For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this p...For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.展开更多
Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this res...Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this research focuses on building an efficient spatial data management system using two constraint violation detection methods.An algorithm for constraint violation detection has been derived to maintain the error-free up-to-date spatial database.Results indicate that the developed constraint violation detection(CVD)system is more efficient compared with conventional systems.展开更多
The branching ratios and CP violations of the B →Dπ decays, including both the color-allowed and the color-suppressed modes, are investigated in detail within QCD framework by considering all diagrams that lead to t...The branching ratios and CP violations of the B →Dπ decays, including both the color-allowed and the color-suppressed modes, are investigated in detail within QCD framework by considering all diagrams that lead to three effective currents of two quarks. An intrinsic mass scale as a dynamical gluon mass is introduced to treat the infrared divergence caused by the soft collinear approximation in the endpoint regions, and the Cutkosky rule is adopted to deal with a physical-region singularity of the on mass-shell quark propagators. When the dynamical gluon mass μg is regarded as a universal sca/e, it is extracted to be around μg = 440 MeV from one of the well-measured B →Dπ decay modes. The resulting predictions for all branching ratios are in agreement with the current experimental measurements. As these decays have no penguin contributions, there are no direct CP asymmetries. Due to interference between the Cabibbo-suppressed and the Cabibbo-favored amplitudes, mixing-induced CP violations are predicted in the B →D^±π^±↓ decays to be consistent with the experimental data at 1-σ level. More precise measurements will be helpful to extracting weak angle 2β+γ.展开更多
基金National Natural Science Foundation of China under Grant No.60873213,91018008 and 61070192Beijing Science Foundation under Grant No. 4082018Shanghai Key Laboratory of Intelligent Information Processing of China under Grant No. IIPL-09-006
文摘For various reasons,many of the security programming rules applicable to specific software have not been recorded in official documents,and hence can hardly be employed by static analysis tools for detection.In this paper,we propose a new approach,named SVR-Miner(Security Validation Rules Miner),which uses frequent sequence mining technique [1-4] to automatically infer implicit security validation rules from large software code written in C programming language.Different from the past works in this area,SVR-Miner introduces three techniques which are sensitive thread,program slicing [5-7],and equivalent statements computing to improve the accuracy of rules.Experiments with the Linux Kernel demonstrate the effectiveness of our approach.With the ten given sensitive threads,SVR-Miner automatically generated 17 security validation rules and detected 8 violations,5 of which were published by Linux Kernel Organization before we detected them.We have reported the other three to the Linux Kernel Organization recently.
文摘Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this research focuses on building an efficient spatial data management system using two constraint violation detection methods.An algorithm for constraint violation detection has been derived to maintain the error-free up-to-date spatial database.Results indicate that the developed constraint violation detection(CVD)system is more efficient compared with conventional systems.
基金supported by National Natural Science Foundation of China (NSFC) under Grant Nos.10475105,10491306,and 10675039the Knowledge Innovation Program (PKIP) of the Chinese Academy of Sciences
文摘The branching ratios and CP violations of the B →Dπ decays, including both the color-allowed and the color-suppressed modes, are investigated in detail within QCD framework by considering all diagrams that lead to three effective currents of two quarks. An intrinsic mass scale as a dynamical gluon mass is introduced to treat the infrared divergence caused by the soft collinear approximation in the endpoint regions, and the Cutkosky rule is adopted to deal with a physical-region singularity of the on mass-shell quark propagators. When the dynamical gluon mass μg is regarded as a universal sca/e, it is extracted to be around μg = 440 MeV from one of the well-measured B →Dπ decay modes. The resulting predictions for all branching ratios are in agreement with the current experimental measurements. As these decays have no penguin contributions, there are no direct CP asymmetries. Due to interference between the Cabibbo-suppressed and the Cabibbo-favored amplitudes, mixing-induced CP violations are predicted in the B →D^±π^±↓ decays to be consistent with the experimental data at 1-σ level. More precise measurements will be helpful to extracting weak angle 2β+γ.