With the rapid development of supercomputers, the scale and complexity are ever increasing, and the reliability and resilience are faced with larger challenges. There are many important technologies in fault tolerance...
详细信息
With the rapid development of supercomputers, the scale and complexity are ever increasing, and the reliability and resilience are faced with larger challenges. There are many important technologies in fault tolerance, such as proacrive failure avoidance technologies based on fault prediction, reactive fault tolerance based on checkpoint, and scheduling technologies to improve reliability. Both qualitative and quantitative descriptions on characteristics of system faults are very critical for these technologies, This study analyzes the source of failures on two typical petascale supercomputers called Sunway BlueLight (based on multi-core CPUs) and Sunway TaihuLight (based on heterogeneous manycore CPUs). It uncovers some interesting fault characteristics and finds unknown correlation relationship among main components' faults. Finally the paper analyzes the failure time of the two supercomputers in various grains of resource and different time spans, and builds a uniform multi-dimensional failure time model for petascale supereomputers.
Binary code similarity detection(BCSD) has many security applications and has attracted a lot of focus. But existing solutions for BCSD problems mainly focus on comparing the similarity between two binary functions an...
详细信息
ISBN:
(纸本)9781665418683
Binary code similarity detection(BCSD) has many security applications and has attracted a lot of focus. But existing solutions for BCSD problems mainly focus on comparing the similarity between two binary functions and what need to be compared is not always a pair of equal-size binary *** solve the problem of searching similar binary code for a small size program in a large size program, in this manuscript,we propose a searching method based on the influence of basic block vertex. Firstly, we formalize the similar code searching problem as a subgraph matching problem and extract the attributed control flow graphs(ACFGs) of the binary ***, we propose a novel metrics to measure the influence of each basic block vertex in query ACFGs and choose the vertex with the largest influence value as the central node. Next, we take the matching nodes of the central node in target ACFG as seed nodes and extending each candidate sub-area from the seed nodes. At last, these candidate sub-areas are further filtered and similar subgraphs are verified in these *** results indicate that the proposed method can find similar binary code efficiently.
Chaos is a similar and random process which is very sensitive to initial value in deterministic *** is a performance of nonlinear dynamical system with built-in *** with the advantages and disadvantages of the present...
详细信息
ISBN:
(纸本)9783038350507
Chaos is a similar and random process which is very sensitive to initial value in deterministic *** is a performance of nonlinear dynamical system with built-in *** with the advantages and disadvantages of the present chaos encryption model,the paper proposes a chaotic stream cipher model based on chaos theory,which not only overcomes finite precision effect,but also improves the randomness of chaotic system and output *** Sequence cycle theory generated by the algorithm can reach more than 10600 at least,which completely satisfies the actual application requirements of stream cipher system.
Wearable devices become popular because they can help people observe health *** battery life is the critical problem for wearable devices. The non-volatile memory(NVM) attracts attention in recent years because of its...
详细信息
Wearable devices become popular because they can help people observe health *** battery life is the critical problem for wearable devices. The non-volatile memory(NVM) attracts attention in recent years because of its fast reading and writing speed, high density, persistence, and especially low idle power. With its low idle power consumption,NVM can be applied in wearable devices to prolong the battery lifetime such as smart bracelet. However, NVM has higher write power consumption than dynamic random access memory(DRAM). In this paper, we assume to use hybrid random access memory(RAM)and NVM architecture for the smart bracelet *** paper presents a data management algorithm named bracelet power-aware data management(BPADM) based on the architecture. The BPADM can estimate the power consumption according to the memory access, such as sampling rate of data, and then determine the data should be stored in NVM or DRAM in order to satisfy low power. The experimental results show BPADM can reduce power consumption effectively for bracelet in normal and sleeping modes.
Network diffusion, such as spread of ideas, rumors, contagious disease, or a new type of behaviors, is one of the fundamental processes within networks. Designing effective strategies for influence spread maximization...
