Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Int...Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and checking buffer overflow caused by integer overflow. We have implemented our approach in three buffer overflow types: format string overflow, stack overflow and heap overflow. Experiments results show that our approach is effective and efficient. We have detected more than 5 known integer overflow vulnerabilities via buffer overflow.展开更多
This paper proposes a new coordination method for multi-robot system.The state space for a multi-robot system is constructed according to the task requirements and system characteristics.Reachable statefor the system ...This paper proposes a new coordination method for multi-robot system.The state space for a multi-robot system is constructed according to the task requirements and system characteristics.Reachable statefor the system is constrained by the system s internal and external constraints,under which the task isexecutable if there exists a state transition trajectory from the initial to the goal state in its state space.Ifthe task is realizable,the feasible or the optimal strategy for task execution could then be investigated inthe state space.Otherwise,the task could be modified to be realizable via adjusting system s configura-tions and/or task constraints,which provides critical guidance for system reconstructions.This con-tributes to the designing and planning of the robotic tasks.Experiments of multi-robot formation movementare conducted to show the validity of the proposed method.展开更多
An ongoing debate exists amongst scholars studying presidential unilateral powers. Some scholars argue presidents use directives to circumvent Congress (Nathan, 1983; Deering & Maltzman, 1999; Cooper, 2002), while ...An ongoing debate exists amongst scholars studying presidential unilateral powers. Some scholars argue presidents use directives to circumvent Congress (Nathan, 1983; Deering & Maltzman, 1999; Cooper, 2002), while other scholars argue that presidents use them to enhance their policy in conjunction with Congress in times of strong congressional support (Shull & Gomez, 1997; Krause & Cohen, 1997). This study applies the same theoretical debate to another presidential unilateral power, monument proclamations. The author argued that presidents strategically issue monument proclamations when they face a hostile political environment and have lost their power of persuasion. The author examined presidential monument proclamations from 1929-2000 using an event-count model. The study shows that presidents are more inclined to use monumental proclamations when they are politically weak especially during their lame duck months when they have the least political power and influence.展开更多
Hate crimes are a culture phenomenon which is perceived by most as an occurrence that should be uprooted from the society. Yet, to date, we have been unable to do so. Hate crimes are the subject of research and commen...Hate crimes are a culture phenomenon which is perceived by most as an occurrence that should be uprooted from the society. Yet, to date, we have been unable to do so. Hate crimes are the subject of research and comments by experts in various fields. In this regard, most scholars agree that a hate based crime is distinguished from a "regular" criminal offence by the motive--the attack is aimed at a victim who is part of a differentiated minority group. However, when reading the relevant documents in the area, it seems that the differences between the experts start at the most basic point--what constitutes hate crimes? This article analyses the concept of "hate crimes" via an interdisciplinary approach aimed at flashing out the fundamental gaps in the research. We have found that the problems include, inter alia, discrepancies in the definition of hate crimes, methodological difficulties regarding validity and legitimacy (mainly due to the absence of information based on the attacker's point of view) and the lack of agreement on the appropriate legal methods required to deal with the ramifications of hate crimes. While part I of this paper revolves around the theoretical aspects of the questions put forth at the centre of this article, part II looks at the same questions from a legal viewpoint. The correlation between the two chapters shows the impact the methodological difficulties have on enforcement endeavors. This relation is further advanced through the examination of test cases from different countries, among them--lsrael. Finally, the article concludes by suggesting a few thoughts on the way to overcome the theoretical problems and making the enforcement efforts more efficient.展开更多
基金Supported by the National Natural Science Foundation of China (60903188), Shanghai Education Commission Innovation Foundation (11YZ192) and World Expo Science and Technology Special Fund of Shanghai Science and Technology Commission (08dz0580202).
文摘Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Run-time Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and checking buffer overflow caused by integer overflow. We have implemented our approach in three buffer overflow types: format string overflow, stack overflow and heap overflow. Experiments results show that our approach is effective and efficient. We have detected more than 5 known integer overflow vulnerabilities via buffer overflow.
基金Supported by the National Natural Science Foundation for Distinguished Young Scholars Abroad (No. 60428303)
文摘This paper proposes a new coordination method for multi-robot system.The state space for a multi-robot system is constructed according to the task requirements and system characteristics.Reachable statefor the system is constrained by the system s internal and external constraints,under which the task isexecutable if there exists a state transition trajectory from the initial to the goal state in its state space.Ifthe task is realizable,the feasible or the optimal strategy for task execution could then be investigated inthe state space.Otherwise,the task could be modified to be realizable via adjusting system s configura-tions and/or task constraints,which provides critical guidance for system reconstructions.This con-tributes to the designing and planning of the robotic tasks.Experiments of multi-robot formation movementare conducted to show the validity of the proposed method.
文摘An ongoing debate exists amongst scholars studying presidential unilateral powers. Some scholars argue presidents use directives to circumvent Congress (Nathan, 1983; Deering & Maltzman, 1999; Cooper, 2002), while other scholars argue that presidents use them to enhance their policy in conjunction with Congress in times of strong congressional support (Shull & Gomez, 1997; Krause & Cohen, 1997). This study applies the same theoretical debate to another presidential unilateral power, monument proclamations. The author argued that presidents strategically issue monument proclamations when they face a hostile political environment and have lost their power of persuasion. The author examined presidential monument proclamations from 1929-2000 using an event-count model. The study shows that presidents are more inclined to use monumental proclamations when they are politically weak especially during their lame duck months when they have the least political power and influence.
文摘Hate crimes are a culture phenomenon which is perceived by most as an occurrence that should be uprooted from the society. Yet, to date, we have been unable to do so. Hate crimes are the subject of research and comments by experts in various fields. In this regard, most scholars agree that a hate based crime is distinguished from a "regular" criminal offence by the motive--the attack is aimed at a victim who is part of a differentiated minority group. However, when reading the relevant documents in the area, it seems that the differences between the experts start at the most basic point--what constitutes hate crimes? This article analyses the concept of "hate crimes" via an interdisciplinary approach aimed at flashing out the fundamental gaps in the research. We have found that the problems include, inter alia, discrepancies in the definition of hate crimes, methodological difficulties regarding validity and legitimacy (mainly due to the absence of information based on the attacker's point of view) and the lack of agreement on the appropriate legal methods required to deal with the ramifications of hate crimes. While part I of this paper revolves around the theoretical aspects of the questions put forth at the centre of this article, part II looks at the same questions from a legal viewpoint. The correlation between the two chapters shows the impact the methodological difficulties have on enforcement endeavors. This relation is further advanced through the examination of test cases from different countries, among them--lsrael. Finally, the article concludes by suggesting a few thoughts on the way to overcome the theoretical problems and making the enforcement efforts more efficient.