如何提高嵌入式软件产品的测试效率,提高软件质量,已经成为当下重要的研究课题,而目前出现的典型开源测试框架主要针对通用嵌入式软件产品或者通用web领域软件产品,并不能满足轻量级操作系统资源受限的特定需求(例如内存占用少、节能效...如何提高嵌入式软件产品的测试效率,提高软件质量,已经成为当下重要的研究课题,而目前出现的典型开源测试框架主要针对通用嵌入式软件产品或者通用web领域软件产品,并不能满足轻量级操作系统资源受限的特定需求(例如内存占用少、节能效率高);针对这种状况设计并实现一种称为ACore Lite Test轻量级测试框架,并以轻量级操作系统内核中的计数信号量模块为例,说明了测试框架的使用方法,并对其设计和实现的正确性进行了验证。展开更多
1、Snort简介
Snort是一个轻量级的网络入侵检测软件,这里的“轻量级”的意思是占用的资源非常少,能运行在多种不同的操作系统中,它是基于libpcap库的网络数据包嗅探器和日志记录工具。Snort具有很好的扩展性和可移植性。它是一个用...1、Snort简介
Snort是一个轻量级的网络入侵检测软件,这里的“轻量级”的意思是占用的资源非常少,能运行在多种不同的操作系统中,它是基于libpcap库的网络数据包嗅探器和日志记录工具。Snort具有很好的扩展性和可移植性。它是一个用C语言编写的开发源代码软件,符合GPL(GUN General Public License)的要求,任何组织和个人都可以自由使用,当前最新版本2.4。展开更多
针对开放式WSN连接到互联网上的智能设备数量和多样性迅速增加而导致的入侵检测误报和入侵检测准确性等问题,提出一种基于增强型支持向量机(Enhanced Support Vector Machine,ESVM)分类和遗传算法(Genetic Algorithm,GA)特征选择的智能...针对开放式WSN连接到互联网上的智能设备数量和多样性迅速增加而导致的入侵检测误报和入侵检测准确性等问题,提出一种基于增强型支持向量机(Enhanced Support Vector Machine,ESVM)分类和遗传算法(Genetic Algorithm,GA)特征选择的智能轻量级物联网入侵检测算法。该算法进行预处理以将入侵数据集的复杂流量转换为SVM的可读格式,采用交叉和变异算子智能选择信息量最大的流量特征以降低无线网络流量的维数,使用ESVM算法执行分类以更有效地识别入侵攻击检测。实现结果表明,该算法在选择最优流量和提高检测精度方面均有明显改善。展开更多
Mobile devices as a popular computing platform for enterprise systems have enabled certain tasks to be executed out of office.However,the work may be interrupted due to the server shutdown or network disconnection whe...Mobile devices as a popular computing platform for enterprise systems have enabled certain tasks to be executed out of office.However,the work may be interrupted due to the server shutdown or network disconnection when employees access traditional single-engine Business Process Management System.To overcome this defect,we present a lightweight twin-engine architecture based on Service Oriented Architecture(SOA).In this paper,we discuss in detail the design and implementation of the architecture,and present a trigger mechanism to activate engines according to the states of hybrid environments since it is critical for the two types of engines to cooperate closely in hybrid environments with fixed and mobile computing resources.The experimental results validate the usability of the architecture.展开更多
Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in t...Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in that: 1) some methods require modifying the source code of OS kernel and kernel modules, which is less practical for wide deployment; 2) other methods cannot well protect the kernel hooks and function return addresses inside kernel mo- dules whose memory locations cannot be pre- determined. To address these problems, we propose OPKH, an on-the-fly hook protection system based on the virtualization technology. Compared with previous solutions, OPKH off- ers the protected OS a fully transparent envi- ronment and an easy deployment. In general, the working procedure of OPKH can be di- vided into two steps. First, we utilise the me- mory virtualization for offiine profiling so that the dynamic hooks can be identified. Second, we exploit the online patching technique to in- strument the hooks for run-time protection. The experiments show that our system can pro- tect the dynamic hooks effectively with mini- mal performance overhead.展开更多
Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbe...Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbed. The main attention of this paper was providing a compact and realizable method to apply ubiquitous computing into our daily lives under sufficient secure guarantee. At last,the personal intelligent assistant system was presented to show that this architecture was a suitable and realizable security mechanism in solving the ubiquitous computing problems.展开更多
文摘如何提高嵌入式软件产品的测试效率,提高软件质量,已经成为当下重要的研究课题,而目前出现的典型开源测试框架主要针对通用嵌入式软件产品或者通用web领域软件产品,并不能满足轻量级操作系统资源受限的特定需求(例如内存占用少、节能效率高);针对这种状况设计并实现一种称为ACore Lite Test轻量级测试框架,并以轻量级操作系统内核中的计数信号量模块为例,说明了测试框架的使用方法,并对其设计和实现的正确性进行了验证。
