Previous studies have shown how to 'fingerprint' certain image processing operation. In this paper, we model the gray-level cumulative distribution of histogram-equalized image as discrete identity function, w...
详细信息
To improve the efficiency of analyzing malware behaviors and increase the validity of the test data, this paper proposes a parallel target-directed analysis method for malware behaviors, which combines static analysis...
详细信息
ISBN:
(纸本)9781849199285
To improve the efficiency of analyzing malware behaviors and increase the validity of the test data, this paper proposes a parallel target-directed analysis method for malware behaviors, which combines static analysis with concolic testing techniques. It first uses static analysis techniques to identify and locate those interactive or input points and sensitive behavior functions. Then based on the distributed platform, by combining symbolic execution and concrete dynamic execution together and taking malware sensitive behaviors as the leading target, the parallel target-directed algorithm of searching sensitive paths and the method of leading and approaching sensitive behaviors are designed. It leads to traverse the sensitive functions, obtain the sensitive paths which can reach the sensitive behavior areas by path backtracking, and generate the corresponding test data. Finally, it finishes the analysis and test of malware behaviors. Experiments show that, compared with fuzz and full paths covering and traversing technique, this method can generate test data more efficiently, reduce the number of paths to be analyzed, and improve the analysis speed and efficiency of malware behaviors.
Current network assessment models often ignore the impact of attack-defense timing on network security, making it difficult to characterize the dynamic game of attack-defense effectively. To effectively manage the net...
详细信息
At present, APT attack detection mainly focuses on the specific realization of detection technology, and there is little research on the timing strategy for active detection of APT attack. This paper focuses on the pr...
详细信息
With the development of attack technology, identifying the real intention of network attack and avoiding further deterioration of security situation has become a hot research topic in recent years. This paper proposes...
详细信息
Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2;based on the following two properties of disturbance *** property is the weight correlation between the first 1...
详细信息
Dear editor,We present a new algorithm to search for effective disturbance vectors with a complexity of 2;based on the following two properties of disturbance *** property is the weight correlation between the first 16-step disturbance vectors and the60-step disturbance *** other property requires all the differences of the active bit positions of the first 16-step disturbance vectors to be
We introduce the concept of a socio-rational secret sharing scheme, in which shares are delivered based on players' reputation and the way they contact with other participants. At the secret sharing stage, weights...
详细信息
Although many classical IP geolocation algorithms are suitable to rich-connected networks, their performances are seriously affected in poor-connected networks with weak delay-distance correlation. This paper tries to...
详细信息
Although many classical IP geolocation algorithms are suitable to rich-connected networks, their performances are seriously affected in poor-connected networks with weak delay-distance correlation. This paper tries to improve the performances of classical IP geolocation algorithms by finding rich-connected sub-networks inside poor-connected networks. First, a new delay-distance correlation model (RTD-Corr model) is proposed. It builds the relationship between delay-distance correlation and actual network factors such as the tortuosity of the network path and the ratio of propagation delay. Second, based on the RTD-Corr model and actual network characteristics, this paper discusses about how to find rich-connected networks inside China Intemet which is a typical actual poor-connected network. Then we find rich-connected sub-networks of China Intemet through a large-scale network measurement which covers three major ISPs and thirty provinces. At last, based on the founded rich-connected sub-networks, we modify two classical IP geolocation algorithms and the experiments in China Intemet show that their accuracy is significantly increased.
The task of next POI recommendations has been studied extensively in recent ***,developing a unified recommendation framework to incorporate multiple factors associated with both POIs and users remains challenging,bec...
详细信息
The task of next POI recommendations has been studied extensively in recent ***,developing a unified recommendation framework to incorporate multiple factors associated with both POIs and users remains challenging,because of the heterogeneity nature of these ***,effective mechanisms to smoothly handle cold-start cases are also a difficult *** by the recent success of neural networks in many areas,in this paper,we propose a simple yet effective neural network framework,named NEXT,for next POI *** is a unified framework to learn the hidden intent regarding user's next move,by incorporating different factors in a unified ***,in NEXT,we incorporate meta-data information,e.g.,user friendship and textual descriptions of POIs,and two kinds of temporal contexts(i.e.,time interval and visit time).To leverage sequential relations and geographical influence,we propose to adopt DeepWalk,a network representation learning technique,to encode such *** evaluate the effectiveness of NEXT against other state-of-the-art alternatives and neural networks based *** results on three publicly available datasets demonstrate that NEXT significantly outperforms baselines in real-time next POI *** experiments show inherent ability of NEXT in handling cold-start.
Due to the outstanding problems of software trustworthiness, the measurement of software trustworthiness has aroused more and more concern. However, few researches pay attention to using more rigorous approaches in th...
暂无评论