首页 > 最新文献

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
Virtual Brokers for Large-Scale Publish/Subscribe in Wireless Sensor Networks 无线传感器网络中大规模发布/订阅的虚拟代理
Yang Liu, Boon-Chong Seet, A. Al-Anbuky
Brokers are critical elements for many publish and subscribe (pub/sub) systems. They are dedicated devices with large computation and storage capacities, but they could suffer from scalability problems when comes to actual large-scale implementations in wireless sensor networks. Inspired by the recent virtual MIMO concept for wireless sensor networks, this paper proposes the idea of ‘virtual brokers’ for large-scale pub/sub systems in sensor networks, and presents in detail the design of a three-stage algorithm for forming a virtual broker around multiple co-located sensor nodes using only network connectivity information. Using computer modeling, we conduct an investigation of our virtual broker formation algorithm and preliminary results demonstrate the potential of our algorithm for scalable formation of virtual brokers.
代理是许多发布和订阅(pub/sub)系统的关键元素。它们是具有大量计算和存储容量的专用设备,但是当涉及到无线传感器网络中的实际大规模实现时,它们可能会遇到可伸缩性问题。受最近无线传感器网络的虚拟MIMO概念的启发,本文提出了传感器网络中大规模pub/sub系统的“虚拟代理”思想,并详细介绍了一个三阶段算法的设计,该算法仅使用网络连接信息在多个共定位的传感器节点周围形成虚拟代理。使用计算机建模,我们对我们的虚拟代理形成算法进行了调查,初步结果证明了我们的算法在虚拟代理的可扩展形成方面的潜力。
{"title":"Virtual Brokers for Large-Scale Publish/Subscribe in Wireless Sensor Networks","authors":"Yang Liu, Boon-Chong Seet, A. Al-Anbuky","doi":"10.1109/EUC.2010.42","DOIUrl":"https://doi.org/10.1109/EUC.2010.42","url":null,"abstract":"Brokers are critical elements for many publish and subscribe (pub/sub) systems. They are dedicated devices with large computation and storage capacities, but they could suffer from scalability problems when comes to actual large-scale implementations in wireless sensor networks. Inspired by the recent virtual MIMO concept for wireless sensor networks, this paper proposes the idea of ‘virtual brokers’ for large-scale pub/sub systems in sensor networks, and presents in detail the design of a three-stage algorithm for forming a virtual broker around multiple co-located sensor nodes using only network connectivity information. Using computer modeling, we conduct an investigation of our virtual broker formation algorithm and preliminary results demonstrate the potential of our algorithm for scalable formation of virtual brokers.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125168401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks 一种多相分层无线传感器网络密钥管理协议
B. Tian, Song Han, S. Parvin, T. Dillon
The security of Wireless Sensor Networks (WSNs) has a direct reliance on secure and efficient key management. This leaves key management as a fundamental research topic in the field of WSNs security. Among the proposed key management schemes for WSNs security, LEAP (Localized Encryption and Authentication Protocol) has been regarded as an efficient protocol over the last years. LEAP supports the establishment of four types of keys. The security of these keys is under the assumption that the initial deployment phase is secure and the initial key is erased from sensor nodes after the initialization phase. However, the initial key is used again for node addition after the initialization phase whereas the new node can be compromised before erasing the key. A time-based key management scheme rethought the security of LEAP. We show the deficiency of the time-based key management scheme and proposed a key management scheme for multi-phase WSNs in this paper. The proposed scheme disperses the damage resulting from the disclosure of the initial key. We show it has better resilience and higher key connectivity probability through the analysis.
