The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the era of big data, massive data has been accumulated in integrated application platform of traffic management of public security. Confidential information leakage is one issue of great importance in the process of data collecting, storing, processing and utilizing. In this work, we propose an anomaly detection approach for the prevention of confidential information leakage. Assume that users'...
The next generation wireless communication network is expected as a composite radio environment including multiple Radio Access Technologies. Therefore, how to select an optimal network for subscriber to achieve Always Best Connected in this heterogeneous network environment is becoming a popular research field. In this paper, an adaptive network selection scheme is proposed. The Cobb-Douglas utility...
Component deployment directly affects the performances of component-based distributed applications, such as response time, throughput, reliability, and security. It also affects resources utility of runtime environment. In order to reduce the cost of resources used by applications and improve the resources utility, this paper defined component graph to represent component-based distributed applications,...
Service-level reuse development has drawn great attention in the research field of embedded systems. In this paper, we present reusable integrity management services for future embedded systems based on virtualization technique. A series of problems related with system security and reliability are addressed by adopting these services to existing system designs. Moreover, we have implemented the prototype...
In this paper, a runtime self-diagnosis and self-recovery infrastructure is presented for embedded systems. Different from existing methods of off-line tracing system logs, our research focuses on analyzing system kernel data structures from runtime memory periodically against predefined constraints. If any violations have been detected, recovery functions are invoked. The prototype system is developed...
In this paper, online system-level self-healing support is presented for embedded systems. Different from off-line log analysis methods used by conventional intrusion detection systems, our research focuses on analyzing runtime kernel data structures hence perform self-diagnosis and self-healing. Inside the infrastructure, self-diagnosis and self-healing solutions have been implemented based on several...
Distribute architecture based on threshold scheme is adopted to provide certification service in Mobile Ad Hoc Networks, due to its characteristics such as no infrastructure, no center. There are some problems in those schemes such as fixed threshold value and conspiracy attack. A certificate signature scheme based on threshold group signature is proposed in this paper, comparing to existing distributed...
The kernel objects consist of critical kernel data structures and system call functions, which are the most important data for a system, should be protected as first-class candidates. In this paper, a lightweight system-level detection and recovery infrastructure is presented for embedded systems. Inside the infrastructure, specific runtime protections have been implemented for different kernel objects,...
An upcoming trend for automobile manufacturers is to provide firmware updates over the air (FOTA) as a service. Since the firmware controls the functionality of a vehicle, security is important. To this end, several secure FOTA protocols have been developed. However, the secure FOTA protocols only solve the security for the transmission of the firmware binary. Once the firmware is downloaded, an attacker...
In this paper, a lightweight system level monitoring infrastructure known as kernel objects monitoring infrastructure (KOMI) is presented for commercial-off-the-shelf (COTS) embedded systems. The kernel objects consist of certain critical kernel data structures and entry points of system calls, which are protected as first-class objects inside the system. KOMI provides specific runtime protections...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.