首页 > 最新文献

2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)最新文献

英文 中文
Applying Metamorphic Testing to e-Commerce Product Search Engines 变形测试在电子商务产品搜索引擎中的应用
S. Nagai, Tatsuhiro Tsuchiya
Metamorphic testing has been advocated as a possible approach to testing of systems that have no useful test oracles; but it has not often been applied in practice. Here we report some of the results of applying metamorphic testing to real-world e-commerce product search engines.
变形测试一直被提倡作为一种可能的方法来测试没有有用的测试oracle的系统;但它在实践中并不经常得到应用。在这里,我们报告了一些将变形测试应用于现实世界的电子商务产品搜索引擎的结果。
{"title":"Applying Metamorphic Testing to e-Commerce Product Search Engines","authors":"S. Nagai, Tatsuhiro Tsuchiya","doi":"10.1109/PRDC.2018.00030","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00030","url":null,"abstract":"Metamorphic testing has been advocated as a possible approach to testing of systems that have no useful test oracles; but it has not often been applied in practice. Here we report some of the results of applying metamorphic testing to real-world e-commerce product search engines.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125913501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Detection of Side-Channel Attacks 关于侧信道攻击的检测
Tsvetoslava Vateva-Gurova, N. Suri
Threats posed by side-channel and covert-channel attacks exploiting the CPU cache to compromise the confidentiality of a system raise serious security concerns. This applies especially to systems offering shared hardware or resources to their customers. As eradicating this threat is practically impeded due to performance implications or financial cost of the current mitigation approaches, a detection mechanism might enhance the security of such systems. In the course of this work, we propose an approach towards side-channel attacks detection, considering the specificity of cache-based SCAs and their implementations.
利用CPU缓存破坏系统机密性的侧信道和隐蔽信道攻击所构成的威胁引起了严重的安全问题。这尤其适用于向客户提供共享硬件或资源的系统。由于当前缓解方法的性能影响或财务成本,消除这种威胁实际上受到阻碍,因此检测机制可能会增强此类系统的安全性。在这项工作的过程中,考虑到基于缓存的sca及其实现的特殊性,我们提出了一种检测侧信道攻击的方法。
{"title":"On the Detection of Side-Channel Attacks","authors":"Tsvetoslava Vateva-Gurova, N. Suri","doi":"10.1109/PRDC.2018.00031","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00031","url":null,"abstract":"Threats posed by side-channel and covert-channel attacks exploiting the CPU cache to compromise the confidentiality of a system raise serious security concerns. This applies especially to systems offering shared hardware or resources to their customers. As eradicating this threat is practically impeded due to performance implications or financial cost of the current mitigation approaches, a detection mechanism might enhance the security of such systems. In the course of this work, we propose an approach towards side-channel attacks detection, considering the specificity of cache-based SCAs and their implementations.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121401092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
FastFI: Accelerating Software Fault Injections FastFI:加速软件故障注入
Oliver Schwahn, Nicolas Coppik, Stefan Winter, N. Suri
Software Fault Injection (SFI) is a widely used technique to experimentally assess the dependability of software systems. To provide a comprehensive view on the dependability of a software under test, SFI typically requires large numbers of experiments, which leads to long test latencies. In order to reduce the overall test duration for SFI, we propose FASTFI, which (1) avoids redundant executions of common path prefixes for faults in the same injection location, (2) avoids test executions for faults that do not get activated, and (3) utilizes parallel processors by executing SFI tests concurrently. FASTFI takes patch files that specify source code mutations as an input, conducts an automated source code analysis to identify the function they target, and then automatically parallelizes the execution of all mutants that target the same function. Our evaluation of FASTFI on four PARSEC benchmarks shows a SFI test latency reduction of up to a factor of 26.
