The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Current network protocol binary software testing methods cannot discover serious vulnerabilities in deep states. This article introduces a novel method based on multi-packet symbolic execution, which can drive the software to deep states, to test the whole network protocol binary software stacks. This article also presents a prototype system, S2EProtocol-multi, upon Selective Symbolic Execution (S2E)...
Traditional symbolic execution for testing software focuses on exploring the paths of the program. However, for stateful network protocol, this method is hard to explore all the protocol states. This paper proposes a novel method based on model-guided symbolic execution, which can associate the program paths with the protocol states and utilize the protocol model to guide the test to explore interesting...
The vulnerabilities existing in network protocol implementations are difficult to detect. The main reason is that the state space of complex protocol binary software is too large to explore. This paper proposes a novel approach that leverages selective symbolic execution to test network protocol binary software directly, which confines symbolic execution in the secure-sensitive area. This paper also...
In this paper a new vulnerability discovery method based on symbolic execution and machine learning is proposed. Given a vulnerable function, similar function set can be located efficiently based on machine learning technique. Function call graphs of each function from the similar function set are obtained by dataflow analysis of the whole program. At last, the symbolic execution engine KLEE is used...
The purpose of this work is to explore the possibility of using (Multi-disciplinary Design and Optimization) MDO frameworks for complex system design of space experiment. Considering both launch and space environmental requirements, the multi-objective optimization of a novel nested flying vehicle for space science experiments is carried out by decreasing launch weight, frequency response, vacuum...
In this paper a new vulnerability detecting method is proposed to detect buffer boundary violations. The main idea is to use the metric of array index manipulation rather than using any heuristic method. We employ a SVM-based classifier to classify the vulnerable functions and innocent functions. Then the vulnerable functions are fed to function call graph guided symbolic execution to precisely determine...
The vulnerabilities exist in Android binary software bring critical threat to Mobile Internet security. In this paper, we put forward a novel method to detect memory corruption vulnerabilities for Android binary software which builds upon memory accession security rules and selective symbolic execution. We also implemented our prototype system and the evaluation results show that our method can detect...
With the advent of the era of big data, O2O as a new industry of making an integration of online and offline effectively, attracts more and more people to start to talk about this topic. In this article, after exploring the past academic research for two years, it is considered to select the local service industry and study the problem of the O2O industry, such as “Meituan.com”.
Currently the extensive application of embedded multimedia processing calls for requirement of hardware acceleration and multi-function expansion, it firmly requires an scalable and efficient design of system architecture for embedded multimedia processing terminal. At first, system architecture with distinct structures and reasonable modules is designed, a simplified multimedia framework is designed...
In the research of composite service execution, runtime QoS ensuring of composite service is an important problem in composite service adaptation. This paper gives an introduction to the design and implementation of composite service adaptive execution supported environment monitoring system, analyzes the crucial problem of the system, builds up an experiment environment to test the monitoring system...
Web services run in a highly dynamic environment (the Internet) which makes the composite service will face multiple exceptions in its execution. Thus, it needs to take effective actions to deal with the errors causing the exceptions. Then, by such actions, composite service can adapt to the dynamics and complexity of its execution environment. Since accurately identifying the error source which causes...
Multi-tenant SaaS software as one of the application pattern in Cloud Computing delivers software thourgh Web to the users by rhe service manner. So, it can reduce the cost of users, and reduce the cost of the maintainess and management by providers. The first problem that must be considered is how to provide the most appropriate tenant to the user according to the business request from the user in...
Leaf color has been commonly used as an index for crop stress status diagnosis. We have developed a low-cost and non-destructive method that is easy to use to assess the health status of plants, based on the estimation of chlorophyll content of leaves using a portable digital camera. Relationships between chlorophyll content and leaf image color indices in the RGB and Lab* space with the comparison...
The paper proposes a dancing robot based on the beat tracking method. The robot can carry out different actions when receiving different musical signal input. The dancing poses are vivid and lifesome, and development of the robot is helpful to enhance intelligence of the traditional creational robot, which exerts a striking influences on the conventional toy market. In the paper, the design of the...
The paper has a detailed description of TDO (Test-Driven Outsourcing) mode, and has analyzed the entire task sets of the outsourcing team, proposed a new Software Process Mode, which is an evolution mode of the helix structure. This mode is different from the traditional mode of software project, so it is a new working mode. It is based on the ideas of BPO (Business Process Outsourcing). It may become...
Owing to the limitation of traditional software aging trend prediction method that based on time and based on measurement in dealing with sudden large scale concurrent questions, this paper proposes a new software aging trend prediction method which is based on user intention. This method predicts the trend of software aging according to the quantity of user requests for each components during the...
This paper presents a .NET framework as the integrating software platform linking all constituent modules of the fault diagnosis and failure prognosis architecture. The inherent characteristics of the .NET framework provide the proposed system with a generic architecture for fault diagnosis and failure prognosis for a variety of applications. Functioning as data processing, feature extraction, fault...
In the SaaS application, users can order corresponding software services from the service provider according to their application needs and adjust their services content in use based on the changes of the enterprise development, with strong elasticity and expansibility. However, despite of so advanced concept of SaaS, there are still some problems in the SaaS field constraining the wider use of SaaS...
SaaS is a new delivery model for the software development and application. Providers tend to make their SaaS products achieve higher level of maturity, serves more people, satisfy more different individual requirements, while maintaining efficiency and flexibility. This paper introduces a new SaaS application model called SaaS with tenancy agency. It adds two new layers: tenancy process layer and...
SaaS (software as a service), the new software application pattern has got wide attraction in both industry and academia. But transaction processing is a problem that prevents SaaS from wide spreading. To solve the problem, this paper proposes A business level compensation mechanism for multitenancy SaaS application transaction processing. The mechanism supports flexible and customizable transaction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.