详细信息
Network diffusion, such as spread of ideas, rumors, contagious disease, or a new type of behaviors, is one of the fundamental processes within networks. Designing effective strategies for influence spread maximization, rumor spread minimization, or epidemic immunization has attracted considerable research attention. However, a key challenge is that many times we can only observe the trace of contagion spreading across network, but the underlying network structure is unknown and the transmission rates between node pairs are unclear to us. In this paper, given the observed information cascades, we aim to address two problems:diffusion network structure inferring and information diffusion pathways tracking. We propose a novel probabilistic model called Network Inferring from Multidimensional Features of Cascades(NIMFC) which takes into account heterogeneous features, including temporal and topological features of cascades, node attributes, and information content, to infer the latent network structure and transmission rates of edges. Also, based on the inferred network structure, we may track diffusion pathways of a cascade in social networks. We use blocked coordinate descent method to learn a sparse estimation of the latent network. Our proposed model NIMFC is evaluated both on large synthetic and real-world data sets, and experimental results show that our method significantly outperforms state-of-the-art models both in terms of recovering the latent network structure and information pathway tracking.
To solve polynomial systems,Harrow,Hassidim,and Lloyd(HHL)proposed a quantum algorithm called HHL *** on the HHL algorithm,Chen et *** an algorithm,the solving the Boolean solutions of polynomial systems(PoSSoB)***,Di...
详细信息
To solve polynomial systems,Harrow,Hassidim,and Lloyd(HHL)proposed a quantum algorithm called HHL *** on the HHL algorithm,Chen et *** an algorithm,the solving the Boolean solutions of polynomial systems(PoSSoB)***,Ding et *** the Boolean Macaulay matrix and analyzed the lower bound on the condition *** by Ding et al.’s research,several related algorithms are proposed in this ***,the improved PoSSoB algorithm using the Boolean Macaulay matrix is proved to have lower ***,for solving equations with errors,a quantum algorithm for the max-polynomial system solving(Max-PoSSo)problem is proposed based on the improved PoSSoB ***,the Max-PoSSo algorithm is extended to the learning with errors(LWE)problem and its special case,the learning parity with noise(LPN)problem,providing a quantitative criterion,the condition number,for the security of these basic problems.
Protecting the security of sensitive information has become a matter of great concern to everyone. Data hiding technique solves the problem to some extent, but still, some shortcomings remain for researching. To impro...
详细信息
Protecting the security of sensitive information has become a matter of great concern to everyone. Data hiding technique solves the problem to some extent, but still, some shortcomings remain for researching. To improve the capability of hiding huge data file in disk with high efficiency. In this paper, we propose a novel approach called CryptFS, which is achieved by utilizing the file access mechanism and modifying the cluster chain structure to hide data. CryptFS can quickly hide data file with G bytes size in less than 0.1s. The time used for hiding and recovering data is irrelevant to the size of data file, and the reliability of the hidden file is high, which will not be overlaid by new created file and disk defragment.
This paper addresses detecting taint-style Thisvulnerabilities in PHP code. It extends classical taint-style model with an element called "cleans", which is used to specify sanitation routines. Based on the ...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
This paper addresses detecting taint-style Thisvulnerabilities in PHP code. It extends classical taint-style model with an element called "cleans", which is used to specify sanitation routines. Based on the new model, a static backward taint data analysis method is proposed to detecting taint-style vulnerabilities. This method includes four key steps, first of which is collecting sinks and constructing contexts, the second is backward tracing variables during a basic block, the third is tracing variables between blocks, and the last is tracing variables crossing function call. A tool called POSE implements this method and testing results show that the method is valid for detecting taint-style web application vulnerabilities.
With serious cybersecurity situations and frequent network attacks,the demands for automated pentests continue to increase,and the key issue lies in attack *** the limited viewpoint of the attacker,attack planning und...
详细信息
With serious cybersecurity situations and frequent network attacks,the demands for automated pentests continue to increase,and the key issue lies in attack *** the limited viewpoint of the attacker,attack planning under uncertainty is more suitable and practical for pentesting than is the traditional planning approach,but it also poses some *** address the efficiency problem in uncertainty planning,we propose the APU-D*Lite algorithm in this ***,the pentest framework is mapped to the planning problem with the Planning Domain Definition Language(PDDL).Next,we develop the pentest information graph to organize network information and assess relevant exploitation actions,which helps to simplify the problem ***,the APU-D*Lite algorithm is introduced based on the idea of incremental heuristic *** method plans for both hosts and actions,which meets the requirements of *** the pentest information graph as the input,the output is an alternating host and action *** experiments,we use the attack success rate to represent the uncertainty level of the *** result shows that APU-D*Lite displays better reliability and efficiency than classical planning algorithms at different attack success rates.
JavaScript engine is the core component of web browsers, whose security issues are one of the critical aspects of the overall Web Eco-Security. Fuzzing technology, as an efficient software testing approach, has been w...
详细信息
暂无评论