The'Principles of Computer Organization' is the core basic course for the construction of computer hardware courses. In this paper, it analyzes the characteristics of the 'Principles of Computer Organizati...
详细信息
To address the problem that traditional network defense techniques are difficult to cope with scanning attacks launched by internal attackers, this paper proposes a Virtual Network Topology Deception Defense mechanism...
详细信息
The taint propagation strategy is the core of the taint analysis technology. When the taint analysis toolsanalyses the target program, it needs to mark the target data according to the formulatedtaint propagation stra...
Network topology construction is one of the basic means to study the target network. Whether it is the discovery of vital nodes, IP location or network characteristics mining, a complete and accurate network topology ...
详细信息
Taint analysis is a common technology for software analysis, which is widely used in the region of information security. Aiming at the problem that the existing binary program dynamic taint analysis framework does not...
详细信息
Industrial Control Systems (ICSs) are widely deployed in critical infrastructures, such as electric power, water filtration and distribution. Programmable Logic Controllers (PLCs) work as the core components of an ICS...
详细信息
Security of online software upgrade has become one of the most important evaluation criteria of cyber security. It is too inefficient to evaluate the security of software upgrade by manual reverse analysis method, whi...
详细信息
Fuzzing [1] is a well-known technique which was employed to provide unexpected or random data as input to JavaScript engines in hopes of finding a security vulnerability. For effective fuzzing, the input must be both ...
详细信息
With the continuous development of trusted computing, the integrity measurement has gradually been practical;but the popularization and application of the existing measurement tools are still restricted by their own m...
详细信息
The security of the IoT has become a hot research area in cyberspace security, among which the malware is a major threat. Based on the ATT&CK model, this paper studies the composition and behavior of IoT malware, ...
详细信息
暂无评论