The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific sec...The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to forrmlize the commands and determine how their security properties affect TPM key rmnagement. The attacker is assumed to call TPM comrmnds without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corre- sponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which suc- cessfully replaces a user key with an attacker's key using lmlicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can hunch a keyhandle attack to obtain the user key and even break into the whole storage tree of user keys.展开更多
A hierarchical non-linear method for image registration was presented, which integrates image segmentation and registration under a variational framework. An improved deformable model is used to simultaneously segment...A hierarchical non-linear method for image registration was presented, which integrates image segmentation and registration under a variational framework. An improved deformable model is used to simultaneously segment and register feature from multiple images. The objects in the image pair are segmented by evolving a single contour and meanwhile the parameters of affine registration transformation are found out. After that, a contour-constrained elastic registration is applied to register the images correctly. The experimental results indicate that the proposed approach is effective to segment and register medical images.展开更多
ABSTRACT The multipath has long been considered a major error source in GPS applications .The characteristics 0f the GPS signal multipath effects are analyzed. based on which an experiment that considers the characte...ABSTRACT The multipath has long been considered a major error source in GPS applications .The characteristics 0f the GPS signal multipath effects are analyzed. based on which an experiment that considers the characteristics of dynamic deformation monitoring has been carried out. The solution results of observation data in two successive days are processed by a method,which combines the wavelet filtering and the differential correction betweentwo successive days. The research demonstrates that the multipath errors have stronger repeatability on successive days;after significantly mitigating the influence of multipath effects,the accuracy of three-dimensional positioning for GPS dynamic deformation monitoring can attain the mm level,an obvious accuracy improving particularly invertical component.The characteristics of GPS signal multipath,th eexperimental scheme and the qualitative and quantitative analysis of results are detailed.展开更多
基金This paper was supported by the National Natural Science Foundation of China under Grants No.91118006, No. 61202414 the Knowledge Innovation Project of Chinese Academy of Science under Grant No. ISCAS2009-DR14.
文摘The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM corntrends to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to forrmlize the commands and determine how their security properties affect TPM key rmnagement. The attacker is assumed to call TPM comrmnds without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corre- sponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which suc- cessfully replaces a user key with an attacker's key using lmlicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can hunch a keyhandle attack to obtain the user key and even break into the whole storage tree of user keys.
基金National Natural Science Foundation ofChina (No.60271033)
文摘A hierarchical non-linear method for image registration was presented, which integrates image segmentation and registration under a variational framework. An improved deformable model is used to simultaneously segment and register feature from multiple images. The objects in the image pair are segmented by evolving a single contour and meanwhile the parameters of affine registration transformation are found out. After that, a contour-constrained elastic registration is applied to register the images correctly. The experimental results indicate that the proposed approach is effective to segment and register medical images.
文摘ABSTRACT The multipath has long been considered a major error source in GPS applications .The characteristics 0f the GPS signal multipath effects are analyzed. based on which an experiment that considers the characteristics of dynamic deformation monitoring has been carried out. The solution results of observation data in two successive days are processed by a method,which combines the wavelet filtering and the differential correction betweentwo successive days. The research demonstrates that the multipath errors have stronger repeatability on successive days;after significantly mitigating the influence of multipath effects,the accuracy of three-dimensional positioning for GPS dynamic deformation monitoring can attain the mm level,an obvious accuracy improving particularly invertical component.The characteristics of GPS signal multipath,th eexperimental scheme and the qualitative and quantitative analysis of results are detailed.