With the convergence of computer technology and industrial networks, attackers are not limited to attacking only individual users' computers, turning to attack industrial control systems that can cause major infra...
With the convergence of computer technology and industrial networks, attackers are not limited to attacking only individual users' computers, turning to attack industrial control systems that can cause major infrastructure problems. Programmable Logic Controllers (PLC) are the core components of industrial control systems. Its safety has a profound impact on the safety of the entire industrial system. This paper firstly classifies the security research of PLC according to the structure and function, and expounds the existing security defects of PLC from the aspects of firmware security, operation security and program security. Then it summarizes and analyzes four types of security protection measures: the integrity of verification firmware, protocol security encryption, code formal verification, and program security defence detection. Finally, according to the overall safety of the industrial system and the actual development of the current PLC, we discuss the development trend of safety research.
User-based attribute information, such as age and gender, is usually considered as user privacy information. It is difficult for enterprises to obtain user-based privacy attribute information. However, user-based priv...
详细信息
mathematical function is an essential part of numerical program, and it is also the key factor that affects the precision and performance of a program. In the design of mathematical functions, in order to satisfy most...
mathematical function is an essential part of numerical program, and it is also the key factor that affects the precision and performance of a program. In the design of mathematical functions, in order to satisfy most application scenarios, it is necessary to correctly round and cover the calculated interval as much as possible. But in certain applications, correct rounding and full coverage of definition domain may not be required. Therefore, mathematical functions can be customized according to application requirements to avoid precision waste as well as improve performance. However, manually implementing mathematical functions is a time-consuming and error-prone task. Tools like Metalibm is designed to automatically generate mathematical function code, which is difficult to take advantage of all the mathematical properties of a function and results in the generated code performing slowly than the corresponding mathematical library function. A method of generating variable precision code based on mathematical properties is proposed for the transcendental function in this work. Experiments showed the performance of the proposed method is comparable to Glibc mathematical function.
Infrastructure as a service (IaaS) which is one of the cloud computing's service modes provides virtual machines to clients via shared physical machines. This Service provides convenience for many enterprises, but...
详细信息
ISBN:
(纸本)9789811136719
Infrastructure as a service (IaaS) which is one of the cloud computing's service modes provides virtual machines to clients via shared physical machines. This Service provides convenience for many enterprises, but also introduces new security threats. Many studies have shown that the co-residency side-channel can be used to extract sensitive information by malicious users. Remarkably, Soo-Jin has present a migration-based system called Nomad to mitigating known and future side-channel which is more universal than the traditional method. However, large scale migration will lead to huge network overheads. To solve the above problems, the characteristics of co-residency side-channel on the single physical server is analyzed, based on which two virtual machine schedule algorithms according the leakage model in Nomad were proposed. The simulation results show that the algorithm can mitigate the threats effectively.
Loop fission is an effective loop optimization for exploiting fine-grained parallelism. Currently, loop fission is widely used in existing parallelizing compilers. To fully exploit the optimization, we proposed and im...
详细信息
With the development of the IT industry, the information resources and services that people come into contact with have been growing. The sharing and interaction of these two types of information has led to further gr...
详细信息
With the development of the IT industry, the information resources and services that people come into contact with have been growing. The sharing and interaction of these two types of information has led to further growth in data resulting in the advent of the era of big data. However, due to the complexity of information, such as low utilization, the confusion, and disorder, it will be a great challenge for service providers to offer customers services with high quality and accurate quality. The recommendation system is a solution adopted by e-marketers for such problems. This paper proposes a SPARK-based recommendation algorithm called SARF. The SARF first reads the original data from the HDFS and uses Spark to yield the datasets. Then, by using these datasets, the optimal recommended model is generated through iterative process. Finally, we gain the results which are recommended to the user by the optimal model. The final experimental results show that our SARF framework can effectively reduce the recommendation error and solve the problem of cold start.
Energy storage and conversion have attained significant intere st owing to its important applications that reduce CO2 emission through employing green *** promising technologies are included metalair batteries,metal-s...
详细信息
Energy storage and conversion have attained significant intere st owing to its important applications that reduce CO2 emission through employing green *** promising technologies are included metalair batteries,metal-sulfur batteries,metal-ion batteries,electrochemical capacitors,***,metal elements are involved with lithium,sodium,and *** these devices,electrode materials are of importance to obtain high ***-dimensional(2 D) materials are a large kind of layered structured materials with promising future as energy storage materials,which include graphene,black phosporu s,MXenes,covalent organic frameworks(COFs),2 D oxides,2 D chalcogenides,and *** progress has been achieved to go ahead for 2 D materials in energy storage and *** researchers will join in this research *** the background,it has motivated us to contribute with a roadmap on ’two-dimensional materials for energy storage and conversion.
In accordance with the distributive traits of semiprimes’ divisors, the article proposes an approach that can find out the small divisor of a semiprime by parallel computing. The approach incorporates a deterministic...
详细信息
In accordance with the distributive traits of semiprimes’ divisors, the article proposes an approach that can find out the small divisor of a semiprime by parallel computing. The approach incorporates a deterministic search with a probabilistic search, requires less memory and can be implemented on ordinary multicore computers. Experiments show that certain semiprimes of 27 to 46 decimal-bits can be validly factorized with the approach on personal computer in expected time.
Malware detection is an important topic in cyber security. The research presented in this paper mainly studies on disassembly codes of Windows executable files, learns from the research route of bioinformatics and pro...
Malware detection is an important topic in cyber security. The research presented in this paper mainly studies on disassembly codes of Windows executable files, learns from the research route of bioinformatics and proposes the concept of software gene. A distance-based method is also proposed to measure the difference of genes and the dimensionality reduction based on a modified clustering algorithm of biological phylogenetic model. Finally a gene-inspired malware detector is constructed using Random Forest model. The software gene extraction proposed in this paper is more flexible and generates less data than the widely-used n-gram method. The detector based on genes also performs better. The clustering-based dimensionality reduction retains more comprehensive features and maintains the interpretability in software analysis area. The detector based on gene-inspired malware detection approach can reach the precision 96.14%, which is better than traditional methods.
Despite providing iOS the security, comfortable, powerful mobile operating system, Apple has too many restrictions. Many users prefer to jailbreaking the iOS by using jailbreaking tool, which allows them to do more un...
Despite providing iOS the security, comfortable, powerful mobile operating system, Apple has too many restrictions. Many users prefer to jailbreaking the iOS by using jailbreaking tool, which allows them to do more unavailable things on their devices. This behaviour may cause risks toward applications and many researches have focused on application security in various aspects. We find that a legal application (we call it potential channel hereafter) can be hijacked and it acts as a channel between the malware in device and the remote control terminal. In this paper, we introduce a channel model based on five conditions after analysing the entire operation procedure and comparing the similarities and differences of various applications. To approve our argument, we show iOS Messages which meets the five conditions, and demonstrate how to intercept messages, that means, a legal application can be hijacked and become a channel. To eliminate the risks, we propose a solution ChanDet and describe how to test whether an application is a potential channel or not. Finally, we give some protection strategies for applications, and we expect that ChanDet will play a significant role in application security of iOS.
暂无评论