DoubleGuard Detecting Intrusions In Multi-tier Web Applications


By @dnl0x00 This is a short summary of the paper “DoubleGuard: Detecting Intrusions In Multi-tier Web Applications” by Le, M., Stavrou, A., & Kang, B. B. which appeared in 2012 in IEEE Transactions on dependable and secure computing, 9(4), 512-525. The authors developed an IDS system named DoubleGuard that models... [Read More]
Tags: paper

Majority is not Enough Bitcoin Mining is Vulnerable


By @dnl0x00 This is a short summary of the paper “Majority is not Enough: Bitcoin Mining is Vulnerable” by Eyal, Ittay, and Emin Gün Sirer which appeared in 2014 in International Conference on Financial Cryptography and Data Security. Creating blocks in Bitcoin is some kind of random process. It cannot... [Read More]
Tags: paper

Nearest neighbor search in the Tiny Images dataset


By @dnl0x00 The Tiny Images dataset consists of 79,302,017 images, each being a 32x32 color RGB image. The images have been retrieved from the Internet from several image search engines, are stored in an uncompressed large binary file (227GB) so that each image can be easily accessed via random access... [Read More]

A simple trick if sequential I/O is the bottleneck


By @dnl0x00 In the following post I will show you a simple trick to increase the throughput of a disk’s sequential I/O up to two orders of magnitude if for some computation the sequential I/O is the bottleneck and computation can be parallized. I will motivate this via an approach... [Read More]
Tags: linux