SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
Researcher : Chatsiri Ratana
  Master’s degree in computer engineering.




                Optimizing Clam-Antivirus for GPU

Kasetsart University, Faculty of Computer Engineering.
Agenda
• Introduction
   • What Clam Antivirus & GPU?
   • Why optimized Clam Antivirus for GPU?
• Related Work
   • Understanding antivirus
   • Kindling of String Matching Algorithms for support Clam
     Antivirus.
• Hybrid Parallel Signature Scanning methods.
   • Kindling optimized for supporting GPU
What Clam Antivirus & GPU?
 • Clam AntiVirus( Clam AV)
    • Antivirus signature database.
    • Signature types are hexadecimal ,MD5 and regular expression signatures
      by third of major types for scanning.
    • Available with e-mail proxies and file servers.
    • ClamAV uses an optimized version of the Boyer-Moore and Aho-Corasick
        • Bayer-Moore algorithm to detect non-polymorphic viruses using simple fixed
          string signature.
        • Aho-Corasick algorithm to detect polymorphic viruses.

 • GPU( Graphics Processing Unit )
    • Flexible stream processors operating on SIMD( Single Instruction Multiple
      Data).
    • Specialized for computationally-intensive and highly parallel operation.
    • Fast shared memory is managed explicitly by the programmer among
      thread block.
Why optimized Clam Antivirus for GPU?
  • ClamAV using string matching concepts.
     • Boyer-Moore
     • Aho-Corasick
  • GPU( Graphics Processing Unit )
     • Supporting Parallel operations(CUDA, OpenCL).
     • Higher data transfer bandwidth.
     • Supporting Library programming.
     •    Multiprocessor consists in eight stream processors, operating on a SIMD
         fashion.
     • Why use GPU instead CPU?
Understanding antivirus
• Signature Bases
   • Type of signature base
       • Hexadecimal
       • MD5
       • Regular expression.
• Algorithms
   • Bayer-Moore algorithm
   • Aho-Corasick algorithm
Structure of Clam AV

            Filtering                   Verification


File   File Buffer
                        Offset   Verification Module




             GPU
                                   Full viruses Signature
Kindling of String Matching Algorithms for
support Clam Antivirus.
• Algorithms
   • Bayer-Moore algorithm
   • Aho-Corasick algorithm
Bayer-Moore Algorithm

     -   -   -   -   A   MA N - - - - -         -   -
     A   N   P   A   N   MA N - - - - -         -   -
     -   A   N   P   A   N MA N - - - -         -   -
     -   -   A   N   P   A N MA N - - -         -   -
     -   -   -   A   N   P A N MA N - -         -   -
     -   -   -   -   A   N P A N MA N -         -   -
     -   -   -   -   -   A N P A N MA N         -   -
     -   -   -   -   -   - A N P A N MA         N

                         Bayer-Moore Algorithm, wikipeida.org
Aho-Corasick Algorithm


  Trojan.KU.MrDir.B = 40 6d 64 20 25 72 61 6e 64 6f 6d 25 ?? ?? 67 6f 6f


  1st stage           X X

   2nd stage
                      40 6d 64 20 25 72 61 6e 64 6f 6d 25 ?? ?? 67 6f 6f
Hybrid Parallel Signature Scanning
methods.
•   Kindling optimized for supporting GPU.
    •   Algorithms of String matching concept.
         •    Hybrid Parallel Signature Scanning.
    •   Memory
         •    GPU Memory management.
    •   I/O
         •    Optimized Hybrid Parallel Signature Scanning for I/O bound.

Contenu connexe

Similaire à Optimizing clam av for gpu 02

Understanding Quality of Experience of Heuristic-based HTTP Adaptive Bitrate ...
Understanding Quality of Experience of Heuristic-based HTTP Adaptive Bitrate ...Understanding Quality of Experience of Heuristic-based HTTP Adaptive Bitrate ...
Understanding Quality of Experience of Heuristic-based HTTP Adaptive Bitrate ...Alpen-Adria-Universität
 
Network Algorithmics
Network AlgorithmicsNetwork Algorithmics
Network Algorithmics인욱 황
 
A Survey Of Aspect Mining Approaches
A Survey Of Aspect Mining ApproachesA Survey Of Aspect Mining Approaches
A Survey Of Aspect Mining Approacheskim.mens
 
Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?Hacken_Ecosystem
 
Cloud Native Data Pipelines (in Eng & Japanese) - QCon Tokyo
Cloud Native Data Pipelines (in Eng & Japanese)  - QCon TokyoCloud Native Data Pipelines (in Eng & Japanese)  - QCon Tokyo
Cloud Native Data Pipelines (in Eng & Japanese) - QCon TokyoSid Anand
 
"Combining Flexibility and Low-Power in Embedded Vision Subsystems: An Applic...
"Combining Flexibility and Low-Power in Embedded Vision Subsystems: An Applic..."Combining Flexibility and Low-Power in Embedded Vision Subsystems: An Applic...
"Combining Flexibility and Low-Power in Embedded Vision Subsystems: An Applic...Edge AI and Vision Alliance
 
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protectionArpan Pal
 
Low Overhead System Tracing with eBPF
Low Overhead System Tracing with eBPFLow Overhead System Tracing with eBPF
Low Overhead System Tracing with eBPFAkshay Kapoor
 
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...chandra sekhar
 
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...chandra sekhar
 
It abbreviations
It abbreviationsIt abbreviations
It abbreviationsANJU A
 
Embedded computing platform design
Embedded computing platform designEmbedded computing platform design
Embedded computing platform designRAMPRAKASHT1
 
SunshinePHP 2017: Tales From The Crypt - A Cryptography Primer
SunshinePHP 2017: Tales From The Crypt - A Cryptography PrimerSunshinePHP 2017: Tales From The Crypt - A Cryptography Primer
SunshinePHP 2017: Tales From The Crypt - A Cryptography PrimerAdam Englander
 
Extent3 exactpro the_future_of_risk_controls
Extent3 exactpro the_future_of_risk_controlsExtent3 exactpro the_future_of_risk_controls
Extent3 exactpro the_future_of_risk_controlsextentconf Tsoy
 
Cryptographic Hardware Support for the Linux Kernel - Netconf 2004
Cryptographic Hardware Support for the Linux Kernel - Netconf 2004Cryptographic Hardware Support for the Linux Kernel - Netconf 2004
Cryptographic Hardware Support for the Linux Kernel - Netconf 2004James Morris
 
20110524zurichngs 1st pub
20110524zurichngs 1st pub20110524zurichngs 1st pub
20110524zurichngs 1st pubsesejun
 

Similaire à Optimizing clam av for gpu 02 (20)

Understanding Quality of Experience of Heuristic-based HTTP Adaptive Bitrate ...
Understanding Quality of Experience of Heuristic-based HTTP Adaptive Bitrate ...Understanding Quality of Experience of Heuristic-based HTTP Adaptive Bitrate ...
Understanding Quality of Experience of Heuristic-based HTTP Adaptive Bitrate ...
 
Network Algorithmics
Network AlgorithmicsNetwork Algorithmics
Network Algorithmics
 
Pcr primer design english version
Pcr primer design english versionPcr primer design english version
Pcr primer design english version
 
Imaging using ARM T6xx GPU
Imaging using ARM T6xx GPUImaging using ARM T6xx GPU
Imaging using ARM T6xx GPU
 
A Survey Of Aspect Mining Approaches
A Survey Of Aspect Mining ApproachesA Survey Of Aspect Mining Approaches
A Survey Of Aspect Mining Approaches
 
Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?
 
Cloud Native Data Pipelines (in Eng & Japanese) - QCon Tokyo
Cloud Native Data Pipelines (in Eng & Japanese)  - QCon TokyoCloud Native Data Pipelines (in Eng & Japanese)  - QCon Tokyo
Cloud Native Data Pipelines (in Eng & Japanese) - QCon Tokyo
 
"Combining Flexibility and Low-Power in Embedded Vision Subsystems: An Applic...
"Combining Flexibility and Low-Power in Embedded Vision Subsystems: An Applic..."Combining Flexibility and Low-Power in Embedded Vision Subsystems: An Applic...
"Combining Flexibility and Low-Power in Embedded Vision Subsystems: An Applic...
 
Wpmc2004 phy protection
Wpmc2004 phy protectionWpmc2004 phy protection
Wpmc2004 phy protection
 
Low Overhead System Tracing with eBPF
Low Overhead System Tracing with eBPFLow Overhead System Tracing with eBPF
Low Overhead System Tracing with eBPF
 
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
 
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
Captcha as-graphical-passwords---a-new-security-primitive-based-on-hard-ai-pr...
 
