The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Symbolic Execution based defect discovery techniques for binary programs are now widely applied. However, because of the path explosion problem, it's still not applicable for security analysis on large programs. A great many infeasible paths in the target program also reduce the performance. To fast generate test cases reaching the potentially vulnerable program points, this paper introduces constraints...
During the multi-dimensional Fuzzing technique, how to construct the influencing relationships between input elements and vulnerable statements is a key problem. This paper applies the virtual machine based taint analysis technique on multi-dimensional Fuzzing, gives detailed design and the experiment result shows the method is feasible.
The traditional lossless compression algorithms are aim for higher compress ratio, but they cannot meet the requirement of the Monitoring System of Construction Machinery. This paper raises an adaptive algorithm with adjustable compression ratio by requirements to meet the requests of different. The practice and experimental result shows that the improved algorithm is more efficient than the traditions...
This paper introduces that using digital potentiometers output 24-channel resistance to simulate the thermistors. Every channel has two digital potentiometers, one is low resolution and high value, the other is high resolution and low value. They are connected through Daisy-Chain and share chip-select. 24-channel digital potentiometers share the SPI's clock and SDI. Input the parameter in the computer...
In order to further enhance the bandwidth of the data communication system in theodolite, a single channel serial optical transmission system was designed based on the studying of the 10BASE-X Gigabit Ethernet physical layer technology which meets the IEEE standard. The conversion between the 64-bit 156.25MHz TTL signals and the 4 channel 3.125Gbps PCML differential signals is carried out by FPGA;...
Based on continuity assumption of fluid, we established a mathematical model of ion transport in the rectangular Nanofluidic Channel with Poisson-Boltzmann equation and modified N-S equations. Through equation derivation, the electric potential distribution function was solved. Next we analyzed how the distribution of the ion electric potential distribution was charged by the solution concentration,...
Knowledge-based Fuzzing technology successfully applies in software vulnerability mining, however, current Fuzzing technology mainly focuses on fuzzing target software based on single data sample and thus the vulnerability mining results are not stable, false negatives of vulnerability are high and the selection of data sample depends on people's analysis. To solve these problems, this paper proposes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.