The creation of an algorithm for recognizing pathological abnormalities in cystic fibrosis is investigated in this paper using the CNN model with a modified psp-net. Currently, Decision Trees, Random Forests, PSP Nets...
详细信息
This study focuses on the employment of persuasive technology with artificial intelligence (AI) to enhance student’s emotions and engagement in educational environments. By integrating persuasive elements such as pra...
详细信息
The agriculture industry is currently dealing with serious issues with rice plants as a result of illnesses that decrease the quantity and output of the harvest. Numerous fungi and bacteria diseases harm plants that a...
详细信息
Currently,security-critical server programs are well protected by various defense techniques,such as Address Space Layout Randomization(ASLR),eXecute Only Memory(XOM),and data Execution Prevention(DEP),against modern ...
详细信息
Currently,security-critical server programs are well protected by various defense techniques,such as Address Space Layout Randomization(ASLR),eXecute Only Memory(XOM),and data Execution Prevention(DEP),against modern code-reuse attacks like Return-oriented programming(ROP)***,in these victim programs,most syscall instructions lack the following ret instructions,which prevents attacks to stitch multiple system calls to implement advanced behaviors like launching a remote *** this kind of gadget greatly constrains the capability of code-reuse *** paper proposes a novel code-reuse attack method called Signal Enhanced Blind Return Oriented programming(SeBROP)to address these *** SeBROP can initiate a successful exploit to server-side programs using only a stack overflow *** leveraging a side-channel that exists in the victim program,we show how to find a variety of gadgets blindly without any pre-knowledges or reading/disassembling the code ***,we propose a technique that exploits the current vulnerable signal checking mechanism to realize the execution flow control even when ret instructions are *** technique can stitch a number of system calls without returns,which is more superior to conventional ROP ***,the SeBROP attack precisely identifies many useful gadgets to constitute a Turing-complete *** attack can defeat almost all state-of-the-art defense *** SeBROP attack is compatible with both modern 64-bit and 32-bit *** validate its effectiveness,We craft three exploits of the SeBROP attack for three real-world applications,i.e.,32-bit Apache 1.3.49,32-bit ProFTPD 1.3.0,and 64-bit Nginx *** results demonstrate that the SeBROP attack can successfully spawn a remote shell on Nginx,ProFTPD,and Apache with less than 8500/4300/2100 requests,respectively.
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ...
详细信息
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.
This is an advanced object detection system with YOLOv7 model, implemented for UAV surveillance as outlined in the article. By integrating the system with Roboflow serving as its database manager and data augmentation...
详细信息
Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data *** Intelligent Active Probing and Trace-back...
详细信息
Due to their simple hardware,sensor nodes in IoT are vulnerable to attack,leading to data routing blockages or malicious tampering,which significantly disrupts secure data *** Intelligent Active Probing and Trace-back Scheme for IoT Anomaly Detection(APTAD)is proposed to collect integrated IoT data by recruiting Mobile Edge Users(MEUs).(a)An intelligent unsupervised learning approach is used to identify anomalous data from the collected data by MEUs and help to identify anomalous nodes.(b)Recruit MEUs to trace back and propose a series of trust calculation methods to determine the trust of nodes.(c)The last,the number of active detection packets and detection paths are designed,so as to accurately identify the trust of nodes in IoT at the minimum cost of the network.A large number of experimental results show that the recruiting cost and average anomaly detection time are reduced by 6.5 times and 34.33%respectively,while the accuracy of trust identification is improved by 20%.
As cloud native technology advances, the scale and complexity of applications built on microservice architecture continue to expand, leading to increasingly intricate differences between software within the same appli...
详细信息
Wireless sensor networks (WSNs) are normally conveyed in arbitrary regions with no security. The source area uncovers significant data about targets. In this paper, a plan dependent on the cloud utilising data publish...
详细信息
Increasingly popular decentralized applications (dApps) with complex application logic incur significant overhead for executing smart contract transactions, which greatly limits public block chain performance. Pre-exe...
暂无评论