The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reflection, which is widely used in practice and abused by many security exploits, poses a significant obstacle to program analysis. Reflective calls can be analyzed statically or dynamically. Static analysis is more sound but also more imprecise (by introducing many false reflective targets and thus affecting its scalability). Dynamic analysis can be precise but often miss many true reflective targets...
Increasingly sophisticated code obfuscation techniques are quickly adopted by malware developers to escape from malware detection and to thwart the reverse engineering effort of security analysts. State-of-the-art de-obfuscation approaches rely on dynamic analysis, but face the challenge of low code coverage as not all software execution paths and behavior will be exposed at specific profiling runs...
We have developed an iterative method for solving absolute value equation Ax–|x| = b, where A ∈ Rn×n x ∈ Rn and b ∈ Rn. The convergence of the proposed method is argued. Some examples are given to illustrate the implementation and efficiency of the method.
Varied trust management models for Ad hoc network had been proposed recently. However, there are rare method to evaluate these models making it is difficult to develop the most appropriate trust models in theory, and also it is difficult for a decision maker to choose an optimal trust model to implement in a concrete scene. In this paper, credibility evaluation of trust models based on fuzzy quantization...
China Southern Power Grid Company (CSG) and eMIT, LLC recently developed and implemented an online risk-based security assessment system-Probabilistic Security Risk Assessment (PSRA). PSRA calculates the probability of undesirable events in the transmission system and evaluates their corresponding severities. PSRA combines the probability measure of each undesirable event with the consequence measure...
To reduce the route length of MSW collection without intermediate facilities, A Waste Collection Vehicle Arc Routing Problem with turn constraints (WCVARPTC) model was proposed, which considers the actual traffic regulations: some streets can be traversed in only one direction, some turns will be forbidden when the common angle is too narrow. An asymmetric vehicle node routing problem (AVNRP) model...
With RFID applications being used more widely, their security risks are growing. Especially, there are many threats in the security of tags in RFID system. Due to their physical structure, plenty of vulnerabilities exist in memory bank and simple communication protocols. In this paper, we analyze the vulnerabilities of memory banks, detail the treats of the vulnerabilities in the cases of different...
FPGA has been used in many fields such as space, military, auto. It is the best choice of cipher protocol and artithmetic achievement. Its security has been a focus. In this paper, the authors design a Hardware Trojan of transmitting key information towards FPGA. It is important to realize the implement mechanism and raise the attention to IC security.
Software vulnerabilities become methods by which an attacker can take control of the victim's system, and those critical bugs cluster in dangerous spot codes. However, fuzz testing provides low code coverage and serious security bugs may be missed potentially, while symbolic execution based testing encounters path explosion and bug trigger problem. To deal with the security issue above, we highlight...
Mobile phones which use Android or other smartphone operating systems, equipped with richer applications than traditional ones, enable users to leave more things to phones to deal with. As a result, personal information stored on mobile phones becomes more and more. It is well known that backup is an important means to keep the information safe. However, users could only sync their contacts, sms,...
Computer networks are inevitably attacked as a result of their openness, while network attack usually actualized by exploiting vulnerability existing in network environment. Attack graph, consisted of lots of related atomic attacks, can fully display the exploitation and dependence relations among all of the vulnerabilities existed in network. Thus, it is a very useful tool for network vulnerability...
Attack graph increasingly becomes a key technique for network security analysis, however, the prevalent Attacker's Ability Monotonic Assumption (AAMA) constraint for attack graph generation could not make full use of the direction of network attack and the hierarchy of defence. As a result, using AAMA is not efficient enough in the process of attack graph generation, especially for large-scale complicated...
Web access mode is the most popular and effective way to share resources between universities nowadays. Considering the opening and complexity of the Internet, Secure and authorized access resources method becomes a key problem. This paper proposed an access control mechanism based on RBAC (Role Based Access Control) for information and telecommunication resources sharing. Then, a resource sharing...
Nowadays, Wireless Sensor Network (WSN) is becoming a hot topic after the "Sensor China" concept proposed in 2009. Sensor nodes are deployed in a hostile or unattended environment to collect the data information. Therefore, network security has become a big problem. A new key management scheme of security network architecture for wireless sensor network is presented in this paper. The proposed...
Outlier detection is a hot topic of data mining. After studying the existing classical algorithm of detecting outliers, this paper proposes a new algorithm for outlier detection based on offset, and makes a new definition for outlier. This detection algorithm is a method based on clustering analysis. It includes cluster modeling and data detection. Also, the clustering result obtained together with...
Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305(2006)], proposed by Lee, Lim and Yang, recently were indicated to be insecure against the authenticator Trentpsilas attacks [Phys. Rev. A 75, 026301(2007)]. In this paper, two novel efficient protocols of quantum direct communication with authentication are presented by utilizing four kinds of Pauli operations...
OAEP is widely accepted because of its provable security and practicability. However, there was a twist in the security proof in the random oracle model. Shoup revealed a flaw in the original security proof by Bellare and Rogaway. In this paper, a revision of the security proof is presented to fix the flaw. Furthermore, compared with some existing improved prove methods, the revised proof is applicable...
Digital signature schemes based on public-key cryptosystems generally permit existential forgery, except the schemes are equipped with some message formatting mechanisms, such as using hash functions or padding redundancies. In 2004, Chang et al. proposed a new digital signature scheme, and claimed the scheme without using any hash function or padding any redundancy can resist forgery attacks. However,...
Association rules mining is one of the most important and fundamental problems in data mining. Recently, in need of security, more and more people are studying privacy- preserving association rules mining in distributed database. This paper addresses a secure mining algorithm of association rules, which builds a globe hash table to prune item-sets and incorporate cryptographic techniques to minimize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.