The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentica-tion. In this paper,the auth...The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentica-tion. In this paper,the author proposes a specified measure of ex-tracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking,and also introduces the definition of the struc-ture used to store the SIBDS in detail. Experimental results dem-onstrate that the extracting method and the storage structure defi-nition offers three strong properties: (i) it can describe the soft-ware's intended behavior accurately; (ii) it demands a small stor-age expense; (iii) it provides strong capability to defend against mimicry attack.展开更多
Thi s paper introduces the usage of these functions. It presents the technique of ho w to program with them to perform the serial communications between a computer a nd other digital devices by the serial ports in Win...Thi s paper introduces the usage of these functions. It presents the technique of ho w to program with them to perform the serial communications between a computer a nd other digital devices by the serial ports in Windows95.The related sample cod es of the applications of this technique written in C++ programming language are also given. This technique is applied successfully to receive the data of t he radio noise from a frequency monitor.展开更多
基金the National Natural Science Foundation of China (60673071, 60743003, 90718005, 90718006)the National High Technology Research and Development Program of China (863 Program) (2006AA01Z442, 2007AA01Z411)
文摘The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentica-tion. In this paper,the author proposes a specified measure of ex-tracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking,and also introduces the definition of the struc-ture used to store the SIBDS in detail. Experimental results dem-onstrate that the extracting method and the storage structure defi-nition offers three strong properties: (i) it can describe the soft-ware's intended behavior accurately; (ii) it demands a small stor-age expense; (iii) it provides strong capability to defend against mimicry attack.
基金Supported by the 86 3 High Technology Project of China (86 3-818-0 1-0 2 )
文摘Thi s paper introduces the usage of these functions. It presents the technique of ho w to program with them to perform the serial communications between a computer a nd other digital devices by the serial ports in Windows95.The related sample cod es of the applications of this technique written in C++ programming language are also given. This technique is applied successfully to receive the data of t he radio noise from a frequency monitor.