随着系统级芯片(System on Chip,SoC)中输入/输出(I/O)接口数量和复用功能的不断增加,I/O复用电路的验证变得越来越复杂,并且需要耗费大量时间。本文针对I/O复用电路的特点,提出一种基于静态形式验证的高效验证方法,在验证早期对I/O复...随着系统级芯片(System on Chip,SoC)中输入/输出(I/O)接口数量和复用功能的不断增加,I/O复用电路的验证变得越来越复杂,并且需要耗费大量时间。本文针对I/O复用电路的特点,提出一种基于静态形式验证的高效验证方法,在验证早期对I/O复用进行了复用功能验证和连接性验证,同时也进行了翻转覆盖率收集。与传统基于动态验证的方法相比,本方法可以将验证时间缩短一半以上,显著提升了设计质量和开发效率。展开更多
针对目前对软件未知漏洞缺乏及时准确分析与自动评估分类的问题,提出一种字词特征融合与贝叶斯优化LightGBM(Bayesian Optimization of LightGBM,BO-LightGBM)的漏洞特征自动评估方法.首先,为减少软件未知漏洞描述中存在新术语造成的影...针对目前对软件未知漏洞缺乏及时准确分析与自动评估分类的问题,提出一种字词特征融合与贝叶斯优化LightGBM(Bayesian Optimization of LightGBM,BO-LightGBM)的漏洞特征自动评估方法.首先,为减少软件未知漏洞描述中存在新术语造成的影响,通过使用字词特征融合的方法提取并融合漏洞描述信息中的字符与单词特征;其中为防止时间信息泄露,将数据按年份排列,使用时间交叉验证方式选取合适的数据集划分方式;其次,利用LightGBM算法通过特征统计确定最优特征的优势,使用该算法对漏洞的机密性、完整性等7个特性进行分类评估.为进一步提高准确度,加入贝叶斯优化器对LightGBM算法中的8个超参数进行优化调整.最后,通过美国国家通用漏洞数据库上的实验表明,字词特征融合算法能够结合漏洞描述信息中的单词与字符特征,对未知漏洞的分类评估具有更高的准确率.与其他集成学习算法相比,经过贝叶斯优化参数寻优的LightGBM算法,能够进一步发挥LightGBM算法优势,提高漏洞特征评估准确率.展开更多
To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnera...To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications.展开更多
This research aims to elucidate the navigational situation of ships during the massive tsunami that occurred in the Tohoku district of Japan on March 11,2011. In particular, it focuses on the time the massive tsunami ...This research aims to elucidate the navigational situation of ships during the massive tsunami that occurred in the Tohoku district of Japan on March 11,2011. In particular, it focuses on the time the massive tsunami encountered ships. AIS (automatic identification system), which is required to be fitted aboard large ships for identifying and locating vessels, was used for the analysis of the navigational status of ships. It was confirmed that a group of ships sailing off the coast suddenly changed course. It was also verified that the ships had been struck by the tsunami, and the time of the strike was identified. The novelty and importance of this research are as follows. First, the behaviour of many ships that encountered the massive tsunami was clarified. There are no earlier instances of simultaneous and detailed recording of the behaviour of many ships encountering a massive tsunami. Second, the movement of the ships that encountered the tsunami was analysed, and the time of the maximum wave of the tsunami was verified. The research presents, for the first time in ship history, the status of a ship at the time of a tsunami using objective navigational data.展开更多
Constraint based program analysis is widely used in program validation, program vulnerability analysis, etc. This paper proposes a temporal correlation function to protect programs from analysis. The temporal correlat...Constraint based program analysis is widely used in program validation, program vulnerability analysis, etc. This paper proposes a temporal correlation function to protect programs from analysis. The temporal correlation function can be applied to resist against both static and dynamic function summary and eoncolie testing. What' s more, the temporal correlation function can produce different outputs even with same input. This feature can be used to damage the premise of function summary as well as prevent concolie testing process to run the new branch with new input. Experiment results show that this method can reduce efficiency and path coverage of concolic testing, while greatly in- creasing the difficulty of constraint based program analysis.展开更多
2014年度"NIDays全球图形化系统设计盛会"中国站于11月14日在北京万达索菲特大酒店圆满落幕。围绕"You and NI Will"这一主题,本届NIDays打造了一场分享与交流的技术盛会。活动共吸引了近六百余位来自不同行业的工程师和二十多家行...2014年度"NIDays全球图形化系统设计盛会"中国站于11月14日在北京万达索菲特大酒店圆满落幕。围绕"You and NI Will"这一主题,本届NIDays打造了一场分享与交流的技术盛会。活动共吸引了近六百余位来自不同行业的工程师和二十多家行业媒体参加。笔者作为受邀媒体代表有幸参加了这次盛会,全天的技术大会让笔者深切感受到N I所打造的强大的图形化系统设计平台,帮助工程师不断创新,解决今天和未来的各种挑战。展开更多
