The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author ...The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.展开更多
This paper introduces the usage of these functions. It presents the technique of how to program with them to perform the serial communications between a computer and other digital devices by the serial porst in Window...This paper introduces the usage of these functions. It presents the technique of how to program with them to perform the serial communications between a computer and other digital devices by the serial porst in Windows95. The related sample codes of the applications of this technique written in C++ programming language are also given. This technique is applied successfully to receive the data of the radio noise from a frequency monitor.展开更多
基金the National Natural Science Foundation of China (60673071, 60743003, 90718005, 90718006)the National High Technology Research and Development Program of China (863 Program) (2006AA01Z442, 2007AA01Z411)
文摘The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.
基金Supported by the 86 3 High Technology Project of China (86 3-818-0 1-0 2 )
文摘This paper introduces the usage of these functions. It presents the technique of how to program with them to perform the serial communications between a computer and other digital devices by the serial porst in Windows95. The related sample codes of the applications of this technique written in C++ programming language are also given. This technique is applied successfully to receive the data of the radio noise from a frequency monitor.