The Internet is about to enter the era of full encryption. Traditional traffic classification methods only work well in non-encrypted environments. How to identify the specific types of network encrypted traffic in an...
详细信息
For the problem of the monotonous teaching form of the database system course, we integrate ideology and politics theories into the teaching design of the database system, combined with the 'Ideological and Politi...
详细信息
IP multicast suffers from scalability and QoS provisioning problems when supporting large scale group communication cross domain. To solve the problems, we propose WSCT-PAN, a per-access-network based wide-sense circu...
详细信息
Dynamic Binary Translation (DBT) is an important technology to cross-platform software transplantation such as enhancing the compatibility of Alpha. However, there exist some factors that impede its performance: high ...
详细信息
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu...
详细信息
To address the characteristics of traditional obfuscation methods such as single approach and obvious features, a Parent-based Powershell Script Fusion Technology is proposed based on code fusion. This technology uses...
详细信息
Sparse matrix vector multiplication is an important and commonly used computing kernel in scientific computing. Irregular arrangement of non zeros in sparse matrix leads to irregular memory access pattern, which in tu...
详细信息
With the development of open source projects, a large number of open source codes will be reused in binary software, and bugs in source codes will also be introduced into binary codes. In order to detect the reused op...
详细信息
The supply of open source and open source components is growing at an alarming rate, while vulnerabilities in open source components are everywhere. Software supply chain analysis aims to discover third-party componen...
详细信息
With the rapid development of the Internet and the increasingly complex and diverse network environment, it is of great significance to quickly and accurately obtain the topology environment of the target network for ...
详细信息
暂无评论