无线传感器网络的安全直接依赖于安全高效的密钥管理。这使得密钥管理成为无线传感器网络安全领域的一个基础性研究课题。在近年来提出的无线传感器网络安全密钥管理方案中,LEAP(本地化加密与认证协议)被认为是一种有效的协议。LEAP支持建立四种类型的密钥。这些密钥的安全性是在初始部署阶段是安全的,并且初始化阶段之后从传感器节点上擦除初始密钥的假设下实现的。但是,初始化阶段之后,将再次使用初始密钥添加节点,而在擦除密钥之前,可能会危及新节点。基于时间的密钥管理方案重新考虑了LEAP的安全性。针对基于时间的密钥管理方案的不足,提出了一种多阶段无线传感器网络的密钥管理方案。所提出的方案分散了初始密钥泄露所造成的损害。通过分析表明,它具有更好的弹性和更高的键连通性概率。
{"title":"A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks","authors":"B. Tian, Song Han, S. Parvin, T. Dillon","doi":"10.1109/EUC.2010.99","DOIUrl":"https://doi.org/10.1109/EUC.2010.99","url":null,"abstract":"The security of Wireless Sensor Networks (WSNs) has a direct reliance on secure and efficient key management. This leaves key management as a fundamental research topic in the field of WSNs security. Among the proposed key management schemes for WSNs security, LEAP (Localized Encryption and Authentication Protocol) has been regarded as an efficient protocol over the last years. LEAP supports the establishment of four types of keys. The security of these keys is under the assumption that the initial deployment phase is secure and the initial key is erased from sensor nodes after the initialization phase. However, the initial key is used again for node addition after the initialization phase whereas the new node can be compromised before erasing the key. A time-based key management scheme rethought the security of LEAP. We show the deficiency of the time-based key management scheme and proposed a key management scheme for multi-phase WSNs in this paper. The proposed scheme disperses the damage resulting from the disclosure of the initial key. We show it has better resilience and higher key connectivity probability through the analysis.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124197630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Trading Conditional Execution for More Registers on ARM Processors ARM处理器上多寄存器的交易条件执行
Huang-Jia Cheng, Yuan-Shin Hwang, Rong-Guey Chang, Cheng-Wei Chen
Conditional execution is an important ISA feature of the ARM series of processors. Every instruction can be made to execute conditionally, that is, it is treated as a NOP if the condition is not met. The advantage of conditional execution is that it can maintain high performance while reducing hardware complexity since it can avoid introducing pipeline bubbles even when no branch prediction units are needed. However, conditional execution takes up precious instruction space as conditions are encoded into a 4-bit condition code selector on every 32-bit ARM instruction. Besides, only small percentages of instructions are actually conditionalized in modern embedded applications, and conditional execution might not even lead to performance improvement on modern embedded processors. This paper proposes to trade conditional execution for more ISA registers on ARM processors, and the 4-bit condition field will be used to encode the extra registers. GCC has been ported to generate ARM code with the new instruction format and experimental results have shown that performance can be improved by 6% on average for Media Bench II benchmarks when the number of ISA registers is extended from 16 to 32.
条件执行是ARM系列处理器的一个重要ISA特性。每个指令都可以有条件地执行,也就是说,如果不满足条件,则将其视为NOP。条件执行的优点是,它可以在保持高性能的同时降低硬件复杂性,因为即使不需要分支预测单元,它也可以避免引入管道气泡。然而,条件执行占用宝贵的指令空间,因为条件被编码到每个32位ARM指令的4位条件代码选择器中。此外,在现代嵌入式应用程序中,只有一小部分指令实际上是条件化的,条件执行甚至可能不会提高现代嵌入式处理器的性能。本文提出在ARM处理器上用条件执行交换更多的ISA寄存器,并使用4位条件字段对额外的寄存器进行编码。已经移植了GCC来生成具有新指令格式的ARM代码,实验结果表明,当ISA寄存器的数量从16个扩展到32个时,Media Bench II基准测试的性能可以平均提高6%。
{"title":"Trading Conditional Execution for More Registers on ARM Processors","authors":"Huang-Jia Cheng, Yuan-Shin Hwang, Rong-Guey Chang, Cheng-Wei Chen","doi":"10.1109/EUC.2010.18","DOIUrl":"https://doi.org/10.1109/EUC.2010.18","url":null,"abstract":"Conditional execution is an important ISA feature of the ARM series of processors. Every instruction can be made to execute conditionally, that is, it is treated as a NOP if the condition is not met. The advantage of conditional execution is that it can maintain high performance while reducing hardware complexity since it can avoid introducing pipeline bubbles even when no branch prediction units are needed. However, conditional execution takes up precious instruction space as conditions are encoded into a 4-bit condition code selector on every 32-bit ARM instruction. Besides, only small percentages of instructions are actually conditionalized in modern embedded applications, and conditional execution might not even lead to performance improvement on modern embedded processors. This paper proposes to trade conditional execution for more ISA registers on ARM processors, and the 4-bit condition field will be used to encode the extra registers. GCC has been ported to generate ARM code with the new instruction format and experimental results have shown that performance can be improved by 6% on average for Media Bench II benchmarks when the number of ISA registers is extended from 16 to 32.