Search For:

Displaying 1-29 out of 29 total
Hardware-Software Codesign for High-Speed Signature-based Virus Scanning
Found in: IEEE Micro
By Ying-Dar Lin, Po-Ching Lin, Yuan-Cheng Lai, Tai-Ying Liu
Issue Date:September 2009
pp. 56-65
<p>High-speed network content security applications often offload signature matching to hardware. In such systems, the throughput of the overall system, rather than the hardware engine alone, is significant. The authors offload virus scanning in the ...
 
Test Coverage Optimization for Large Code Problems
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ying-Dar Lin,Chi-Heng Chou,Yuan-Cheng Lai,Tse-Yau Huang,Simon Chung,Jui-Tsun Hung,Frank C. Lin
Issue Date:March 2012
pp. 215-220
Because running all previous tests for the regression testing of a system is time-consuming, the size of a test suite of the system must be reduced intelligently with adequate test coverage and without compromising its fault detection capability. Five algo...
 
Session Level Flow Classification by Packet Size Distribution and Session Grouping
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Chun-Nan Lu,Ying-Dar Lin,Chun-Ying Huang,Yuan-Cheng Lai
Issue Date:March 2012
pp. 221-226
Classifying traffic into specific network applications is essential for application-aware network management and it becomes more challenging because modern applications obscure their network behaviors. While port number-based classifiers work only for some...
 
VPN Gateways over Network Processors: Implementation and Evaluation
Found in: Real-Time and Embedded Technology and Applications Symposium, IEEE
By Yi-Neng Lin, Chiuan-Hung Lin, Ying-Dar Lin, Yuan-Chen Lai
Issue Date:March 2005
pp. 480-486
Networking applications, such as VPN and content filtering, demand extra computing power in order to meet the throughput requirement nowadays. In addition to pure ASIC solutions, network processor architecture is emerging as an alternative to scale up data...
 
DiffServ over Network Processors: Implementation and Evaluation
Found in: High-Performance Interconnects, Symposium on
By Ying-Dar Lin, Yi-Neng Lin, Shun-Chin Yang, Yu-Sheng Lin
Issue Date:August 2002
pp. 121
Network processors are emerging as a programmable alternative to the traditional ASIC-based solutions in scaling up the data-plane processing of network services. This work, rather than proposing new algorithms, illustrates the process of, and examines the...
 
PCUP : Pipelined Cyclic Upstream Protocol over Hybrid Fiber Coax
Found in: IEEE Computer and Communications Societies, Annual Joint Conference of the
By Ying-Dar Lin, Chia-Jen Wu, Wei-Ming Yin
Issue Date:April 1997
pp. 1165
In order to span NII (National Information Infrastructure) into the homes, the community cable TV networks have to be re-engineered to support two-way interactive services. In this work, we propose PCUP (Pipelined Cyclic Upstream Protocol) as the upstream ...
 
A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning
Found in: IEEE Transactions on Computers
By Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:April 2011
pp. 594-601
Virus scanning involves computationally intensive string matching against a large number of signatures of different characteristics. Matching a variety of signatures challenges the selection of matching algorithms, as each approach has better performance t...
 
Using String Matching for Deep Packet Inspection
Found in: Computer
By Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai, Tsern-Huei Lee
Issue Date:April 2008
pp. 23-28
String matching has sparked renewed research interest due to its usefulness for deep packet inspection in applications such as intrusion detection, virus scanning, and Internet content filtering. Matching expressive pattern specifications with a scalable a...
 
Thread Allocation in Chip Multiprocessor Based Multithreaded Network Processors
Found in: Advanced Information Networking and Applications, International Conference on
By Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:March 2008
pp. 718-725
This work tries to derive ideas for thread allocation in Chip Multiprocessor (CMP)-based network processors performing general applications by Continuous-Time Markov Chain modeling and Petri net simulations. The concept of P-M ratio, where P and M indicate...
 
kP2PADM: An In-kernel Gateway Architecture for Managing P2P Traffic
Found in: Parallel and Distributed Processing Symposium, International
By Ying-Dar Lin, Po-Ching Lin, Meng-Fu Tsai, Tsao-Jiang Chang, Yuan-Cheng Lai
Issue Date:March 2007
pp. 462
This work presents an in-kernel gateway architecture on Linux, namely kP2PADM, for managing P2P traffic on dynamic ports. This design can effectively eliminate redundant data passing between the kernel space and the user space. The management functions inc...
 
