoughts
More informationCS 268: IP Multicast Routing
Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte
More informationImplementing Automata. CSc 453. Compilers and Systems Software. 4 : Lexical Analysis II. Department of Computer Science University of Arizona
Implementing utomt Sc 5 ompilers nd Systems Softwre : Lexicl nlysis II Deprtment of omputer Science University of rizon collerg@gmil.com opyright c 009 hristin ollerg NFs nd DFs cn e hrd-coded using this
More informationA Heuristic Approach for Discovering Reference Models by Mining Process Model Variants
A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl
More informationA REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS
A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute
More informationpdfapilot Server 2 Manual
pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:
More information? Statistical model for normal network behavior and for abnormal traffic patterns. ? Comparison with majority voting scheme
Anomly Detection in IP Network Using Sttisticl Signl Processing Introduction? Why re Signl Processing Techniques effective t detecting severl network nomlies? Introducing Sttisticl Signl Processing techniques
More informationFrom Indexing Data Structures to de Bruijn Graphs
From Indexing Dt Structures to de Bruijn Grphs Bstien Czux, Thierry Lecroq, Eric Rivls LIRMM & IBC, Montpellier - LITIS Rouen June 1, 201 Czux, Lecroq, Rivls (LIRMM) Generlized Suffix Tree & DBG June 1,
More informationAn introduction to model checking
An introduction to model checking Slide 1 University of Albert Edmonton July 3rd, 2002 Guy Trembly Dépt d informtique UQAM Outline Wht re forml specifiction nd verifiction methods? Slide 2 Wht is model
More informationAlgorithm Design (5) Text Search
Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:
More informationComparative Study of Universities Web Structure Mining
Comprtive Study of Universities Web Structure Mining Z. Abdullh, A. R. Hmdn Abstrct This pper is ment to nlyze the rnking of University of Mlysi Terenggnu, UMT s website in the World Wide Web. There re
More information12 <= rm <digit> 2 <= rm <no> 2 <= rm <no> <digit> <= rm <no> <= rm <number>
DDD16 Compilers nd Interpreters DDB44 Compiler Construction R Prsing Prt 1 R prsing concept Using prser genertor Prse ree Genertion Wht is R-prsing? eft-to-right scnning R Rigthmost derivtion in reverse
More informationDeterministic. Finite Automata. And Regular Languages. Fall 2018 Costas Busch - RPI 1
Deterministic Finite Automt And Regulr Lnguges Fll 2018 Costs Busch - RPI 1 Deterministic Finite Automton (DFA) Input Tpe String Finite Automton Output Accept or Reject Fll 2018 Costs Busch - RPI 2 Trnsition
More informationPolymorphic Blending Attacks. Slides by Jelena Mirkovic
Polymorphic Blending Attacks Slides by Jelena Mirkovic 1 Motivation! Polymorphism is used by malicious code to evade signature-based IDSs Anomaly-based IDSs detect polymorphic attacks because their byte
More informationUninformed Search. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 31 Jan 2012
1 Hl Dumé III (me@hl3.nme) Uninformed Serch Hl Dumé III Comuter Science University of Mrylnd me@hl3.nme CS 421: Introduction to Artificil Intelligence 31 Jn 2012 Mny slides courtesy of Dn Klein, Sturt
More information5/9/17. Lesson 51 - FTC PART 2. Review FTC, PART 1. statement as the Integral Evaluation Theorem as it tells us HOW to evaluate the definite integral
Lesson - FTC PART 2 Review! We hve seen definition/formul for definite integrl s n b A() = lim f ( i )Δ = f ()d = F() = F(b) F() n i=! where F () = f() (or F() is the ntiderivtive of f() b! And hve seen
More informationSynchronizability of Conversations Among Web Services
1 Synchronizbility of Converstions Among Web Services Xing Fu, Tevfik Bultn, Jinwen Su Abstrct We present frmework for nlyzing interctions mong web services tht communicte with synchronous messges. We
More informationPhylogeny and Molecular Evolution
Phylogeny nd Moleculr Evolution Chrcter Bsed Phylogeny 1/50 Credit Ron Shmir s lecture notes Notes by Nir Friedmn Dn Geiger, Shlomo Morn, Sgi Snir nd Ron Shmir Durbin et l. Jones nd Pevzner s presenttion
More informationText mining: bag of words representation and beyond it
Text mining: bg of words representtion nd beyond it Jsmink Dobš Fculty of Orgniztion nd Informtics University of Zgreb 1 Outline Definition of text mining Vector spce model or Bg of words representtion
More information10.5 Graphing Quadratic Functions
0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions
More informationCPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls
Redings for Next Two Lectures Text CPSC 213 Switch Sttements, Understnding Pointers - 2nd ed: 3.6.7, 3.10-1st ed: 3.6.6, 3.11 Introduction to Computer Systems Unit 1f Dynmic Control Flow Polymorphism nd
More informationCone Cluster Labeling for Support Vector Clustering
Cone Cluster Lbeling for Support Vector Clustering Sei-Hyung Lee Deprtment of Computer Science University of Msschusetts Lowell MA 1854, U.S.A. slee@cs.uml.edu Kren M. Dniels Deprtment of Computer Science
More informationParameterless Outlier Detection in Data Streams
Prmeterless Outlier Detection in Dt Strems Alice Mrscu nd Florent Mssegli INRIA AxIS Project-Tem 2004 route des lucioles - BP 93 {first.lst}@sophi.inri.fr ABSTRACT Outlyingness is subjective concept relying
More informationAddress Register Assignment for Reducing Code Size
Address Register Assignment for Reducing Code Size M. Kndemir 1, M.J. Irwin 1, G. Chen 1, nd J. Rmnujm 2 1 CSE Deprtment Pennsylvni Stte University University Prk, PA 16802 {kndemir,mji,guilchen}@cse.psu.edu
More informationLocal Search Heuristics for NFA State Minimization Problem *
Int. J. Communictions, etwork nd System Sciences, 0, 5, 638-63 http://dx.doi.org/0.36/ijcns.0.5907 Pulished Online Septemer 0 (http://www.scirp.org/journl/ijcns) Locl Serch Heuristics for FA Stte inimiztion
More informationOverview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases
Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture
More informationEfficient Techniques for Tree Similarity Queries 1
Efficient Techniques for Tree Similrity Queries 1 Nikolus Augsten Dtbse Reserch Group Deprtment of Computer Sciences University of Slzburg, Austri July 6, 2017 Austrin Computer Science Dy 2017 / IMAGINE
More informationTopic 2: Lexing and Flexing
Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of
More informationMA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork
MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html
More informationApplication-Level Traffic Monitoring and an Analysis on IP Networks
Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for
More information