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130319267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Environment for Design Software and Hardware Aspects of Clock Synchronization and Communication in DRTES DRTES中时钟同步与通信的软硬件设计环境
B. Hamid, A. Ziani
Complexity in Distributed Real time Embedded Systems (DRTES) is rising due to richer functionality that is enabled by more powerful hardware. Component-Based Software Engineering (CBSE) and Model Driven Engineering (MDE) help to capture several facets of this complexity. With these two approaches, we build on two main currents in embedded systems research: synchronization and communication. In this paper, we propose a DRTES meta-model to deal with software and hardware aspects of synchronization and communication at a model level. The elements of this meta-model will be used to describe software and hardware specifications and requirements using component as a first class artifact to build such systems. Each component type (generic component) has several instances and multiple views, principally software or hardware one with specific links. The link offers an interface to choose the map between a software and a hardware component at an even greater level using UML profiles derived from DRTES meta-model. This is to allow an automatic exploration at component instance level via Model Driven Engineering. As a proof of concept we examine a test case that has software and hardware synchronization and communication requirements: a GPS.
由于更强大的硬件支持更丰富的功能,分布式实时嵌入式系统(DRTES)的复杂性正在上升。基于组件的软件工程(CBSE)和模型驱动工程(MDE)有助于捕获这种复杂性的几个方面。有了这两种方法,我们建立在嵌入式系统研究的两个主要趋势:同步和通信。在本文中,我们提出了一个DRTES元模型,在模型级别处理同步和通信的软件和硬件方面。这个元模型的元素将被用来描述软件和硬件规范和需求,使用组件作为构建这样的系统的第一类工件。每种组件类型(通用组件)都有几个实例和多个视图,主要是带有特定链接的软件或硬件视图。该链接提供了一个接口,使用从DRTES元模型派生的UML概要文件,在更高的层次上选择软件和硬件组件之间的映射。这是为了允许通过模型驱动工程在组件实例级别进行自动探索。作为概念验证,我们检查了一个具有软件和硬件同步和通信需求的测试用例:GPS。
{"title":"An Environment for Design Software and Hardware Aspects of Clock Synchronization and Communication in DRTES","authors":"B. Hamid, A. Ziani","doi":"10.1109/EUC.2010.19","DOIUrl":"https://doi.org/10.1109/EUC.2010.19","url":null,"abstract":"Complexity in Distributed Real time Embedded Systems (DRTES) is rising due to richer functionality that is enabled by more powerful hardware. Component-Based Software Engineering (CBSE) and Model Driven Engineering (MDE) help to capture several facets of this complexity. With these two approaches, we build on two main currents in embedded systems research: synchronization and communication. In this paper, we propose a DRTES meta-model to deal with software and hardware aspects of synchronization and communication at a model level. The elements of this meta-model will be used to describe software and hardware specifications and requirements using component as a first class artifact to build such systems. Each component type (generic component) has several instances and multiple views, principally software or hardware one with specific links. The link offers an interface to choose the map between a software and a hardware component at an even greater level using UML profiles derived from DRTES meta-model. This is to allow an automatic exploration at component instance level via Model Driven Engineering. As a proof of concept we examine a test case that has software and hardware synchronization and communication requirements: a GPS.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121211619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card 一种安全的基于双线性配对的智能卡远程用户认证方案
M. Bayat, M. Farash, Amirvala Movahed
Authentication schemes play vital roles in computer and communication security. In order to authenticate the remote users, password based schemes have been widely used. In this paper we introduce a secure remote user authentication scheme based on bilinear pairing that satisfies all security requirements which are mentioned for password based authentication schemes using smart card.
