Particle Swarm Optimization

Particle Swarm Optimization - Kennedy & Eberhart 1995 What do flocks of birds, schools of fish, ant colonies, bat echo-location, firefly flashlights, cuckoos, and flower-pollination all have in common? They've all inspired optimisation algorithms! I've been perusing Xin-She Yang's book on Nature-Inspired Optimization Algorithms and thought it might be fun to make a mini-series out … Continue reading Particle Swarm Optimization

Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade

Buffer Overflows: Attacks and Defenses for the Vulnerabilty of the Decade - Cowan et al. 2000 Some of you may recall reading "Smashing the Stack for Fun and Profit" (hard to believe that was published in 1996!), which helped to raise consciousness of buffer overflow attacks. In this paper from 2000 Cowan et al. provide … Continue reading Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade

Lessons Learned in Implementing and Deploying Crypto Software

Lessons Learned in Implementing and Deploying Crypto Software - Gutmann 2002 The author of today's paper, Peter Gutmann, is the developer of CryptLib, which gives him a unique perspective both in the development of crypto, and also in how people use it (from supporting the crypolib user base). The paper was written in 2002, so … Continue reading Lessons Learned in Implementing and Deploying Crypto Software

Mining your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Mining your Ps and Qs: Detection of Widespread Weak Keys in Network Devices - Heninger et al. 2012 This paper definitely wins the 'best pun in a paper title' prize. P and Q here refer to the factors that are multiplied together when generating your public and private key pairs. As for the mining? It … Continue reading Mining your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google’s Datacenter Network

Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google's Datacenter Network - Singh et. al (Google) 2015 Let's end the week with something completely different: a look at ten years and five generations of networking within Google's datacenters. Bandwidth demands within the datacenter are doubling every 12-15 months, even faster than the … Continue reading Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google’s Datacenter Network