SOLELY AUTHORED INTL. RESEARCH PAPERS (5)

November, 2016

On the Imminent Advent of Botnet Powered Cracking

2th IEEE International Conference on Collaboration and Internet Computing. Pittsburg, U.S.A

This paper improves upon the basic technique of splitting a brute force among bots (described in my second paper “Usage of botnets for high speed MD5 hash cracking”). This article describes an integrated constant cost algorithm of splitting work when using any combination of an arbitary set of work loads defined by : Markovian filters and/or Probabilistic Context Free Grammar, combined with dictionary mangling, and both naive and masked brute force. The algorithm ensures that work load distribution is equal, regardless of the varying amounts of computing power possessed by each node (in the millions). Lost work can be recovered, added to the job pool and be assigned to other nodes regardless of the nature of the initial lost work without losing homogeneity in work assignment. Lost work can be guranteed to be recovered within a specified duration. Comparisons with hash rates of cloud-based cracking are also discussed.

Download Text from IEEE Xplore


December, 2014

Human computer interaction advancement by usage of smart phones for motion tracking and remote operation

14th IEEE International Conference on Scalable computing and communication. Bali, Indonesia

This paper describes a proof-of-concept Human Computer Interaction system not requiring a connecting network between the device and the computer. Also, this method doesn’t require construction or usage of custom devices of any sort.

Download Text from IEEE Xplore   Read More


May, 2014

Bitcoin mining acceleration and performance quantification

27th IEEE Canadian Conference on Electrical and Computer Engineering. Toronto, Canada

This paper discusses methods of contextually faster Bitcoin mining technique by usage of both the CPUs and GPUs of miners in mining pools and quantifies greater hash rates achieved. This paper also discusses possible exploitation of a similar system (Litecoin) by Botnet herders.

(Google Scholar) Citations earned:
  1.  Tschorsch, Florian, and Björn Scheuermann. “Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies.”
  2. Morisse, Marcel. “Cryptocurrencies and Bitcoin: Charting the Research Landscape.” (2015).
  3. Quan-Liang Lin. “Using Proof-of-Assignment to solve NP problem:A platform for Vapor Computing” (2015).
  4. Kumkum Gupta, Sparsh Agrawal, Ashrut Bharadwaj. “Dependability of Bitcoin in E-Commerce” (2015)
  5. de Koning, Patrick, and W. P. Weijland. “In hoeverre is het Bitcoin systeem een piramide systeem?” (2015)
  6. Carlos Domingos Vaz Lampreia Horta Martins, “Parallelization of the LU Decomposition in Heterogeneous Systems” (2015)
  7. Lawrence of J.Trautman, “Is Disruptive Blockchain Technology the Future of Financial Services?” (2016)
  8. Holk, Eric. Region-based Memory Management For Expressive Gpu Programming. Diss. Indiana University (2016)
  9. Weber, Martin. “Cryptocurrencies and the Block Chain.” (2016)
  10. Kim, Sungwook. “Group bargaining based bitcoin mining scheme using incentive payment process.” Transactions on Emerging Telecommunications Technologies (2016)
  11. TEXTBOOK: Protocols for Secure Electronic Commerce, Third Edition, Mostafa Hashem Sherif, ISBN 9781482203745, (2016)
  12. Jesse Yli-Huumo, Deokyoon Ko, Sujin Choi, “Where Is Current Research on Blockchain Technology?—A Systematic Review” (2016)
  13. Conoscenti, Vetr, De Martin, “Blockchain for the Internet of Things: a Systematic Literature Review” (2016)
  14. Schmidt, Rainer, et al. “Benefits from Using Bitcoin: Empirical Evidence from a European Country.” International Journal of , Management, Engineering, and Technology (IJSSMET) 7.4 (2016): 48-62.
  15. John Liu, “Bitcoin : A Co-word Analysis”, 6th Economics & Finance Conference, Paris.
  16. Godsiff, “Bitcoin: Bubble or Blockchain?”, 9th KES International Conference 2015.
  17. BOOK: Agent and Multi-Agent Systems: Technologies and Applications, 2016
  18. Notheisen et al (2017). “Breaking Down The Blockchain Hype – Towards A Blockchain Market Engineering Approach”. In Proceedings of the 25th European Conference on Information Systems (ECIS) 2017 (pp. 1062-1080). ISBN 978-989-207655
  19. 19,20 (Awaiting links)
Accolades:
  • Featured in a “state of academy Bitcoin research compilation” by Brett Scott (Alternative Finance Explorer, author of publications in TheGuardian, Wired)
  • Paper registration fee of $750 and mandatory attendance of conference waived
  • Most downloaded paper of conference (1st out of 257 papers)
  • Nominated “Award Quality”
  • Featured in a university textbook on Secure Electronic Commerce (See citation#11)

