By simulating the unique properties of different types of neurons and their interconnecting patterns, heterogeneous neural networks can more accurately reflect the structural and functional characteristics of biologic...
详细信息
By simulating the unique properties of different types of neurons and their interconnecting patterns, heterogeneous neural networks can more accurately reflect the structural and functional characteristics of biological neural systems. Therefore, a novel hyperbolic non-volatile locally active memristor is proposed, enabling the construction of a heterogeneous Hindmarsh–Rose neuron memristive synapse-coupled Hopfield neural network (HR-M-HNN) via synaptic characteristic emulation. Dynamic analysis reveals that the HR-M-HNN exhibits hidden attractor characteristics due to the absence of equilibrium points and can generate complex dynamics behaviors, including hyperchaos, chaos, periodic and quasi-periodic, and multistability. Further research reveals a strong correlation between the chaotic state of HR-M-HNN and the locally active control parameter of the memristor. To verify the accuracy of the dynamic analysis, the corresponding analog circuit is designed. Furthermore, based on the HR-M-HNN hyperchaotic system, a novel image encryption scheme is proposed, which utilizes the position index of the Latin square to perform synchronous permutation and diffusion on the plain image, reducing redundant operations and effectively enhancing the encryption speed. Security analyses demonstrate that the proposed image encryption scheme offers excellent performance and robustness.
Neural manifold learning (NML), as a significant research topic in the field of neuroscience, plays a vital role in the realization of intelligent brain-computer interface (BCI) at the edge. However, traditional edge ...
详细信息
As an important program analysis method, taint analysis technology has been widely used in the field of vulnerability detection. However, the existing dynamic taint analysis needs to design instruction-by-instruction ...
详细信息
ISBN:
(纸本)9781665490832
As an important program analysis method, taint analysis technology has been widely used in the field of vulnerability detection. However, the existing dynamic taint analysis needs to design instruction-by-instruction taint propagation rules, which is expensive and has a high false positive rate for identifying the implicit control flow of the target program. In view of the above problems, this paper proposes a dynamic taint analysis method nnTaint based on neural network for the existing taint-guided fuzzing technology, which has the characteristics of low cost and low false positives. Comparing nnTaint with the existing taint analysis tools, the operation efficiency is improved by 10.9%-18.8% compared with the traditional taint analysis, which reduces the cost of the existing dynamic taint analysis technology to a certain extent. On the LAVA-M testing datasets and GNU binutils program, nnTaint improves the edge coverage by 4.7%-16% compared with the existing taint-guided fuzzing tools, effectively improving the implicit control flow recognition accuracy of the existing dynamic taint analysis. The results show that nnTaint can improve the efficiency and accuracy of existing dynamic taint analysis tools.
There are many vulnerable vulnerabilities in Web service of embedded devices. However, existing fuzzing methods cannot analyze such Web service efficiently or effectively. Aiming at the above problems, this paper prop...
详细信息
ISBN:
(纸本)9781665490832
There are many vulnerable vulnerabilities in Web service of embedded devices. However, existing fuzzing methods cannot analyze such Web service efficiently or effectively. Aiming at the above problems, this paper proposes a fuzzing method based on Web service correlation information of embedded devices (Wsci-ed). Based on this method, this paper implements the fuzzing test prototype tool CinfoFuzz, which guides the fuzzing with Wsci-ed. Comparing the performance of CinfoFuzz with the fuzzing tools Boofuzz and Peach, the results show that CinfoFuzz has higher efficiency; in the vulnerability mining experiment of actual software, CinfoFuzz can trigger more vulnerabilities.
We develop two types of adaptive energy preserving algorithms based on the averaged vector field for the guiding center dynamics,which plays a key role in magnetized *** adaptive scheme is applied to the Gauss Legendr...
详细信息
We develop two types of adaptive energy preserving algorithms based on the averaged vector field for the guiding center dynamics,which plays a key role in magnetized *** adaptive scheme is applied to the Gauss Legendre’s quadrature rules and time stepsize respectively to overcome the energy drift problem in traditional energy-preserving *** new adaptive algorithms are second order,and their algebraic order is carefully *** results show that the global energy errors are bounded to the machine precision over long time using these adaptive algorithms without massive extra computation cost.
With the massive placement of sensors leading to a surge in IoT data, it is wise for system administrators to use data aggregation strategies to collect and share data in edge-assisted IoT scenarios because traditiona...
详细信息
macOS drivers, i.e., Kernel EXTensions (kext), are attractive attack targets for adversaries. However, automatically discovering vulnerabilities in kexts is extremely challenging because kexts are mostly closed-source...
ISBN:
(纸本)9781939133373
macOS drivers, i.e., Kernel EXTensions (kext), are attractive attack targets for adversaries. However, automatically discovering vulnerabilities in kexts is extremely challenging because kexts are mostly closed-source, and the latest macOS running on customized Apple Silicon has limited tool-chain support. Most existing static analysis and dynamic testing solutions cannot be applied to the latest macOS. In this paper, we present the first smart fuzzing solution KextFuzz to detect bugs in the latest macOS kexts running on Apple Silicon. Unlike existing driver fuzzing solutions, KextFuzz does not require source code, execution traces, hypervisors, or hardware features (e.g., coverage tracing) and thus is universal and practical. We note that macOS has deployed many mitigations, including pointer authentication, code signature, and userspace kernel layer wrappers, to thwart potential attacks. These mitigations can provide extra knowledge and resources for us to enable kernel fuzzing. KextFuzz exploits these mitigation schemes to instrument the binary for coverage tracking, test privileged kext code that is guarded and infrequently accessed, and infer the type and semantic information of the kext interfaces. KextFuzz has found 48 unique kernel bugs in the macOS kexts and got five CVEs. Some bugs could cause severe consequences like non-recoverable denial-of-service or damages.
Programmable logic controllers(PLCs)play a critical role in many industrial control systems,yet face increasingly serious cyber *** this paper,we propose a novel PLC-compatible software-based defense mechanism,called ...
详细信息
Programmable logic controllers(PLCs)play a critical role in many industrial control systems,yet face increasingly serious cyber *** this paper,we propose a novel PLC-compatible software-based defense mechanism,called Heterogeneous Redundant Proactive Defense Framework(HRPDF).We propose a heterogeneous PLC architecture in HRPDF,including multiple heterogeneous,equivalent,and synchronous runtimes,which can thwart multiple types of attacks against PLC without the need of external *** ensure the availability of PLC,we also design an inter-process communication algorithm that minimizes the overhead of *** implement a prototype system of HRPDF and test it in a real-world PLC and an OpenPLC-based device,*** results show that HRPDF can defend against multiple types of attacks with 10.22%additional CPU and 5.56%additional memory overhead,and about 0.6 ms additional time overhead.
The primary purpose of acquiring network security situation elements is to detect and discover potential security threats from discrete and isolated data. In the complex network environment, the existing network secur...
详细信息
暂无评论