Binary translation system,a technique for translating executable binary program,could transform the code operating on a system structure into the command of another system ***,in multi-source translation system,the ef...
详细信息
Binary translation system,a technique for translating executable binary program,could transform the code operating on a system structure into the command of another system ***,in multi-source translation system,the efficiency in floating point instruction translation realized by relying on software is not *** floating point computation capacity is the important indicator of computer *** taking SW processor as the target platform,translation algorithm for floating point optimization based on QEMU translation system is put *** mainly includes the following two stages:firstly,the content of identifying floating point computation invoking helper function,the number obtaining parameter and returned value,data type information;secondly,the floating point operation of changing into local floating point operation and reduce the redundant floating points according to the standard of *** to the experiment of NPB test set,it manifests that the average speed-up ratio of floating point optimization algorithm can reach 30%.
By allocating IP address and changing IP address in source and destination hosts, network address space randomization is committed to construct a dynamic and heterogeneous network to decrease the attacking possibility...
详细信息
By allocating IP address and changing IP address in source and destination hosts, network address space randomization is committed to construct a dynamic and heterogeneous network to decrease the attacking possibility and *** research mainly deploys the features of OpenF low network including data plane and control plane decoupling, centralized control of the network and dynamic updating of forwarding rules, combines the advantages of the network address space randomization technology with the features of the Open Flow network, and designs a novel resolu-tion towards IP conversion in Floodlight *** research can help improve the unpredic-tability and decrease the possibility of worm attacking and IP sniffing by IP allocation.
The SIMD(Single Instruction Multiple Data) extension component has been widely used in modern processors to improve the execution efficiency of the *** mainstream compilers(such as GCC,ICC,OPEN64,etc.) have supported ...
详细信息
The SIMD(Single Instruction Multiple Data) extension component has been widely used in modern processors to improve the execution efficiency of the *** mainstream compilers(such as GCC,ICC,OPEN64,etc.) have supported the SIMD automatic *** current compilers can only vectorize the innermost layer of the loop,but this way often does not get the optimal performance *** at this kind of problem and combining with the processor architecture,a loopnest vectorization method based on the benefit analysis model is proposed and implemented in the GCC *** method can analyze different loop-nest vectorization schemes effectively and choose the most profitable one as the final optimization *** article first reviewed the researches about loop-nest vectorization,then introduces this new code generation method for loop-nest ***,we use several common application examples for *** experimental results show that the results of the benefit model are similar to the actual test results,and accordingly increase the efficiency for loop-nest vectorization.
Dynamic Binary Translation(DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of ***,there exist some factors that impede its performance:high translation ...
详细信息
Dynamic Binary Translation(DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of ***,there exist some factors that impede its performance:high translation overhead and translated code of low *** this work,we take advantage of host registers,using register mapping strategy to promote the performance of *** mapping registers from guest Instruction-Set Architectures(ISA) to host machines,it could off-load the overhead caused by load and store operations of *** simplifying the rules of the intermediate code generated,it could lower the number of intermediate code and improve the quality of translated *** X86 to ALPHA on SPEC 2006,the code expansion reduces 32.86%and the performance of the optimized translator is improved by 7.55%.
Concerning the identity-based binary tree key revocation scheme, the storage and use of binary tree can not be guaranteed in open cloud environment. This paper proposes a distributed key revocation scheme based on sha...
详细信息
Concerning the identity-based binary tree key revocation scheme, the storage and use of binary tree can not be guaranteed in open cloud environment. This paper proposes a distributed key revocation scheme based on shared binary tree. The scheme splits the binary key tree into branches and distributes them to multiple nodes to save. Then multiple nodes work together to rebuild the key. At the same time, this paper optimizes the lookup algorithm during rebuilding. It solves the issues on distributed storage, safe use and fast reconstruction of the binary tree in the open environment. Experiments and analysis show that the scheme has higher efficiency and makes identity-based key revocation scheme run safely in the open environment.
In order to improve the transmission efficiency, security and anonymity of Tor anonymous communication system, this paper analyzes the efficiency of Tor anonymous system through research and analysis of the security a...
详细信息
In order to improve the transmission efficiency, security and anonymity of Tor anonymous communication system, this paper analyzes the efficiency of Tor anonymous system through research and analysis of the security and vulnerability of transmission mechanism, encryption rules and node distribution of Tor anonymous network system, and then proposes an efficient improved model EFTAN for Tor anonymous network, and finally obtains a network system that can improve the efficiency, security and anonymity of the anonymous communication.
The virtual block device is the data carrier of virtual machine(VM) and user information,while the file system is the ultimate goal of many *** proposed a security device named virtual block device mapping to file(VBD...
详细信息
The virtual block device is the data carrier of virtual machine(VM) and user information,while the file system is the ultimate goal of many *** proposed a security device named virtual block device mapping to file(VBD-MF) that can translate block-level operations into file-level ones by building a mapping from blocks to ***-MF could provide an out-of-VM way to monitor the file system with no modification on the code of virtual machine monitor(VMM)and guest OS,and it also provided other security tools and methods with direct interface to operate the file *** implemented a prototype on Linux and *** evaluation shows that VBD-MF has a better capability of monitoring with some loss on performance of read and *** to the traditional monitoring of host-based file system,VBD-MF has a better hidden and safety property.
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogen...
详细信息
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogeneous,and the software stacks on them are customizable and flexible as *** dynamic information extraction and analysis technologies have been successfully used for general platform in vulnerability mining,malicious code detection and so on,its usage on embedded system lags behind *** paper provides(1) a CrossPlatform-Dynamic Instrumentation Framework,which,by leveraging an extensible intermediate code module and a semantic constraint database,decouples the instrumentation plugins from underlying hardware and OS;(2) a set of instrumentation interfaces which may be implemented by plugins to extract runtime state of various code granularity;(3) ability of system semantic introspection to extract processes and modules information(system semantic views),by using system attribute description files and abstract state extraction *** with TEMU and DECAF,our method shows more advantages in performance of abstract state extraction,and reducing the time and memory overhead.
It is effective to ensure the credibility of program to monitor the real-time status in the whole process when the program is been executed. Aiming at the problem of high convexity of feature extracting and interactio...
详细信息
It is effective to ensure the credibility of program to monitor the real-time status in the whole process when the program is been executed. Aiming at the problem of high convexity of feature extracting and interaction between false positive and false negative rate in current study, this paper proposed one kind of program behaviour model based on the dependencies. It constituted variable-length system call sequences according to the sifting and relevance analysing of system calls generated from running program. We can get the feature sequence through layered analysing, aggregation and simplification. Experiments on the selected samples show that the model is feasible and has better control on false positive and false negative rate.
Recursive relation mainly describes the unique law satisfied by a sequence, so it plays an important role in almost all branches of mathematics. It is also one of the main algorithms commonly used in computer programm...
详细信息
暂无评论