Junk code increase manual analysis difficulty in reverse engineering, and seriously disturb the automatic analysis process of ant code obfuscating, so find a junk code removing method has a great significance in the f...
详细信息
With the development of Industrial 4.0, the popularity of information technology (IT) systems in industrial control systems (ICSs) has brought great cyber-attack risk. The proactive defense technology, an important de...
详细信息
Network security assessment is an important method of evaluating network security. The existing researches of network security assessment have the problem that the method is not comprehensive and accurate. In order to...
详细信息
The high complexity of software and the diversity of security vulnerabilities have brought severe challenges to the research of software security vulnerabilities Traditional vulnerability mining methods are inefficien...
详细信息
Industrial network boundary protection equipment faces threats from attackers when protecting the industrial control system network. The similarity and static characteristics caused by large-scale and long-term deploy...
详细信息
Multi Variant eXecution (MVX) is a security defense technique that uses software diversity to protect system from attacks. MVX improves security capability by enhancing system endogenous security compared to tradition...
详细信息
Information technology facilitates people’s lives greatly, while it also brings many security issues, such as code plagiarism, software in-fringement, and malicious code. In order to solve the problems, reverse engin...
详细信息
The progress of target network topology discovery research is slow due to the uncertainty of the target network range, and large-scale network measurement activities lead to a large accumulation of "false links&q...
详细信息
The notion of attack surface shifting is introduced to describe the situation of shifting the attack surface in the moving target defense system. However, the situation of shifting the attack surface in the mimic defe...
详细信息
With the convergence of computer technology and industrial networks, attackers are not limited to attacking only individual users' computers, turning to attack industrial control systems that can cause major infra...
详细信息
暂无评论