Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
About me
This is a page not in th emain menu
Published:
This post will show up by default. To disable scheduling of future posts, edit config.yml
and set future: false
.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Published:
This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.
Short description of portfolio item number 1
Short description of portfolio item number 2
Published in 2nd Cyber Security In Networking Conference (CSNet'18), Paris, France., 2018
Abstract: A central problem with distributed ledger technologies involves the latency that must be incurred in processing and verifying transactions to be accepted as permanent records in the ledger. In many applications, high latency is simply not a tolerable aspect of the governance of the ledger. To help reduce latency, we offer a distributed ledger architecture, Tango, that mimics the Iota-tangle design as articulated by Popov in his seminal paper. A main idea is the introduction of a semi-synchronous transaction entry protocol layer. We model periodic pulsed injections into the evaluation layer from the entry layer.
Recommended citation: Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge Novillo, Sam Sengupta, Ali Tekeoglu, "Tango: The Beginning - A Semi-Synchronous Iota-Tangle Type Distributed Ledger with Periodic Pulsed Entries." CSNet2018, October 24-26, Paris, France.
Published in 2nd Cyber Security In Networking Conference (CSNet'18), Paris, France, 2018
Abstract: A central problem with distributed ledger technologies involves the latency that must be incurred in processing and verifying transactions to be accepted as permanent records in the ledger. In many applications, high latency is simply not a tolerable aspect of the governance of the ledger. To help reduce latency, we first propose a theoretical pulsed injection protocol then apply innovative inventory theory onto the unverified transactions in the system. To utilize a probabilistic model for the pulsed injection of transactions, we calibrate the optimum pulsed transaction injection batch size to ensure equilibrium and optimal performance of the system.
Recommended citation: Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge Novillo, Sam Sengupta, Ali Tekeoglu, "A Probabilistic Model of Periodic Pulsed Transaction Injection" CSNet2018, October 24-26, Paris. France.
Published in 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Taichung, Taiwan, 2018
Abstract: To keep a cryptocurrency system at its optimal performance, it is necessary to utilize the resources and avoid latency in its network. To achieve this goal, dynamically and efficiently injecting the unverified transactions to enable synchronicity based on the current system configuration and the traffic of the network is crucial. To meet this need, we design the pulsed transaction injection parameterization (PTIP) protocol to provide a preliminary dynamic injection mechanism. To further assist the network to achieve its subgoals based on various house policies (such as maximal revenue to the network or maximum throughput of the system), we turn the house policy based optimization as a 0/1 knapsack problem. To efficiently solve these NP-hard problems, we adapt and improve a fully polynomial time approximation scheme (FPTAS) and dynamic programming as components in our approximate optimization algorithm.
Recommended citation: Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge Novillo, Sam Sengupta, Ali Tekeoglu, "Parameterized Pulsed Transaction Injection Computation Model And Performance Optimizer For IOTA-Tango", The 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC'18), October 27, 2018, Taichung, Taiwan.
Published in 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Taichung, Taiwan, 2018
Abstract: Distributed ledger technologies have a central problem that involves the latency. When transactions are to be accepted in the ledger, latency is incurred due to transaction processing and verification. For efficient systems, high latency should be avoided for the governance of the ledger. To help reduce latency, we offer a distributed ledger architecture, Tango, that mimics the Iota-tangle design as articulated by Popov in his seminal paper. We introduce a semi-synchronous transaction entry protocol layer to avoid asynchronicity in the system since an asynchronous system has a high latency. We further model periodic pulsed injections into the evaluation layer from the entry layer to regulate the performance of the system.
Recommended citation: Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge Novillo, Sam Sengupta, Ali Tekeoglu, "Semi-Synchronocity Enabling Protocol and Pulsed Injection Protocol for a Distributed Ledger System", The 13th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC'18), October 27, 2018, Taichung, Taiwan.
Published in The 18th International Conference on Electronics, Information, and Communication (ICEIC 2019), Jan 22-25 2019, Auckland, New Zealand, 2019
Abstract: Internet of Things devices have spread to near ubiquity this decade. All around us now lies an invisible mesh of communication from devices embedded in seemingly everything. Inevitably some of that communication flying around our heads will contain data that must be protected or otherwise shielded from tampering. The responsibility to protect this sensitive information from malicious actors as it travels through the air then falls upon the standards used to communicate this data. Bluetooth Low Energy (BLE) is one of these standards, the aim of this paper is to put its security standards to test. By attempting to exploit its vulnerabilities we can see how secure this standard really is. In this paper, we present steps for analyzing the security of BLE devices using open-source hardware and software.
Recommended citation: Seth Sevier, Ali Tekeoglu, "Analyzing the Security of Bluetooth Low Energy", The 18th International Conference on Electronics, Information, and Communication (ICEIC 2019), Jan 22-25 2019, Auckland, New Zealand.
Published in The 26th International Conference on Telecommunications (ICT 2019), April 8-10 2019, Hanoi, Vietnam, 2019
Abstract: Products that are connected and controlled remotely via the Internet are becoming more prevalent, and as a result, homes and businesses have ever increasing attack surfaces on their networks. To raise the standard of security, companies need more ways to automate testing of the most commonly found issues with IoT devices against their products. The creation of an automated security testing framework, such as Artorias, allows companies to automate the process of finding easy to identify problems, saving time for more advanced and manual processes of security and functional testing on a product. To show the framework’s stability and reliability, things such as proper coding standards should be adhered to, proper management of the project should be present, and unit-tests or code coverage of the framework should be created and maintained. This ongoing project bridges together the principles of security and proper planning and development of a larger programming effort. In this paper, we introduce the IoT Security Testing Framework Artorias, and present an extensible framework that interested research community members can extend for more coverage on privacy and security issues of IoT devices.
Recommended citation: Bryer Jeannotte, Ali Tekeoglu, "Artorias: IoT Security Testing Framework", The 26th International Conference on Telecommunications (ICT 2019), Apr 8-10 2019, Hanoi, Vietnam.
Published:
This is a description of your talk, which is a markdown files that can be all markdown-ified like any other post. Yay markdown!
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, SUNY Poly, Network Computer Security Department, 2016
In this course we learn to recognize hackers’ tracks and uncover network-based evidence. We investigate methods to carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspects’ web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.
Graduate course (M.S.), SUNY Poly, Network Computer Security Department, 2016
This was a Special Topic course, covers the emerging topic of Internet-of-Things (IoT) and it’s (in)security. In the first half of the semester, we cover the chapters from the required textbook such as: IoT uses, IoT in the Enterprise, IoT Vulnerabilities, Attacks and Countermeasures, etc. Since it is a Masters level course, in the remaining time we will read, review and present academic papers in the class. We will also have a final (group) project which will investigate a specific IoT device’s security and present a report.