Junk code fuzzy transformation (JCFT) is one of the effective approaches of the code obfuscation technology. Based on the analysis of current junk code strategies, this paper presents a new method named junk code encryption algorithm of subroutine, and depicts the algorithm with formalized language. The paper studies how to prove the logic invariability of subroutine’s JCFT with formalized method. After studying the formalized definition of subroutine’s JCFT, some lemmas are extracted. With these lemmas, and from three aspects such as "XOR and CMP Expansion", "False Embranchment Construction" and "JNE Append Junk Code", the paper proves that the procedure which transforms with subroutine’s JCFT has the same logicality with the original procedure.
{"title":"Study the Logic Invariability in Subroutine's Junk Code Fuzzy Transformation","authors":"Guo-zi Sun, Baobing Wang, Dan-wei Chen, Qiang Cai","doi":"10.1109/NSWCTC.2009.204","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.204","url":null,"abstract":"Junk code fuzzy transformation (JCFT) is one of the effective approaches of the code obfuscation technology. Based on the analysis of current junk code strategies, this paper presents a new method named junk code encryption algorithm of subroutine, and depicts the algorithm with formalized language. The paper studies how to prove the logic invariability of subroutine’s JCFT with formalized method. After studying the formalized definition of subroutine’s JCFT, some lemmas are extracted. With these lemmas, and from three aspects such as \"XOR and CMP Expansion\", \"False Embranchment Construction\" and \"JNE Append Junk Code\", the paper proves that the procedure which transforms with subroutine’s JCFT has the same logicality with the original procedure.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"455 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116410926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Introduce the construction of wireless sensor networks on oil-drilling site. Build the framework of the system, configure the software and hardware, and analysis the process based on Zigbee technology. Realize the transplantation of TinyOS Operating system on the CC2430 Platform, data collecting, program debugging, and performance testing of wireless sensor networks. The data collected by the monitoring system coincides with the actual situation. So this monitoring system could be used to monitor the process of oil drilling.
{"title":"Research and Development of Oil Drilling Monitoring System Based on Wireless Sensor Network Technology","authors":"Qinghua Xu, Jinyu Jiang, Xianbiao Wang","doi":"10.1109/NSWCTC.2009.270","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.270","url":null,"abstract":"Introduce the construction of wireless sensor networks on oil-drilling site. Build the framework of the system, configure the software and hardware, and analysis the process based on Zigbee technology. Realize the transplantation of TinyOS Operating system on the CC2430 Platform, data collecting, program debugging, and performance testing of wireless sensor networks. The data collected by the monitoring system coincides with the actual situation. So this monitoring system could be used to monitor the process of oil drilling.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114638772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to study the impact of node mobility upon distributed cooperative communication, a three-node model was established. It used Alamouti coding. Using bit error rate as a metric, the cooperative communication parameter was defined. Compared with Alamouti2×1 and direct communication separately, cooperative communication achieved its upper and lower bound. The simulation results show that under the circumstance of S-R channel’s good performance, as long as S-D and R-D channel satisfy certain conditions, the cooperative communication will be superior to Alamouti2×1 and direct communication.
{"title":"The Upper and Lower Bound of Distributed Cooperative Communication","authors":"Changsong Xia, Weijun Cheng, B. Zhu","doi":"10.1109/NSWCTC.2009.219","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.219","url":null,"abstract":"In order to study the impact of node mobility upon distributed cooperative communication, a three-node model was established. It used Alamouti coding. Using bit error rate as a metric, the cooperative communication parameter was defined. Compared with Alamouti2×1 and direct communication separately, cooperative communication achieved its upper and lower bound. The simulation results show that under the circumstance of S-R channel’s good performance, as long as S-D and R-D channel satisfy certain conditions, the cooperative communication will be superior to Alamouti2×1 and direct communication.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116940232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wire communication network combining wireless communication, a hybrid network communication system applied in NC system is proposed. Operation mode of the upper computer combining the lower computer is adopted in NC system to create wire communication network. Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer. The lower computer is only as motion control system. Some fault signals in NC machine tool are transmitted from lower computer to upper computer. The lower computer is connected with the upper computer by the network cables and Ethernet switchboard based on TCP / IP protocol. The industrial Ethernet network is adopted as the platform. Otherwise, NC system is connected with PDA by virtual serial port technology to create Piconet and diagnose the no-alarm fault in virtual of Bluetooth technology. Virtual serial port in PC is directly accessed with NT port software. The information of NC machine, including NC code, cutter location data and so on, is regularly accessed from top-level application program by Bluetooth wireless communication module with timer component in C++Builder6. The information of NC machine is saved as the Access file in PDA database by ActiveSync software. The Upper computer communication program and the lower computer communication program is designed in virtual of Winsock technology in C++Builder6. The PDA receiving data module program is compiled by evb3.0. In the experiment based on the method above, Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer to increase functions in NC system while the lower computer normally running. When the lower computer is connected with PDA, process information is successfully transferred to PDA to increase maintainable efficiency while NC system is running. The hybrid network communication system applied in NC system to increase functions and maintainable efficiency.
