期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Enhance Information Flow Tracking with Function Recognition
1
作者 Zhou Kan Huang Shiqiu +3 位作者 Huang Shan Qi Zhengwei Gu Jian Guan Haibing 《China Communications》 SCIE CSCD 2010年第6期24-29,共6页
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput... With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the computer specialists know what is stored in the given computer. Binary-based information flow tracking which concerns the changes of control flow is an effective way to analyze the behavior of a program. The existing systems ignore the modifications of the data flow, which may be also a malicious behavior. Thus the function recognition is introduced to improve the information flow tracking. Function recognition is a helpful technique recognizing the function body from the software binary to analyze the binary code. And that no false positive and no false negative in our experiments strongly proves that our approach is effective. 展开更多
关键词 function recognition information flow tracking program behavior e-evidence.
下载PDF
Modified joint probabilistic data association with classification-aided for multitarget tracking 被引量:8
2
作者 Ba Hongxin Cao Lei +1 位作者 He Xinyi Cheng Qun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第3期434-439,共6页
Joint probabilistic data association is an effective method for tracking multiple targets in clutter, but only the target kinematic information is used in measure-to-track association. If the kinematic likelihoods are... Joint probabilistic data association is an effective method for tracking multiple targets in clutter, but only the target kinematic information is used in measure-to-track association. If the kinematic likelihoods are similar for different closely spaced targets, there is ambiguity in using the kinematic information alone; the correct association probability will decrease in conventional joint probabilistic data association algorithm and track coalescence will occur easily. A modified algorithm of joint probabilistic data association with classification-aided is presented, which avoids track coalescence when tracking multiple neighboring targets. Firstly, an identification matrix is defined, which is used to simplify validation matrix to decrease computational complexity. Then, target class information is integrated into the data association process. Performance comparisons with and without the use of class information in JPDA are presented on multiple closely spaced maneuvering targets tracking problem. Simulation results quantify the benefits of classification-aided JPDA for improved multiple targets tracking, especially in the presence of association uncertainty in the kinematic measurement and target maneuvering. Simulation results indicate that the algorithm is valid. 展开更多
关键词 multi-target tracking data association joint probabilistic data association classification information track coalescence maneuvering target.
下载PDF
A Multi-Flow Information Flow Tracking Approach for Proving Quantitative Hardware Security Properties 被引量:1
3
作者 Yu Tai Wei Hu +2 位作者 Lu Zhang Dejun Mu Ryan Kastner 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第1期62-71,共10页
Information Flow Tracking(IFT)is an established formal method for proving security properties related to confidentiality,integrity,and isolation.It has seen promise in identifying security vulnerabilities resulting fr... Information Flow Tracking(IFT)is an established formal method for proving security properties related to confidentiality,integrity,and isolation.It has seen promise in identifying security vulnerabilities resulting from design flaws,timing channels,and hardware Trojans for secure hardware design.However,existing IFT methods tend to take a qualitative approach and only enforce binary security properties,requiring strict non-interference for the properties to hold while real systems usually allow a small amount of information flows to enable desirable interactions.Consequently,existing methods are inadequate for reasoning about quantitative security properties or measuring the security of a design in order to assess the severity of a security vulnerability.In this work,we propose two multi-flow solutions—multiple verifications for replicating existing IFT model and multi-flow IFT method.The proposed multi-flow IFT method provides more insight into simultaneous information flow behaviors and allows for proof of quantitative information flow security properties,such as diffusion,randomization,and boundaries on the amount of simultaneous information flows.Experimental results show that our method can be used to prove a new type of information flow security property with verification performance benefits. 展开更多
关键词 hardware security information Flow tracking(IFT) multi-flow IFT security property
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部