The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Patch-based vulnerability analysis is a hot topic for security researchers and attackers, some important semantic can be used to discover new bugs or errors via information revealed from patch differences. However, automatic description for patched differences is always viewed as such a difficult task that similar work is usually achieve in manual method. In this paper, we present an automatic patch-based...
Software vulnerability orientation is of great significance to vulnerability exploiting and vulnerability repairing. This paper presents a new method of vulnerability orientation based on complex network theory. We describe the software structure by system-level characteristics of complex network and generate structural signatures of original and patched software. By comparing patches of the similar...
Although dynamic analysis is immune to polymorphic, metamorphic, and encryption techniques, it is an open issue how to precisely capture behavior of malware. A connection between system call and its module has been constructed using taint propagation and stack back tracing, and a method of capturing malware behavior is presented on the basis of this connection. This method works well on parasitic...
This paper describes a novel method for extracting fingerprints of executables. A new data visual approach based on data field is imported. The 3-tuple (in-degree, out-degree, function call relationship) extracted from call graph are used for constructing data field and the potential field graph. This potential field graph is fingerprinted by the method of shape invariant moments which is mature and...
High resolution TEM becomes more powerful when coupled with a Gatan imaging filter (GIF). It gives both structural and compositional information simultaneously with subnanometer and nanometer resolution, respectively. By means of these combined techniques, the failure mechanism of diffusion barrier layers in IC devices, having the structure of Al-1%Si-0.5%Cu/TiN/Ti/Si substrate, was investigated....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.