期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Smart Obfuscation Approach to Protect Software in Cloud
1
作者 Lei Yu yucong duan 《Computers, Materials & Continua》 SCIE EI 2023年第9期3949-3965,共17页
Cloud computing and edge computing brought more software,which also brought a new danger of malicious software attacks.Data synchronization mechanisms of software can further help reverse data modifications.Based on t... Cloud computing and edge computing brought more software,which also brought a new danger of malicious software attacks.Data synchronization mechanisms of software can further help reverse data modifications.Based on the mechanisms,attackers can cover themselves behind the network and modify data undetected.Related knowledge of software reverse engineering can be organized as rules to accelerate the attacks,when attackers intrude cloud server to access the source or binary codes.Therefore,we proposed a novel method to resist this kind of reverse engineering by breaking these rules.Our method is based on software obfuscations and encryptions to enhance the security of distributed software and cloud services in the 5G era.Our method is capable of(1)replacing theoriginal assembly codes of theprotectedprogramwithequivalent assembly instructions inan iteration way,(2)obfuscating the control flow of the protected program to confuse attackers meanwhile keeps the program producing the same outputs,(3)encrypting data to confuse attackers.In addition,the approach can periodically and automatically modify the protected software binary codes,and the binary codes of the protected software are encrypted to resist static analysis and dynamic analysis.Furthermore,a simplified virtual machine is implemented to make the protected codes unreadable to attackers.Cloud game is one of the specific scenarios which needs low latency and strong data consistency.Cheat engine,Ollydbg,and Interactive Disassembler Professional(IDA)are used prevalently for games.Our improved methods can protect the software from the most vulnerable aspects.The improved dynamic code swapping and the simplified virtual machine technologies for cloud games are the main innovations.We inductively learned that our methods have been working well according to the security mechanisms and time complexity analysis.Experiments show that hidden dangers can be eliminated with efficient methods:Execution time and file sizes of the target codes can be multiple times than that of the original program codes which depend on specific program functions. 展开更多
关键词 OBFUSCATION self-modification ENCRYPTION edge computing
下载PDF
Physical artificial intelligence(PAI):the next-generation artificial intelligence
2
作者 Yingbo LI Zhao LI +1 位作者 yucong duan Anamaria-Beatrice SPULBER 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第8期1231-1238,共8页
Artificial intelligence(AI)has been a driving force for innovation and social progress in various domains(Pan,2017).However,most of its industrial applications have focused on the signal processing domain,which relies... Artificial intelligence(AI)has been a driving force for innovation and social progress in various domains(Pan,2017).However,most of its industrial applications have focused on the signal processing domain,which relies on data generated and collected by different sensors. 展开更多
关键词 artificial DOMAINS INTELLIGENCE
原文传递
Experience report:investigating bug fixes in machine learning frameworks/libraries
3
作者 Xiaobing SUN Tianchi ZHOU +3 位作者 Rongcun WANG yucong duan Lili BO Jianming CHANG 《Frontiers of Computer Science》 SCIE EI CSCD 2021年第6期43-58,共16页
Machine learning(ML)techniques and algorithms have been successfully and widely used in various areas including software engineering tasks.Like other software projects,bugs are also common in ML projects and libraries... Machine learning(ML)techniques and algorithms have been successfully and widely used in various areas including software engineering tasks.Like other software projects,bugs are also common in ML projects and libraries.In order to more deeply understand the features related to bug fixing in ML projects,we conduct an empirical study with 939 bugs from five ML projects by manually examining the bug categories,fixing patterns,fixing scale,fixing duration,and types of maintenance.The results show that(1)there are commonly seven types of bugs in ML programs;(2)twelve fixing patterns are typically used to fix the bugs in ML programs;(3)68.80%of the patches belong to micro-scale-fix and small-scale-fix;(4)66.77%of the bugs in ML programs can be fixed within one month;(5)45.90%of the bug fixes belong to corrective activity from the perspective of software maintenance.Moreover,we perform a questionnaire survey and send them to developers or users of ML projects to validate the results in our empirical study.The results of our empirical study are basically consistent with the feedback from developers.The findings from the empirical study provide useful guidance and insights for developers and users to effectively detect and fix bugs in MLprojects. 展开更多
关键词 bug fixing machine learning project empirical study questionnaire survey
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部