Concerning the identity-based binary tree key revocation scheme, the storage and use of binary tree can not be guaranteed in open cloud environment. This paper proposes a distributed key revocation scheme based on sha...
详细信息
Concerning the identity-based binary tree key revocation scheme, the storage and use of binary tree can not be guaranteed in open cloud environment. This paper proposes a distributed key revocation scheme based on shared binary tree. The scheme splits the binary key tree into branches and distributes them to multiple nodes to save. Then multiple nodes work together to rebuild the key. At the same time, this paper optimizes the lookup algorithm during rebuilding. It solves the issues on distributed storage, safe use and fast reconstruction of the binary tree in the open environment. Experiments and analysis show that the scheme has higher efficiency and makes identity-based key revocation scheme run safely in the open environment.
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogen...
详细信息
With the widespread application of embedded devices,embedded software vulnerabilities and oriented attacks to embedded system are also *** being wellknown,the hardware architecture of the embedded devices is heterogeneous,and the software stacks on them are customizable and flexible as *** dynamic information extraction and analysis technologies have been successfully used for general platform in vulnerability mining,malicious code detection and so on,its usage on embedded system lags behind *** paper provides(1) a CrossPlatform-Dynamic Instrumentation Framework,which,by leveraging an extensible intermediate code module and a semantic constraint database,decouples the instrumentation plugins from underlying hardware and OS;(2) a set of instrumentation interfaces which may be implemented by plugins to extract runtime state of various code granularity;(3) ability of system semantic introspection to extract processes and modules information(system semantic views),by using system attribute description files and abstract state extraction *** with TEMU and DECAF,our method shows more advantages in performance of abstract state extraction,and reducing the time and memory overhead.
To deal with the problem of external storages management in multiple virtual machines environment, a system design scheme of external storages management is proposed with the idea of virtual memory management and prot...
详细信息
Program logical controllers(PLCs) are the kernel equipment of industrial control system(ICS) as they directly monitor and control industrial processes. Recently, ICS is suffering from various cyber th
ISBN:
(纸本)9781467389808
Program logical controllers(PLCs) are the kernel equipment of industrial control system(ICS) as they directly monitor and control industrial processes. Recently, ICS is suffering from various cyber th
With the rapid development and extensive use of the Internet,network security is the key point of the current research of computer *** router is the key interconnection equipment in the Internet system,and it is neces...
详细信息
With the rapid development and extensive use of the Internet,network security is the key point of the current research of computer *** router is the key interconnection equipment in the Internet system,and it is necessary to improve the security of the router *** routing protocol is used in the packet switching *** communication is implemented by each switching node in the network to forward data *** present,most of the router intrusion detection systems are based on the machine learning *** paper proposes a Long Short Term Memory(LSTM) architecture applied to the Recurrent Neural Network(RNN),and uses the KDD Cup 1999 data set to train the IDS *** performance testing,the ability to efficiently and accurately classify network traffic into attacks and normal capabilities.
Software diversity has been proven to be an effective approach to enhance system *** make the best of the advantage brought by software diversity,a multi-variant execution environment is ***,although some MVEEs have b...
详细信息
Software diversity has been proven to be an effective approach to enhance system *** make the best of the advantage brought by software diversity,a multi-variant execution environment is ***,although some MVEEs have been proposed,most of them are either too simple or only focusing one aspect which limits their widely adoption in *** this paper we propose a framework for multi-variant execution environment to enhance the security of software *** framework addresses different aspects when implementing a MVEE and can help to make the best of software diversity to enhance the system's security.
In recent years,modern web applications are becoming more and more complex and it makes difficult for developers to audit the *** number of attacks against these applications has increased *** detection techniques for...
详细信息
In recent years,modern web applications are becoming more and more complex and it makes difficult for developers to audit the *** number of attacks against these applications has increased *** detection techniques for web applications are badly in *** after execution(EAR) vulnerability is a kind of logic flaws for web *** allows the server-side execution continuing after the intended halting *** may result in serious consequences such as information *** this paper,we propose a path-sensitive inter-procedural analysis to detect EAR vulnerabilities in PHP web *** analysis improves the traditional detection method by verifying the path conditions and considers more details which may influence the false-positive *** have shown how our approach can handle situations where other existing tools may fail by some real-world examples.
Vulnerability detection, especially vulnerability automatic detection, have long been an area of active research. Considering that RNN can model dependencies automatically, we propose a recurrent neural network(RNN) b...
详细信息
Vulnerability detection, especially vulnerability automatic detection, have long been an area of active research. Considering that RNN can model dependencies automatically, we propose a recurrent neural network(RNN) based method for binary code vulnerability detection. We collected correspond to 4 types of vulnerabilities, including CWE-134, CWE-191, CWE-401 and *** find which RNN is better in vulnerability detection, we evaluated 6 different RNNs, including SRNN, BSRNN, LSTM, BLSTM, GRU and BGRU. The results demonstrated that BSRNN is better than others in vulnerability detection.
The supply of open source and open source components is growing at an alarming rate,while vulnerabilities in open source components are *** supply chain analysis aims to discover third-party components and open source...
详细信息
The supply of open source and open source components is growing at an alarming rate,while vulnerabilities in open source components are *** supply chain analysis aims to discover third-party components and open source code used in a software,and analyze the software's dependence on *** this paper,we propose a software component analysis method and a known vulnerabilities detecting *** scanning the open source components of the binary file and conducting vulnerability analysis,the known vulnerabilities are *** paper mainly solves the problem of detecting known vulnerabilities in the supply chain of binary *** conducted a case analysis and achieved good results.
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole *** are almost always caused by cascading *** paper first analyzes the global blackouts in the ...
详细信息
The safe and stable operation of power system is related to the national economy and people's livelihood of the whole *** are almost always caused by cascading *** paper first analyzes the global blackouts in the past 20 years,and points out that the scale and probability distribution of blackouts obey the power-law ***,it is concluded that transmission line fault,bus fault,large-scale power flow transfer and relay protection device misoperation are the main factors causing cascading ***,the five stages of cascading failure evolution are analyzed,which are slow successive interruption process,fast successive interruption process,transient oscillation,avalanche blackout and long ***,the research results of cascading failure at home and abroad in recent years are analyzed from three research points:small world network,topological network and two-layer coupling network.
暂无评论