认证方案在计算机和通信安全中起着至关重要的作用。为了对远程用户进行身份验证,基于密码的方案得到了广泛的应用。本文提出了一种基于双线性对的安全远程用户认证方案,该方案满足智能卡密码认证方案的所有安全要求。
{"title":"A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card","authors":"M. Bayat, M. Farash, Amirvala Movahed","doi":"10.1109/EUC.2010.93","DOIUrl":"https://doi.org/10.1109/EUC.2010.93","url":null,"abstract":"Authentication schemes play vital roles in computer and communication security. In order to authenticate the remote users, password based schemes have been widely used. In this paper we introduce a secure remote user authentication scheme based on bilinear pairing that satisfies all security requirements which are mentioned for password based authentication schemes using smart card.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121238928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Automated Software Protection through Program Externalization on Memory-Limited Secure Devices 在内存有限的安全设备上通过程序外部化实现自动软件保护
S. Chaumette, Olivier Ly, Renaud Tabary
In this paper we propose a hardware assisted software protection scheme that relies on the use of a resource-limited secure token ({em e.g.} a smart card). The protection consists in externalizing the execution of the sensitive pieces of code of the application to be protected to the token block by block, while the unsensitive code is still executed inside the untrusted computer. We define a generic process: the protection is enforced automatically. Our method relies on static analysis techniques that are used to infer the parts of code to be externalized together with run-time externalization protocol. We have developed a software environment implementing this technology for Java applications.
在本文中,我们提出了一种硬件辅助软件保护方案,该方案依赖于使用资源有限的安全令牌(例如智能卡)。这种保护包括将要保护的应用程序的敏感代码块的执行外部化到令牌块,而不敏感的代码仍然在不受信任的计算机内执行。我们定义了一个通用流程:自动执行保护。我们的方法依赖于静态分析技术,该技术用于推断要与运行时外部化协议一起外部化的代码部分。我们已经为Java应用程序开发了一个实现该技术的软件环境。
{"title":"Automated Software Protection through Program Externalization on Memory-Limited Secure Devices","authors":"S. Chaumette, Olivier Ly, Renaud Tabary","doi":"10.1109/EUC.2010.122","DOIUrl":"https://doi.org/10.1109/EUC.2010.122","url":null,"abstract":"In this paper we propose a hardware assisted software protection scheme that relies on the use of a resource-limited secure token ({em e.g.} a smart card). The protection consists in externalizing the execution of the sensitive pieces of code of the application to be protected to the token block by block, while the unsensitive code is still executed inside the untrusted computer. We define a generic process: the protection is enforced automatically. Our method relies on static analysis techniques that are used to infer the parts of code to be externalized together with run-time externalization protocol. We have developed a software environment implementing this technology for Java applications.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preemption Control Using Frequency Scaling in Fixed Priority Scheduling 固定优先级调度中基于频率缩放的抢占控制
Abhilash Thekkilakattil, A. Pillai, R. Dobrin, S. Punnekkat
Controlling the number of preemptions in real time systems is highly desirable in order to achieve an efficient system design in multiple contexts. For example, the delays due to context switches account for high preemption overheads which detrimentally impact the system schedulability. Preemption control can also be potentially used for the efficient control of critical section behaviors in multi-threaded applications. At the same time, modern processor architectures provide for the ability to selectively choose operating frequencies, primarily targeting energy efficiency as well as system performance. In this paper, we propose the use of CPU Frequency Scaling for controlling the preemptive behavior of real-time tasks. We present a framework for selectively eliminating preemptions, that does not require modifications to the task attributes or to the underlying scheduler. We evaluate the proposed approach by four different heuristics through extensive simulation studies.
