As the present fusing strategies cannot utilize the correlation of different detection results for image steganography effectively, a steganalysis method is proposed based on fusing SVM classifiers. Firstly, different...
详细信息
ISBN:
(纸本)9781467391672
As the present fusing strategies cannot utilize the correlation of different detection results for image steganography effectively, a steganalysis method is proposed based on fusing SVM classifiers. Firstly, different feature subsets are used for the training of SVM classifiers. Secondly, the detection results of multi-classifiers are utilized to train a fusing classifier, the fusing classifier can learn the correlation and diversity of detection results of sub-classifiers. From the experimental result, it can be seen that the proposed steganalysis method can achieve better detection performance for J-UNIWARD steganography compared with voting and Bayesian methods.
Software vulnerability detection is crucial for maintaining the security and stability of software systems. In this paper, we propose a novel neural network model called TS-GGNN to address the problem of vulnerability...
Software vulnerability detection is crucial for maintaining the security and stability of software systems. In this paper, we propose a novel neural network model called TS-GGNN to address the problem of vulnerability detection in source code slices. The TS-GGNN model effectively captures both local and global features of vulnerable code by fusing sequence features with graph features. To achieve this, we utilize graph structure and sequence structure learning approaches to comprehensively extract valuable information from the source code slices. Our experiments are conducted on the SARD dataset, which consists of 61,638 code samples annotated for the presence or absence of vulnerabilities. The results demonstrate that TS-GGNN has the best vulnerability detection performance, with an accuracy of 99.4%, a precision of 98.81%, and an F1 score as high as 99.4% thereby validating the effectiveness of the TS-GGNN model in capturing features relevant to software vulnerabilities.
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper summarizes the UEFI platform firmware framework structure as well as its potential security problems. Then the vulnerability factors of...
详细信息
ISBN:
(纸本)9781538665664;9781538665657
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper summarizes the UEFI platform firmware framework structure as well as its potential security problems. Then the vulnerability factors of UEFI platform firmware are described using the modeling language. This paper proposes an improved Attack Graphs model based on Finite state Machine (AGFSM), which can be used to evaluate the reliability of UEFI, as well as calculate the expected exploitation cost and expected attack loss. Finally, based on the AGFSM model, we realize the evaluation of a set of attack strategies for the UEFI platform firmware and verify the rationality of the model and the validity of the evaluation. The research is conducive to the rapid detection of the vulnerability of UEFI Platform Firmware, predict the attack paths and deploy the security strategy targeted to safeguard the firmware.
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l...
详细信息
ISBN:
(数字)9781728170084
ISBN:
(纸本)9781728170091
Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good learning experience for students at home. This paper presents an online teaching model based on the idea of Problem-Based Learning (PBL) and take “Data Structure” as an example to discuss the design of teaching process and problems.
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu...
详细信息
ISBN:
(数字)9781728186351
ISBN:
(纸本)9781728186368
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resulting in abnormal execution of contract and out of control. Vulnerable contracts with such attacks will directly lead to the loss of a large amount of property. To evaluate the effectiveness of such Double-Access Attack, we conducted theoretical analysis and experimental verification, finding attack success rate is 100% under the condition that dynamic array length is controllable.
Mobile target defense technology not only protects system security, but also increases the cost of system operation. How to reduce the defense cost as much as possible while achieving the defense function is a current...
详细信息
ISBN:
(数字)9781728165790
ISBN:
(纸本)9781728165806
Mobile target defense technology not only protects system security, but also increases the cost of system operation. How to reduce the defense cost as much as possible while achieving the defense function is a current research point. This article proposes a dynamic protocol stack for sniffing attacks. By constructing a protocol stack that dynamically transforms the protocol format, it increases the difficulty of the attacker's reverse analysis of the protocol format, so that even if the attacker captures the data packet, he cannot obtain the sensitive data carried in it. At the same time, based on the idea of dynamic protocol stack, this paper uses dynamic game with incomplete information as the theoretical basis to establish a multi-stage mobile target defense game model. Through quantitative analysis of the costs and benefits of both offense and defense, the optimal defense strategy for attacks of varying degrees of damage is selected. Finally, the feasibility and effectiveness of the model are proved through simulation experiments.
Kernel-level Rootkit injects malicious code in the system kernel and realizes vicious function by modifying kernel code and data. The emergence of virtualization technology makes Rootkit hide itself and accesses syste...
详细信息
ISBN:
(纸本)9781479999620
Kernel-level Rootkit injects malicious code in the system kernel and realizes vicious function by modifying kernel code and data. The emergence of virtualization technology makes Rootkit hide itself and accesses system resources effectively. This paper proposes a kind of Rootkit based on VMM (VMRootkit) which can hide system process and system cannot find it. For realizing it, we firstly puts forward formal model of VMRootkit about cooperative concealment combined with Trojans thought about cooperative concealment, then researches the process switch and data structure of operating system and realized prototype of it, which can monitor system process and realize process depth hiding by modifying data structure related process view. Experiment shows that VMRootkit prototype meets the idea of cooperative concealment, can realize process depth hiding and has better hidden property than kernel-level Rootkit.
In Linux Address Space layout Randomization, not all memory addresses are random. Executable Program is still loaded to a static address, so an attacker can do code reuse attack by using gadgets in executable program ...
详细信息
ISBN:
(纸本)9781479999620
In Linux Address Space layout Randomization, not all memory addresses are random. Executable Program is still loaded to a static address, so an attacker can do code reuse attack by using gadgets in executable program code segment. To improve the weaken ASLR, this paper proposes and implements a new protection method named EPCSAR (Executable Program Code Segment Address Randomization). Taking advantage of static analysis results of IDA, EPCSAR used an IDA plugin to identify the instructions needing relocation in the ELF executable program. By modifying the ELF loader, EPCSAR mapped the executable program code segment into a random address. Evaluation shows the EPCSAR can defense the code reuse attack using gadgets in static region, and only has low runtime overhead of 1.31%.
Network topology is one of the most important parts in network security situation awareness tasks. Considering that the topology may change due to network intrusion, adjustment of routing policies, etc., the tradition...
详细信息
Device simulation is an important method of embedded device security analysis, due to the extensive and heterogeneous nature of the current peripherals, the existing simulation technology for peripheral simulation is ...
详细信息
Device simulation is an important method of embedded device security analysis, due to the extensive and heterogeneous nature of the current peripherals, the existing simulation technology for peripheral simulation is mostly fuzzy, to find the input and output that meet the firmware requirements as the main goal. In order to construct a template based on IO interface identification to extend the peripheral simulation scheme, this paper identifies the IO interface without firmware source code based on the characteristics of the IO configuration process in MCU firmware. Through experimental comparison, this method has a certain effect in MCU firmware interface recognition.
暂无评论