The paper presents a framework for developing a variety of video transition effects. The framework is designed to deal with the problem of inefficiency for programmers to generate more and more diversified video trans...The paper presents a framework for developing a variety of video transition effects. The framework is designed to deal with the problem of inefficiency for programmers to generate more and more diversified video transition, which is caused by excessive coupling between the sub-modules of the system. So the framework is designed to be modular, flexible and extensible. Based on the analysis of common features of different effects, the implementation of video transition effect is divided into 4 sub-odules, each of which can be designed and developed independently. Furthermore, these sub-modules can be easily sub- stituted, modified and reused. We present a formal description of our framework, and give typical study cases to show the extensive utility of the framework.展开更多
Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing met...Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing methods focus on user-level heap overflow detection. Only a few methods are proposed for kernel heap protection. Moreover,all these kernel protection methods need modifying the existing OS kernel so that they may not be adopted in practice. To address this problem,we propose a lightweight virtualization-based solution that can protect the kernel heap buffers allocated for the target kernel modules. The key idea of our approach is to combine the static binary analysis and virtualization technology to trap a memory allocation operation of the target kernel module,and then add one secure canary word to the end of the allocated buffer. After that,a monitor process is launched to check the integrity of the canaries. The evaluations show that our system can detect kernel heap overflow attacks effectively with minimal performance cost.展开更多
This paper discusses a popular community definition in complex network research in terms of the conditions under which a community is minimal, that is, the community cannot be split into several smaller communities or...This paper discusses a popular community definition in complex network research in terms of the conditions under which a community is minimal, that is, the community cannot be split into several smaller communities or split and reorganized with other network elements into new communities. The result provides a base on which further optimization computation of the quantitative measure for community identification can be realized.展开更多
文摘The paper presents a framework for developing a variety of video transition effects. The framework is designed to deal with the problem of inefficiency for programmers to generate more and more diversified video transition, which is caused by excessive coupling between the sub-modules of the system. So the framework is designed to be modular, flexible and extensible. Based on the analysis of common features of different effects, the implementation of video transition effect is divided into 4 sub-odules, each of which can be designed and developed independently. Furthermore, these sub-modules can be easily sub- stituted, modified and reused. We present a formal description of our framework, and give typical study cases to show the extensive utility of the framework.
基金supported in part by National Natural Science Foundation of China (NSFC) under Grant No.61602035the National Key Research and Development Program of China under Grant No.2016YFB0800700+1 种基金the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information SecurityOpen Found of Key Laboratory of IOT Application Technology of Universities in Yunnan Province under Grant No.2015IOT03
文摘Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing methods focus on user-level heap overflow detection. Only a few methods are proposed for kernel heap protection. Moreover,all these kernel protection methods need modifying the existing OS kernel so that they may not be adopted in practice. To address this problem,we propose a lightweight virtualization-based solution that can protect the kernel heap buffers allocated for the target kernel modules. The key idea of our approach is to combine the static binary analysis and virtualization technology to trap a memory allocation operation of the target kernel module,and then add one secure canary word to the end of the allocated buffer. After that,a monitor process is launched to check the integrity of the canaries. The evaluations show that our system can detect kernel heap overflow attacks effectively with minimal performance cost.
基金The research is supported by the Ministry of Science and Technology of China under Grant No.2006CB503905Some authors are also supported by the National Natural Science Foundation of China under Grant Nos.10631070 and 10701080the JSPS(Japan Society for the Promotion of Science)-NSFC(National Natural Science Foundation of China) collaboration project under Grant No.10711140116
文摘This paper discusses a popular community definition in complex network research in terms of the conditions under which a community is minimal, that is, the community cannot be split into several smaller communities or split and reorganized with other network elements into new communities. The result provides a base on which further optimization computation of the quantitative measure for community identification can be realized.
基金supported by the National Natural Science Foundation of China under Grant No.10871106
文摘For a class of generalized Feistel block ciphers, an explicit formula for the minimum numbers of linearly active S-boxes of any round r is presented.