Absolute Security
Information Systems and Security Lab (ISSL), Electrical Engineering Department, Sharif University of technology. Cryptology, Cryptography, Network Security, Information Theory, Steganalysis, Cryptanalysis, etc Sessions.
Saturday, April 11, 2020
A Public Key Encryption Algorithm for Network Security
Security Weaknesses in PGP
- Leveraging big visual data to predict severe weather conditions
- Discovering Triangles in Portraits for Supporting Photographic Creation
- Skeleton Matching with Applications in Severe Weather Detection
- Detecting Dominant Vanishing Points in Natural Scenes with Application to Composition-Sensitive Image Retrieval
- Shape matching using skeleton context for automated bow echo detection
- Detecting Vanishing Points in Natural Scenes with Application in Photo Composition Analysis
- Stochastic Modeling and Optimization of Stragglers
- Automatic Thumbnail Generation by Smart Cropping
- Evaluating the Combined Impact of Node Architecture and Cloud Workload Characteristics on Network Traffic and Performance/Cost
- Fork-Join Queue Modeling and Optimal Scheduling in Parallel Programming Frameworks
- Optimal Placement of Cores, Caches and Memory Controllers in Network On-Chip
- Towards Stochastically Optimizing Data Computing Flows
- Stochastic Modeling and Optimization of Stragglers in Map-Reduce Framework
- Towards blind detection of low-rate spatial embedding in image steganalysis
- Modeling and Optimization of Straggling Mappers
- Performance Modeling and Optimization of MapReduce
- Security Weaknesses in PGP Protocol
- Eigenvalues-based LSB steganalysis
- Image steganalysis based on SVD and noise estimation: Improve sensitivity to spatial LSB embedding families
- Multi-dimensional correlation steganalysis
- Game-theoretic approach to mitigate packet dropping in wireless ad-hoc networks
- Risk of attack coefficient effect on availability of adhoc networks
- Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup
- Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup (PIAKAP)
- Locally Multi-path Adaptive Routing Protocol Resilient to Selfishness and Wormholes
- Extended Authentication and Key Agreement Protocol of UMTS
Wednesday, March 25, 2020
System and methods for UICC-based secure communication
ABSTRACT
A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed.
SYSTEM AND METHODS FOR UICC-BASED SECURE COMMUNICATION 20150222631
Wednesday, November 21, 2018
MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURES
MODELING, MONITORING AND SCHEDULING TECHNIQUES FOR NETWORK RECOVERY FROM MASSIVE FAILURES
- Thomas F Laporta, Dissertation Advisor
- Thomas F Laporta, Committee Chair
- Ting He, Committee Member
- Nilanjan Ray Chaudhuri, Committee Member
- Marek Flaska, Outside Member
- Network Recovery
- Massive Disruption
- Stochastic Optimization
- Uncertainty
- Network Recovery Massive Disruption
- Uncertainty.
- Cascading Failures
- Interdependent Networks
- Power Grid
- Software-Defined Networking
Tuesday, October 10, 2017
Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment
CAGE: A Contention-Aware Game-theoretic Model for Heterogeneous Resource Assignment
Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications' need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.
Draft > CAGE
Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications' need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and co-processor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.
Draft > CAGE
Saturday, September 30, 2017
Modeling and Optimization of MapReduce
ABSTRACT
MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and continuously increasing the number of mappers without accurate scheduling can degrade the overall performance. We analytically capture the effects of stragglers (delayed mappers) on the performance. Based on an observed delayed exponential distribution (DED) of the response time of mappers, we then model the map phase by means of hardware, system, and application parameters. Mean sojourn time (MST), the time needed to sync the completed map tasks at one reducer, is mathematically formulated. Following that, we optimize MST by finding the task inter-arrival time to each mapper node. The optimal mapping problem leads to an equilibrium property investigated for different types of inter-arrival and service time distributions in a heterogeneous datacenter (i.e., a datacenter with different types of nodes). Our experimental results show the performance and important parameters of the different types of schedulers targeting MapReduce applications. We also show that, in the case of mixed deterministic and stochastic schedulers, there is an optimal scheduler that can always achieve the lowest MST.
[Tech Report] [Master Thesis] [IEEE Trans]
Last version > MapReduce_Performance_Optimization
Friday, September 22, 2017
PIAKAP
Authentication and Key Agreement Protocol in 4G
Abstract
Identification, authentication and key agreement protocol of UMTS networks with security mode setup has some weaknesses in the case of mutual freshness of key agreement, DoS-attack resistance, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses of the previous frameworks suggested for the UMTS AKA protocol. After that we propose a new protocol called private identification, authentication, and key agreement protocol (PIAKAP), for UMTS mobile network. Our suggested protocol combines identification and AKA stages of UMTS AKA protocol while eliminates disadvantages of related works and brings some new features to improve the UMTS AKA mechanism. These features consist of reducing the interactive rounds of the UMTS AKA with security mode setup and user privacy establishment.
ePrint, Research, Security and tagged Ahmad Salahi, Authentication, Identification, Key Agreement, Mobile Network, PIAKAP, Privacy, Security Protocol, Somayeh Salimi, UMTS on .