Designing an Integrated Architecture for Network Content Security Gateways
Found in: Computer
By Ying-Dar Lin, Chih-Wei Jan, Po-Ching Lin, Yuan-Cheng Lai
Issue Date:November 2006
pp. 66-72
Installing multiple network security products to detect and block viruses, spam, and other intrusions introduces substantial overhead in interprocess communications and kernel/user space interactions. Tightly integrating these functions in a single gateway...
 
On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices
Found in: IEEE Transactions on Software Engineering
By Ying-Dar Lin,Jose F. Rojas,Edward T.-H. Chu,Yuan-Cheng Lai
Issue Date:October 2014
pp. 1-1
Automated GUI testing consists of simulating user events and validating the changes in the GUI in order to determine if an Android application meets specifications. Traditional record-replay testing tools mainly focus on facilitating the test case writing ...
 
Improving the Accuracy of Automated GUI Testing for Embedded Systems
Found in: IEEE Software
By Ying-Dar Lin,Edward T.-H. Chu,Shang-Che Yu,Yuan-Cheng Lai
Issue Date:January 2014
pp. 39-45
Automated GUIs test application user interfaces and verify their functionalities. However, due to the uncertainty of runtime execution environments, the device under test (DUT) might not reproduce GUI operations on time, resulting in test failures. The Sma...
 
Redefining Security Criteria for Networking Devices with Case Studies
Found in: IEEE Security & Privacy
By Ying-Dar Lin,Chia-Yin Lee,Hao-Chuan Tsai
Issue Date:January 2014
pp. 43-53
Common Criteria, ICSA Labs, and NSS Labs--three well-known standard security criteria--emphasize document review of a product's life cycle, false negative and positive rates of malicious and benign traffic, and performance and self-protection of security f...
 
In-Kernel Relay for Scalable One-to-Many Streaming
Found in: IEEE MultiMedia
By Ying-Dar Lin,Chia-Yu Ku,Yuan-Cheng Lai,Chia-Fon Hung
Issue Date:January 2013
pp. 69-79
The in-kernel One-to-Many Streaming Splicing (OMSS) relay method can help improve the relay data paths of critical nodes to reduce computing power for UDP and TCP streams and enhance the subscriber capacity.
 
Multiple-Resource Request Scheduling for Differentiated QoS at Website Gateway
Found in: Advanced Information Networking and Applications, International Conference on
By Ying-Dar Lin, Ching-Ming Tien, Shih-Chiang Tsao, Ruo-Hua Feng, Yuan-Cheng Lai
Issue Date:March 2008
pp. 433-440
Differentiated quality of service is a way for a website operator to provide different service levels to its clients. Traditional HTTP request scheduling schemes can achieve this, but they schedule requests to manage only one server resource, such as CPU o...
 
Scalable Automaton Matching for High-Speed Deep Content Inspection
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ying-Dar Lin, Kuo-Kun Tseng, Chen-Chou Hung, Yuan-Cheng Lai
Issue Date:May 2007
pp. 858-863
String matching plays a central role in content inspection applications such as intrusion detection, anti-virus, anti-spam and Web filtering. Because they are computation and memory intensive, software matching algorithms are insufficient in meeting the hi...
 
A Parallel Automaton String Matching with Pre-Hashing and Root-Indexing Techniques for Content Filtering Coprocessor
Found in: Application-Specific Systems, Architectures and Processors, IEEE International Conference on
By Kuo-Kun Tseng, Ying-Dar Lin, Tsern-Huei Lee, Yuan-Cheng Lai
Issue Date:July 2005
pp. 113-118
<p>We propose a new Parallel Automaton string matching approach and its hardware architecture for content filtering coprocessor. This new approach can improve the average matching time of the Parallel Automaton with Pre-Hashing and Root-Indexing tech...
 
Assessing and Improving TCP Rate Shaping over Edge Gateways
Found in: IEEE Transactions on Computers
By Huan-Yun Wei, Shih-Chiang Tsao, Ying-Dar Lin
Issue Date:March 2004
pp. 259-275
<p><b>Abstract</b>—Computers installed with commercial/open-source software have been widely employed as organizational edge gateways to provide policy-based network management. Such gateways include firewalls for access control, and band...
 
