Eavesdropping attacks have seriously threatened network security. Attackers could eavesdrop on target nodes and link to steal confidential data. In the traditional network architecture, the static routing path and the...
详细信息
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine...
详细信息
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine binary similarity,achieved great ***,we found that the existing frameworks often ignored the complex internal structure of instructions and didn’t fully consider the long-term dependencies of *** this paper,we propose firmVulSeeker—a vulnerability search tool for embedded firmware images,based on BERT and Siamese *** first builds a BERT MLM task to observe and learn the semantics of different instructions in their context in a very large unlabeled binary ***,a finetune mode based on Siamese network is constructed to guide training and matching semantically similar functions using the knowledge learned from the first ***,it will use a function embedding generated from the fine-tuned model to search in the targeted corpus and find the most similar function which will be confirmed whether it’s a real vulnerability *** evaluate the accuracy,robustness,scalability and vulnerability search capability of *** show that it can greatly improve the accuracy of matching semantically similar functions,and can successfully find more real vulnerabilities in real-world firmware than other tools.
As more embedded environments need license plate recognition systems, how to recognize car plates with high speed/accuracy and low energy has become an important and challenging problem. In this paper, we propose a ul...
详细信息
Cisco IOS is an operating system that runs on Cisco routing and switching *** security is important to the entire *** vulnerability attacks have become one of the main sources of threat to Cisco IOS security,it is nec...
详细信息
Cisco IOS is an operating system that runs on Cisco routing and switching *** security is important to the entire *** vulnerability attacks have become one of the main sources of threat to Cisco IOS security,it is necessary to analyze the defense mechanism of IOS against vulnerability *** purpose of this paper is to find out the deficiencies of IOS vulnerability defense mechanism in time and put forward improvement methods and preventive ***,this paper introduces the protection mechanism of Cisco IOS vulnerability,including CheckHeaps,DEP,*** principle of these mechanisms and the idea of vulnerability protection are *** then,after analyzing the shortcomings of these protection mechanisms,the basic idea of bypassing these protection mechanisms is ***,in view of the shortcomings of Cisco IOS vulnerability defense mechanism and the proposed bypass methods,some advices about how to better protect Cisco IOS from vulnerability exploitation are given.
Large-scale graph data is a research hotspot in the processing of big data and is generally used in traffic management, analysis of social network and semantic web, etc., resulting in the emergence of a variety of lar...
详细信息
Large-scale graph data is a research hotspot in the processing of big data and is generally used in traffic management, analysis of social network and semantic web, etc., resulting in the emergence of a variety of large-scale graph computing platforms. How to select a more suitable graph computing platform for different tasks has become one of the hot topics in the field of graph computing. The related knowledge of graph computing models is systematically reviewed in this paper. First of all, the concept of graph computing model is outlined, including the definition and characteristics of graph computing and the development of graph computing models. Then, three kinds of graph computing models are introduced. Finally, the development process of the graph computing models is summarized, and the future research direction is prospected.
Fuzzing is an effective approach to detect software vulnerabilities utilizing changeable generated inputs. However, fuzzing the network protocol on the firmware of IoT devices is limited by inefficiency of test case g...
详细信息
A key problem in spoken language identification (LID) is how to effectively model features from a given speech utterance. Recent techniques such as end-to-end schemes and deep neural networks (DNNs) utilising transfer...
详细信息
With the continuous development of quantum communication in recent years, quantum key distribution (QKD) has also become a key technology in the field of quantum communication. Due to the limitation of physical resour...
详细信息
Federated learning is a promising learning paradigm that allows collaborative training of models across multiple data owners without sharing their raw *** enhance privacy in federated learning,multi-party computation ...
详细信息
Federated learning is a promising learning paradigm that allows collaborative training of models across multiple data owners without sharing their raw *** enhance privacy in federated learning,multi-party computation can be leveraged for secure communication and computation during model *** survey provides a comprehensive review on how to integrate mainstream multi-party computation techniques into diverse federated learning setups for guaranteed privacy,as well as the corresponding optimization techniques to improve model accuracy and training *** also pinpoint future directions to deploy federated learning to a wider range of applications.
With the development of network security research, network attack modeling and analysis techniques have been paid more and more attention. A generalized stochastic colored Petri Net (GSCPN) Model is proposed. To each ...
详细信息
暂无评论