It abbreviations
It abbreviationsIt abbreviations
It abbreviations
 
Embedded computing platform design
Embedded computing platform designEmbedded computing platform design
Embedded computing platform design
 
rspamd-fosdem
rspamd-fosdemrspamd-fosdem
rspamd-fosdem
 
SunshinePHP 2017: Tales From The Crypt - A Cryptography Primer
SunshinePHP 2017: Tales From The Crypt - A Cryptography PrimerSunshinePHP 2017: Tales From The Crypt - A Cryptography Primer
SunshinePHP 2017: Tales From The Crypt - A Cryptography Primer
 
Pcr array 2013
Pcr array 2013Pcr array 2013
Pcr array 2013
 
Extent3 exactpro the_future_of_risk_controls
Extent3 exactpro the_future_of_risk_controlsExtent3 exactpro the_future_of_risk_controls
Extent3 exactpro the_future_of_risk_controls
 
Cryptographic Hardware Support for the Linux Kernel - Netconf 2004
Cryptographic Hardware Support for the Linux Kernel - Netconf 2004Cryptographic Hardware Support for the Linux Kernel - Netconf 2004
Cryptographic Hardware Support for the Linux Kernel - Netconf 2004
 
20110524zurichngs 1st pub
20110524zurichngs 1st pub20110524zurichngs 1st pub
20110524zurichngs 1st pub
 

Dernier

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Optimizing clam av for gpu 02

  • 1. Researcher : Chatsiri Ratana Master’s degree in computer engineering. Optimizing Clam-Antivirus for GPU Kasetsart University, Faculty of Computer Engineering.
  • 2. Agenda • Introduction • What Clam Antivirus & GPU? • Why optimized Clam Antivirus for GPU? • Related Work • Understanding antivirus • Kindling of String Matching Algorithms for support Clam Antivirus. • Hybrid Parallel Signature Scanning methods. • Kindling optimized for supporting GPU
  • 3. What Clam Antivirus & GPU? • Clam AntiVirus( Clam AV) • Antivirus signature database. • Signature types are hexadecimal ,MD5 and regular expression signatures by third of major types for scanning. • Available with e-mail proxies and file servers. • ClamAV uses an optimized version of the Boyer-Moore and Aho-Corasick • Bayer-Moore algorithm to detect non-polymorphic viruses using simple fixed string signature. • Aho-Corasick algorithm to detect polymorphic viruses. • GPU( Graphics Processing Unit ) • Flexible stream processors operating on SIMD( Single Instruction Multiple Data). • Specialized for computationally-intensive and highly parallel operation. • Fast shared memory is managed explicitly by the programmer among thread block.
  • 4. Why optimized Clam Antivirus for GPU? • ClamAV using string matching concepts. • Boyer-Moore • Aho-Corasick • GPU( Graphics Processing Unit ) • Supporting Parallel operations(CUDA, OpenCL). • Higher data transfer bandwidth. • Supporting Library programming. • Multiprocessor consists in eight stream processors, operating on a SIMD fashion. • Why use GPU instead CPU?
  • 5. Understanding antivirus • Signature Bases • Type of signature base • Hexadecimal • MD5 • Regular expression. • Algorithms • Bayer-Moore algorithm • Aho-Corasick algorithm
  • 6. Structure of Clam AV Filtering Verification File File Buffer Offset Verification Module GPU Full viruses Signature
  • 7. Kindling of String Matching Algorithms for support Clam Antivirus. • Algorithms • Bayer-Moore algorithm • Aho-Corasick algorithm
  • 8. Bayer-Moore Algorithm - - - - A MA N - - - - - - - A N P A N MA N - - - - - - - - A N P A N MA N - - - - - - - - A N P A N MA N - - - - - - - - A N P A N MA N - - - - - - - - A N P A N MA N - - - - - - - - A N P A N MA N - - - - - - - - A N P A N MA N Bayer-Moore Algorithm, wikipeida.org
  • 9. Aho-Corasick Algorithm Trojan.KU.MrDir.B = 40 6d 64 20 25 72 61 6e 64 6f 6d 25 ?? ?? 67 6f 6f 1st stage X X 2nd stage 40 6d 64 20 25 72 61 6e 64 6f 6d 25 ?? ?? 67 6f 6f
  • 10. Hybrid Parallel Signature Scanning methods. • Kindling optimized for supporting GPU. • Algorithms of String matching concept. • Hybrid Parallel Signature Scanning. • Memory • GPU Memory management. • I/O • Optimized Hybrid Parallel Signature Scanning for I/O bound.