Dhammika Elkaduwe

Dhammika Elkaduwe
University of Peradeniya | UOP · Department of Computer Engineering

PhD, UNSW

About

24
Publications
17,918
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,654
Citations
Additional affiliations
May 2002 - present
University of Peradeniya
Position
  • Professor (Associate)

Publications

Publications (24)
Conference Paper
Full-text available
Today’s network transactions are usually handled using kernel-based network protocols residing on general-purpose processors (GPPs). Over time, network transmission speeds have developed rapidly without a corresponding increase in processing speeds of host processors. With devices featuring advanced connectivity and Internet functionality, protocol...
Preprint
Full-text available
Foreground estimation through background subtraction is used to identify the region of interest in a video sequence, and is incorporated in many algorithmic pipelines as a preprocessing step. Foreground estimation plays an important role in a wide range of computer vision and image processing applications such as video surveillance, object detectio...
Presentation
Full-text available
Experimental results of Cache Optimization Techniques for General Purpose Graphics Processing Units
Conference Paper
Compute Unified Device Architecture (CUDA) is an attractive alternative for our ever growing need for high performance computing. However to extract the full potential of CUDA one should, at the least be familiar with the programming model and should have a fair understanding of the memory and the cache architecture. Yet most of the domain experts...
Conference Paper
Full-text available
General Purpose Graphic Processing Unit(GPGPU) is used widely for achieving high performance or high throughput in parallel programming. This capability of GPGPUs is very famous in the new era and mostly used for scientific computing which requires more processing power than normal personal computers. Therefore, most of the programmers, researchers...
Conference Paper
Full-text available
The Aho-Corasick algorithm is multiple patterns searching algorithm running sequentially in various applications like network intrusion detection and bioinformatics for finding several input strings within a given large input string. The parallel version of the Aho-Corasick algorithm is called as Parallel Failure-less Aho-Corasick algorithm because...
Conference Paper
Full-text available
Kernel-based network protocol implementation has led to major performance limitations in high-performance networking owing to excessive transaction latencies. Designing such protocols in reconfigurable hardware such as FPGA has been attempted to overcome these limitations. The use of reconfigurable hardware is needed in the development phase and co...
Article
Full-text available
String matching is an important part in today's computer applications and Aho-Corasick algorithm is one of the main string matching algorithms used to accomplish this. This paper discusses that when can the GPUs be used for string matching applications using the Aho-Corasick algorithm as a benchmark. We have to identify the best unit to run our str...
Article
Full-text available
The ability to reduce power consumption of a device is attractive for several reasons. On one hand, reducing power in high end computers will reduce the cost of cooling and the performance loss due to overheating cores. On the other hand, ubiquitous battery powered devices will enjoy a longer battery life due to the reduction in power consumption....
Article
A Byzantine fault is a failure that cannot be identified by observing the output of a component; the component produces a wrong result as opposed to not producing a result at all or producing a result that can be identified as wrong. Such faults may be caused by a number of causes including software bugs and malicious attacks. Tolerating such fault...
Conference Paper
Full-text available
Rijndael was standardized in 2001 by National Institute of Standard and Technology as the Advanced Encryption Standard (AES). AES is still being used to encrypt financial, military and even government confidential data. In 2005, Bernstein illustrated a remote cache timing attack on AES using the client-server architecture and therefore proved a sid...
Conference Paper
Full-text available
Introduction Telepresence [4] is an extension of Robotic Technology which allows a person to appear or present at a separate location virtually. In 1980s, the study of using robots to represent a person has started and in early 1990s similar kind of Telepresence robots were available. As the other kinds of robots, the Telepresence Robots are now co...
Article
Full-text available
We report on the formal, machine-checked verication of the seL4 microkernel from an abstract specication down to its C implementation. We assume correctness of compiler, assembly code, hardware, and boot code. seL4 is a third-generation microkernel of L4 provenance, comprising 8,700 lines of C and 600 lines of assembler. Its performance is comparab...
Article
Full-text available
This paper presents a machine-checked high-level security analysis of seL4 — an evolution of the L4 kernel series targeted to secure, embedded devices. We provide an abstract specification of the seL4 access control system in terms of a classical take-grant model together with a formal proof of its decidability. Using the decidability property we s...
Conference Paper
Full-text available
Complete formal verification is the only known way to guarantee that a system is free of programming errors. We present our experience in performing the formal, machine-checked verification of the seL4 microkernel from an abstract specification down to its C implementation. We assume correctness of compiler, assembly code, and hardware, and we used...
Conference Paper
Full-text available
This paper presents a machine-checked high-level security analysis of seL4—an evolution of the L4 kernel series targeted to secure, embedded devices. We provide an abstract specification of the seL4 access control system together with a formal proof that shows how confined subsystems can be enforced. All proofs and specifications in this paper are...
Article
Full-text available
Embedded systems are evolving into increasingly complex software systems. One approach to managing this software complexity is to divide the system into smaller, tractable components and provide strong isolation guarantees between them. This paper focuses on one aspect of the system's behaviour that is critical to any such guarantee: management of...
Article
Full-text available
High-end embedded systems featuring millions of lines of code, with varying degrees of assurance, are becom- ing commonplace. These devices are typically expected to meet diverse application requirements within tight re- source budgets. Their growing complexity makes it in- creasingly difficult to ensure that they are secure and robust. One approac...
Article
Full-text available
Kernel memory is a resource that must be managed care- fully in order to ensure the efficiency and availability of the system. The use of an inappropriate policy would lead to suboptimal performance and even make the sys- tem susceptible to denial of service attacks. In this paper, we argue that user-level managers, with their domain specific knowl...

Network

Cited By

Projects