软件故障注入(SFI)是一种广泛应用于软件系统可靠性实验评估的技术。为了对被测软件的可靠性提供一个全面的看法,SFI通常需要大量的实验,这导致了很长的测试延迟。为了减少SFI的整体测试持续时间,我们提出了FASTFI,它(1)避免在同一注入位置对故障重复执行公共路径前缀,(2)避免对未激活的故障执行测试,以及(3)通过并发执行SFI测试来利用并行处理器。FASTFI将指定源代码突变的补丁文件作为输入,进行自动化的源代码分析以识别它们所针对的功能,然后自动并行执行针对同一功能的所有突变。我们在四个PARSEC基准测试上对FASTFI的评估显示,SFI测试延迟减少了高达26倍。
{"title":"FastFI: Accelerating Software Fault Injections","authors":"Oliver Schwahn, Nicolas Coppik, Stefan Winter, N. Suri","doi":"10.1109/PRDC.2018.00035","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00035","url":null,"abstract":"Software Fault Injection (SFI) is a widely used technique to experimentally assess the dependability of software systems. To provide a comprehensive view on the dependability of a software under test, SFI typically requires large numbers of experiments, which leads to long test latencies. In order to reduce the overall test duration for SFI, we propose FASTFI, which (1) avoids redundant executions of common path prefixes for faults in the same injection location, (2) avoids test executions for faults that do not get activated, and (3) utilizes parallel processors by executing SFI tests concurrently. FASTFI takes patch files that specify source code mutations as an input, conducts an automated source code analysis to identify the function they target, and then automatically parallelizes the execution of all mutants that target the same function. Our evaluation of FASTFI on four PARSEC benchmarks shows a SFI test latency reduction of up to a factor of 26.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126265795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family 利用RasMMA算法生成Android恶意软件家族的恶意行为特征
Shun-Chieh Chang, Yeali S. Sun, Wu-Long Chuang, Meng Chang Chen, Bo Sun, Takeshi Takahashi
Malware developers often use various obfuscation techniques to generate polymorphic and metamorphic versions of malicious programs. As a result, variants of a malware family generally exhibit resembling behavior, and most importantly, they possess certain common essential codes so to achieve the same designed purpose. Meantime, keeping up with new variants and generating signatures for each individual in a timely fashion has been costly and inefficient for anti-virus software companies. It motivates us the idea of no more dancing with variants. In this paper, we aim to find a malware family's main characteristic operations or activities directly related to its intent. We propose a novel automatic dynamic Android profiling system and malware family runtime behavior signature generation method called Runtime API sequence Motif Mining Algorithm (RasMMA) based on the analysis of the sensitive and permission-related execution traces of the threads and processes of a set of variant APKs of a malware family. We show the effectiveness of using the generated family signature to detect new variants using real-world dataset. Moreover, current anti-malware tools usually treat detection models as a black box for classification and offer little explanations on how malwares behave and how they proceed step by step to infiltrate targeted system and achieve the goal. We take malware family DroidKungFu as a case study to illustrate that the generated family signature indeed captures key malicious activities of the family.
恶意软件开发人员经常使用各种混淆技术来生成多态和变形版本的恶意程序。因此,恶意软件家族的变体通常表现出类似的行为,最重要的是,它们拥有某些共同的基本代码,以实现相同的设计目的。与此同时,对杀毒软件公司来说,跟上病毒的新变种并及时为每个人生成签名既昂贵又低效。它激发了我们不再与变体共舞的想法。在本文中,我们的目标是找到一个恶意软件家族的主要特征,操作或活动直接相关的意图。本文在分析恶意软件家族一系列变种apk的线程和进程的敏感和权限相关执行轨迹的基础上,提出了一种新的Android动态自动分析系统和恶意软件家族运行时行为签名生成方法——运行时API序列Motif Mining Algorithm (RasMMA)。我们展示了使用生成的家族签名使用真实数据集检测新变体的有效性。此外,目前的反恶意软件工具通常将检测模型视为分类的黑箱,并且很少解释恶意软件的行为以及它们如何一步步渗透目标系统并实现目标。我们以恶意软件家族DroidKungFu为例,说明生成的家族签名确实捕获了该家族的关键恶意活动。
{"title":"ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family","authors":"Shun-Chieh Chang, Yeali S. Sun, Wu-Long Chuang, Meng Chang Chen, Bo Sun, Takeshi Takahashi","doi":"10.1109/PRDC.2018.00047","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00047","url":null,"abstract":"Malware developers often use various obfuscation techniques to generate polymorphic and metamorphic versions of malicious programs. As a result, variants of a malware family generally exhibit resembling behavior, and most importantly, they possess certain common essential codes so to achieve the same designed purpose. Meantime, keeping up with new variants and generating signatures for each individual in a timely fashion has been costly and inefficient for anti-virus software companies. It motivates us the idea of no more dancing with variants. In this paper, we aim to find a malware family's main characteristic operations or activities directly related to its intent. We propose a novel automatic dynamic Android profiling system and malware family runtime behavior signature generation method called Runtime API sequence Motif Mining Algorithm (RasMMA) based on the analysis of the sensitive and permission-related execution traces of the threads and processes of a set of variant APKs of a malware family. We show the effectiveness of using the generated family signature to detect new variants using real-world dataset. Moreover, current anti-malware tools usually treat detection models as a black box for classification and offer little explanations on how malwares behave and how they proceed step by step to infiltrate targeted system and achieve the goal. We take malware family DroidKungFu as a case study to illustrate that the generated family signature indeed captures key malicious activities of the family.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132117411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Attack-Tolerant Agreement Algorithm for Block Chain 一种区块链容错协议算法
M. Kitakami, Kazuki Matsuoka
This paper proposes a method to protect block chains, which is transaction records in virtual currency such as Bitcoin, from majority voting attacks. In the proposed method, it is difficult to acquire consecutive blocks by increasing the difficulty level of the search problem for the node that acquired the block.
