Pointer alias analysis is a key technology in dataflow analysis, the analysis results are the basis of compilation optimization and program transformation. Based on the analysis of demand-driven pointer analysis algor...
详细信息
Pointer alias analysis is a key technology in dataflow analysis, the analysis results are the basis of compilation optimization and program transformation. Based on the analysis of demand-driven pointer analysis algorithms, the imprecision of demand driven alias analysis algorithm of one level flow is studied. Combined with two demand driven analysis algorithms, an improved pointer alias analysis algorithm is proposed. Finally the algorithm is evaluated on SPEC2006 benchmark, the experiment results show that the algorithm has high precision and fine scalability than the other two.
For the problem that static disassembly can expose system API calls in programs, this paper proposes a kind of code obfuscation aimed at hiding system API calls from reverse analysis. The algorithm is implemented by c...
详细信息
For the problem that static disassembly can expose system API calls in programs, this paper proposes a kind of code obfuscation aimed at hiding system API calls from reverse analysis. The algorithm is implemented by creating a system API address table and constructing secret index variables. During execution, the program looks up the table for the correct API to call, thus keeping the semantic unchanged. Analysis and experiments show that the algorithm can effectively protect system API calls from static reverse analysis.
There are many vulnerable vulnerabilities in Web service of embedded devices. However, existing fuzzing methods cannot analyze such Web service efficiently or effectively. Aiming at the above problems, this paper prop...
详细信息
ISBN:
(纸本)9781665490832
There are many vulnerable vulnerabilities in Web service of embedded devices. However, existing fuzzing methods cannot analyze such Web service efficiently or effectively. Aiming at the above problems, this paper proposes a fuzzing method based on Web service correlation information of embedded devices (Wsci-ed). Based on this method, this paper implements the fuzzing test prototype tool CinfoFuzz, which guides the fuzzing with Wsci-ed. Comparing the performance of CinfoFuzz with the fuzzing tools Boofuzz and Peach, the results show that CinfoFuzz has higher efficiency; in the vulnerability mining experiment of actual software, CinfoFuzz can trigger more vulnerabilities.
Median filtering is a nonlinear signal processing technique and has an advantage in the field of image ***,more attention has been paid to the forensics research of median *** this paper,a median filtering forensics m...
详细信息
Median filtering is a nonlinear signal processing technique and has an advantage in the field of image ***,more attention has been paid to the forensics research of median *** this paper,a median filtering forensics method based on quaternion convolutional neural network(QCNN)is *** median filtering residuals(MFR)are used to preprocess the *** the output of MFR is expanded to four channels and used as the input of *** QCNN,quaternion convolution is designed that can better mix the information of different channels than traditional *** quaternion pooling layer is designed to evaluate the result of quaternion *** is proposed to features well combine the three-channel information of color image and fully extract forensics *** show that the proposed method has higher accuracy and shorter training time than the traditional convolutional neural network with the same convolution depth.
We proposed three shortest path-attack strategies and investigated the vulnerability of three complex model networks under these path-attack strategies. The experimental results indicate that the robustness of random ...
详细信息
ISBN:
(纸本)9781510830981
We proposed three shortest path-attack strategies and investigated the vulnerability of three complex model networks under these path-attack strategies. The experimental results indicate that the robustness of random network is the weakest, but small-world network is the strongest under the shortest pathattack strategies. We also obtain that the shortest path-attack strategies are more harmful than RPA(random augmenting approach) attack strategy. These findings supplement and extend the previous attack results and can thus help us to provide some insights into the design of more robust networks.
Based on the problem that supervised machine learning requires labeled samples and fails to identify unknown traffic,the author innovatively integrates wavelet transform and K-means algorithm of unsupervised machine l...
详细信息
Based on the problem that supervised machine learning requires labeled samples and fails to identify unknown traffic,the author innovatively integrates wavelet transform and K-means algorithm of unsupervised machine learning by combining the advantage of wavelet transform in solving multi-fractal network traffic and proposes a traffic identification method based on wavelet spectrum of scatter factor and improved *** method represents each stream sequence with wavelet spectrum of scatter factor,which is taken as the input of clustering *** author carries out a cluster analysis with GA K-means *** experimental result suggests that this method has an obvious superiority in stability and accuracy of classification.
