To achieve the scalability and Quality of Service (QoS) of multicast service, a Wide-Sense Circuit Tree (WSCT) based on Aggregated Multicast Tree is proposed. By aggregating multicast traffics of the same class, WSCT ...
详细信息
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se...
详细信息
ISBN:
(纸本)9781939133441
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the security of PoS blockchains once signing keys get corrupted. That is, after an adversary obtains enough signing keys, it can break the immutable nature of PoS blockchains by forking the chain and modifying the history from some point in the past. Forward-secure multi-signature (FS-MS) schemes can overcome this issue by periodically updating signing keys. The only FS-MS construction currently available is Drijvers et al's Pixel, which builds on pairing groups and only achieves forward security at the time period level. In this work, we present new FS-MS constructions that either are free from pairing or capture forward security at the individual message level (i.e., fine-grained forward security). Our first construction Pixel+ works for a maximum number of time periods T. Pixel+ signatures consist of only one group element, and can be verified using two exponentiations. It is the first FS-MS from RSA assumption, and has 3.5x and 22.8x faster signing and verification than Pixel, respectively. Our second FS-MS construction Pixel++ is a pairing-based one. It immediately revokes the signing key's capacity of re-signing the message after creating a signature on this message, rather than at the end of the current time period. Thus, it provides more practical forward security than Pixel. On the other hand, Pixel++ is almost as efficient as Pixel in terms of signing and verification. Both Pixel+ and Pixel++ allow for non-interactive aggregation of signatures from independent signers and are proven to be secure in the random oracle model. In addition, they also support the aggregation of public keys, significantly reducing the storage overhead on PoS blockchains. We demonstrate how to integrate Pixel+ and Pixel++ into PoS blockchains. As a proof-of-concept, we prov
Information technology facilitates people's lives greatly,while it also brings many security issues,such as code plagiarism,software in-fringement,and malicious *** order to solve the problems,reverse engineering ...
Information technology facilitates people's lives greatly,while it also brings many security issues,such as code plagiarism,software in-fringement,and malicious *** order to solve the problems,reverse engineering is applied to analyze abundant binary code manually,which costs a lot of ***,due to the maturity of different obfuscation techniques,the disassembly code generated from the same function differs greatly in the opcode and control flow graph through different obfuscation *** paper propose a method inspired by natural language processing,to realize the semantic similarity matching of binary code in basic block granularity and function *** the similarity matching task of binary code obtained by different obfuscation options of LLVM,the indicator reaches 99%,which is better than the existing technologies.
Quantum computing is a new computing mode that follows the laws of quantum mechanics to control quantum information units for computation. In terms of computational efficiency, due to the existence of quantum mechanic...
详细信息
Malware clustering analysis plays an important role in largescale malware homology analysis. However, the generation approach of the ground truth data is usually ignored. The labels from Anti-virus(AV)engines are most...
Malware clustering analysis plays an important role in largescale malware homology analysis. However, the generation approach of the ground truth data is usually ignored. The labels from Anti-virus(AV)engines are most commonly used but some of them are inaccurate or inconsistent. To overcome the drawback, many researchers make ground truth data based on voting mechanism such as AVclass, but this method is difficult to evaluate different-granularity clustering results. Graphbased method like VAMO is more robust but it needs to maintain a largesize database. In this paper, we propose a novel evaluation model named MalCommunity based on the graph named Malware Relation Graph. Different from VAMO, the construction of the graph is free from a largesize database and just needs the AV label information of the samples in the test set. We introduce community detection algorithm Fast Newman to divide the sample set and use modularity parameter to measure the target clustering results. The experiment results indicate that our model has the ability of noise immunity of malware family classification inconsistency and granularity inconsistency from AV labels. Our model is also convenient to evaluate different-granularity clustering methods with different heights.
REST NBI (REST Northbound API) is the mainstream NBI implementation method of current SDN controllers, but none of them has achieved authorization management, which leads to serious privilege abuse problems. In this p...
详细信息
Due to disjoint memory references and non-aligned memory references, existing SIMD compilers can't vectorize loops containing indirect array utilizing SIMD(Single Instruction Multiple Data) instructions. However, ...
详细信息
Due to disjoint memory references and non-aligned memory references, existing SIMD compilers can't vectorize loops containing indirect array utilizing SIMD(Single Instruction Multiple Data) instructions. However, addressing this problem is inevitable, since many important applications extensively use this program pattern to reduce memory and computation requirement. In this paper, we propose a new efficient code generation technique for indirect array. For an irregular indirect array access, we adopt two separately registers to store the array base and the index address. It significantly contributes to the performance improvement by vectorizing more loops and reducing the overheads. We also developed this method in our auto-vectorization compiler SW-VEC. The experimental results show that the proposed method can translate applications within direct array access into high-performance targeted vectorized codes, thereby advancing the execution efficiency adequately.
Sleep is a very important physiological process for humans, and sleep staging is an important basis for evaluating sleep quality and diagnosing sleep-related diseases. Manual sleep staging is time-consuming and labori...
详细信息
Nowadays,many applications are too big to keep their own *** analysis is a technique which can be used for ensure the safety of large ***,frequent calls to libraries and frameworks bring a lot of difficulties to the *...
详细信息
ISBN:
(纸本)9781510823808
Nowadays,many applications are too big to keep their own *** analysis is a technique which can be used for ensure the safety of large ***,frequent calls to libraries and frameworks bring a lot of difficulties to the *** propose the specification inference to solve the *** survey the recent advances in specification inference techniques and divide them into three groups by the methods they adopt which are domain specific language(DSL),data mining and abductive inference,*** we take a detailed look at the representative results in each *** is our hope that we can see more creative achievements in this field by doing this work.
Binary translation system,a technique for translating executable binary program,could transform the code operating on a system structure into the command of another system ***,in multi-source translation system,the ef...
详细信息
Binary translation system,a technique for translating executable binary program,could transform the code operating on a system structure into the command of another system ***,in multi-source translation system,the efficiency in floating point instruction translation realized by relying on software is not *** floating point computation capacity is the important indicator of computer *** taking SW processor as the target platform,translation algorithm for floating point optimization based on QEMU translation system is put *** mainly includes the following two stages:firstly,the content of identifying floating point computation invoking helper function,the number obtaining parameter and returned value,data type information;secondly,the floating point operation of changing into local floating point operation and reduce the redundant floating points according to the standard of *** to the experiment of NPB test set,it manifests that the average speed-up ratio of floating point optimization algorithm can reach 30%.
暂无评论