文摘1、Snort简介
Snort是一个轻量级的网络入侵检测软件,这里的“轻量级”的意思是占用的资源非常少,能运行在多种不同的操作系统中,它是基于libpcap库的网络数据包嗅探器和日志记录工具。Snort具有很好的扩展性和可移植性。它是一个用C语言编写的开发源代码软件,符合GPL(GUN General Public License)的要求,任何组织和个人都可以自由使用,当前最新版本2.4。
文摘针对开放式WSN连接到互联网上的智能设备数量和多样性迅速增加而导致的入侵检测误报和入侵检测准确性等问题,提出一种基于增强型支持向量机(Enhanced Support Vector Machine,ESVM)分类和遗传算法(Genetic Algorithm,GA)特征选择的智能轻量级物联网入侵检测算法。该算法进行预处理以将入侵数据集的复杂流量转换为SVM的可读格式,采用交叉和变异算子智能选择信息量最大的流量特征以降低无线网络流量的维数,使用ESVM算法执行分类以更有效地识别入侵攻击检测。实现结果表明,该算法在选择最优流量和提高检测精度方面均有明显改善。
基金supported by the National 973 Programs(2013CB329102)the National Natural Science Foundation of China(61501048)+3 种基金China Postdoctoral Science Foundation funded project(2016T90067,2015M570060)the Key Project of National Natural Science Foundation of China(61132001)the National Key Technology Research and Development Program of China(2012BAH94F02)the Fundamental Research Funds for the Central Universities(2015RC22)
文摘Mobile devices as a popular computing platform for enterprise systems have enabled certain tasks to be executed out of office.However,the work may be interrupted due to the server shutdown or network disconnection when employees access traditional single-engine Business Process Management System.To overcome this defect,we present a lightweight twin-engine architecture based on Service Oriented Architecture(SOA).In this paper,we discuss in detail the design and implementation of the architecture,and present a trigger mechanism to activate engines according to the states of hybrid environments since it is critical for the two types of engines to cooperate closely in hybrid environments with fixed and mobile computing resources.The experimental results validate the usability of the architecture.
基金supported in part by the National High Technology Research and Development Program of China(863 Program)under Grant No.2009AA01Z433the Project of National Ministry under Grant No.A21201-10006the Open Foundation of State Key Laboratory of Information Security(Institute of Information Engineering,Chinese Academy of Sciences)under Grant No.2013-4-1
文摘Kernel hooks are very important con- trol data in OS kernel. Once these data are com- promised by attackers, they can change the control flow of OS kemel's execution. Previ- ous solutions suffer from limitations in that: 1) some methods require modifying the source code of OS kernel and kernel modules, which is less practical for wide deployment; 2) other methods cannot well protect the kernel hooks and function return addresses inside kernel mo- dules whose memory locations cannot be pre- determined. To address these problems, we propose OPKH, an on-the-fly hook protection system based on the virtualization technology. Compared with previous solutions, OPKH off- ers the protected OS a fully transparent envi- ronment and an easy deployment. In general, the working procedure of OPKH can be di- vided into two steps. First, we utilise the me- mory virtualization for offiine profiling so that the dynamic hooks can be identified. Second, we exploit the online patching technique to in- strument the hooks for run-time protection. The experiments show that our system can pro- tect the dynamic hooks effectively with mini- mal performance overhead.
基金Key Project of Chinese Ministry of Education (No.104086)
文摘Lightweight ubiquitous computing security architecture was presented. Lots of our recent researches have been integrated in this architecture. And the main current researches in the related area have also been absorbed. The main attention of this paper was providing a compact and realizable method to apply ubiquitous computing into our daily lives under sufficient secure guarantee. At last,the personal intelligent assistant system was presented to show that this architecture was a suitable and realizable security mechanism in solving the ubiquitous computing problems.