期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
宣钢棒材冷剪系统电控优化
1
作者 段勇 《电子技术与软件工程》 2016年第13期170-170,共1页
宣钢二钢轧厂棒材生产线于2012年3月投产,随着生产工艺的逐渐成熟,产量要求不断提高,电控中存在的缺陷不断凸显出来,为解决高强度棒材电控系统在运行过程中凸显出来的问题,对设计不完善的地方重新进行设计论证,并进行冷剪定尺剪切系统... 宣钢二钢轧厂棒材生产线于2012年3月投产,随着生产工艺的逐渐成熟,产量要求不断提高,电控中存在的缺陷不断凸显出来,为解决高强度棒材电控系统在运行过程中凸显出来的问题,对设计不完善的地方重新进行设计论证,并进行冷剪定尺剪切系统优化改造。 展开更多
关键词 棒材线 冷剪 检测原件
下载PDF
Analysis on the Parameter Selection Method for FLUSH+RELOAD Based Cache Timing Attack on RSA 被引量:2
2
作者 ZHOU Ping WANG Tao +2 位作者 LI Guang ZHANG Fan ZHAO Xinjie 《China Communications》 SCIE CSCD 2015年第6期33-45,共13页
FLUSH+RELOAD attack is recently proposed as a new type of Cache timing attacks.There are three essential factors in this attack,which are monitored instructions.threshold and waiting interval.However,existing literatu... FLUSH+RELOAD attack is recently proposed as a new type of Cache timing attacks.There are three essential factors in this attack,which are monitored instructions.threshold and waiting interval.However,existing literature seldom exploit how and why they could affect the system.This paper aims to study the impacts of these three parameters,and the method of how to choose optimal values.The complete rules for choosing the monitored instructions based on necessary and sufficient condition are proposed.How to select the optimal threshold based on Bayesian binary signal detection principal is also proposed.Meanwhile,the time sequence model of monitoring is constructed and the calculation of the optimal waiting interval is specified.Extensive experiments are conducted on RSA implemented with binary square-and-multiply algorithm.The results show that the average success rate of full RSA key recovery is89.67%. 展开更多
关键词 side channel attack Cache timingattack RSA square-multiply algorithm expo-nentiation
下载PDF
Detecting Compromised Kernel Hooks with Support of Hardware Debugging Features 被引量:3
3
作者 Shi Wenchang Zhou HongWei +1 位作者 Yuan JinHui Liang Bin 《China Communications》 SCIE CSCD 2012年第10期78-90,共13页
Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge,... Although there exist a few good schemes to protect the kernel hooks of operating systems, attackers are still able to circumvent existing defense mechanisms with spurious context infonmtion. To address this challenge, this paper proposes a framework, called HooklMA, to detect compromised kernel hooks by using hardware debugging features. The key contribution of the work is that context information is captured from hardware instead of from relatively vulnerable kernel data. Using commodity hardware, a proof-of-concept pro- totype system of HooklMA has been developed. This prototype handles 3 082 dynamic control-flow transfers with related hooks in the kernel space. Experiments show that HooklMA is capable of detecting compomised kernel hooks caused by kernel rootkits. Performance evaluations with UnixBench indicate that runtirre overhead introduced by HooklMA is about 21.5%. 展开更多
关键词 operating system kernel hook integrity HARDWARE control flow
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部