An energy-efficient domain-specific architecture for regular expressions

D Conficconi, E Del Sozzo, F Carloni… - … on Emerging Topics …, 2022 - ieeexplore.ieee.org
Regular Expressions (REs) are a computational kernel widely used for finding patterns in
data in compute-intensive tasks such as genomic markers research, signature-based …

Cicero: A domain-specific architecture for efficient regular expression matching

D Parravicini, D Conficconi, ED Sozzo… - ACM Transactions on …, 2021 - dl.acm.org
Regular Expression (RE) matching is a computational kernel used in several applications.
Since RE complexity and data volumes are steadily increasing, hardware acceleration is …

Pattern Matching in YARA: Improved Aho-Corasick Algorithm

D Regéciová, D Kolář, M Milkovič - IEEE Access, 2021 - ieeexplore.ieee.org
YARA is a tool for pattern matching used by malware analysts all over the world. YARA can
scan files, as well as process memory. It allows us to define sequences of symbols as text …

[PDF][PDF] Xilinx all programmable devices: A superior platform for compute-intensive systems

C Murphy, Y Fu - Xilinx White Paper, 2017 - fpga.eetrend.com
To keep pace with the growing demand for data processing, tomorrow's systems require a
step change in compute capability. Yesterday's solutions (eg, x86 processors) can no longer …

Role of YARA Tool in Intrusion Detection Systems (IDS)

RH Mahdi, H Trabelsi - 2022 Fifth College of Science …, 2022 - ieeexplore.ieee.org
Computer scientists are studying intrusion detection systems due to rising network
throughput and security threatsthat the network may be exposed to as a result of external …

On the role of reconfigurable systems in domain-specific computing

D Conficconi - 2021 - politesi.polimi.it
Computer architectures field is facing technological and architectural obstacles that are
limiting the general-purpose processor scaling in the delivered performance at a reasonable …

[PDF][PDF] An Optimized Multi-Character Pattern Matching Circuit For Network Intrusion Detection Systems

B Modi, G Tripp - academia.edu
There are various kinds of Network attacks often identifiable by the patterns of data they
contain. More complex regular expressions that express these patterns need to be matched …