Download Text from IEEE Xplore    Read More


August, 2013

Usage of Botnets for high speed MD5 hash Cracking

3rd IEEE International Conference on Innovative Computing Technology. London, Britain

This paper quantifies the advantage of using the CPU simultaneously with the GPU for hash cracking and describes how a potential attacker, with respect to the size of the botnet used, could come to possess capabilities of hash rates of at least greater than 11 times the rate of the world’s fastest GPU cluster based MD5 brute forcing machine with no investment. This also  addresses a bottleneck in my previous paper by presenting a constant cost function for work break down, distribution and intake.

(Google Scholar) Citations earned:
  1. Blase Ur, Sean M. Segreti, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle L. Mazurek, William Melicher, and Richard Shay. 2015. Measuring real-world accuracies and biases in modeling password guessability. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC’15), Jaeyeon Jung (Ed.). USENIX Association, Berkeley, CA, USA, 463-481. (2015)
  2. SANS Institute InfoSec (Pierce M Gibbs), “Botnet Tracking Tools” (2014).
  3. Blase Ur, “Supporting Password-Security Decisions with Data”, PhD Thesis (2016)
  4. Mukherjee, Bidyut, Roshan Lal Neupane, and Prasad Calyam. “End-to-End IoT Security Middleware for Cloud-Fog Communication.” (2017)
Accolades:
  • Conference paper download count rank: 18th out of 107 papers

Download Text from IEEE Xplore    Read More


 

June, 2013

Cracking MD5 hashes by simultaneous usage of Multiple GPUs and CPUs over multiple machines in a network

2nd International Conference on Advances in Electronics, Electrical and Computer Engineering. Dehradun, India

This paper presents an efficient method of maximally using computing resources by simultaneously using Graphics Processing Units (GPUs) and Central Processing Units (CPUs) of machines over a network for MD5 hash brute forcing, and compares its efficiency against using networked GPUs alone. Methods to achieve work distribution without the use of custom hardware is also described.

Google Scholar Citations earned:
  1. Barbieri, D.; Cardellini, V.; Filippone, S., “Exhaustive Key Search on Clusters of GPUs,” Parallel & Distributed Processing Symposium Workshops (IPDPSW), 2014 IEEE International , vol., no., pp.1160,1168, 19-23 May 2014; doi: 10.1109/IPDPSW.2014.131
  2. Davide Barbieri, “SIMPL: A Pattern Language for writing Efficient Kernels on GPU architectures” (2014)
Accolades:
  • Conference paper download count rank: 13th out of 82 papers
  • Journal Appearance (UACEE International Journal of Advances in Computer Science and its Applications)

Download Text from SeekDl Library    Read More


 

CO- AUTHORED INTERNATIONAL RESEARCH PAPERS (1)

October, 2015

An NFC featured three level authentication system for tenable transaction and abridgment of ATM card blocking intricacies

6th International Conference and Workshop on Computing and Communication. Vancouver, Canada

Using a three factor authentication scheme employing NFC (Near Field Communication: an emerging technology evolved from a combination of contact-less identification and interconnection providing data exchange), Dash Matrix Algorithm and One-time password, we describe and quantity the potential to overcome common transaction liabilities (brute force attack, shoulder surfing, skimming of ATM cards, etc.). The auxiliary feature of blocking ATM card is implemented using a QR code authentication scheme and NFC technology, implemented both in NFC enabled phones and non-NFC enabled phones (with the help of an NFC transmitter, receiver and Bluetooth). The proposed system, therefore, ensures both secure usage of ATM cards and cost effectiveness by utility of novel and increasingly common technology, when also simultaneously proving to be user friendly.

(Google Scholar) Citations earned:
  1. S. Kumari et al, “An RFID Enabled Authentication System for Transaction and Abridgement of ATM Card Blocking and unblocking Intricacies” (March 2016)

Download Text from IEEE Xplore