为了在多种环境下实现高效的系统设计,控制实时系统中抢占的数量是非常必要的。例如,由于上下文切换造成的延迟导致了高抢占开销,这对系统的可调度性产生了不利影响。抢占控制还可以潜在地用于多线程应用程序中对临界区行为的有效控制。与此同时,现代处理器架构提供了选择性选择工作频率的能力,主要针对能源效率和系统性能。在本文中,我们提出使用CPU频率缩放来控制实时任务的抢占行为。我们提出了一个框架来选择性地消除抢占,它不需要修改任务属性或底层调度器。我们通过广泛的模拟研究评估了四种不同的启发式方法。
{"title":"Preemption Control Using Frequency Scaling in Fixed Priority Scheduling","authors":"Abhilash Thekkilakattil, A. Pillai, R. Dobrin, S. Punnekkat","doi":"10.1109/EUC.2010.47","DOIUrl":"https://doi.org/10.1109/EUC.2010.47","url":null,"abstract":"Controlling the number of preemptions in real time systems is highly desirable in order to achieve an efficient system design in multiple contexts. For example, the delays due to context switches account for high preemption overheads which detrimentally impact the system schedulability. Preemption control can also be potentially used for the efficient control of critical section behaviors in multi-threaded applications. At the same time, modern processor architectures provide for the ability to selectively choose operating frequencies, primarily targeting energy efficiency as well as system performance. In this paper, we propose the use of CPU Frequency Scaling for controlling the preemptive behavior of real-time tasks. We present a framework for selectively eliminating preemptions, that does not require modifications to the task attributes or to the underlying scheduler. We evaluate the proposed approach by four different heuristics through extensive simulation studies.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116884386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PDVDS: A Pattern-Driven Software Vulnerability Detection System 模式驱动的软件漏洞检测系统
Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang
The automatic detection of security vulnerabilities in binary program is challenging and lacks efficient tools. Current research and tools are mostly restricted to a specific platform and environment, which induces the trouble to detect all kinds of vulnerabilities with unified approach. Moreover, Existing methods need many manual operations and rely on the experience of researchers. This paper presents a cross-platform system for automatically software vulnerability detection based on uniform intermediate representation. It supports many platforms, including x86, PowerPC and ARM. The system lifts underlying instructions to intermediate representation from several platforms. Platform-independent analysis method is implemented based on intermediate representation by static analysis. It also uses a vulnerability pattern driver extracted from experience and knowledge to drive the automatic vulnerability detection during the analysis. The system called PDVDS has been realized. We have evaluated its effectiveness through validating many known vulnerabilities and detecting three zero-day vulnerabilities.
二进制程序安全漏洞的自动检测具有挑战性,且缺乏有效的工具。目前的研究和工具大多局限于特定的平台和环境,这给统一检测各种漏洞带来了困难。此外,现有的方法需要大量的人工操作,并且依赖于研究人员的经验。提出了一种基于统一中间表示的跨平台软件漏洞自动检测系统。它支持许多平台,包括x86、PowerPC和ARM。该系统将底层指令从多个平台提升到中间表示。通过静态分析实现了基于中间表示的平台无关分析方法。它还使用从经验和知识中提取的漏洞模式驱动程序来驱动分析过程中的漏洞自动检测。实现了pdvd系统。我们通过验证许多已知漏洞和检测三个零日漏洞来评估其有效性。
{"title":"PDVDS: A Pattern-Driven Software Vulnerability Detection System","authors":"Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang","doi":"10.1109/EUC.2010.88","DOIUrl":"https://doi.org/10.1109/EUC.2010.88","url":null,"abstract":"The automatic detection of security vulnerabilities in binary program is challenging and lacks efficient tools. Current research and tools are mostly restricted to a specific platform and environment, which induces the trouble to detect all kinds of vulnerabilities with unified approach. Moreover, Existing methods need many manual operations and rely on the experience of researchers. This paper presents a cross-platform system for automatically software vulnerability detection based on uniform intermediate representation. It supports many platforms, including x86, PowerPC and ARM. The system lifts underlying instructions to intermediate representation from several platforms. Platform-independent analysis method is implemented based on intermediate representation by static analysis. It also uses a vulnerability pattern driver extracted from experience and knowledge to drive the automatic vulnerability detection during the analysis. The system called PDVDS has been realized. We have evaluated its effectiveness through validating many known vulnerabilities and detecting three zero-day vulnerabilities.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115218278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of the Test-bed for Underwater Acoustic Sensor Network Based on ARM9 Processor 基于ARM9处理器的水声传感器网络试验台的设计与实现
Yung-Pyo Kim, Jung-Il Namgung, N. Yun, Hui-Jin Cho, Imtiaz Ahmed Khan, Soo-Hyun Park
Underwater acoustic communication, compared with Wireless Sensor Networks (WSNs) used in terrestrial environment, poses unique challenges due to the harsh underwater environment, such as limited bandwidth capacity, high and variable propagation delays, high bit error rates, and temporary losses connectivity caused by multipath and fading phenomena in spite of using a variety of applications in many areas. In this paper we specify to develop the baseboard using characteristics of ARM9 processor based on low power consumption to enhance the performance, to improve a variety of restrictions. And we describe the process of the underwater communication that demonstrates and designs test-bed of the underwater acoustic sensor network with a similar actual environment.