文摘随着系统级芯片(System on Chip,SoC)中输入/输出(I/O)接口数量和复用功能的不断增加,I/O复用电路的验证变得越来越复杂,并且需要耗费大量时间。本文针对I/O复用电路的特点,提出一种基于静态形式验证的高效验证方法,在验证早期对I/O复用进行了复用功能验证和连接性验证,同时也进行了翻转覆盖率收集。与传统基于动态验证的方法相比,本方法可以将验证时间缩短一半以上,显著提升了设计质量和开发效率。
文摘针对目前对软件未知漏洞缺乏及时准确分析与自动评估分类的问题,提出一种字词特征融合与贝叶斯优化LightGBM(Bayesian Optimization of LightGBM,BO-LightGBM)的漏洞特征自动评估方法.首先,为减少软件未知漏洞描述中存在新术语造成的影响,通过使用字词特征融合的方法提取并融合漏洞描述信息中的字符与单词特征;其中为防止时间信息泄露,将数据按年份排列,使用时间交叉验证方式选取合适的数据集划分方式;其次,利用LightGBM算法通过特征统计确定最优特征的优势,使用该算法对漏洞的机密性、完整性等7个特性进行分类评估.为进一步提高准确度,加入贝叶斯优化器对LightGBM算法中的8个超参数进行优化调整.最后,通过美国国家通用漏洞数据库上的实验表明,字词特征融合算法能够结合漏洞描述信息中的单词与字符特征,对未知漏洞的分类评估具有更高的准确率.与其他集成学习算法相比,经过贝叶斯优化参数寻优的LightGBM算法,能够进一步发挥LightGBM算法优势,提高漏洞特征评估准确率.
基金Acknowledgements This work was supported by the National Natural ScienceFoundation of China under Grants No. 60873191, No. 60903152, No. 60821001, and the Beijing Natural Science Foundation under Grant No. 4072020.
文摘To achieve privacy and authentication sinmltaneously in mobile applications, various Three-party Password-authenticated key exchange (3PAKE) protocols have been proposed. However, some of these protocols are vulnerable to conventional attacks or have low efficiency so that they cannot be applied to mobile applications. In this paper, we proposed a password-authenticated multiple key exchange protocol for mobile applications using elliptic curve cryptosystem. The proposed protocol can achieve efficiency, reliability, flexibility and scalability at the same time. Compared with related works, the proposed protocol is more suitable and practical for mobile applications.
文摘This research aims to elucidate the navigational situation of ships during the massive tsunami that occurred in the Tohoku district of Japan on March 11,2011. In particular, it focuses on the time the massive tsunami encountered ships. AIS (automatic identification system), which is required to be fitted aboard large ships for identifying and locating vessels, was used for the analysis of the navigational status of ships. It was confirmed that a group of ships sailing off the coast suddenly changed course. It was also verified that the ships had been struck by the tsunami, and the time of the strike was identified. The novelty and importance of this research are as follows. First, the behaviour of many ships that encountered the massive tsunami was clarified. There are no earlier instances of simultaneous and detailed recording of the behaviour of many ships encountering a massive tsunami. Second, the movement of the ships that encountered the tsunami was analysed, and the time of the maximum wave of the tsunami was verified. The research presents, for the first time in ship history, the status of a ship at the time of a tsunami using objective navigational data.
基金Supported by the National Natural Science Foundation of China(No.61121061)National Key Technology R&D Program(No.2012BAH38B02,2012BAH06B00)
文摘Constraint based program analysis is widely used in program validation, program vulnerability analysis, etc. This paper proposes a temporal correlation function to protect programs from analysis. The temporal correlation function can be applied to resist against both static and dynamic function summary and eoncolie testing. What' s more, the temporal correlation function can produce different outputs even with same input. This feature can be used to damage the premise of function summary as well as prevent concolie testing process to run the new branch with new input. Experiment results show that this method can reduce efficiency and path coverage of concolic testing, while greatly in- creasing the difficulty of constraint based program analysis.
文摘2014年度"NIDays全球图形化系统设计盛会"中国站于11月14日在北京万达索菲特大酒店圆满落幕。围绕"You and NI Will"这一主题,本届NIDays打造了一场分享与交流的技术盛会。活动共吸引了近六百余位来自不同行业的工程师和二十多家行业媒体参加。笔者作为受邀媒体代表有幸参加了这次盛会,全天的技术大会让笔者深切感受到N I所打造的强大的图形化系统设计平台,帮助工程师不断创新,解决今天和未来的各种挑战。