The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Motivated by applications to security and high efficiency, we propose an automated methodology for validating on low-level intermediate representations the results of a source-level static analysis. Our methodology relies on two main ingredients: a relative-safety checker, an instance of a relational verifier which proves that a program is "safer" than another, and a transformation of programs...
An offline optimal flexible load transfer strategy of more electric aircraft including operation mode and fault location of variable frequency starter generator is proposed, whose key innovation is to quantify variable operational safety margin using node voltage flexibility. Firstly, a series of scenes that show the fluctuation of load in different operation mode are generated through the Monte Carlo...
To ensure that an access control (AC) system is safe, there must be a reliable means to verify that the specified AC policy model conforms to the safety requirements and policy author's intentions. A general verification approach includes black-box and white-box testing, as well as the generation of sufficient test cases to check the correctness of model implementations.
Security assessment is an important means to prevent large-scale blackouts. This paper proposes an overall evaluation indicator from a macro perspective of the grid security. The indicator is proposed from the view of the main task of the grid operation. It takes the reserve level as the carrier and sets various security and stability constraints on power outputs to get the total maximum output of...
Nowadays the level of penetration of nonprogrammable renewable (NPRE) power systems in some countries is quite high and it is going to increase in the next years. Of course such systems have an impact on national power systems, especially in those regions that are weakly connected with the main national grid, e.g. islands power systems. This paper addresses the general problem of finding some parameters...
It is difficult to make a comprehensive, accurate and quantitative evaluation for atmospheric pressure single stage type producer gas generator system. Based on the analysis and study of atmospheric pressure single stage type producer gas generator, and combining with the examples evaluation procedures and evaluation model of a steel corporation in Daqiu Zhuang, Jing Hai County of Tianjin, this paper...
In view of the limitation of lack of forward-looking in current static security analysis, we form the predicting section by using the date of short-term load forecasting, the power generating plan data and the change date of grid structure and offer the static security based on this section. It has a great significance to power system security.
It is of great significance for us to research security problems in the power system. After choosing static security, related theories and methods to be main research object, we calculate power flow and use transferring load as safety countermeasures for power restoration at the same time. Here, we select the Newton method. Then, making the static analysis module of PSASP as the electric power system...
Spyware is a rapidly spreading security issue. Traditional spyware detection can mainly be classified into two categories: signature based detection and behavior based detection. The former is not able to detect unknown spyware and variants of known spyware. The latter fails when spyware attempts to blend in with legitimate behavior. This paper presents a novel spyware detection technique which is...
We present an low-cost enhancement to a standard MISR design for safety and security purposes in automotive applications. Depending on the application, the MISR is enhanced by either a linear or a nonlinear code generator presented in this paper. Linear code generator reduces the probability of error masking for a BIST-related signature generation while nonlinear code generator is used for security-related...
A new scheme of dynamic group blind signature based on elliptic curve discrete logarithm problem (ECDLP) which extends the dynamic group blind signature and the knowledge signature to the elliptic curve cyclic group is generalized. The scheme runs in time slice manner and can be proved security with zero knowledge proof. It supports the dynamic addition and deletion of the group members freely. And...
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating and storing the proofs which are inherently large. The approaches proposed to alleviate this, suffer from drawbacks of their own especially the enlargement of the trusted computing base, in which any bug may cause an unsafe program to be accepted. We propose...
This paper presents principles and results of dynamic testing of an SRAM-based FPGA using time- resolved fault injection with a pulsed laser. The synchronization setup and experimental procedure are detailed. Fault injection results obtained with a DES crypto-core application implemented on a Xilinx Virtex II are discussed.
Due to their reconfigurability and their high density of resources, SRAM-based FPGAs are more and more used in embedded systems. For some applications (Pay-TV,Banking, Telecommunication ...), a high level of security is needed. FPGAs are intrinsically sensitive to ionizing effects, such as light stimulation, and attackers can try to exploit faults injected in the downloaded configuration. Previous...
In this paper, a novel blind digital watermarking algorithm using wavelet-packet decomposition is proposed. Firstly, the original image is transformed into frequency domain with wavelet-packet decomposition by using a key that decides which direction will be further transformed, so that the sub bands where watermark is embedded are determined. Secondly, the binary watermark image with copyright information...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.