With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput...With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.展开更多
In the complex magnetic anomalies under undulating terrain, multiple source superposition and significant noise conditions, the “noise avoidance inversion” depends on three experiments. The displacement experiment a...In the complex magnetic anomalies under undulating terrain, multiple source superposition and significant noise conditions, the “noise avoidance inversion” depends on three experiments. The displacement experiment accurately solves the prediction problem of the form of the target magnetic source, finds the matching relationship with the maximum thickness of the target magnetic source, and the noise change experiment demonstrates the reliability of the noise avoidance inversion. It can be seen that “noise avoidance inversion” creates a “chaotic image back to true” inversion route for complex magnetic anomalies. Noise avoidance inversion of multi-source superimposed complex magnetic anomalies in Erhai Lake is an example.展开更多
基金This work is supported by National Natural Science Foundation of China (Grant No.60773093, 60873209, and 60970107), the Key Program for Basic Research of Shanghai (Grant No. 09JC1407900, 09510701600, 10511500100), IBM SUR Funding and IBM Research-China JP Funding, and Key Lab of Information Network Security, Ministry of Public Security.
文摘With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective.
文摘In the complex magnetic anomalies under undulating terrain, multiple source superposition and significant noise conditions, the “noise avoidance inversion” depends on three experiments. The displacement experiment accurately solves the prediction problem of the form of the target magnetic source, finds the matching relationship with the maximum thickness of the target magnetic source, and the noise change experiment demonstrates the reliability of the noise avoidance inversion. It can be seen that “noise avoidance inversion” creates a “chaotic image back to true” inversion route for complex magnetic anomalies. Noise avoidance inversion of multi-source superimposed complex magnetic anomalies in Erhai Lake is an example.