With the development of generative artificial intelligence, new forgery methods are rapidly emerging. Social platforms are flooded with vast amounts of unlabeled synthetic data and authentic data, making it increasing...
详细信息
Rapid and accurate localization of illicit micro-recorders, cameras, and other wireless network devices is of great significance for ensuring public privacy and security. However, existing methods are susceptible to e...
Rapid and accurate localization of illicit micro-recorders, cameras, and other wireless network devices is of great significance for ensuring public privacy and security. However, existing methods are susceptible to environmental noise, have low localization accuracy, high localization time overhead, and require extensive manual involvement. To address these issues, we propose LENSER, a channel state information based indoor localization scheme for illicit wireless network devices. First, we set detection points to capture signal amplitude distribution changes during the antenna array rotation process, thus determining whether there is a line-of-sight propagation relationship between the detection point and the malicious device. Next, we identify the room containing the malicious device based on the line-of-sight propagation relationship and calibrate the measured position and estimate the direction of the malicious device using existing methods within the room. Finally, we establish a linear space based on the direction of the malicious device and propose an iterative comparison method based on received signal strength indicator to localize malicious devices accessing public Wi-Fi networks within the room. We conducted 1200 experiments in four buildings with different layouts and building materials. The results show that LENSER’s average localization time is 12.5 minutes, and the average localization accuracy is 26.4 centimeters, an improvement of 11.1% to 86.1% in average localization accuracy and a reduction of 11.1% to 58.2% in average localization time compared to existing methods, such as Spotfi, Lumos, SCamF, SNOOPDOG, and Region Division.
Quantum computing is a new computing mode that follows the laws of quantum mechanics to control quantum information units for computation. In terms of computational efficiency, due to the existence of quantum mechanic...
详细信息
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel *** with patch-style passive defense,MVX can defend against known and...
详细信息
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel *** with patch-style passive defense,MVX can defend against known and even unknown vulnerability-based attacks without relying on attack feature ***,variants generated with software diversity technologies will introduce new vulnerabilities when they execute in ***,we analyze the security of MVX theory from the perspective of formal *** we summarize the general forms and techniques for attacks against MVX,and analyze the new vulnerabilities arising from the combination of variant generation *** propose SecMVX,a secure MVX architecture and variant generation *** evaluations based on CVEs and SPEC 2006 benchmark show that SecMVX introduces 11.29%of the average time overhead,and avoids vulnerabilities caused by the improper combination of variant generation technologies while keeping the defensive ability of MVX.
Taint analysis is a common technology for software analysis, which is widely used in the region of information security. Aiming at the problem that the existing binary program dynamic taint analysis framework does not...
详细信息
Metalens,characterized by their unique functions and distinctive physical properties,have gained significant attention for their potential *** further optimize the performance of metalens,it is necessary to characteri...
详细信息
Metalens,characterized by their unique functions and distinctive physical properties,have gained significant attention for their potential *** further optimize the performance of metalens,it is necessary to characterize the phase modulation of the *** this study,we present a multi-distance phase retrieval system based on optical field scanning and discuss its convergence and *** findings indicate that the system is capable of retrieving the phase distribution of the metalens as long as the measurement noise is low and the total length of the scanned light field is sufficiently *** system enables the analysis of focal length and aberration by utilizing the computed phase *** extend our investigation to measure the phase distribution of the metalens operating in the near-infrared(NIR)spectrum and identify the impact of defects in the sample on the ***,we conduct a comparative analysis of the phase distribution of the metalens in air and ethanol and observe the variations in the phase modulation of the metalens in different working *** system provides a straightforward method for the phase characterization of metalens,aiding in optimizing the metalens design and functionality.
Network topology construction is one of the basic means to study the target network. Whether it is the discovery of vital nodes, IP location or network characteristics mining, a complete and accurate network topology ...
详细信息
Security of online software upgrade has become one of the most important evaluation criteria of cyber security. It is too inefficient to evaluate the security of software upgrade by manual reverse analysis method, whi...
详细信息
Industrial Control Systems (ICSs) are widely deployed in critical infrastructures, such as electric power, water filtration and distribution. Programmable Logic Controllers (PLCs) work as the core components of an ICS...
详细信息
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine...
详细信息
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine binary similarity,achieved great ***,we found that the existing frameworks often ignored the complex internal structure of instructions and didn’t fully consider the long-term dependencies of *** this paper,we propose firmVulSeeker—a vulnerability search tool for embedded firmware images,based on BERT and Siamese *** first builds a BERT MLM task to observe and learn the semantics of different instructions in their context in a very large unlabeled binary ***,a finetune mode based on Siamese network is constructed to guide training and matching semantically similar functions using the knowledge learned from the first ***,it will use a function embedding generated from the fine-tuned model to search in the targeted corpus and find the most similar function which will be confirmed whether it’s a real vulnerability *** evaluate the accuracy,robustness,scalability and vulnerability search capability of *** show that it can greatly improve the accuracy of matching semantically similar functions,and can successfully find more real vulnerabilities in real-world firmware than other tools.
暂无评论