水声通信与地面环境下的无线传感器网络(WSNs)相比,由于水下恶劣的环境,例如有限的带宽容量、高且可变的传播延迟、高误码率、多径和衰落现象造成的暂时性连接损失等,面临着独特的挑战。本文明确利用ARM9处理器的特点开发基于低功耗的基板,以提高性能,改善各种限制。描述了水下通信的过程,并在相似的实际环境下演示和设计了水声传感器网络试验台。
{"title":"Design and Implementation of the Test-bed for Underwater Acoustic Sensor Network Based on ARM9 Processor","authors":"Yung-Pyo Kim, Jung-Il Namgung, N. Yun, Hui-Jin Cho, Imtiaz Ahmed Khan, Soo-Hyun Park","doi":"10.1109/EUC.2010.49","DOIUrl":"https://doi.org/10.1109/EUC.2010.49","url":null,"abstract":"Underwater acoustic communication, compared with Wireless Sensor Networks (WSNs) used in terrestrial environment, poses unique challenges due to the harsh underwater environment, such as limited bandwidth capacity, high and variable propagation delays, high bit error rates, and temporary losses connectivity caused by multipath and fading phenomena in spite of using a variety of applications in many areas. In this paper we specify to develop the baseboard using characteristics of ARM9 processor based on low power consumption to enhance the performance, to improve a variety of restrictions. And we describe the process of the underwater communication that demonstrates and designs test-bed of the underwater acoustic sensor network with a similar actual environment.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115591687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Simulator Problem in User Centric Smart Card Ownership Model 以用户为中心的智能卡所有权模型中的模拟器问题
Raja Naeem Akram, K. Markantonakis, K. Mayes
The Issuer Centric Smart Card Ownership Model (ICOM) gives complete control of smart cards to their respective card issuers, enabling them to install, modify or delete applications remotely, in a secure manner. However, the User Centric Smart Card Ownership Model (UCOM) delegates the ownership of smart cards to their users, entitling them to install or delete any application according to their requirements. In the UCOM there might be no off-card relationship between a smart card and an application provider, referred to as a Service Provider, which is the cornerstone of the ICOM security framework. Therefore, this creates unique security issues like the simulator problem, in which a malicious user may simulate the smart card environment on a computing device and requests installation of an application. Following this, it might be possible to retrieve sensitive application data by reverse engineering. In this paper, we analyse the simulator problem, how it affects the UCOM and propose a possible solution.
以发卡机构为中心的智能卡所有权模型(ICOM)将智能卡的完全控制权交给各自的发卡机构,使他们能够以安全的方式远程安装、修改或删除应用程序。然而,以用户为中心的智能卡所有权模型(UCOM)将智能卡的所有权委托给其用户,使他们有权根据自己的需求安装或删除任何应用程序。在UCOM中,智能卡和应用程序提供者(称为服务提供者)之间可能没有卡外关系,服务提供者是ICOM安全框架的基石。因此,这会产生独特的安全问题,例如模拟器问题,恶意用户可能会在计算设备上模拟智能卡环境并请求安装应用程序。在此之后,可以通过逆向工程检索敏感的应用程序数据。在本文中,我们分析了模拟器问题,它是如何影响UCOM的,并提出了一个可能的解决方案。
{"title":"Simulator Problem in User Centric Smart Card Ownership Model","authors":"Raja Naeem Akram, K. Markantonakis, K. Mayes","doi":"10.1109/EUC.2010.108","DOIUrl":"https://doi.org/10.1109/EUC.2010.108","url":null,"abstract":"The Issuer Centric Smart Card Ownership Model (ICOM) gives complete control of smart cards to their respective card issuers, enabling them to install, modify or delete applications remotely, in a secure manner. However, the User Centric Smart Card Ownership Model (UCOM) delegates the ownership of smart cards to their users, entitling them to install or delete any application according to their requirements. In the UCOM there might be no off-card relationship between a smart card and an application provider, referred to as a Service Provider, which is the cornerstone of the ICOM security framework. Therefore, this creates unique security issues like the simulator problem, in which a malicious user may simulate the smart card environment on a computing device and requests installation of an application. Following this, it might be possible to retrieve sensitive application data by reverse engineering. In this paper, we analyse the simulator problem, how it affects the UCOM and propose a possible solution.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124964047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1