Co-DRR: An Integrated Uplink and Downlink Scheduler for Bandwidth Management over Wireless LANs
Found in: Computers and Communications, IEEE Symposium on
By Huan-Yun Wei, Ching-Chuang Chiang, Ying-Dar Lin
Issue Date:July 2003
pp. 1415
Bandwidth management over wired bottleneck links has been an effective way to utilize network resources. For the rapidly emerging IEEE 802.11 Wireless LAN (WLAN), the limited WLAN bandwidth becomes a new bottleneck and requires bandwidth management. Most p...
 
Open Source Software Development: An Overview
Found in: Computer
By Ming-Wei Wu, Ying-Dar Lin
Issue Date:June 2001
pp. 33-38
<p>Although some challenge the value of open source software development, its popularity is undisputed. This overview of open source licensing and development models describes the movement's main principles. </p> <p>Whereas proprietary ve...
 
Guaranteed versus Controlled Load: Implications for Service Subscribers and Providers in RSVP Networks
Found in: Information Networking, International Conference on
By Yuan-Cheng Lai, Ying-Dar Lin, Chih-Yu Chen, Huan-Yun Wey
Issue Date:February 2001
pp. 487
IETF Integrated Service Working Group has specified two service classes: Guaranteed Quality (GQ) service and Controlled Load (CL) service. What concerns service sub-scribers and providers most is the cost of these two services and their performance. For se...
 
Characterization and control of highly correlated traffic in high speed networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Ying-Dar Lin, Tian-Ren Huang, Yuan-Cheng Lai
Issue Date:November 1996
pp. 19
By assuming network traffic to be independent from each other, the analysis of network performance can be simplified. However, the real traffic sources may have some correlation which makes their behavior tend to converge or diverge. This phenomenon has a ...
 
Mobile Application Security
Found in: Computer
By Ying-Dar Lin,Chun-Ying Huang,Matthew Wright,Georgios Kambourakis
Issue Date:June 2014
pp. 21-23
With a multitude of mobile apps available in the market, most users are unaware of the security risks they bring. Strategies for coping with the diversity of these threats deserve a closer look.
   
How Different Are Malware Collected Actively and Passively?
Found in: Computer
By Ying-Dar Lin,Chia-Yin Lee,Yu-Sung Wu,Pei-Hsiu Ho,Fu-Yu Wang,Yi-Lang Tsai
Issue Date:June 2013
pp. 1
A new open-source tool chain with malware collection, detection, and analysis is presented, evaluated, and open sourced. It actively collects malware through two channels: web-links and peer-to-peer. Then it detects malware with multiple anti-virus scanner...
 
Performance Analysis of Rate-based Congestion Control Scheme and Choice of High and Low Thresholds
Found in: Computer Communications and Networks, International Conference on
By Yuan-Cheng Lai, Ying-Dar Lin
Issue Date:September 1997
pp. 70
The paper presents a performance analysis of a rate-based congestion control mechanism. The switching capacity of the buffer is finite to reflect real conditions. Using a differential equation approach, we get the closed-form equations of cell loss probabi...
 
Modeling and analysis of core-centric network processors
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Kuo-Kun Tseng, Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:January 2009
pp. 1-15
Network processors can be categorized into two types, the coprocessors-centric model in which the data-plane is handled by coprocessors, and the core-centric model in which the core processes most of the data-plane packets yet offloading some tasks to copr...
     
Modeling and analysis of core-centric network processors
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Kuo-Kun Tseng, Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:July 2008
pp. 1-15
Network processors can be categorized into two types, the coprocessors-centric model in which data-plane is handled by coprocessors, and the core-centric model in which the core processes most of the data-plane packets yet offloading some tasks to coproces...
     
A fast scalable automaton-matching accelerator for embedded content processors
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Kuo-Kun Tseng, Tsern-Huei Lee, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:April 2009
pp. 1-30
Home and office network gateways often employ a cost-effective embedded network processor to handle their network services. Such network gateways have received strong demand for applications dealing with intrusion detection, keyword blocking, antivirus and...
     
 1