{"title":"The Research of Hybrid Network Communication System in NC System","authors":"Kun-qi Wang, Pengju Wang, Ya-nan Wang","doi":"10.1109/NSWCTC.2009.345","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.345","url":null,"abstract":"Wire communication network combining wireless communication, a hybrid network communication system applied in NC system is proposed. Operation mode of the upper computer combining the lower computer is adopted in NC system to create wire communication network. Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer. The lower computer is only as motion control system. Some fault signals in NC machine tool are transmitted from lower computer to upper computer. The lower computer is connected with the upper computer by the network cables and Ethernet switchboard based on TCP / IP protocol. The industrial Ethernet network is adopted as the platform. Otherwise, NC system is connected with PDA by virtual serial port technology to create Piconet and diagnose the no-alarm fault in virtual of Bluetooth technology. Virtual serial port in PC is directly accessed with NT port software. The information of NC machine, including NC code, cutter location data and so on, is regularly accessed from top-level application program by Bluetooth wireless communication module with timer component in C++Builder6. The information of NC machine is saved as the Access file in PDA database by ActiveSync software. The Upper computer communication program and the lower computer communication program is designed in virtual of Winsock technology in C++Builder6. The PDA receiving data module program is compiled by evb3.0. In the experiment based on the method above, Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer to increase functions in NC system while the lower computer normally running. When the lower computer is connected with PDA, process information is successfully transferred to PDA to increase maintainable efficiency while NC system is running. The hybrid network communication system applied in NC system to increase functions and maintainable efficiency.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114781727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Target localization is an important application in wireless sensor networks. However, because of the limitation of the capability of the individual nodes and the noises in the environment, a single sensor usually cannot localize a target accurately and observations from multiple sensors need to be combined to improve the localization accuracy. In this paper, the Centroid method, a widely used node localization algorithm is applied to target localization. We first identify two factors that affect the accuracy of the Centroid method: node density and uniformity. Then we propose a classifying procedure by which a cluster-based network is formed. In this cluster-based network, only a part of sensors are active and the node density and uniformity is adjusted to improve the localization accuracy. Experimental results show that by using our classifying method, the accuracy of the localization result can be improved with fewer active nodes.
{"title":"Topology Optimization for Target Localization in Wireless Sensor Networks","authors":"Chao Yang, Lijun Chen, Daoxu Chen, Li Xie","doi":"10.1109/NSWCTC.2009.28","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.28","url":null,"abstract":"Target localization is an important application in wireless sensor networks. However, because of the limitation of the capability of the individual nodes and the noises in the environment, a single sensor usually cannot localize a target accurately and observations from multiple sensors need to be combined to improve the localization accuracy. In this paper, the Centroid method, a widely used node localization algorithm is applied to target localization. We first identify two factors that affect the accuracy of the Centroid method: node density and uniformity. Then we propose a classifying procedure by which a cluster-based network is formed. In this cluster-based network, only a part of sensors are active and the node density and uniformity is adjusted to improve the localization accuracy. Experimental results show that by using our classifying method, the accuracy of the localization result can be improved with fewer active nodes.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115685628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Flexible authorization is a significant research realm in pervasive computing. Logic program is a worthy approach for expressing and reasoning flexible authorization not only in theory but also in practice. This paper mainly focuses on specifying flexible authorization policies using logic programs. The features of the flexible authorizations are analyzed. The conflicts resolution and dynamic authorization based on LPOD (Logic Program with Ordered Disjunction) are studied.
{"title":"Flexible Authorizations with Logic Program","authors":"Mingsheng Zhang, Wu Chen, Yisong Wang, Mingyi Zhang","doi":"10.1109/NSWCTC.2009.9","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.9","url":null,"abstract":"Flexible authorization is a significant research realm in pervasive computing. Logic program is a worthy approach for expressing and reasoning flexible authorization not only in theory but also in practice. This paper mainly focuses on specifying flexible authorization policies using logic programs. The features of the flexible authorizations are analyzed. The conflicts resolution and dynamic authorization based on LPOD (Logic Program with Ordered Disjunction) are studied.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because of the limitations of condition configuration and execution mechanism, the exiting access control models are not flexible and can not support multi-policy. Focusing on this, the paper presents a policy-based access control model (PBAC). Different from the traditional models which restrict session only with subject authorization, PBAC realizes policy-based access control by defining attribute to describe session property, performing a new policy management method that is free from application logic, and advocating an independent access control decision mechanism. As a consequence, PBAC is more flexible on restricting session, and makes great progress on multi-policy supporting. The comparison analysis indicates that PBAC is superior to the current access control models.
