Novak Boškov
YOU?
Author Swipe
View article: A Ranking Framework for Network Resource Allocation and Scheduling via Hypergraphs
A Ranking Framework for Network Resource Allocation and Scheduling via Hypergraphs Open
Resource allocation and scheduling are a common problem in various distributed systems. Although widely studied, the state-of-the-art solutions either do not scale or lack the expressive power to capture the most complex instances of the p…
View article: Out‐of‐band transaction pool sync for large dynamic blockchain networks
Out‐of‐band transaction pool sync for large dynamic blockchain networks Open
Synchronization of transaction pools ( mempools ) has shown potential for improving the performance and block propagation delay of state‐of‐the‐art blockchains. Indeed, various heuristics have been proposed in the literature to incorporate…
View article: Enabling Cost-Benefit Analysis of Data Sync Protocols
Enabling Cost-Benefit Analysis of Data Sync Protocols Open
The problem of data synchronization arises in networked applications that require some measure of consistency. Indeed data synchronization approaches have demonstrated a significant potential for improving performance in various applicatio…
View article: SREP: Out-Of-Band Sync of Transaction Pools for Large-Scale Blockchains
SREP: Out-Of-Band Sync of Transaction Pools for Large-Scale Blockchains Open
Synchronization of transaction pools (mempools) has shown potential for improving the performance and block propagation delay of state-of-the-art blockchains. Indeed, various heuristics have been proposed in the literature to this end, all…
View article: Automated Exposure Notification for COVID-19.
Automated Exposure Notification for COVID-19. Open
In the current COVID-19 pandemic, various Automated Exposure Notification (AEN) systems have been proposed to help quickly identify potential contacts of infected individuals. All these systems try to leverage the current understanding of …
View article: Drndalo: Lightweight Control Flow Obfuscation Through Minimal Processor/Compiler Co-Design
Drndalo: Lightweight Control Flow Obfuscation Through Minimal Processor/Compiler Co-Design Open
Binary analysis is traditionally used in the realm of malware detection. However, the same technique may be employed by an attacker to analyze the original binaries in order to reverse engineer them and extract exploitable weaknesses. When…
View article: Security Threats in Approximate Computing Systems
Security Threats in Approximate Computing Systems Open
Approximate computing systems improve energy efficiency and computation speed at the cost of reduced accuracy on system outputs. Existing efforts mainly explore the feasible approximation mechanisms and their implementation methods. There …
View article: CodeTrolley: Hardware-Assisted Control Flow Obfuscation
CodeTrolley: Hardware-Assisted Control Flow Obfuscation Open
Many cybersecurity attacks rely on analyzing a binary executable to find exploitable sections of code. Code obfuscation is used to prevent attackers from reverse engineering these executables. In this work, we focus on control flow obfusca…