It is difficult to fuzz the protocol because the format of network protocol is complex and often involves syntax and semantic constraints. Traditional fuzzing often makes a trade-off between the validity of protocol m...
详细信息
We propose a new type of variable coverage method called Dynamic Array Double-Access Attack (DADA Attack) in Ethereum Virtual Machine (EVM). Such attack can read and write operations anywhere in the storage area, resu...
详细信息
This article uses the vector space model to express microblogging text in quantity, via the cosine of the angle of text clustering method to calculate the similarity between the text. We can generate alternative micro...
详细信息
A novel memory consistency model for thousand-core processors is presented. The model simplifies cache coherence for the full chip, and reduces cache design complexity. In addition, the model has the ability to descri...
详细信息
To address the characteristics of traditional obfuscation methods such as single approach and obvious features, a Parent-based Powershell Script Fusion Technology is proposed based on code fusion. This technology uses...
详细信息
The essence of Network attack and Defense confrontation is the Game process between attacker and Defender. In the research of the existing network attack strategy, there is a priori hypothesis defect of equal status b...
详细信息
Nowadays, the cyberspace security situation is unoptimistic. Widespread vulnerabilities and backdoors are the main factors of insecurity in cyberspace. Furthermore, the software monoculture makes the attack have an ex...
详细信息
The design of secure password authenticated key exchange (PAKE) protocols with RSA is a nontrivial hard work. Until now there have been only a few secure PAKE protocols based on RSA and most of them work in the two-pa...
详细信息
Software diversity has been proven to be an effective approach to enhance system security. To make the best of the advantage brought by software diversity, a multi-variant execution environment is needed. However, alt...
详细信息
Network anomaly traffic detection is an important technique for detecting intrusion activities and maintaining cyberspace security. Random forest is widely used in network anomalous traffic detection due to its good d...
详细信息
暂无评论