Context. Development of safety-critical systems is mostly governed by process-heavy paradigms, while increasing demands on flexibility and agility also reach this domain. Objectives. We wanted to explore in more detai...
详细信息
PEP-side caching is used in request-response access control mechanisms to increase the availability and reduce the processing overhead on PDP. Nonetheless, this paper shows that using this approach may open an insider...
详细信息
An increasing number of spatial keyword query techniques that return qualified objects based on a comprehensive consideration of spatial and keyword constraints have been presented in the literature. Due to the comple...
详细信息
This project explores the design of a tool to facilitate a common task that software engineers find difficult - the identification and management of dependencies between the many heterogeneous entities created in the ...
详细信息
Charging of large-scale electric vehicles will have a significant impact on the grid so that their charging schedule needs to be optimized. The traditional centralized scheduling method requires high performance in in...
详细信息
ISBN:
(纸本)9781479920327
Charging of large-scale electric vehicles will have a significant impact on the grid so that their charging schedule needs to be optimized. The traditional centralized scheduling method requires high performance in information exchange and computing. Based on the analysis of the features of electric vehicle charging load and the research of cloud computing, we propose a cloud computing based schedule platform for optimal charging of electric vehicles. In addition, the function and implementation of the three basic modules of the platform (the data collection module, the cloud computing center and the control center) are exposed. The platform performs well in optimal scheduling for electric vehicles. In addition, the platform can also make full use of the computing resource and reduce the communication congestion.
The state-of-the-art mobile visual search approaches are based on the bag-of-visual-word (BoW). As BoW representation ignores geometric relationship among the local features, a full geometric constraint like RANSAC is...
详细信息
A software birthmark is unique, as certain native characteristics of a program, hence can be used to measure the similarity between programs. In general, a static software birthmark does not need program execution, bu...
详细信息
ISBN:
(纸本)9781450316569
A software birthmark is unique, as certain native characteristics of a program, hence can be used to measure the similarity between programs. In general, a static software birthmark does not need program execution, but is more vulnerable to attacks by semantic-preserving transformations. A dynamic software birthmark is applicable to packed executables, but cannot cover all the possible program paths. In this paper, we propose a novel effective technique to measure the similarity of Microsoft Windows applications using both static and dynamic birthmarks, which are based on the list of system APIs as well as the frequency of system API calls. Because system APIs are located in Windows system directories and act as a bridge between applications and the operating system, our birthmarks are resilient to obfuscations and compiler optimizations. A static birthmark consists of the system API call frequency of a target program, which can be extracted by scanning the executable file. A dynamic birthmark is the frequency of system API function calls, which can be extracted by a binary instrumentation tool during the execution of the program. To evaluate the effectiveness of the proposed technique, we compare various types of Windows applications using both the static and dynamic birthmarks. To demonstrate the robustness, we compare packed executables that were compressed by a binary packing tool. We carry out additional experiments for measuring the similarity between target Windows applications at the source code level and verify the evaluation results. The experimental results show that our birthmarks can effectively measure the similarity between Windows applications, as intended. Copyright 2013 ACM.
Evolution is of key importance for software services as they need to satisfy ever-changing customer requirements under open and dynamic operating environment. The majority of current research on service evolution is f...
详细信息
Malware authors have been generating and disseminating malware variants through various ways, such as reusing modules or using automated malware generation tools. With the help of the malware generation techniques, th...
详细信息
Combined Harm Assessment of Safety and Security for Information Systems (CHASSIS) method defines a unified process for safety and security assessments to address both the safety and security aspects during system deve...
详细信息
暂无评论