Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l...
详细信息
Infrastructure as a service (IaaS) which is one of the cloud computing's service modes provides virtual machines to clients via shared physical machines. This Service provides convenience for many enterprises, but...
详细信息
ISBN:
(纸本)9789811136719
Infrastructure as a service (IaaS) which is one of the cloud computing's service modes provides virtual machines to clients via shared physical machines. This Service provides convenience for many enterprises, but also introduces new security threats. Many studies have shown that the co-residency side-channel can be used to extract sensitive information by malicious users. Remarkably, Soo-Jin has present a migration-based system called Nomad to mitigating known and future side-channel which is more universal than the traditional method. However, large scale migration will lead to huge network overheads. To solve the above problems, the characteristics of co-residency side-channel on the single physical server is analyzed, based on which two virtual machine schedule algorithms according the leakage model in Nomad were proposed. The simulation results show that the algorithm can mitigate the threats effectively.
Dynamic taint analysis is a widely used information flow analysis method. The software structure supporting dynamic taint analysis needs running program to monitor the spread of taint, which will bring a large running...
详细信息
Person entity alignment is to distinguish whether the person entity information extracted from different data sources refer to the same entity. Existing methods mainly use attribute and relation information of entity ...
详细信息
Cyberspace mimic defense has been proven to be a revolutionary defense technology that "changes the rules of the game" to ensure the security of cyberspace. However, the software diversity inherent in mimic ...
详细信息
With the popularization of embedded devices, security issues continue to occur. The existing automated security testing methods for embedded devices are mainly carried out from two aspects: the Web interface of the de...
详细信息
The difference between real devices and virtual environments causes a low success rate of application-layer program emulation when the firmware is operating in full-system emulation during the dynamic analysis of the ...
详细信息
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper summarizes the UEFI platform firmware framework structure as well as its potential security problems. Then the vulnerability factors of...
详细信息
In recent years, with the development and popularity of information technology, how to protect information systems from malicious code is now a hot issue. Malicious code will cause irreversible damage through a series...
详细信息
Device simulation is an important method of embedded device security analysis, due to the extensive and heterogeneous nature of the current peripherals, the existing simulation technology for peripheral simulation is ...
详细信息
暂无评论