本文提出了一种保护区块链(比特币等虚拟货币的交易记录)免受多数投票攻击的方法。在该方法中,通过增加获取块的节点的搜索问题的难度,使获取连续块变得困难。
{"title":"An Attack-Tolerant Agreement Algorithm for Block Chain","authors":"M. Kitakami, Kazuki Matsuoka","doi":"10.1109/PRDC.2018.00041","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00041","url":null,"abstract":"This paper proposes a method to protect block chains, which is transaction records in virtual currency such as Bitcoin, from majority voting attacks. In the proposed method, it is difficult to acquire consecutive blocks by increasing the difficulty level of the search problem for the node that acquired the block.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129404996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enforcing Enterprise Mobile Application Security Policy with Plugin Framework 使用插件框架实施企业移动应用安全策略
Pang-Yang Chu, Wei-Huan Lu, Jun-Wei Lin, Yu-Sung Wu
The prevalent use of mobile applications in enterprise computing requires more stringent yet flexible enforcement of security policies on the mobile devices. Existing enforcement mechanisms such as mobile device management system focus on the management of device features and cannot cover the diverse security policies of enterprise applications precisely. We address the challenge by proposing a novel security policy enforcement system based on Plugin framework. The system provides fine-grained security policy enforcement at each library call site in an application. With root privilege (targeting company-owned devices), fine-grained enforcement can be applied to any application. Without root privilege (targeting BYOD devices), fine-grained enforcement can be applied to the applications installed via the enforcement system.
移动应用程序在企业计算中的普遍使用要求在移动设备上实施更严格但更灵活的安全策略。现有的强制机制(如移动设备管理系统)侧重于对设备特性的管理,无法准确覆盖企业应用程序的各种安全策略。我们提出了一种新的基于插件框架的安全策略实施系统。系统在应用程序中的每个库调用站点提供细粒度的安全策略实施。使用根权限(针对公司拥有的设备),可以对任何应用程序应用细粒度的强制执行。如果没有根权限(针对BYOD设备),可以将细粒度的强制应用于通过强制系统安装的应用程序。
{"title":"Enforcing Enterprise Mobile Application Security Policy with Plugin Framework","authors":"Pang-Yang Chu, Wei-Huan Lu, Jun-Wei Lin, Yu-Sung Wu","doi":"10.1109/PRDC.2018.00048","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00048","url":null,"abstract":"The prevalent use of mobile applications in enterprise computing requires more stringent yet flexible enforcement of security policies on the mobile devices. Existing enforcement mechanisms such as mobile device management system focus on the management of device features and cannot cover the diverse security policies of enterprise applications precisely. We address the challenge by proposing a novel security policy enforcement system based on Plugin framework. The system provides fine-grained security policy enforcement at each library call site in an application. With root privilege (targeting company-owned devices), fine-grained enforcement can be applied to any application. Without root privilege (targeting BYOD devices), fine-grained enforcement can be applied to the applications installed via the enforcement system.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130242640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring the Relationship Between Dimensionality Reduction and Private Data Release 降维与私有数据发布的关系探讨
Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, N. Suri, Pang-Chieh Wang
It is important to facilitate data sharing between data owners and data analysts as data owners do not always have the ability to process and analyze data. For example, governments around the world are starting to release collected data to the public to leverage data analysis competence of the crowd. However, some privacy leakage incidents have made the public to rediscover the importance of privacy protection, leading to new privacy regulations. In existing researches dimensionality reduction has played an important role in private data release mechanisms to improve utility but its influence on privacy protection has never been examined. In this study, we perform a series of experiments and found that dimensionality reduction could provide similar privacy protection effects as K-anonymity mechanisms, and it could work as a preprocessor of K-anonymity process to it to reduce the generalization and suppression needed.
