针对光伏发电站监控系统的现状,开发了以ARM11为硬件平台的光伏发电站监控系统,所使用的软件平台为Win CE 6.0。将各种电压和电流传感器以及环境变量传感器连接到RS485模拟数据数据采集卡,对采集的电压、电流、风速、光照、温度等变量...针对光伏发电站监控系统的现状,开发了以ARM11为硬件平台的光伏发电站监控系统,所使用的软件平台为Win CE 6.0。将各种电压和电流传感器以及环境变量传感器连接到RS485模拟数据数据采集卡,对采集的电压、电流、风速、光照、温度等变量进行初步处理并且将其存储到嵌入式数据库SQLite3.3,通过数据分析可以对现场进行控制,统一管理。上位机通过监控界面可以清楚地看到现场情况,通过SQL Server 2005存储历史数据,方便日后查看和处理。目前该系统能稳定运行,抗干扰能力强,自动化程度高,有很好的应用前景。展开更多
An embedded protective device for 35kV power line is worked out based on Philips’ LPC2292 ARM MCU. Several aspects such as embedded design technique adopted in the system framework, application of adaptive theory in ...An embedded protective device for 35kV power line is worked out based on Philips’ LPC2292 ARM MCU. Several aspects such as embedded design technique adopted in the system framework, application of adaptive theory in data acquisition, Board Support Packet (BSP) developing and task dispatching related to operating system are discussed. Both hardware and software framework of the system are given. Advanced hardware platform and software development environment is applied in design of the system, with the advanced co-design technology.展开更多
Defending against return-oriented programing(ROP) attacks is extremely challenging for modern operating systems.As the most popular mobile OS running on ARM,Android is even more vulnerable to ROP attacks due to its we...Defending against return-oriented programing(ROP) attacks is extremely challenging for modern operating systems.As the most popular mobile OS running on ARM,Android is even more vulnerable to ROP attacks due to its weak implementation of ASLR and the absence of effective control-flow integrity enforcement.In this paper,leveraging specific ARM features,an instruction randomization strategy to mitigate ROP attacks in Android even with the threat of single pointer leakage vulnerabilities is proposed.By popping out more registers in functions' epilogue instructions and reallocating registers in function scopes,branch targets in all(direct and indirect) branch instructions potential to be ROP gadgets are changed randomly.Without the knowledge of binaries' runtime instructions layout,adversary's repeated control flow transfer in ROP exploits will be subverted.Furthermore,this instruction randomization idea has been implemented in both Android Dalvik runtime and ART.Corresponding evaluations proved it is capable to introduce enough randomness for more than 99% discovered functions and thwart about 95% ROP gadgets in application's shared libraries and oat file compiled from Dalvik bytecode.Besides,evaluations on real-world exploits also confirmed its effectiveness on mitigating ROP attacks within acceptable performance overhead.展开更多
文摘针对光伏发电站监控系统的现状,开发了以ARM11为硬件平台的光伏发电站监控系统,所使用的软件平台为Win CE 6.0。将各种电压和电流传感器以及环境变量传感器连接到RS485模拟数据数据采集卡,对采集的电压、电流、风速、光照、温度等变量进行初步处理并且将其存储到嵌入式数据库SQLite3.3,通过数据分析可以对现场进行控制,统一管理。上位机通过监控界面可以清楚地看到现场情况,通过SQL Server 2005存储历史数据,方便日后查看和处理。目前该系统能稳定运行,抗干扰能力强,自动化程度高,有很好的应用前景。
文摘An embedded protective device for 35kV power line is worked out based on Philips’ LPC2292 ARM MCU. Several aspects such as embedded design technique adopted in the system framework, application of adaptive theory in data acquisition, Board Support Packet (BSP) developing and task dispatching related to operating system are discussed. Both hardware and software framework of the system are given. Advanced hardware platform and software development environment is applied in design of the system, with the advanced co-design technology.
基金supported by the National Natural Science Foundation of China(Grant No.61202387,61332019 and 61373168)the National Basic Research Program of China(“973”Program)(Grant No.2014CB340600)
文摘Defending against return-oriented programing(ROP) attacks is extremely challenging for modern operating systems.As the most popular mobile OS running on ARM,Android is even more vulnerable to ROP attacks due to its weak implementation of ASLR and the absence of effective control-flow integrity enforcement.In this paper,leveraging specific ARM features,an instruction randomization strategy to mitigate ROP attacks in Android even with the threat of single pointer leakage vulnerabilities is proposed.By popping out more registers in functions' epilogue instructions and reallocating registers in function scopes,branch targets in all(direct and indirect) branch instructions potential to be ROP gadgets are changed randomly.Without the knowledge of binaries' runtime instructions layout,adversary's repeated control flow transfer in ROP exploits will be subverted.Furthermore,this instruction randomization idea has been implemented in both Android Dalvik runtime and ART.Corresponding evaluations proved it is capable to introduce enough randomness for more than 99% discovered functions and thwart about 95% ROP gadgets in application's shared libraries and oat file compiled from Dalvik bytecode.Besides,evaluations on real-world exploits also confirmed its effectiveness on mitigating ROP attacks within acceptable performance overhead.