Research Publications

Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4194

This main community comprises five sub-communities, each representing the academic contribution made by SLIIT-affiliated personnel.

Browse

Search Results

Now showing 1 - 3 of 3
  • Thumbnail Image
    PublicationEmbargo
    Recommendation system based on Tamil-English code-mixed text analysis
    (Institute of Electrical and Electronics Engineers, 2022-10-15) Vijayakumar, S; Murugaiah, G; Sivanesan, J; Archchana, K; Tissera, W; Vidhanaarachchi, S
    The cinema industry has always been popular since its inception many years ago and is a preferred pastime of many people. It can be observed that even though online movie applications are popular in multilingual society, English is the preferred language. Naturally, people of other languages mix their native language with English during communications resulting in an abundance of multilingual data called code-mixed data, available in today's world. This research focuses on the movie recommendation system whose primary objective is to make a recommender system through Natural Language Processing (NLP) Tools for Tamil-English Code-mixed (Tanglish) Comments. Our recommendation system will be a filtering scheme whose primary objective is to predict a viewer's rating or preference towards a movie or web series.
  • Thumbnail Image
    PublicationEmbargo
    SEAMS: A Symmetric Encryption Algorithm Modification System to Resist Power Based Side Channel Attacks
    (Springer, Cham, 2018-11-02) Pathirana, K. P. A. P; Lankarathne, L. R. M. O; Hangawaththa, N. H. A. D. A; Abeywardena, K. Y; Kuruwitaarachchi, N
    Side channel attacks which examine physical characteristics of a cryptographic algorithm, are getting much more popular in present days since it is easier to mount an attack in a short time with only a few hundred dollars’ worth of devices. Sensitive information of a cryptographic module can be easily identified by evaluating the side channel information, such as power consumption, heat and electromagnetic emissions that outputs from the cryptographic device. This creates a huge impact on the security of the cryptographic modules as it is an efficient technique to break cryptographic algorithms by analyzing the patterns of the side channel information without having any specialized knowledge in cryptography. The solution proposed in this paper is an algorithm modification system for symmetric algorithms in order to mitigate side channel attacks. This is achieved by injecting randomness to the algorithm following a comprehensive analysis of power fluctuations that outputs from a given algorithm. In the proposed solution, a hardware device tracks down the patterns in power consumption and analyze those meter readings by utilizing machine learning techniques. As a result of this analysis, it identifies the pattern generating source code positions. System will add random code fragments in to the identified positions in the algorithm without altering the output in order to resist side channel attacks.
  • Thumbnail Image
    PublicationEmbargo
    Secure Messaging Platform Based on Blockchain
    (2020 2nd International Conference on Advancements in Computing (ICAC), SLIIT, 2020-12-10) Ellewala, U. P.; Amarasena, W.D.H.U; Lakmali, H.V.S.; Senanayaka, L.M.K.; Senarathne, A. N.
    The boundaries between personal and business communications is a key issue faced by most organizations. Use of unsecured and unsafe applications in workplaces pose enormous security risks. Companies are not adequately aware about the applications that are being used in their employees' devices. When it comes to critical business communication involving exchanging trade secrets, making business referrals and strategic business decisions, protecting of messages and shared files becomes a challenge. Most publicly available communication platforms do not empower organizations to regulate, track and scale their communication and does not provide compliance with data protection frameworks, which can result in cross industry system risks. As a result, both individuals and organizations express deep concern about data security and protection of privacy when using Instant Messaging applications. Non-repudiation in communications not only conveys to the user, recognition of the communication process, but it is also a crucial way to establish a relationship of trust and to overcome trust disputes. Our primary objective, through this research, is to develop a chat application with more secure channels of enterprise level communication. Using new technologies such as blockchain, which operate on a decentralized model, we can surmount the drawbacks of traditional messaging applications, thereby ensuring confidentiality, integrity and availability of official data, along with advanced auditing features.