促进数据所有者和数据分析师之间的数据共享非常重要,因为数据所有者并不总是具有处理和分析数据的能力。例如,世界各国政府开始向公众发布收集到的数据,以利用人群的数据分析能力。然而,一些隐私泄露事件使公众重新认识到隐私保护的重要性,从而产生了新的隐私法规。在现有研究中,降维在私有数据发布机制中发挥了重要作用,以提高效用,但其对隐私保护的影响尚未得到研究。在本研究中,我们进行了一系列实验,发现降维可以提供与k -匿名机制相似的隐私保护效果,并且可以作为k -匿名过程的预处理程序,以减少其泛化和抑制所需。
{"title":"Exploring the Relationship Between Dimensionality Reduction and Private Data Release","authors":"Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, N. Suri, Pang-Chieh Wang","doi":"10.1109/PRDC.2018.00013","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00013","url":null,"abstract":"It is important to facilitate data sharing between data owners and data analysts as data owners do not always have the ability to process and analyze data. For example, governments around the world are starting to release collected data to the public to leverage data analysis competence of the crowd. However, some privacy leakage incidents have made the public to rediscover the importance of privacy protection, leading to new privacy regulations. In existing researches dimensionality reduction has played an important role in private data release mechanisms to improve utility but its influence on privacy protection has never been examined. In this study, we perform a series of experiments and found that dimensionality reduction could provide similar privacy protection effects as K-anonymity mechanisms, and it could work as a preprocessor of K-anonymity process to it to reduce the generalization and suppression needed.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131734041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Semantic Failover in Software-Defined Networking 软件定义网络中的语义故障转移
Shu-Wen Hsueh, Tung-Yueh Lin, Weng-Ian Lei, Chi-Leung Patrick Ngai, Yu-Hang Sheng, Yu-Sung Wu
Software-defined networking (SDN) eases the management of large-scale network by providing centralized and programmable control of a network. The centralization inevitably creates a single point of failure and requires the use of redundant controllers. However, due to the need for replicating the SDN application states, existing solutions tend to assume that the controllers are of the same type. This imposes an undesirable trade-off between cost and availability as each active controller would require a dedicated standby controller of the same type. We propose semantic failover to address the issue, which allows generic failover across any types of controllers. Semantic failover models the SDN application states from the control plane messages and restores the application states by invoking the northbound API on the standby controller. It is thereby not dependent on specific types of controllers. The prototype system was tested on real-world SDN controllers, and the evaluation results have demonstrated the potentials of semantic failover for both homogenous and heterogeneous controller pairs.
软件定义网络(SDN)通过提供对网络的集中和可编程控制,简化了对大型网络的管理。集中化不可避免地会造成单点故障,并需要使用冗余控制器。然而,由于需要复制SDN应用程序状态,现有的解决方案倾向于假设控制器是相同类型的。这在成本和可用性之间强加了一种不受欢迎的权衡,因为每个活动控制器都需要一个相同类型的专用备用控制器。我们提出语义故障转移来解决这个问题,它允许跨任何类型的控制器进行通用故障转移。语义故障转移从控制平面消息建模SDN应用程序状态,并通过调用备用控制器上的北向API恢复应用程序状态。因此,它不依赖于特定类型的控制器。原型系统在真实的SDN控制器上进行了测试,评估结果证明了同质和异构控制器对的语义故障转移潜力。
{"title":"Semantic Failover in Software-Defined Networking","authors":"Shu-Wen Hsueh, Tung-Yueh Lin, Weng-Ian Lei, Chi-Leung Patrick Ngai, Yu-Hang Sheng, Yu-Sung Wu","doi":"10.1109/PRDC.2018.00052","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00052","url":null,"abstract":"Software-defined networking (SDN) eases the management of large-scale network by providing centralized and programmable control of a network. The centralization inevitably creates a single point of failure and requires the use of redundant controllers. However, due to the need for replicating the SDN application states, existing solutions tend to assume that the controllers are of the same type. This imposes an undesirable trade-off between cost and availability as each active controller would require a dedicated standby controller of the same type. We propose semantic failover to address the issue, which allows generic failover across any types of controllers. Semantic failover models the SDN application states from the control plane messages and restores the application states by invoking the northbound API on the standby controller. It is thereby not dependent on specific types of controllers. The prototype system was tested on real-world SDN controllers, and the evaluation results have demonstrated the potentials of semantic failover for both homogenous and heterogeneous controller pairs.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116148659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Effectiveness of Code Normalization for Function Identification 论代码归一化在功能识别中的有效性
Angelos Oikonomopoulos, Remco Vermeulen, Cristiano Giuffrida, H. Bos
Information on the identity of functions is typically removed when translating source code to executable form. Yet being able to recognize specific functions opens up a number of applications. In this paper, we investigate normalization-based approaches for the purposes of aiding the reverse engineer and as an enabler for the rejuvenation of legacy binaries. We iteratively refine our methods and report on their effectiveness. Our results show that a naive approach can be surprisingly effective in both problem domains. Further, our evaluation looks into more advanced normalization techniques and finds that their practicality varies significantly with the problem domain.
