Matej Trampus - Academia.edu (original) (raw)

Papers by Matej Trampus

Research paper thumbnail of Uporaba Pametnih Kartic

Research paper thumbnail of Simplifying multimedia applications development by introducing multicast extensions to COM

Because of its object-oriented approach, extensibility and flexibility, COM can be effectively us... more Because of its object-oriented approach, extensibility and flexibility, COM can be effectively used for developing dynamic, component based, distributed applications. Using COM as a platform for building such applications, researchers and developers can concentrate on important issues specific to their applications instead of devoting a significant portion of their efforts to building supporting infrastructure. However, COM currently lacks support for

Research paper thumbnail of Software Testing and Security: Attacking End Users' Applications by Run Time Modifications

Research paper thumbnail of Message Routing In Pure Peer-To-Peer Networks

Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architectu... more Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architecture, typically without hierarchy. Often, flooding-based routing mechanisms are used for sending messages through the overlay (application level) network. Due to the limited scalability and high network load experiences, the paper suggests an improvement to reduce the traffic and overall performance: if a peer remembers recently forwarded answers, it may route the next query messages asking about the same contents only to the relevant neighbour, not to all of them. The routing simulations have shown promising results.

Research paper thumbnail of Towards empirical evaluation of test-driven development in a university environment

The IEEE Region 8 EUROCON 2003. Computer as a Tool.

... but also took 16% evaluated different working environments and tools suitable more the as the... more ... but also took 16% evaluated different working environments and tools suitable more the as the There was a modest for TDD-like agile iterative development 191. Students all correlation between time spent and achieved external quality. ...

Research paper thumbnail of Uveljavljanje varnostnih politik med izvajanjem komponentno izgrajenih aplikacij

Research paper thumbnail of Uporaba Pametnih Kartic

Research paper thumbnail of Simplifying multimedia applications development by introducing multicast extensions to COM

Because of its object-oriented approach, extensibility and flexibility, COM can be effectively us... more Because of its object-oriented approach, extensibility and flexibility, COM can be effectively used for developing dynamic, component based, distributed applications. Using COM as a platform for building such applications, researchers and developers can concentrate on important issues specific to their applications instead of devoting a significant portion of their efforts to building supporting infrastructure. However, COM currently lacks support for

Research paper thumbnail of Software Testing and Security: Attacking End Users' Applications by Run Time Modifications

Research paper thumbnail of Message Routing In Pure Peer-To-Peer Networks

Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architectu... more Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architecture, typically without hierarchy. Often, flooding-based routing mechanisms are used for sending messages through the overlay (application level) network. Due to the limited scalability and high network load experiences, the paper suggests an improvement to reduce the traffic and overall performance: if a peer remembers recently forwarded answers, it may route the next query messages asking about the same contents only to the relevant neighbour, not to all of them. The routing simulations have shown promising results.

Research paper thumbnail of Towards empirical evaluation of test-driven development in a university environment

The IEEE Region 8 EUROCON 2003. Computer as a Tool.

... but also took 16% evaluated different working environments and tools suitable more the as the... more ... but also took 16% evaluated different working environments and tools suitable more the as the There was a modest for TDD-like agile iterative development 191. Students all correlation between time spent and achieved external quality. ...

Research paper thumbnail of Distributed message routing in unstructured P2P network overlays

The IEEE Region 8 EUROCON 2003. Computer as a Tool.

Research paper thumbnail of Uporaba pametnih kartic za varno hranjenje dokumentov

... Nato pošlje še APDU za kreiranje in zagon, nakar se program¥ ek lahko kadarkoli uporablja. Pr... more ... Nato pošlje še APDU za kreiranje in zagon, nakar se program¥ ek lahko kadarkoli uporablja. Program¥ ki (appleti) se obi¥ ajno na kartico naložijo in zaženejo med procesom personalizacije. Lastnik kartice varno shranjuje datoteke v preprost datote¥ ni sistem kartice. ...

Research paper thumbnail of Distributed message routing in unstructured P2P network overlays

The IEEE Region 8 EUROCON 2003. Computer as a Tool.

Research paper thumbnail of Content Networks: Distributed Routing Decisions in Presence of Repeated Queries

International Journal of Foundations of Computer Science, 2004

Content networks are overlay networks, enabling access to distributed contents on centralized ser... more Content networks are overlay networks, enabling access to distributed contents on centralized servers or individual computers. Since flooding-based routing scheme features poor scalability, we present a modification, which reduces the total network traffic while retaining the original efficiency. In choosy routing, as we call it, each node, while passing an answer, remembers which neighbor it came from. Subsequently repeated queries about the same content are forwarded only to that neighbor. This way, the network learns effective routes. The simulations on several topology types have shown the expected behavior, with up to three-fold reduction in the overall query traffic.

Research paper thumbnail of Are e-commerce users defenceless?

Proceedings International Parallel and Distributed Processing Symposium

We are interested in new ways of threats and attack on the e-commerce. The server side of e-comme... more We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is not true for the client side. End users are usually undereducated in the field of computer security. They use internet clients such as web browsers and e-mail programs to do their e-commerce business. Their platform that is used to run these programs can hardly be trusted. This paper focuses on the attacks on system and application infrastructure. Main idea of our approach is to take advantage of existing applications and attack them while they are executing. We analyze the steps that need to be taken in such attacks and point out the properties of the applications and execution environments that can be exploited. To demonstrate the findings, we present two case studies of such attacks. The first exploits a web browser which uses SSL (Secure Sockets Layer) and the second an email client which uses digital signatures. In both cases we are able to successfully perform the attack which escapes the end user's notice. In the final part of the paper we present possible defence against such attack together with our work on security enforcement system.

