
Dhammika ElkaduweUniversity of Peradeniya | UOP · Department of Computer Engineering
Dhammika Elkaduwe
PhD, UNSW
About
24
Publications
17,918
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,654
Citations
Introduction
Additional affiliations
May 2002 - present
Publications
Publications (24)
Today’s network transactions are usually handled using kernel-based network protocols residing on general-purpose processors (GPPs). Over time, network transmission speeds have developed rapidly without a corresponding increase in processing speeds of host processors. With devices featuring advanced connectivity and Internet functionality, protocol...
Foreground estimation through background subtraction is used to identify the region of interest in a video sequence, and is incorporated in many algorithmic pipelines as a preprocessing step.
Foreground estimation plays an important role in a wide range of computer vision and image processing applications such as video surveillance, object detectio...
Experimental results of Cache Optimization Techniques for General Purpose Graphics Processing Units
Compute Unified Device Architecture (CUDA) is an attractive alternative for our ever growing need for high performance computing. However to extract the full potential of CUDA one should, at the least be familiar with the programming model and should have a fair understanding of the memory and the cache architecture. Yet most of the domain experts...
General Purpose Graphic Processing Unit(GPGPU) is used widely for achieving high performance or high throughput in parallel programming. This capability of GPGPUs is very famous in the new era and mostly used for scientific computing which requires more processing power than normal personal computers. Therefore, most of the programmers, researchers...
The Aho-Corasick algorithm is multiple patterns searching algorithm running sequentially in various applications like network intrusion detection and bioinformatics for finding several input strings within a given large input string. The parallel version of the Aho-Corasick algorithm is called as Parallel Failure-less Aho-Corasick algorithm because...
Kernel-based network protocol implementation has led to major performance limitations in high-performance networking owing to excessive transaction latencies. Designing such protocols in reconfigurable hardware such as FPGA has been attempted to overcome these limitations. The use of reconfigurable hardware is needed in the development phase and co...
String matching is an important part in today's computer applications and
Aho-Corasick algorithm is one of the main string matching algorithms used to
accomplish this. This paper discusses that when can the GPUs be used for string
matching applications using the Aho-Corasick algorithm as a benchmark. We have
to identify the best unit to run our str...
The ability to reduce power consumption of a device is attractive for several reasons. On one hand, reducing power in high end computers will reduce the cost of cooling and the performance loss due to overheating cores. On the other hand, ubiquitous battery powered devices will enjoy a longer battery life due to the reduction in power consumption....
A Byzantine fault is a failure that cannot be identified by observing the output of a component; the component produces a wrong result as opposed to not producing a result at all or producing a result that can be identified as wrong. Such faults may be caused by a number of causes including software bugs and malicious attacks. Tolerating such fault...
Rijndael was standardized in 2001 by National Institute of Standard and Technology as the Advanced Encryption Standard (AES). AES is still being used to encrypt financial, military and even government confidential data. In 2005, Bernstein illustrated a remote cache timing attack on AES using the client-server architecture and therefore proved a sid...
Introduction Telepresence [4] is an extension of Robotic Technology which allows a person to appear or present at a separate location virtually. In 1980s, the study of using robots to represent a person has started and in early 1990s similar kind of Telepresence robots were available. As the other kinds of robots, the Telepresence Robots are now co...
We report on the formal, machine-checked verication of the seL4 microkernel from an abstract specication down to its C implementation. We assume correctness of compiler, assembly code, hardware, and boot code. seL4 is a third-generation microkernel of L4 provenance, comprising 8,700 lines of C and 600 lines of assembler. Its performance is comparab...
This paper presents a machine-checked high-level security analysis of seL4 — an evolution of the L4 kernel series targeted to secure, embedded devices. We provide an abstract specification of the seL4 access control system in terms of a classical take-grant model together with a formal proof of its decidability. Using the decidability property we s...
Complete formal verification is the only known way to guarantee that a system is free of programming errors. We present our experience in performing the formal, machine-checked verification of the seL4 microkernel from an abstract specification down to its C implementation. We assume correctness of compiler, assembly code, and hardware, and we used...
This paper presents a machine-checked high-level security analysis of seL4—an evolution of the L4 kernel series targeted to secure, embedded devices. We provide an abstract specification of the seL4 access control system together with a formal proof that shows how confined subsystems can be enforced. All proofs and specifications in this paper are...
Embedded systems are evolving into increasingly complex software systems. One approach to managing this software complexity is to divide the system into smaller, tractable components and provide strong isolation guarantees between them. This paper focuses on one aspect of the system's behaviour that is critical to any such guarantee: management of...
High-end embedded systems featuring millions of lines of code, with varying degrees of assurance, are becom- ing commonplace. These devices are typically expected to meet diverse application requirements within tight re- source budgets. Their growing complexity makes it in- creasingly difficult to ensure that they are secure and robust. One approac...
Kernel memory is a resource that must be managed care- fully in order to ensure the efficiency and availability of the system. The use of an inappropriate policy would lead to suboptimal performance and even make the sys- tem susceptible to denial of service attacks. In this paper, we argue that user-level managers, with their domain specific knowl...
Projects
Projects (3)
Find suitable cache optimization techniques for GPGPUs' architectures.