期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Fine-Grained Binary Analysis Method for Privacy Leakage Detection on the Cloud Platform 被引量:1
1
作者 Jiaye Pan Yi Zhuang +1 位作者 Xinwen Hu Wenbing Zhao 《Computers, Materials & Continua》 SCIE EI 2020年第7期607-622,共16页
Nowadays cloud architecture is widely applied on the internet.New malware aiming at the privacy data stealing or crypto currency mining is threatening the security of cloud platforms.In view of the problems with exist... Nowadays cloud architecture is widely applied on the internet.New malware aiming at the privacy data stealing or crypto currency mining is threatening the security of cloud platforms.In view of the problems with existing application behavior monitoring methods such as coarse-grained analysis,high performance overhead and lack of applicability,this paper proposes a new fine-grained binary program monitoring and analysis method based on multiple system level components,which is used to detect the possible privacy leakage of applications installed on cloud platforms.It can be used online in cloud platform environments for fine-grained automated analysis of target programs,ensuring the stability and continuity of program execution.We combine the external interception and internal instrumentation and design a variety of optimization schemes to further reduce the impact of fine-grained analysis on the performance of target programs,enabling it to be employed in actual environments.The experimental results show that the proposed method is feasible and can achieve the acceptable analysis performance while consuming a small amount of system resources.The optimization schemes can go beyond traditional dynamic instrumentation methods with better analytical performance and can be more applicable to online analysis on cloud platforms. 展开更多
关键词 Cloud platform privacy leakage binary analysis dynamic analysis
下载PDF
Photometric solution and period analysis of the contact binary system AH Cnc 被引量:1
2
作者 Ying-Jiang Peng Zhi-Quan Luo +11 位作者 Xiao-Bin Zhang Li-Cai Deng Kun Wang Jian-Feng Tian Zheng-Zhou Yan Yang Pan Wei-Jing Fang Zhong-Wen Feng De-Lin Tang Qi-Li Liu Jin-Jiang Sun Qiang Zhou 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2016年第10期63-70,共8页
Photometric observations of AH Cnc, a W UMa-type system in the open cluster M67, were car- fled out by using the 50BIN telescope. About 100h of time-series/3- and V-band data were taken, based on which eight new times... Photometric observations of AH Cnc, a W UMa-type system in the open cluster M67, were car- fled out by using the 50BIN telescope. About 100h of time-series/3- and V-band data were taken, based on which eight new times of light minima were determined. By applying the Wilson-Devinney method, the light curves were modeled and a revised photometric solution of the binary system was derived. We con- firmed that AH Cnc is a deep contact (f = 51%), low mass-ratio (q - 0.156) system. Adopting the distance modulus derived from study of the host cluster, we have re-calculated the physical parameters of the binary system, namely the masses and radii. The masses and radii of the two components were estimated to be respectively 1.188(4-0.061) Me, 1.332(4-0.063) RQ for the primary component and 0.185(4-0.032) Me, 0.592(4-0.051) Re for the secondary. By adding the newly derived minimum timings to all the available data, the period variations of AH Cnc were studied. This shows that the orbital period of the binary is con- tinuously increasing at a rate of dp/dt = 4.29 x 10-10 d yr-1. In addition to the long-term period increase, a cyclic variation with a period of 35.26 yr was determined, which could be attributed to an unresolved tertiary component of the system. 展开更多
关键词 methods: data analysis -- astronomical instrumentation -- binaries: eclipsing stars closestars -- Galaxy: open clusters and associations: individual (M67)
下载PDF
An extended binary subband canonical correlation analysis detection algorithm oriented to the radial contraction-expansion motion steady- state visual evoked paradigm 被引量:1
3
作者 Yuxue Zhao Hongxin Zhang +3 位作者 Yuanzhen Wang Chenxu Li Ruilin Xu Chen Yang 《Brain Science Advances》 2022年第1期19-37,共19页
The radial contraction-expansion motion paradigm is a novel steady-state visual evoked experimental paradigm,and the electroencephalography(EEG)evoked potential is different from the traditional luminance modulation p... The radial contraction-expansion motion paradigm is a novel steady-state visual evoked experimental paradigm,and the electroencephalography(EEG)evoked potential is different from the traditional luminance modulation paradigm.The signal energy is concentrated chiefly in the fundamental frequency,while the higher harmonic power is lower.Therefore,the conventional steady-state visual evoked potential recognition algorithms optimizing multiple harmonic response components,such as the extended canonical correlation analysis(eCCA)and task-related component analysis(TRCA)algorithm,have poor recognition performance under the radial contraction-expansion motion paradigm.This paper proposes an extended binary subband canonical correlation analysis(eBSCCA)algorithm for the radial contraction-expansion motion paradigm.For the radial contraction-expansion motion paradigm,binary subband filtering was used to optimize the weighting coefficients of different frequency response signals,thereby improving the recognition performance of EEG signals.The results of offline experiments involving 13 subjects showed that the eBSCCA algorithm exhibits a better performance than the eCCA and TRCA algorithms under the stimulation of the radial contraction-expansion motion paradigm.In the online experiment,the average recognition accuracy of 13 subjects was 88.68%±6.33%,and the average information transmission rate(ITR)was 158.77±43.67 bits/min,which proved that the algorithm had good recognition effect signals evoked by the radial contraction-expansion motion paradigm. 展开更多
