The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author ...The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.展开更多
This paper introduces the usage of these functions. It presents the technique of how to program with them to perform the serial communications between a computer and other digital devices by the serial porst in Window...This paper introduces the usage of these functions. It presents the technique of how to program with them to perform the serial communications between a computer and other digital devices by the serial porst in Windows95. The related sample codes of the applications of this technique written in C++ programming language are also given. This technique is applied successfully to receive the data of the radio noise from a frequency monitor.展开更多
基于Google Maps API for Flash/Flex、PHP以及Socket技术,根据网络设备的技术特点和地理分布特点,以Web GIS方式灵活地实现了网络设备在线状态检测、设备信息查询、拓扑动态监测、电子地图刷新等功能。介绍了设计思路,主要功能及实现...基于Google Maps API for Flash/Flex、PHP以及Socket技术,根据网络设备的技术特点和地理分布特点,以Web GIS方式灵活地实现了网络设备在线状态检测、设备信息查询、拓扑动态监测、电子地图刷新等功能。介绍了设计思路,主要功能及实现方法。展开更多
基金the National Natural Science Foundation of China (60673071, 60743003, 90718005, 90718006)the National High Technology Research and Development Program of China (863 Program) (2006AA01Z442, 2007AA01Z411)
文摘The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.
基金Supported by the 86 3 High Technology Project of China (86 3-818-0 1-0 2 )
文摘This paper introduces the usage of these functions. It presents the technique of how to program with them to perform the serial communications between a computer and other digital devices by the serial porst in Windows95. The related sample codes of the applications of this technique written in C++ programming language are also given. This technique is applied successfully to receive the data of the radio noise from a frequency monitor.