翻訳と辞書
Words near each other
・ Parasite increased trophic transmission
・ Parasite load
・ Parasite Pig
・ Parasite Planet
・ Parasite single
・ Parasite!
・ Parasitellus
・ Parasitemia
・ Parasitengona
・ Parasites & Vectors
・ Parasites (band)
・ Parasites Like Us
・ Parasites Lost
・ Parasitic capacitance
・ Parasitic castration
Parasitic computing
・ Parasitic cone
・ Parasitic disease
・ Parasitic drag
・ Parasitic element (electrical networks)
・ Parasitic extraction
・ Parasitic gap
・ Parasitic jaeger
・ Parasitic life cycles
・ Parasitic load
・ Parasitic loss
・ Parasitic mass
・ Parasitic number
・ Parasitic nutrition
・ Parasitic oscillation


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Parasitic computing : ウィキペディア英語版
Parasitic computing

Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature. It is, in a sense, a security exploit in that the program implementing the parasitic computing has no authority to consume resources made available to the other program.
It was first proposed by Albert-Laszlo Barabasi, Vincent W. Freeh, Hawoong Jeong & Jay B. Brockman from University of Notre Dame, Indiana, USA, in 2001.〔(Parasitic Computing )〕 The example given by the original paper was two computers communicating over the Internet, under disguise of a standard communications session. The first computer is attempting to solve a large and extremely difficult 3-SAT problem; it has decomposed the original 3-SAT problem in a considerable number of smaller problems. Each of these smaller problems is then encoded as a relation between a checksum and a packet such that whether the checksum is accurate or not is also the answer to that smaller problem. The packet/checksum is then sent to another computer. This computer will, as part of receiving the packet and deciding whether it is valid and well-formed, create a checksum of the packet and see whether it is identical to the provided checksum. If the checksum is invalid, it will then request a new packet from the original computer. The original computer now knows the answer to that smaller problem based on the second computer's response, and can transmit a fresh packet embodying a different sub-problem. Eventually, all the sub-problems will be answered and the final answer easily calculated.
The example is based on an exploit of the Transmission Control Protocol (TCP), used for internet connections, so in the end, the target computer(s) is unaware that it has performed computation for the benefit of the other computer, or even done anything besides have a normal TCP/IP session.
The proof-of-concept is obviously extremely inefficient as the amount of computation necessary to merely send the packets in the first place easily exceeds the computations leeched from the other program; and the 3-SAT problem would be solved much more quickly if just analyzed locally. In addition, in practice packets would probably have to be retransmitted occasionally when real checksum errors and network problems occur. However, parasitic computing on the level of checksums is a demonstration of the concept. The authors suggest that as one moves up the application stack, there might come a point where there is a net computational gain to the parasite - perhaps one could break down interesting problems into queries of complex cryptographic protocols using public keys. If there was a net gain, one could in theory use a number of control nodes for which many hosts on the Internet form a distributed computing network completely unawares.
Students of the University of Applied Sciences, Bern, Switzerland, extended this concept into a programmable virtual machine in 2002.〔(Diploma thesis on Parasitic Computing )〕
==Parasitic Bitcoin mining==

In 2011, a group of malware programs were noticed by security software vendors,〔(Symantec spots malware that uses your GPU to mine Bitcoins )〕〔(Symantec: Trojan.Badminer )〕 which utilized high performance graphics processing units (GPUs) for Bitcoin mining, a chain of computationally intensive tasks to generate cryptocurrency units. These programs invaded systems and were executed like other malware, rather than exploiting underlying protocols. Powerful GPUs on personal computers were originally created mainly for games, but with interfaces like CUDA and OpenCL, became usable for general computing tasks, surpassing the performance of a Central Processing Unit (CPU) by multiple times.〔(All About Bitcoin Mining: Road To Riches Or Fool's Gold? )〕 Until then, parasitic computing lacked powerful computing resources and results to easily convert into cash for criminals.
In January 2014, Bitcoin mining malware was distributed through a Java exploit by compromised ads, displayed on the Yahoo website.〔(Yahoo malware turns Europeans' computers into Bitcoin slaves )〕 In 2013, Bitcoin mining malware was installed as adware alongside other downloads, some pointing out to the functionality in lengthy EULA texts.〔(Potentially Unwanted Miners - Toolbar Peddlers Use Your System To Make BTC )〕 Malware including Bitcoin mining functionality was also secretly downloaded and activated by adware bundled with regular software downloads, both distributed by related companies in Israel and Ukraine.〔(Adware Gone Bad: The Adware and MEVADE/SEFNIT Connection )〕
Bitcoin mining by personal computers infected with malware is being challenged by dedicated hardware, such as FPGA and ASIC platforms, which are more efficient in terms of power consumption and thus may have lower costs than theft of computing resources.〔(Bitcoin’s Computing Crisis )〕

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Parasitic computing」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.