在将源代码转换为可执行形式时,通常会删除有关函数标识的信息。然而,能够识别特定功能开启了许多应用。在本文中,我们研究了基于规范化的方法,以帮助逆向工程,并作为遗留二进制文件复兴的推动者。我们迭代地改进我们的方法,并报告它们的有效性。我们的结果表明,一种朴素的方法在这两个问题领域中都能出奇地有效。此外,我们的评估着眼于更高级的规范化技术,并发现它们的实用性因问题领域而异。
{"title":"On the Effectiveness of Code Normalization for Function Identification","authors":"Angelos Oikonomopoulos, Remco Vermeulen, Cristiano Giuffrida, H. Bos","doi":"10.1109/PRDC.2018.00045","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00045","url":null,"abstract":"Information on the identity of functions is typically removed when translating source code to executable form. Yet being able to recognize specific functions opens up a number of applications. In this paper, we investigate normalization-based approaches for the purposes of aiding the reverse engineer and as an enabler for the rejuvenation of legacy binaries. We iteratively refine our methods and report on their effectiveness. Our results show that a naive approach can be surprisingly effective in both problem domains. Further, our evaluation looks into more advanced normalization techniques and finds that their practicality varies significantly with the problem domain.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116867500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-Physical Transactions: A Method for Securing VANETs with Blockchains 网络物理交易:一种用区块链保护vanet的方法
Matthew Wagner, B. McMillin
Blockchains are used to perform state agreement in a distributed system. However, there is no way to validate off-chain actions, such as physical actions, in the current architecture. This paper proposes a new blockchain architecture which features locally physically-verified transactions. From this new architecture, this paper presents a protocol for securing vehicular ad-hoc networks (VANETs) without the need to constantly communicate with roadside units (RSUs) or other infrastructure components. However, issues such as privacy in VANETs and Blockchains are left to future work. This paper shows the results from simulations of the current system in order to note its weaknesses. In particular, this paper can be used as a benchmark to show that ideas such as Proof-of-Work and full blockchain validation cannot work in a purely peer-to-peer VANET.
区块链用于在分布式系统中执行状态协议。然而,在当前的体系结构中,没有办法验证链下操作,比如物理操作。本文提出了一种新的区块链体系结构,该体系结构具有本地物理验证的事务。基于这种新架构,本文提出了一种协议,用于保护车辆自组织网络(vanet),而无需与路边单元(rsu)或其他基础设施组件进行持续通信。然而,vanet和区块链中的隐私等问题将留给未来的工作。本文给出了现有系统的仿真结果,以指出其不足之处。特别是,这篇论文可以作为一个基准来证明,像工作量证明和完全区块链验证这样的想法不能在纯粹的点对点VANET中工作。
{"title":"Cyber-Physical Transactions: A Method for Securing VANETs with Blockchains","authors":"Matthew Wagner, B. McMillin","doi":"10.1109/PRDC.2018.00017","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00017","url":null,"abstract":"Blockchains are used to perform state agreement in a distributed system. However, there is no way to validate off-chain actions, such as physical actions, in the current architecture. This paper proposes a new blockchain architecture which features locally physically-verified transactions. From this new architecture, this paper presents a protocol for securing vehicular ad-hoc networks (VANETs) without the need to constantly communicate with roadside units (RSUs) or other infrastructure components. However, issues such as privacy in VANETs and Blockchains are left to future work. This paper shows the results from simulations of the current system in order to note its weaknesses. In particular, this paper can be used as a benchmark to show that ideas such as Proof-of-Work and full blockchain validation cannot work in a purely peer-to-peer VANET.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115460580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1