this paper presents a novel path-sensitive static analysis method for detecting taint-style vulnerabilities in PHP code. The new method includes three key, the first of which is path searching during a basic block, th...
详细信息
ISBN:
(纸本)9781509039456;9781509039449
this paper presents a novel path-sensitive static analysis method for detecting taint-style vulnerabilities in PHP code. The new method includes three key, the first of which is path searching during a basic block, the second is path searching between blocks, and the third is path searching crossing function call. A tool name POSE implements the new method and the testing results show the method is valid for taint-style vulnerabilities in PHP code.
A rotor position observer based on hysteresis comparator (HC) was presented to acquire the rotor position angle of the Doubly-fed induction generator (DFIG) under unbalanced grid Voltage conditions. The position and v...
详细信息
With the wide application of network attached storage (NAS), the security problem is becoming more and more serious, together with the increasingly fierce attacks against NAS devices of different manufacturers. In ord...
详细信息
Nowadays, the vulnerability in the software upgrade process are extremely harmful to network security. However, the detection of upgrade vulnerability is facing serious difficulties and problems. Aiming at the current...
详细信息
DDoS attack and defense is regarded as a multistage signaling game with observable actions. Its extensive form is given out, and its perfect bayesian nash equilibrium is solved. The current problems encountered by DDo...
详细信息
Dynamic networks are ubiquitous. Detecting dynamic network changes is helpful to understand the network development trend and discover network anomalies in time. It is a research hotspot at present. The structure of t...
详细信息
Vulnerability detection, especially vulnerability automatic detection, have long been an area of active research. Considering that RNN can model dependencies automatically, we propose a recurrent neural network (RNN) ...
详细信息
In the existing scheduling algorithms of mimicry structure, the random algorithm cannot solve the problem of large vulnerability window in the process of random scheduling. Based on known vulnerabilities, the algorith...
详细信息
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole country. Blackouts are almost always caused by cascading failures. This paper first analyzes th...
详细信息
IP geolocation technology can estimate or determine the geographical location of terminal device through IP address, which is an important basis for location-based network services. The existing IP geolocation methods...
详细信息
暂无评论