关键词 steady-state visual evoked potentials brain-computer interface radial contraction-expansion motion paradigm binary subband canonical correlation analysis extended binary subband canonical correlation analysis
原文传递
Analysis of Strehl ratio limit with superresolution binary phase filters 被引量:3
4
作者 Vidal F.Canales Pedro J.Valle Manuel P.Cagigal 《Chinese Optics Letters》 SCIE EI CAS CSCD 2016年第7期38-41,共4页
Several pupil filtering techniques have been developed in the last few years to obtain transverse superresolution (a narrower point spread function core). Such a core decrease entails two relevant limitations: a de... Several pupil filtering techniques have been developed in the last few years to obtain transverse superresolution (a narrower point spread function core). Such a core decrease entails two relevant limitations: a decrease of the peak intensity and an increase of the sidelobe intensity. Here, we calculate the Strehl ratio as a function of the core size for the most used binary phase filters. Furthermore, we show that this relation approaches the fundamental limit of the attainable Strehl ratio at the focal plane for any filter. Finally, we show the calculation of the peak-to-sidelobe ratio in order to check the system viability in every application. 展开更多
关键词 analysis of Strehl ratio limit with superresolution binary phase filters
原文传递
A Study on the Determinants of Location Choice in Inward Foreign Direct Investment (FDI): Focusing on the Incheon Free Economic Zone
5
作者 TaeUg Rho NanJoo (Nancy) Park 《Journal of Modern Accounting and Auditing》 2012年第4期488-502,共15页
Inward foreign direct investment (FDI) is expected to grow further by virtue of economic globalization. A thorough understanding of the locational determinants of inward FDI will be conducive to enhanced efficiency ... Inward foreign direct investment (FDI) is expected to grow further by virtue of economic globalization. A thorough understanding of the locational determinants of inward FDI will be conducive to enhanced efficiency in attracting direct and SOC-related investments from foreign entities. This study analyzes 51 cases of inward direct foreign investment made in the Incheon free economic zone (IFEZ) from 2002 to 2009 to determine the factors influencing FDI volume, the relevance of locations and the correlation between investment size and location. First, the relationship between the loeational determinants of FDI and the total investment size (total expected project cost) is analyzed. Second, the relationship between the locational determinants of FDI and the FDI is analyzed. Third, the relationship between the locational determinants of FDI and the location choice is analyzed. The results indicate the determinants that influence locations and investment size of FDI entities; whether these factors exercise influence in the zone; and the factors that have relatively significant effects. Ultimately, based on the analytical findings, a few implications for policy and practice are derived. 展开更多
关键词 ordinary least square method binary logistic regression analysis foreign direct investment (FDI) determinants of location choice Incheon free economic zone (IFEZ)
下载PDF
Measuring the orbital periods of low mass X-ray binaries in the X-ray band
6
作者 Yi Chou 《Research in Astronomy and Astrophysics》 SCIE CAS CSCD 2014年第11期1367-1382,共16页
A low mass X-ray binary (LMXB) contains either a neutron star or a black hole accreting materials from its low mass companion star. It is one of the primary astrophysical sources for studying stellar-mass compact ob... A low mass X-ray binary (LMXB) contains either a neutron star or a black hole accreting materials from its low mass companion star. It is one of the primary astrophysical sources for studying stellar-mass compact objects and accreting phe- nomena. As with other binary systems, the most important parameter of an LMXB is the orbital period, which allows us to learn about the nature of the binary system and constrain the properties of the system's components, including the compact ob- ject. As a result, measuring the orbital periods of LMXBs is essential for investigating these systems even though fewer than half of them have known orbital periods. This article introduces the different methods for measuring the orbital periods in the X-ray band and reviews their application to various types of LMXBs, such as eclipsing and dipping sources, as well as pulsar LMXBs. 展开更多
关键词 X-rays: binaries -- binaries: close -- methods: data analysis
下载PDF
Memory access integrity:detecting fine-grained memory access errors in binary code 被引量:1
7
作者 Wenjie Li Dongpeng Xu +5 位作者 WeiWu Xiaorui Gong Xiaobo Xiang Yan Wang Fangming gu Qianxiang Zeng 《Cybersecurity》 CSCD 2019年第1期286-303,共18页
