Control flow obfuscation is an important way of software copyright protection, the main purpose is to make the static analysis tools produce wrong control flow graph, and then prevent malicious use of reverse engineer...
详细信息
Control flow obfuscation is an important way of software copyright protection, the main purpose is to make the static analysis tools produce wrong control flow graph, and then prevent malicious use of reverse engineering against software. In this paper we ropose an approach to implement control flow obfuscation using Windows structured exception handling mechanism. Programs are obfuscated by replacing branch instructions with exception code and inserting fake branch instruction after the exception code. Furthermore, exception code random technology is used to improve the resilience of the obfuscated code. Experimental results show that disassemble tools fail to identify 56.7% control flow of the obfuscated code, and have a misunderstanding of 40% control flow. The increase in program size and execute time of the obfuscated code is also modest.
With the development of wireless access technology and mobile computing, mobile P2P networks are supposed to thrive in file-sharing, streaming media, electronic commerce and other applications. However, due to the con...
详细信息
With the development of wireless access technology and mobile computing, mobile P2P networks are supposed to thrive in file-sharing, streaming media, electronic commerce and other applications. However, due to the concepts of decentralization and multi-hop transmission, mobile P2P networks are suffering from attacks launched by malicious members. Aiming at guarding MP2P networks, this paper analyzes the challenges and attacks for MP2P networks, and gives possible countermeasures to defend the threats. Also, current reputation systems are discussed in detail, including potential threats they are facing with and so on. Furthermore, considerations on how to construct robust reputation systems are given.
due to the underground economy stimulation, malware creators are writing malicious codes at an alarming rate. At the same time, novel resistance techniques are commonly available, leading to a huge number of varia...
详细信息
due to the underground economy stimulation, malware creators are writing malicious codes at an alarming rate. At the same time, novel resistance techniques are commonly available, leading to a huge number of variants. Behavior-baseddetection techniques are a promising solution to this serious problem. In this paper we propose fuse program behaviors to identify malware. This approach uses Bayesian training to get the malicious degree of program behavior, adopt d-S synthesize rule to fuse program behaviors to detect virus. Our experimental evaluation shows that our prototype system effective on detecting malicious codes and their variants.
Through program dependence analysis, the method of parallel symbolic execution based on reduction about program execution path family was proposed. Firstly, instruction statements which affect on the symbolic valu...
详细信息
Through program dependence analysis, the method of parallel symbolic execution based on reduction about program execution path family was proposed. Firstly, instruction statements which affect on the symbolic value were extracted according to data dependency. Then the key branch conditions controlling these statements were located and connected. Thus the reduction algorithm from multiple paths of which symbolic values are all the same to path families was was designed and implemented. Finally, path family chain was built and parallel symbolic execution was realized. The experimental results show that the method promotes parallel processing ability and test efficiency, compared with common parallel scheduling policy of allocating program execution path.
In order to improve the efficiency of symbolic execution in software vulnerability detection, we propose the sensitive point oriented test method for parallel approach in the paper. Static analysis is used for identif...
详细信息
In order to improve the efficiency of symbolic execution in software vulnerability detection, we propose the sensitive point oriented test method for parallel approach in the paper. Static analysis is used for identification and location of sensitive points. Then based on dynamic symbolic execution, the algorithm of parallel approach to sensitive point is designed, in order to select for the preferential path andrealize iterative approach test. Moreover, we present search algorithm of test cases to reuse forward information andreduce communication redundancy. Finally, the experiment results verify the improvement of symbolic execution efficiency and effectiveness of exception detection.
Computed Tomography(CT) generates a three-dimensional image of the internals of an object from a large series of two-dimensional X-ray images taken around a single axis of rotation. Speckle noise in 3d images, such as...
详细信息
Computed Tomography(CT) generates a three-dimensional image of the internals of an object from a large series of two-dimensional X-ray images taken around a single axis of rotation. Speckle noise in 3d images, such as medical images and industrial CT images, inevitably affects the analysis results of the interested objects contained in the volume data. This paperdefines a group of volume morphology arithmetic operators, mainly including open and close, by extending area morphology into 3-d space. Using these operators, the light anddark objects of small size could be removeddirectly from the 3-d spaces of the target objects, while the connectivity of the main 3-d target objects in the volume data is still preserved. To demonstrate the validity of the volume morphology operators, they are applied to suppress speckle noises in 3-d images of coral andrat skull. Experimental results show that the algorithm proposed in this paper processes volume data as a whole, so that could protect the 3-d shapes of the target objects, especially the boundaries in the vertical direction. Comparing with the traditional process of treating 3-d images as 2-d image sequences, this method is more beneficial to volume segmentation and feature extraction for fine structures.
How to provide quality of service (QoS) guar- antees in routing andswitchingsystems has become one of the key research topics in the areas of routing andswitching technologies. differentiated services architecture ...
详细信息
How to provide quality of service (QoS) guar- antees in routing andswitchingsystems has become one of the key research topics in the areas of routing andswitching technologies. differentiated services architecture (diffServ) is known as a promising way for supporting QoS in a high-speed backbone network scenario. However, the measurement indexes forrealtime multimedia traffic, which plays very important roles in next generation internet, are not so clearly defined. In this paper, a new service architecture called SOQG (Service Orient QoS Guarantees) aiming at providing QoS guarantees for multimedia traffic is first proposed. SOQG classifies the internet traffic into five classes: EF, JCC, BCG-H, BCG-L and BE. Then, Based on this architecture, we propose a new switch called load balanceddifferentiated universal service support switch (LBdU). LBdU consists of three modules: BCU (Bandwidth Control Unit), LBS (Load Balanced Scheduling) and XOS ( Cross-point Output Scheduling). We evaluate LBdU by comprehensive simulations. As expected, LBdU can provide delay and bandwidth guarantees for both EF and JCC traffic.
How to provide quality of service (QoS) guarantees in routing andswitchingsystems has become one of the key research topics in the areas of routing andswitching technologies. differentiated services architecture (d...
详细信息
For the issue of the discretionary access control (dAC) model safety analysis,a logic method is *** method takes the Gd model as the classic dAC model and Prolog as the basic language to describe system states and sta...
详细信息
For the issue of the discretionary access control (dAC) model safety analysis,a logic method is *** method takes the Gd model as the classic dAC model and Prolog as the basic language to describe system states and state transferrules.A general program based on this logic method is proposed fordAC safety analysis,but this program may never be terminal for some safety analysis *** safety analysis algorithm is achieved by simplifying the general program according to the property of the dAC model state transfer *** safety analysis algorithm is easier to understand and implement than the previous algorithms and its time complexity is O(N+M+T),in which N,M,and T are the numbers of the rights with copy flag,the policies forright transferring,and the policies forright permitting,respectively.
According to the application of Superword Level Paralleism (SLP) auto-vectorization compiling system in digital Signal Processing(dSP),due to the specialized functions of dSP frame,such as the specific addressing mode...
详细信息
According to the application of Superword Level Paralleism (SLP) auto-vectorization compiling system in digital Signal Processing(dSP),due to the specialized functions of dSP frame,such as the specific addressing model,a wide variety of registers,irregulardata branch,the obstacle of dependence relation to vectorization non-aligneddata or otherreasons,which resulted in the compiler can not support SIMd auto-vectorization with the feature of *** order to solve this problem,the SLP auto-vectorization method was studied towards dSP *** on the specialized functions of dSP frame,the instruction analysis and optimization algorithm in SLP auto-vectorization were improved,so as to transform more high-efficiency source *** experimental results show that the optimization method of this paper has a tremendous role on improving dSP performances andreducing power consumption.
暂无评论