Mining sequential rules from large databases is an important topic in data mining fields with wide applications. Most of the relevant studies focused on finding sequential rules appearing in a single sequence of event...
详细信息
Blurred underwater image is always an annoying problem in the oceanic engineering. In this paper, we propose an efficient and low complexity underwater image enhancement method based on dark channel prior. Our method ...
详细信息
Return-Oriented Programming (ROP) is a technique which leverages the instruction gadgets in existing libraries/executables to construct Turing complete programs. However, ROP attack is usually composed with gadgets wh...
ISBN:
(纸本)9781450305648
Return-Oriented Programming (ROP) is a technique which leverages the instruction gadgets in existing libraries/executables to construct Turing complete programs. However, ROP attack is usually composed with gadgets which are ending in ret instruction without the corresponding call instruction. Based on this fact, several defense mechanisms have been proposed to detect the ROP malicious code. To circumvent these defenses, Return-Oriented Programming without returns has been proposed recently, which uses the gadgets ending in jmp instruction but with much diversity. In this paper, we propose an improved ROP techniques to construct the ROP shellcode without returns. Meanwhile we implement a tool to automatically construct the real-world Return-Oriented Programming without returns shell-code, which as demonstrated in our experiment can bypass most of the existing ROP defenses. Copyright 2011 ACM.
In this paper,a fast access control applied to Hadoop cloud computing using the fingerprint identiication and face recognition is *** study employed a way of low-capacity Linux embedded platform linked to Hadoop via E...
详细信息
In this paper, we introduce a Hadoop cloud computing together with access security by using the fingerprint identification and face recognition. Hadoop cloud computing is connected to serve plenty of mobile devices or...
详细信息
Most algorithms are run-to-completion and provide one answer upon completion and no answer if interrupted before completion. On the other hand, anytime algorithms have a monotonic increasing utility with the length of...
详细信息
With the population of networking infrastructure in home area, we can realize Smart Home nowadays. Automation, zero-configuration and easy to use are the major requirements of Smart Home. In this paper, we propose a d...
详细信息
In the process of segmentation the traditional graph-theoretical clustering method is sensitive to noise and fuzzy edges,thus false segmentation result is appeared. Further, the large computational complexity also aff...
详细信息
When object-oriented programs evolve to aspect-oriented programs (AOP), the behavior of the evolved programs can become complex and hard to understand because the aspects woven into object-oriented programs can change...
详细信息
暂无评论