Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper summarizes the UEFI platform firmware framework structure as well as its potential security problems. Then the vulnerability factors of...
详细信息
Programmable logic controllers (PLCs) are the core of industrial control systems (ICS), which play an essential role in critical infrastructure. In recent years, significant real-world attacks against PLCs have emerge...
详细信息
The supply of open source and open source components is growing at an alarming rate, while vulnerabilities in open source components are everywhere. Software supply chain analysis aims to discover third-party componen...
详细信息
In recent years, with the development and popularity of information technology, how to protect information systems from malicious code is now a hot issue. Malicious code will cause irreversible damage through a series...
详细信息
Website Fingerprinting (WF) is a traffic analysis attack. The potential local adversary can infer the user's web activity by extracting implicit pattern information from traffic traces. Leveraging the latest advan...
详细信息
Portable Executable (PE) virus technology is an important threat factor in the field of network security. With continuous upgrading of malware detection technology, virus infection technology will also gradually evolv...
详细信息
Compared with traditional Hardware Design Languages (HDL) programming, High-Level Synthesis (HLS) can reduce the design difficulty of reconfigurable system. Most HLS tools target for systems on programmable chips, and...
详细信息
Feature selection methods for classification are crucial for intrusion detection techniques using machine learning. High-dimensional features in intrusion detection data affect computational complexity, consume more u...
详细信息
Dynamic binary analysis is an important way of program analysis. Most of the existing dynamic analysis tools are based on dynamic binary instrumentation platforms. The existing gdb tool, which is often used for debugg...
详细信息
The difference between real devices and virtual environments causes a low success rate of application-layer program emulation when the firmware is operating in full-system emulation during the dynamic analysis of the ...
详细信息
暂无评论