Control flow obfuscation is an important way of software copyright protection, the main purpose is to make the static analysis tools produce wrong control flow graph, and then prevent malicious use of reverse engineer...
详细信息
Control flow obfuscation is an important way of software copyright protection, the main purpose is to make the static analysis tools produce wrong control flow graph, and then prevent malicious use of reverse engineering against software. In this paper we ropose an approach to implement control flow obfuscation using Windows structured exception handling mechanism. Programs are obfuscated by replacing branch instructions with exception code and inserting fake branch instruction after the exception code. Furthermore, exception code random technology is used to improve the resilience of the obfuscated code. Experimental results show that disassemble tools fail to identify 56.7% control flow of the obfuscated code, and have a misunderstanding of 40% control flow. The increase in program size and execute time of the obfuscated code is also modest.
With the development of wireless access technology and mobile computing, mobile P2P networks are supposed to thrive in file-sharing, streaming media, electronic commerce and other applications. However, due to the con...
详细信息
With the development of wireless access technology and mobile computing, mobile P2P networks are supposed to thrive in file-sharing, streaming media, electronic commerce and other applications. However, due to the concepts of decentralization and multi-hop transmission, mobile P2P networks are suffering from attacks launched by malicious members. Aiming at guarding MP2P networks, this paper analyzes the challenges and attacks for MP2P networks, and gives possible countermeasures to defend the threats. Also, current reputation systems are discussed in detail, including potential threats they are facing with and so on. Furthermore, considerations on how to construct robust reputation systems are given.
Code-Controlled Hardware Trojan horse is an important kind of hardware Trojan horse and may be existent in various electronic equipments. It is necessary and imperative to detect this kind of Trojan horse. In this pap...
详细信息
Code-Controlled Hardware Trojan horse is an important kind of hardware Trojan horse and may be existent in various electronic equipments. It is necessary and imperative to detect this kind of Trojan horse. In this paper we firstly study characteristics of Code-Controlled Hardware Trojan horse. Then model checking, a kind of formalization method, is primarily researched to detect Code-Controlled Hardware Trojan horse. To detect Code-Controlled hardware Trojan horses effectively, we investigate publisheddetection techniques for hardware Trojan horses and point out theirdeficiencies. Finally we present a new special detection approach combined with model checking andreverse-engineering. Experiments indicate that the new detection approach is effective to detect Code-Controlled Hardware Trojan horse.
Through program dependence analysis, the method of parallel symbolic execution based on reduction about program execution path family was proposed. Firstly, instruction statements which affect on the symbolic valu...
详细信息
Through program dependence analysis, the method of parallel symbolic execution based on reduction about program execution path family was proposed. Firstly, instruction statements which affect on the symbolic value were extracted according to data dependency. Then the key branch conditions controlling these statements were located and connected. Thus the reduction algorithm from multiple paths of which symbolic values are all the same to path families was was designed and implemented. Finally, path family chain was built and parallel symbolic execution was realized. The experimental results show that the method promotes parallel processing ability and test efficiency, compared with common parallel scheduling policy of allocating program execution path.
In order to improve the efficiency of symbolic execution in software vulnerability detection, we propose the sensitive point oriented test method for parallel approach in the paper. Static analysis is used for identif...
详细信息
In order to improve the efficiency of symbolic execution in software vulnerability detection, we propose the sensitive point oriented test method for parallel approach in the paper. Static analysis is used for identification and location of sensitive points. Then based on dynamic symbolic execution, the algorithm of parallel approach to sensitive point is designed, in order to select for the preferential path andrealize iterative approach test. Moreover, we present search algorithm of test cases to reuse forward information andreduce communication redundancy. Finally, the experiment results verify the improvement of symbolic execution efficiency and effectiveness of exception detection.
How to provide quality of service (QoS) guar- antees in routing andswitchingsystems has become one of the key research topics in the areas of routing andswitching technologies. differentiated services architecture ...
