Matches in DBpedia 2015-10 for { <http://dbpedia.org/resource/Parasitic_computing> ?p ?o }
Showing triples 1 to 68 of
68
with 100 triples per page.
- Parasitic_computing abstract "Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program.It was first proposed by Albert-Laszlo Barabasi, Vincent W. Freeh, Hawoong Jeong & Jay B. Brockman from University of Notre Dame, Indiana, USA, in 2001. The example given by the original paper was two computers communicating over the Internet, under disguise of a standard communications session. The first computer is attempting to solve a large and extremely difficult 3-SAT problem; it has decomposed the original 3-SAT problem in a considerable number of smaller problems. Each of these smaller problems is then encoded as a relation between a checksum and a packet such that whether the checksum is accurate or not is also the answer to that smaller problem. The packet/checksum is then sent to another computer. This computer will, as part of receiving the packet and deciding whether it is valid and well-formed, create a checksum of the packet and see whether it is identical to the provided checksum. If the checksum is invalid, it will then request a new packet from the original computer. The original computer now knows the answer to that smaller problem based on the second computer's response, and can transmit a fresh packet embodying a different sub-problem. Eventually, all the sub-problems will be answered and the final answer easily calculated.The example is based on an exploit of the Transmission Control Protocol (TCP), used for internet connections, so in the end, the target computer(s) is unaware that it has performed computation for the benefit of the other computer, or even done anything besides have a normal TCP/IP session.The proof-of-concept is obviously extremely inefficient as the amount of computation necessary to merely send the packets in the first place easily exceeds the computations leeched from the other program; and the 3-SAT problem would be solved much more quickly if just analyzed locally. In addition, in practice packets would probably have to be retransmitted occasionally when real checksum errors and network problems occur. However, parasitic computing on the level of checksums is a demonstration of the concept. The authors suggest that as one moves up the application stack, there might come a point where there is a net computational gain to the parasite - perhaps one could break down interesting problems into queries of complex cryptographic protocols using public keys. If there was a net gain, one could in theory use a number of control nodes for which many hosts on the Internet form a distributed computing network completely unawares.Students of the University of Applied Sciences, Bern, Switzerland, extended this concept into a programmable virtual machine in 2002.".
- Parasitic_computing wikiPageID "23985".
- Parasitic_computing wikiPageLength "6398".
- Parasitic_computing wikiPageOutDegree "29".
- Parasitic_computing wikiPageRevisionID "676215152".
- Parasitic_computing wikiPageWikiLink 3-SAT.
- Parasitic_computing wikiPageWikiLink Adware.
- Parasitic_computing wikiPageWikiLink Application-specific_integrated_circuit.
- Parasitic_computing wikiPageWikiLink Application_stack.
- Parasitic_computing wikiPageWikiLink Bitcoin.
- Parasitic_computing wikiPageWikiLink Boolean_satisfiability_problem.
- Parasitic_computing wikiPageWikiLink CUDA.
- Parasitic_computing wikiPageWikiLink Category:Computer_security.
- Parasitic_computing wikiPageWikiLink Category:Distributed_computing_architecture.
- Parasitic_computing wikiPageWikiLink Category:Models_of_computation.
- Parasitic_computing wikiPageWikiLink Central_Processing_Unit.
- Parasitic_computing wikiPageWikiLink Central_processing_unit.
- Parasitic_computing wikiPageWikiLink Checksum.
- Parasitic_computing wikiPageWikiLink Cryptocurrency.
- Parasitic_computing wikiPageWikiLink Cryptographic_protocol.
- Parasitic_computing wikiPageWikiLink Denial-of-service_attack.
- Parasitic_computing wikiPageWikiLink Denial_of_service_attack.
- Parasitic_computing wikiPageWikiLink Distributed_computing.
- Parasitic_computing wikiPageWikiLink EULA.
- Parasitic_computing wikiPageWikiLink End-user_license_agreement.
- Parasitic_computing wikiPageWikiLink Field-programmable_gate_array.
- Parasitic_computing wikiPageWikiLink Graphics_processing_unit.
- Parasitic_computing wikiPageWikiLink Internet.
- Parasitic_computing wikiPageWikiLink Internet_protocol_suite.
- Parasitic_computing wikiPageWikiLink Java_(programming_language).
- Parasitic_computing wikiPageWikiLink Malware.
- Parasitic_computing wikiPageWikiLink Network_packet.
- Parasitic_computing wikiPageWikiLink OpenCL.
- Parasitic_computing wikiPageWikiLink Packet_(information_technology).
- Parasitic_computing wikiPageWikiLink Public-key_cryptography.
- Parasitic_computing wikiPageWikiLink Public_key_cryptography.
- Parasitic_computing wikiPageWikiLink IP.
- Parasitic_computing wikiPageWikiLink Transmission_Control_Protocol.
- Parasitic_computing wikiPageWikiLink Virtual_machine.
- Parasitic_computing wikiPageWikiLink Well-formed_element.
- Parasitic_computing wikiPageWikiLink Yahoo.
- Parasitic_computing wikiPageWikiLink Yahoo!.
- Parasitic_computing wikiPageWikiLinkText "Parasitic computing".
- Parasitic_computing hasPhotoCollection Parasitic_computing.
- Parasitic_computing wikiPageUsesTemplate Template:More_footnotes.
- Parasitic_computing wikiPageUsesTemplate Template:Reflist.
- Parasitic_computing subject Category:Computer_security.
- Parasitic_computing subject Category:Distributed_computing_architecture.
- Parasitic_computing subject Category:Models_of_computation.
- Parasitic_computing hypernym Technique.
- Parasitic_computing type Area.
- Parasitic_computing type Article.
- Parasitic_computing type Model.
- Parasitic_computing type Software.
- Parasitic_computing type Area.
- Parasitic_computing type Article.
- Parasitic_computing type Method.
- Parasitic_computing type Model.
- Parasitic_computing comment "Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program.It was first proposed by Albert-Laszlo Barabasi, Vincent W. Freeh, Hawoong Jeong & Jay B.".
- Parasitic_computing label "Parasitic computing".
- Parasitic_computing sameAs Computación_parasitaria.
- Parasitic_computing sameAs Calcul_parasitaire.
- Parasitic_computing sameAs Calcolo_parassita.
- Parasitic_computing sameAs m.05_26.
- Parasitic_computing sameAs Q1054130.
- Parasitic_computing sameAs Q1054130.
- Parasitic_computing wasDerivedFrom Parasitic_computing?oldid=676215152.
- Parasitic_computing isPrimaryTopicOf Parasitic_computing.