{"title":"Research on Policy-based Access Control Model","authors":"Lin Zhi, Wang Jing, Chen Xiao-su, Jia Lian-xing","doi":"10.1109/NSWCTC.2009.313","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.313","url":null,"abstract":"Because of the limitations of condition configuration and execution mechanism, the exiting access control models are not flexible and can not support multi-policy. Focusing on this, the paper presents a policy-based access control model (PBAC). Different from the traditional models which restrict session only with subject authorization, PBAC realizes policy-based access control by defining attribute to describe session property, performing a new policy management method that is free from application logic, and advocating an independent access control decision mechanism. As a consequence, PBAC is more flexible on restricting session, and makes great progress on multi-policy supporting. The comparison analysis indicates that PBAC is superior to the current access control models.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121345015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With trusted computing technology, we can build trust relations between computing platforms distributed on network. But current methods which are merely based on the integrity of components to justify the dependability of remote runtime environment, are hard to adapt today’s Internet full of heterogeneous platforms due to the scalability of measurement list. Especially when verifying open source software, this shortcoming is more obvious for the reason that all possible custom-built versions have to be considered. To solve this problem, we extended existing method to limit the size of measurement list by attesting the building process of custom-built software.
{"title":"Remote Attestation for Custom-built Software","authors":"Ce Meng, Yeping He, Qian Zhang","doi":"10.1109/NSWCTC.2009.158","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.158","url":null,"abstract":"With trusted computing technology, we can build trust relations between computing platforms distributed on network. But current methods which are merely based on the integrity of components to justify the dependability of remote runtime environment, are hard to adapt today’s Internet full of heterogeneous platforms due to the scalability of measurement list. Especially when verifying open source software, this shortcoming is more obvious for the reason that all possible custom-built versions have to be considered. To solve this problem, we extended existing method to limit the size of measurement list by attesting the building process of custom-built software.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124677416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, an improved colour image encryption is proposed, which is based on a chaotic logistic map and the one-way coupled-map lattices (OCML) model. The results of several experimental, statistical analyses and key sensitivity tests prove the security robustness of the proposed cryptosystem.
{"title":"An Improved Colour Image Encryption Based on Chaotic Map and OCML Model","authors":"Jun He, Jun Zheng, Zhi-bin Li, Hai-feng Qian","doi":"10.1109/NSWCTC.2009.243","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.243","url":null,"abstract":"In this paper, an improved colour image encryption is proposed, which is based on a chaotic logistic map and the one-way coupled-map lattices (OCML) model. The results of several experimental, statistical analyses and key sensitivity tests prove the security robustness of the proposed cryptosystem.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122601016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article introduced a kind of method to produce two value sequences by separating the two-dimensional cat mapping sequence, according to the distribution of this two value sequence, establish exclusive corresponding relationships between the two-dimensional cat mapping chaos sequence and the discrete wavelet transformation coefficient matrix. The value of the discrete wavelet transformation coefficient matrix was encrypted and the scrambled by adjusting chaos sequence. The test result indicated that this algorithm can overcome the flaw of lower-dimensional chaos dynamics system easy to attack, and has the characteristics of highly secrecy, simple key, precise uniformity between restructuring image and original image. Meanwhile it can withstand the noise effect from the transmission process.
{"title":"An Image Encryption Algorithm Based on Discrete Wavelet Transform and Two Dimension Cat Mapping","authors":"Chunjiang Pang","doi":"10.1109/NSWCTC.2009.191","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.191","url":null,"abstract":"This article introduced a kind of method to produce two value sequences by separating the two-dimensional cat mapping sequence, according to the distribution of this two value sequence, establish exclusive corresponding relationships between the two-dimensional cat mapping chaos sequence and the discrete wavelet transformation coefficient matrix. The value of the discrete wavelet transformation coefficient matrix was encrypted and the scrambled by adjusting chaos sequence. The test result indicated that this algorithm can overcome the flaw of lower-dimensional chaos dynamics system easy to attack, and has the characteristics of highly secrecy, simple key, precise uniformity between restructuring image and original image. Meanwhile it can withstand the noise effect from the transmission process.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130688184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}