期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
上下文敏感的控制流完整性保护的改进方法
1
作者 沈钦涛 张丽 +3 位作者 罗磊 马俊 余杰 吴庆波 《计算机科学》 CSCD 北大核心 2017年第11期87-90,共4页
面对控制流劫持攻击的威胁,业界使用控制流完整性保护技术来保障进程的执行安全。传统的控制流完整性验证保护机制依赖于动态二进制改写技术,在分析、实施等过程中难度较大,且有可能带来二进制兼容的问题。通过研究近几年提出的上下文... 面对控制流劫持攻击的威胁,业界使用控制流完整性保护技术来保障进程的执行安全。传统的控制流完整性验证保护机制依赖于动态二进制改写技术,在分析、实施等过程中难度较大,且有可能带来二进制兼容的问题。通过研究近几年提出的上下文敏感的控制流保护技术PathArmor,分析了其检测进程控制流的时机。然后针对PathArmor只在进程做系统调用时才进行检测的机制,提出了改进的方法。该方法依据内核页错误中断处理机制,通过修改用户页面的保护属性主动触发可执行页面的执行错误;接着,修改页错误中断处理过程,钩挂do_page_fault以处理主动触发的执行错误。用户进程代码和数据的完整性得以保证的同时,得到了更多陷入内核接受检查的机会。在Nginx,bzip2,SQLite等典型应用环境下的实验结果表明,改进的方法能够明显增加系统安全分析的粒度,更好地保护程序的控制流。 展开更多
关键词 控制流完整性 执行路径 硬件特性 控制流保护 内核陷入
下载PDF
Enhancement of DC-Link Protection of PMSG Based Wind Turbine under Network Disturbance by Using New Buck Controller System
2
作者 Linda Sartika Atsushi Umemura +1 位作者 Rion Takahashi Junji Tamura 《Journal of Mechanics Engineering and Automation》 2017年第4期171-179,共9页
Protection system for DC-link circuit of back-to-back converter of PMSG (Permanent Magnet Synchronous Generator) based wind turbine is essential part for the system to ride through a network fault in grid system. Vo... Protection system for DC-link circuit of back-to-back converter of PMSG (Permanent Magnet Synchronous Generator) based wind turbine is essential part for the system to ride through a network fault in grid system. Voltage on the DC-link circuit can be increased significantly due to power unbalance between stator side converter and grid side converter. Increase of DC-link circuit voltage can lead to a damage of IGBT of the converter and control system failure. In this paper performance enhancement of DC-link protection of PMSG based Wind turbine by using new control system of buck converter is proposed. The buck converter is used to control supplied voltage of a breaking resistor to dissipate energy from the wind generator during network disturbance. In order to investigate effectiveness of the proposed DC-link protection system, fault analysis is performed in the simulation study by using PSCAD/EMTDC software program. In addition, comparative analysis between the proposed protection system and the conventional protection system using DC chopper is also performed. 展开更多
关键词 Wind farm variable speed wind turbine permanent magnet synchronous generator buck controller.
下载PDF
Comprehensive experiment and evaluation on safety due to fully-mechanized mining under the Xitian River at Linxin Mine
3
作者 来兴平 任奋华 蔡美峰 《Journal of Coal Science & Engineering(China)》 2004年第2期34-36,共3页
L3414 mechanized mining working face (No.14 coal seam) of Lingxin Mine is under the Xitian River.The mining disturbed zone where rock properties and conditions have been changed due to mining, the safety and environme... L3414 mechanized mining working face (No.14 coal seam) of Lingxin Mine is under the Xitian River.The mining disturbed zone where rock properties and conditions have been changed due to mining, the safety and environmental protection were con- cemed greatly. Based on engineering geological environment of L3414 working face and mining factors, the color bore-bole TV inspecting, leakage of drilling fluid monitoring, simulation experiment, numerical computing, in-situ ground stress measurement and subsidence measurement, etal, these programs contribute to the formation of a scientific basis for control water safe mining and normal mining or environmental protection in the condition of existing fully-mechanized mining. 展开更多
关键词 comprehensive experiment and evaluation existing mining method control water safe mining environmental protection
下载PDF
Research of Software Complexity Metrics with Security Indicator
4
作者 付剑晶 王珂 《Journal of Donghua University(English Edition)》 EI CAS 2011年第5期460-464,共5页
Software protection technology has been universally emphasized, with the development of reverse engineering and static analysis techniques. So, it is important to research how to quantitatively evaluate the security o... Software protection technology has been universally emphasized, with the development of reverse engineering and static analysis techniques. So, it is important to research how to quantitatively evaluate the security of the protected software. However, there are some researchers evaluating the security of the proposed protect techniques directly by the traditional complexity metrics, which is not suffident. In order to better reflect security from software complexity, a multi-factor complexity metric based on control flow graph (CFG) is proposed, and the corresponding calculating procedures are presented in detail. Moreover, complexity density models are constructed to indicate the strength of software resisting reverse engineering and code analysis. Instance analysis shows that the proposed method is simple and practical, and can more objectively reflect software security from the perspective of the complexity. 展开更多
关键词 complexity metric software protection complexity density control flow graph
下载PDF
Research on Intelligent Control and protection of flexible HVDC
5
作者 Runfeng Zhang 《International Journal of Technology Management》 2014年第2期29-31,共3页
This paper introduces the working principle of HVDC control and protection system. And the paper summarizes the flexible HVDC technology features and application fields and describes the composition and software intel... This paper introduces the working principle of HVDC control and protection system. And the paper summarizes the flexible HVDC technology features and application fields and describes the composition and software intelligent flexible HVDC control and protection system configuration. Finally, the simulation results are also given, experimental results show: HVDC flexible intelligent control and protection has a good control effect in the steady state and transient process, suitable for practical engineering application. 展开更多
关键词 Flexible DC transmission Pulse Wide Module Intelligent control
下载PDF
一种基于CFI保护的Android Native代码保护框架
6
作者 张文 刘文灵 +2 位作者 李晖 陈泽 牛少彰 《北京邮电大学学报》 EI CAS CSCD 北大核心 2018年第6期1-6,13,共7页
针对Android应用的native代码面对的关键代码提取攻击和恶意代码植入攻击问题,提出了一个基于控制流完整性(CFI)保护的代码保护框架Droid CFI.该框架通过对被保护应用进行静态分析,提取其native代码的控制流特征,向开发者提供可视化策... 针对Android应用的native代码面对的关键代码提取攻击和恶意代码植入攻击问题,提出了一个基于控制流完整性(CFI)保护的代码保护框架Droid CFI.该框架通过对被保护应用进行静态分析,提取其native代码的控制流特征,向开发者提供可视化策略配置视图设定关键函数,并根据策略配置生成对应的加固代码,与被保护应用的其他部分一起形成目标应用;目标应用在运行时,通过对关键函数进行动态CFI检查判定是否遭遇上述攻击,从而达到保护目的.实验结果表明,Droid CFI能够通过极小的性能开销实现对应用软件native代码的安全性保护. 展开更多
关键词 native代码 关键代码提取攻击 恶意代码植入攻击 控制流完整性保护
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部