As one of the most notorious programming errors,memory access errors still hurt modern software security.Particularly,they are hidden deeply in important software systems written in memory unsafe languages like C/C++.... As one of the most notorious programming errors,memory access errors still hurt modern software security.Particularly,they are hidden deeply in important software systems written in memory unsafe languages like C/C++.Plenty of work have been proposed to detect bugs leading to memory access errors.However,all existing works lack the ability to handle two challenges.First,they are not able to tackle fine-grained memory access errors,e.g.,data overflow inside one data structure.These errors are usually overlooked for a long time since they happen inside one memory block and do not lead to program crash.Second,most existing works rely on source code or debugging information to recover memory boundary information,so they cannot be directly applied to detection of memory access errors in binary code.However,searching memory access errors in binary code is a very common scenario in software vulnerability detection and exploitation.In order to overcome these challenges,we propose Memory Access Integrity(MAI),a dynamic method to detect finegrained memory access errors in off-the-shelf binary executables.The core idea is to recover fine-grained accessing policy between memory access behaviors and memory ranges,and then detect memory access errors based on the policy.The key insight in our work is that memory accessing patterns reveal information for recovering the boundary of memory objects and the accessing policy.Based on these recovered information,our method maintains a new memory model to simulate the life cycle of memory objects and report errors when any accessing policy is violated.We evaluate our tool on popular CTF datasets and real world softwares.Compared with the state of the art detection tool,the evaluation result demonstrates that our tool can detect fine-grained memory access errors effectively and efficiently.As the practical impact,our tool has detected three 0-day memory access errors in an audio decoder. 展开更多
关键词 binary analysis FINE-GRAINED Memory access error DETECTION
原文传递
Memory access integrity:detecting fine-grained memory access errors in binary code
8
作者 Wenjie Li Dongpeng Xu +5 位作者 WeiWu Xiaorui Gong Xiaobo Xiang YanWang Fangming gu Qianxiang Zeng 《Cybersecurity》 2018年第1期574-591,共18页
As one of the most notorious programming errors,memory access errors still hurt modern software security.Particularly,they are hidden deeply in important software systems written in memory unsafe languages like C/C++.... As one of the most notorious programming errors,memory access errors still hurt modern software security.Particularly,they are hidden deeply in important software systems written in memory unsafe languages like C/C++.Plenty of work have been proposed to detect bugs leading to memory access errors.However,all existing works lack the ability to handle two challenges.First,they are not able to tackle fine-grained memory access errors,e.g.,data overflow inside one data structure.These errors are usually overlooked for a long time since they happen inside one memory block and do not lead to program crash.Second,most existing works rely on source code or debugging information to recover memory boundary information,so they cannot be directly applied to detection of memory access errors in binary code.However,searching memory access errors in binary code is a very common scenario in software vulnerability detection and exploitation.In order to overcome these challenges,we propose Memory Access Integrity(MAI),a dynamic method to detect finegrained memory access errors in off-the-shelf binary executables.The core idea is to recover fine-grained accessing policy between memory access behaviors and memory ranges,and then detect memory access errors based on the policy.The key insight in our work is that memory accessing patterns reveal information for recovering the boundary of memory objects and the accessing policy.Based on these recovered information,our method maintains a new memory model to simulate the life cycle of memory objects and report errors when any accessing policy is violated.We evaluate our tool on popular CTF datasets and real world softwares.Compared with the state of the art detection tool,the evaluation result demonstrates that our tool can detect fine-grained memory access errors effectively and efficiently.As the practical impact,our tool has detected three 0-day memory access errors in an audio decoder. 展开更多
关键词 binary analysis FINE-GRAINED Memory access error DETECTION
原文传递
Bin2vec:learning representations of binary executable programs for security tasks 被引量:1
9
作者 Shushan Arakelyan Sima Arasteh +2 位作者 Christophe Hauser Erik Kline Aram Galstyan 《Cybersecurity》 EI CSCD 2021年第1期401-414,共14页