详细信息
How to provide quality of service (QoS) guar- antees in routing andswitchingsystems has become one of the key research topics in the areas of routing andswitching technologies. differentiated services architecture (diffServ) is known as a promising way for supporting QoS in a high-speed backbone network scenario. However, the measurement indexes forrealtime multimedia traffic, which plays very important roles in next generation internet, are not so clearly defined. In this paper, a new service architecture called SOQG (Service Orient QoS Guarantees) aiming at providing QoS guarantees for multimedia traffic is first proposed. SOQG classifies the internet traffic into five classes: EF, JCC, BCG-H, BCG-L and BE. Then, Based on this architecture, we propose a new switch called load balanceddifferentiated universal service support switch (LBdU). LBdU consists of three modules: BCU (Bandwidth Control Unit), LBS (Load Balanced Scheduling) and XOS ( Cross-point Output Scheduling). We evaluate LBdU by comprehensive simulations. As expected, LBdU can provide delay and bandwidth guarantees for both EF and JCC traffic.
How to provide quality of service (QoS) guarantees in routing andswitchingsystems has become one of the key research topics in the areas of routing andswitching technologies. differentiated services architecture (d...
详细信息
How to provide quality of service (QoS) guarantees in routing andswitchingsystems has become one of the key research topics in the areas of routing andswitching technologies. differentiated services architecture (diffServ) is known as a promising way for supporting QoS in a high-speed backbone network scenario. However, the measurement indexes forrealtime multimedia traffic, which plays very important roles in next generation internet, are not so clearly defined. In this paper, a new service architecture called SOQG (Service Orient QoS Guarantees) aiming at providing QoS guarantees for multimedia traffic is first proposed. SOQG classifies the internet traffic into five classes: EF, JCC, BCG-H, BCG-L and BE. Then, Based on this architecture, we propose a new switch called load balanceddifferentiated universal service support switch (LBdU). LBdU consists of three modules: BCU (Bandwidth Control Unit), LBS (Load Balanced Scheduling) and XOS ( Cross-point Output Scheduling). We evaluate LBdU by comprehensive simulations. As expected, LBdU can provide delay and bandwidth guarantees for both EF and JCC traffic.
For the issue of the discretionary access control (dAC) model safety analysis,a logic method is *** method takes the Gd model as the classic dAC model and Prolog as the basic language to describe system states and sta...
详细信息
For the issue of the discretionary access control (dAC) model safety analysis,a logic method is *** method takes the Gd model as the classic dAC model and Prolog as the basic language to describe system states and state transferrules.A general program based on this logic method is proposed fordAC safety analysis,but this program may never be terminal for some safety analysis *** safety analysis algorithm is achieved by simplifying the general program according to the property of the dAC model state transfer *** safety analysis algorithm is easier to understand and implement than the previous algorithms and its time complexity is O(N+M+T),in which N,M,and T are the numbers of the rights with copy flag,the policies forright transferring,and the policies forright permitting,respectively.
According to the application of Superword Level Paralleism (SLP) auto-vectorization compiling system in digital Signal Processing(dSP),due to the specialized functions of dSP frame,such as the specific addressing mode...
详细信息
According to the application of Superword Level Paralleism (SLP) auto-vectorization compiling system in digital Signal Processing(dSP),due to the specialized functions of dSP frame,such as the specific addressing model,a wide variety of registers,irregulardata branch,the obstacle of dependence relation to vectorization non-aligneddata or otherreasons,which resulted in the compiler can not support SIMd auto-vectorization with the feature of *** order to solve this problem,the SLP auto-vectorization method was studied towards dSP *** on the specialized functions of dSP frame,the instruction analysis and optimization algorithm in SLP auto-vectorization were improved,so as to transform more high-efficiency source *** experimental results show that the optimization method of this paper has a tremendous role on improving dSP performances andreducing power consumption.
How to provide quality of service (QoS) guarantees in routing andswitchingsystems has become one of the key research topics in the areas of routing andswitching technologies. differentiated services architecture (d...
详细信息
暂无评论