2D face images represent faces with incomplete information. 3D face reconstruction from a single 2D image is a challenging problem with application value. The single feature extraction method distorts the generated 3D...
详细信息
ISBN:
(数字)9781728186351
ISBN:
(纸本)9781728186368
2D face images represent faces with incomplete information. 3D face reconstruction from a single 2D image is a challenging problem with application value. The single feature extraction method distorts the generated 3D face image. In this paper, we use contour-based face segmentation method to reconstruct 3D face image. We focus on the edge and contour information of the face when using contour lines to segment the face. Different from the global 3D face reconstruction method, we combine the global and local face information to carry out 3D face reconstruction. Our method: First of all, we do contour segmentation for human faces and extract the features of the segmented images. Second, we learn the local binary features of each keypoint in a complete face image, then combine the features and use linear regression to detect the keypoints. Thirdly, we use Convolutional Neural Networks to learn the regression 3D Morphable Model coefficient and significantly improve the quality and efficiency of reconstruction. We regressed the coefficients of the 3D deformable model from 2D images to present face alignment for 3D face reconstruction. We carry out feature mapping between 2D face and 3D face image, and monitor and verify 3D face model through mapping relationship. Our method can not only reconstruct face images from all angles, but also reduce face deformities. We made face images fit better under different expressions and postures.
The establishment of the network traffic model has an important significance on the research of *** the basis of existing researches,this paper proposes the improved Semi-Markov network traffic model,and re-divides th...
详细信息
The establishment of the network traffic model has an important significance on the research of *** the basis of existing researches,this paper proposes the improved Semi-Markov network traffic model,and re-divides the state of network traffic into idle state,normal state and busy state,and also researches the busy state of network traffic by the use of Pareto distribution,and later researches the state transition relation of Semi-Markov process on this *** experimental results show that the characteristics of the network traffic under the busy state can be well in line with the nature of Pareto distribution,and the network bandwidth utilization calculated in this way is also consistent with the actual situation,so that the model established in this paper can well describe the characteristics of network traffic.
To solve the emerging complex optimization problems,multi objective optimization algorithms are *** introducing the surrogate model for approximate fitness calculation,the multi objective firefly algorithm with surrog...
To solve the emerging complex optimization problems,multi objective optimization algorithms are *** introducing the surrogate model for approximate fitness calculation,the multi objective firefly algorithm with surrogate model(MOFA-SM) is proposed in this ***,the population was initialized according to the chaotic ***,the external archive was constructed based on the preference sorting,with the lightweight clustering pruning *** the process of evolution,the elite solutions selected from archive were used to guide the movement to search optimal *** results show that the proposed algorithm can achieve better performance in terms of convergence iteration and stability.
With the development of communication 5G networks and technologies,spectrum resources are increasingly *** scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spectrum a...
详细信息
With the development of communication 5G networks and technologies,spectrum resources are increasingly *** scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spectrum allocation,and due to the complexity of the network environment,the security of spectrum auctions can not be *** existing secure spectrum auction schemes introduce a semi-honest agent to complete spectrum ***,the hypothetical semi-honest model does not guarantee the security of spectnim auction in the actual application scenario,which may lead to potential security threats:the agent may reveal the privacy of bidders,agent or auctioneer may collude with the bidder to manipulate the spectrum auction,and so *** this paper,a secure spectrum auction scheme without a trusted party is proposed based on the smart contract technology,and the smart contract written into the blockchain replaces the traditional semi-honest agent to cooperate with the auctioneer server to complete the *** order to ensure the security of our scheme,a secure spectrum auction protocol is designed,in which the Software Guard Extensions(SGX)technology and Paillier cryptosystem are used to protect the privacy of *** verification is provided in our protocol by using extensive Pedersen commitment,which prevents the auctioneer server and the bidder from colluding with each other and verifies group bid sum ***,the security analysis is given to propose several types of attacks that can be ***,theoretical analysis and simulation experiments of our protocol are also provided.
暂无评论