Tackling binary program analysis problems has traditionally implied manually defining rules and heuristics,a tedious and time consuming task for human analysts.In order to improve automation and scalability,we propose... Tackling binary program analysis problems has traditionally implied manually defining rules and heuristics,a tedious and time consuming task for human analysts.In order to improve automation and scalability,we propose an alternative direction based on distributed representations of binary programs with applicability to a number of downstream tasks.We introduce Bin2vec,a new approach leveraging Graph Convolutional Networks(GCN)along with computational program graphs in order to learn a high dimensional representation of binary executable programs.We demonstrate the versatility of this approach by using our representations to solve two semantically different binary analysis tasks–functional algorithm classification and vulnerability discovery.We compare the proposed approach to our own strong baseline as well as published results,and demonstrate improvement over state-of-the-art methods for both tasks.We evaluated Bin2vec on 49191 binaries for the functional algorithm classification task,and on 30 different CWE-IDs including at least 100 CVE entries each for the vulnerability discovery task.We set a new state-of-the-art result by reducing the classification error by 40%compared to the source-code based inst2vec approach,while working on binary code.For almost every vulnerability class in our dataset,our prediction accuracy is over 80%(and over 90%in multiple classes). 展开更多
关键词 binary program analysis Computer security Vulnerability discovery Neural networks
原文传递
Virtual Determination of Sex:Estimating Cut off Value of Digital Metric Traits of Foramen Magnum on Three-dimensional Computed Tomography with Receiver Operating Characteristic and Logistic Regression Analysis 被引量:2
10
作者 Harish Kumar S Agarwal Pardaman Singh Setia Suryamani Pandey 《Journal of Forensic Science and Medicine》 2021年第1期1-8,共8页
Background:Radiological imaging plays a pivotal role in forensic anthropology.As have the imaging techniques advances,so have the digital skeletal measurements inched towards precision.Secular trends of the population... Background:Radiological imaging plays a pivotal role in forensic anthropology.As have the imaging techniques advances,so have the digital skeletal measurements inched towards precision.Secular trends of the population keep on changing in modem times.Hence,finding the precise technique of bone measurement,with greater reproducibility,in modem population is always needed in making population specific biological profile.Aim and Objective:The aim of this study was to estimate the accuracy of the foramen magnum measurement,obtained by three dimensional multi-detector computed tomography using volume rendering technique with the cut off value of each variable,in sex determination of an individual.Materials and Methods:Two metric traits,an antero-posterior diameter(APD)and transverse diameter(TD),were measured digitally in an analysis of 130 radiological images having equal proportion of male and female samples.Foramen magnum index and area of foramen magnum(Area by Radinsky's[AR],Area by Teixeira5s[AT])were derived from APD and TD.Results:Descriptive statistical analysis,using unpaired t-test,showed significant higher value in males in all the variables.Using Pearson correlation analysis,maximum correlation was observed between area(AT and AR r=0.999)and between area and TD(AR r=0.955 and AT r=0.945 respectively).When used individually,TD had the highest predictive value(67.7%)for sex detennination among all the parameters followed by AT(65.4%)and AR(64.6%).Cutoff value of variables TD,AR and AT were 29.9 mm,841.80 mm2 and 849.70 mm2 respectively.Receiver operating characteristic curve predicted male and female sex with 96.2%and 89.2%accuracy respectively.The overall accuracy of the model was 92.7%.Conclusion:Measurements from 3D CT using volume rendering technique were precise,and the application of logistic regression analysis predicted the sex with more accuracy. 展开更多
关键词 binary logistic regression analysis foramen magnum sex determination three-dimensional multi-detector computed tomography volume rendering technique
原文传递
PARAMETRIC AND NON-PARAMETRIC COMBINATION MODEL TO ENHANCE OVERALL PERFORMANCE ON DEFAULT PREDICTION 被引量:1
11
作者 LI Jun PAN Liang +1 位作者 CHEN Muzi YANG Xiaoguang 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2014年第5期950-969,共20页
The probability of default(PD) is the key element in the New Basel Capital Accord and the most essential factor to financial institutions' risk management.To obtain good PD estimation,practitioners and academics h... The probability of default(PD) is the key element in the New Basel Capital Accord and the most essential factor to financial institutions' risk management.To obtain good PD estimation,practitioners and academics have put forward numerous default prediction models.However,how to use multiple models to enhance overall performance on default prediction remains untouched.In this paper,a parametric and non-parametric combination model is proposed.Firstly,binary logistic regression model(BLRM),support vector machine(SVM),and decision tree(DT) are used respectively to establish models with relatively stable and high performance.Secondly,in order to make further improvement to the overall performance,a combination model using the method of multiple discriminant analysis(MDA) is constructed.In this way,the coverage rate of the combination model is greatly improved,and the risk of miscarriage is effectively reduced.Lastly,the results of the combination model are analyzed by using the K-means clustering,and the clustering distribution is consistent with a normal distribution.The results show that the combination model based on parametric and non-parametric can effectively enhance the overall performance on default prediction. 展开更多
关键词 binary logistic regression combination model decision tree K-means clustering multiple discriminant analysis probability of default support vector machine
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部