Research paper thumbnail of Uporaba Pametnih Kartic

Research paper thumbnail of Simplifying multimedia applications development by introducing multicast extensions to COM

Because of its object-oriented approach, extensibility and flexibility, COM can be effectively us... more Because of its object-oriented approach, extensibility and flexibility, COM can be effectively used for developing dynamic, component based, distributed applications. Using COM as a platform for building such applications, researchers and developers can concentrate on important issues specific to their applications instead of devoting a significant portion of their efforts to building supporting infrastructure. However, COM currently lacks support for

Research paper thumbnail of Software Testing and Security: Attacking End Users' Applications by Run Time Modifications

Research paper thumbnail of Message Routing In Pure Peer-To-Peer Networks

Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architectu... more Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architecture, typically without hierarchy. Often, flooding-based routing mechanisms are used for sending messages through the overlay (application level) network. Due to the limited scalability and high network load experiences, the paper suggests an improvement to reduce the traffic and overall performance: if a peer remembers recently forwarded answers, it may route the next query messages asking about the same contents only to the relevant neighbour, not to all of them. The routing simulations have shown promising results.

Research paper thumbnail of Towards empirical evaluation of test-driven development in a university environment

The IEEE Region 8 EUROCON 2003. Computer as a Tool.

... but also took 16% evaluated different working environments and tools suitable more the as the... more ... but also took 16% evaluated different working environments and tools suitable more the as the There was a modest for TDD-like agile iterative development 191. Students all correlation between time spent and achieved external quality. ...

Research paper thumbnail of Uveljavljanje varnostnih politik med izvajanjem komponentno izgrajenih aplikacij

Research paper thumbnail of Uporaba Pametnih Kartic

Research paper thumbnail of Simplifying multimedia applications development by introducing multicast extensions to COM

Because of its object-oriented approach, extensibility and flexibility, COM can be effectively us... more Because of its object-oriented approach, extensibility and flexibility, COM can be effectively used for developing dynamic, component based, distributed applications. Using COM as a platform for building such applications, researchers and developers can concentrate on important issues specific to their applications instead of devoting a significant portion of their efforts to building supporting infrastructure. However, COM currently lacks support for

Research paper thumbnail of Software Testing and Security: Attacking End Users' Applications by Run Time Modifications

Research paper thumbnail of Message Routing In Pure Peer-To-Peer Networks

Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architectu... more Pure peer-to-peer systems are loosely coupled, highly autonomous systems with a simple architecture, typically without hierarchy. Often, flooding-based routing mechanisms are used for sending messages through the overlay (application level) network. Due to the limited scalability and high network load experiences, the paper suggests an improvement to reduce the traffic and overall performance: if a peer remembers recently forwarded answers, it may route the next query messages asking about the same contents only to the relevant neighbour, not to all of them. The routing simulations have shown promising results.

Research paper thumbnail of Towards empirical evaluation of test-driven development in a university environment

The IEEE Region 8 EUROCON 2003. Computer as a Tool.

... but also took 16% evaluated different working environments and tools suitable more the as the... more ... but also took 16% evaluated different working environments and tools suitable more the as the There was a modest for TDD-like agile iterative development 191. Students all correlation between time spent and achieved external quality. ...

Research paper thumbnail of Distributed message routing in unstructured P2P network overlays

The IEEE Region 8 EUROCON 2003. Computer as a Tool.

Research paper thumbnail of Uporaba pametnih kartic za varno hranjenje dokumentov

... Nato pošlje še APDU za kreiranje in zagon, nakar se program¥ ek lahko kadarkoli uporablja. Pr... more ... Nato pošlje še APDU za kreiranje in zagon, nakar se program¥ ek lahko kadarkoli uporablja. Program¥ ki (appleti) se obi¥ ajno na kartico naložijo in zaženejo med procesom personalizacije. Lastnik kartice varno shranjuje datoteke v preprost datote¥ ni sistem kartice. ...

Research paper thumbnail of Distributed message routing in unstructured P2P network overlays

The IEEE Region 8 EUROCON 2003. Computer as a Tool.

Research paper thumbnail of Content Networks: Distributed Routing Decisions in Presence of Repeated Queries

International Journal of Foundations of Computer Science, 2004

Content networks are overlay networks, enabling access to distributed contents on centralized ser... more Content networks are overlay networks, enabling access to distributed contents on centralized servers or individual computers. Since flooding-based routing scheme features poor scalability, we present a modification, which reduces the total network traffic while retaining the original efficiency. In choosy routing, as we call it, each node, while passing an answer, remembers which neighbor it came from. Subsequently repeated queries about the same content are forwarded only to that neighbor. This way, the network learns effective routes. The simulations on several topology types have shown the expected behavior, with up to three-fold reduction in the overall query traffic.

Research paper thumbnail of Are e-commerce users defenceless?

Proceedings International Parallel and Distributed Processing Symposium

We are interested in new ways of threats and attack on the e-commerce. The server side of e-comme... more We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is not true for the client side. End users are usually undereducated in the field of computer security. They use internet clients such as web browsers and e-mail programs to do their e-commerce business. Their platform that is used to run these programs can hardly be trusted. This paper focuses on the attacks on system and application infrastructure. Main idea of our approach is to take advantage of existing applications and attack them while they are executing. We analyze the steps that need to be taken in such attacks and point out the properties of the applications and execution environments that can be exploited. To demonstrate the findings, we present two case studies of such attacks. The first exploits a web browser which uses SSL (Secure Sockets Layer) and the second an email client which uses digital signatures. In both cases we are able to successfully perform the attack which escapes the end user's notice. In the final part of the paper we present possible defence against such attack together with our work on security enforcement system.