As an important program analysis method, taint analysis technology has been widely used in the field of vulnerability detection. However, the existing dynamic taint analysis needs to design instruction-by-instruction ...
详细信息
ISBN:
(纸本)9781665490832
As an important program analysis method, taint analysis technology has been widely used in the field of vulnerability detection. However, the existing dynamic taint analysis needs to design instruction-by-instruction taint propagation rules, which is expensive and has a high false positive rate for identifying the implicit control flow of the target program. In view of the above problems, this paper proposes a dynamic taint analysis method nnTaint based on neural network for the existing taint-guided fuzzing technology, which has the characteristics of low cost and low false positives. Comparing nnTaint with the existing taint analysis tools, the operation efficiency is improved by 10.9%-18.8% compared with the traditional taint analysis, which reduces the cost of the existing dynamic taint analysis technology to a certain extent. On the LAVA-M testing datasets and GNU binutils program, nnTaint improves the edge coverage by 4.7%-16% compared with the existing taint-guided fuzzing tools, effectively improving the implicit control flow recognition accuracy of the existing dynamic taint analysis. The results show that nnTaint can improve the efficiency and accuracy of existing dynamic taint analysis tools.
Recent years have seen a rapid growth of location-aware applications such as targeted marketing, restricted content delivery and location-based security check. Although existing delay-based IP geolocation techniques w...
详细信息
ISBN:
(纸本)9781467381161
Recent years have seen a rapid growth of location-aware applications such as targeted marketing, restricted content delivery and location-based security check. Although existing delay-based IP geolocation techniques work well in some developed countries, the assumption of a strong delay-distance correlation that they often rely on may fail in many developing countries for poor network connectivity. To obtain more accurate delay-based IP geolocation results in poor-connected networks, an IP geolocation method based on rich-connected sub-networks is presented in this paper. At first, the network connectivity of one particular network is measured. Next, if the network is poor-connected, the method will divide it and search rich-connected sub-networks based on properties such as ISP and location information of probing hosts and landmarks. Then, based on the discovered rich-connected sub-networks, landmarks and probing hosts are deployed and selected to measure data such as delay, distance and topology, etc. At last, the location of the target host is estimated by modifying the processes of existing delay-based IP geolocation techniques based on selected landmarks and probing hosts. The experiments which cover 30 provinces and 3 major ISPs of China show that the proposed method can find corresponding rich-connected sub-networks and significantly improve the performance of existing typical delay-based IP geolocation techniques in an actual poor-connected network.
In 2017, Tian, Yang and Mu presented a new three-party key exchange protocol YPKE in radio frequency identification environment, which is based on the HMQV protocol. They claimed that the proposed YPKE protocol in the...
详细信息
For business-oriented type of short-term training courses of this new task of teaching and teaching needs, to carry out an in-depth analysis and research, detailed the demand characteristics of these new teaching curr...
详细信息
For business-oriented type of short-term training courses of this new task of teaching and teaching needs, to carry out an in-depth analysis and research, detailed the demand characteristics of these new teaching curriculum, on this basis, based on the design of a project-driven teaching practices, the implementation process is given in detail all aspects of teaching practice, and the teaching process should have the conditions and problems likely to face in-depth analysis of short-term training courses for such business-oriented type of conduct has implementation of targeted teaching a useful exploration and try.
Pointer alias analysis is a key technology in dataflow analysis, the analysis results are the basis of compilation optimization and program transformation. Based on the analysis of demand-driven pointer analysis algor...
详细信息
Pointer alias analysis is a key technology in dataflow analysis, the analysis results are the basis of compilation optimization and program transformation. Based on the analysis of demand-driven pointer analysis algorithms, the imprecision of demand driven alias analysis algorithm of one level flow is studied. Combined with two demand driven analysis algorithms, an improved pointer alias analysis algorithm is proposed. Finally the algorithm is evaluated on SPEC2006 benchmark, the experiment results show that the algorithm has high precision and fine scalability than the other two.
For the problem that static disassembly can expose system API calls in programs, this paper proposes a kind of code obfuscation aimed at hiding system API calls from reverse analysis. The algorithm is implemented by c...
详细信息
For the problem that static disassembly can expose system API calls in programs, this paper proposes a kind of code obfuscation aimed at hiding system API calls from reverse analysis. The algorithm is implemented by creating a system API address table and constructing secret index variables. During execution, the program looks up the table for the correct API to call, thus keeping the semantic unchanged. Analysis and experiments show that the algorithm can effectively protect system API calls from static reverse analysis.
There are many vulnerable vulnerabilities in Web service of embedded devices. However, existing fuzzing methods cannot analyze such Web service efficiently or effectively. Aiming at the above problems, this paper prop...
详细信息
ISBN:
(纸本)9781665490832
There are many vulnerable vulnerabilities in Web service of embedded devices. However, existing fuzzing methods cannot analyze such Web service efficiently or effectively. Aiming at the above problems, this paper proposes a fuzzing method based on Web service correlation information of embedded devices (Wsci-ed). Based on this method, this paper implements the fuzzing test prototype tool CinfoFuzz, which guides the fuzzing with Wsci-ed. Comparing the performance of CinfoFuzz with the fuzzing tools Boofuzz and Peach, the results show that CinfoFuzz has higher efficiency; in the vulnerability mining experiment of actual software, CinfoFuzz can trigger more vulnerabilities.
Median filtering is a nonlinear signal processing technique and has an advantage in the field of image ***,more attention has been paid to the forensics research of median *** this paper,a median filtering forensics m...
详细信息
Median filtering is a nonlinear signal processing technique and has an advantage in the field of image ***,more attention has been paid to the forensics research of median *** this paper,a median filtering forensics method based on quaternion convolutional neural network(QCNN)is *** median filtering residuals(MFR)are used to preprocess the *** the output of MFR is expanded to four channels and used as the input of *** QCNN,quaternion convolution is designed that can better mix the information of different channels than traditional *** quaternion pooling layer is designed to evaluate the result of quaternion *** is proposed to features well combine the three-channel information of color image and fully extract forensics *** show that the proposed method has higher accuracy and shorter training time than the traditional convolutional neural network with the same convolution depth.
We proposed three shortest path-attack strategies and investigated the vulnerability of three complex model networks under these path-attack strategies. The experimental results indicate that the robustness of random ...
详细信息
ISBN:
(纸本)9781510830981
We proposed three shortest path-attack strategies and investigated the vulnerability of three complex model networks under these path-attack strategies. The experimental results indicate that the robustness of random network is the weakest, but small-world network is the strongest under the shortest pathattack strategies. We also obtain that the shortest path-attack strategies are more harmful than RPA(random augmenting approach) attack strategy. These findings supplement and extend the previous attack results and can thus help us to provide some insights into the design of more robust networks.
Based on the problem that supervised machine learning requires labeled samples and fails to identify unknown traffic,the author innovatively integrates wavelet transform and K-means algorithm of unsupervised machine l...
详细信息
Based on the problem that supervised machine learning requires labeled samples and fails to identify unknown traffic,the author innovatively integrates wavelet transform and K-means algorithm of unsupervised machine learning by combining the advantage of wavelet transform in solving multi-fractal network traffic and proposes a traffic identification method based on wavelet spectrum of scatter factor and improved *** method represents each stream sequence with wavelet spectrum of scatter factor,which is taken as the input of clustering *** author carries out a cluster analysis with GA K-means *** experimental result suggests that this method has an obvious superiority in stability and accuracy of classification.
暂无评论