With the increase of software complexity,the security threats faced by the software are also increasing day by day.So people pay more and more attention to the mining of software vulnerabilities.Although source code h...With the increase of software complexity,the security threats faced by the software are also increasing day by day.So people pay more and more attention to the mining of software vulnerabilities.Although source code has rich semantics and strong comprehensibility,source code vulnerability mining has been widely used and has achieved significant development.However,due to the protection of commercial interests and intellectual property rights,it is difficult to obtain source code.Therefore,the research on the vulnerability mining technology of binary code has strong practical value.Based on the investigation of related technologies,this article firstly introduces the current typical binary vulnerability analysis framework,and then briefly introduces the research background and significance of the intermediate language;with the rise of artificial intelligence,a large number of machine learning methods have been tried to solve the problem of binary vulnerability mining.This article divides the current related binary vulnerabilities mining technology into traditional mining technology and machine learning mining technology,respectively introduces its basic principles,research status and existing problems,and briefly summarizes them.Finally,based on the existing research work,this article puts forward the prospect of the future research on the technology of binary program vulnerability mining.展开更多
Objective To introduce a rapid simple staining method for sperm morphology.Methods Liquifiedsemen was on the glass, fixed by methanol, treated with phosphonic acid buffer, stained by A, B staining solution separately,...Objective To introduce a rapid simple staining method for sperm morphology.Methods Liquifiedsemen was on the glass, fixed by methanol, treated with phosphonic acid buffer, stained by A, B staining solution separately, and rinsed by running water. Results After staining, the whole sper-matozoid was very clear. The cephalic zone of spermatozoid head , acrosome area , was colored pink; its caudal zone colored violet red or violet blue. The body and tail of spermatozoid colored pink or light blue. Normal and abnormal morphology of spermatozoid could be differentiated easily. The sloughed spermatogenic cells and white blood cells could be differentiated also. Conclusion This rapid staining method of semen smear can produce the same effect of other usual staining method , but the staining time is shorter and the procedure is simpler.展开更多
基金This paper is based on the funding of the following two projects:Research on Key Technologies of User Location Privacy Protection and Data Integrity Verification under Mobile P2P Architecture,Project No.(619QN193)Research on Security Vulnerability Detection Technology of Open Source Software Based on Deep Learning,Project No.(ZDYF2020212).
文摘With the increase of software complexity,the security threats faced by the software are also increasing day by day.So people pay more and more attention to the mining of software vulnerabilities.Although source code has rich semantics and strong comprehensibility,source code vulnerability mining has been widely used and has achieved significant development.However,due to the protection of commercial interests and intellectual property rights,it is difficult to obtain source code.Therefore,the research on the vulnerability mining technology of binary code has strong practical value.Based on the investigation of related technologies,this article firstly introduces the current typical binary vulnerability analysis framework,and then briefly introduces the research background and significance of the intermediate language;with the rise of artificial intelligence,a large number of machine learning methods have been tried to solve the problem of binary vulnerability mining.This article divides the current related binary vulnerabilities mining technology into traditional mining technology and machine learning mining technology,respectively introduces its basic principles,research status and existing problems,and briefly summarizes them.Finally,based on the existing research work,this article puts forward the prospect of the future research on the technology of binary program vulnerability mining.
文摘Objective To introduce a rapid simple staining method for sperm morphology.Methods Liquifiedsemen was on the glass, fixed by methanol, treated with phosphonic acid buffer, stained by A, B staining solution separately, and rinsed by running water. Results After staining, the whole sper-matozoid was very clear. The cephalic zone of spermatozoid head , acrosome area , was colored pink; its caudal zone colored violet red or violet blue. The body and tail of spermatozoid colored pink or light blue. Normal and abnormal morphology of spermatozoid could be differentiated easily. The sloughed spermatogenic cells and white blood cells could be differentiated also. Conclusion This rapid staining method of semen smear can produce the same effect of other usual staining method , but the staining time is shorter and the procedure is simpler.