期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
On the Security of Smart Home Systems:A Survey
1
作者 袁斌 万俊 +2 位作者 吴宇晗 邹德清 金海 《Journal of Computer Science & Technology》 SCIE EI CSCD 2023年第2期228-247,共20页
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the fastest-growing.However,the rapid development of the smart home has also made smart home systems a target for attackers.Recently,r... Among the plethora of IoT(Internet of Things)applications,the smart home is one of the fastest-growing.However,the rapid development of the smart home has also made smart home systems a target for attackers.Recently,researchers have made many efforts to investigate and enhance the security of smart home systems.Toward a more secure smart home ecosystem,we present a detailed literature review on the security of smart home systems.Specifically,we categorize smart home systems’security issues into the platform,device,and communication issues.After exploring the research and specific issues in each of these security areas,we summarize the root causes of the security flaws in today's smart home systems,which include the heterogeneity of internal components of the systems,vendors'customization,the lack of clear responsibility boundaries and the absence of standard security standards.Finally,to better understand the security of smart home systems and potentially provide better protection for smart home systems,we propose research directions,including automated vulnerability mining,vigorous security checking,and data-driven security analysis. 展开更多
关键词 IoT(Internet of Things) smart home IoT security smart home security
原文传递
Deployment optimization for target perpetual coverage in energy harvesting wireless sensor network
2
作者 Zhenkun Jin Yixuan Geng +4 位作者 Chenlu Zhu Yunzhi Xia Xianjun Deng Lingzhi Yi Xianlan Wang 《Digital Communications and Networks》 SCIE 2024年第2期498-508,共11页
Energy limitation of traditional Wireless Sensor Networks(WSNs)greatly confines the network lifetime due to generating and processing massive sensing data with a limited battery.The energy harvesting WSN is a novel ne... Energy limitation of traditional Wireless Sensor Networks(WSNs)greatly confines the network lifetime due to generating and processing massive sensing data with a limited battery.The energy harvesting WSN is a novel network architecture to address the limitation of traditional WSN.However,existing coverage and deployment schemes neglect the environmental correlation of sensor nodes and external energy with respect to physical space.Comprehensively considering the spatial correlation of the environment and the uneven distribution of energy in energy harvesting WSN,we investigate how to deploy a collection of sensor nodes to save the deployment cost while ensuring the target perpetual coverage.The Confident Information Coverage(CIC)model is adopted to formulate the CIC Minimum Deployment Cost Target Perpetual Coverage(CICMTP)problem to minimize the deployed sensor nodes.As the CICMTP is NP-hard,we devise two approximation algorithms named Local Greedy Threshold Algorithm based on CIC(LGTA-CIC)and Overall Greedy Search Algorithm based on CIC(OGSA-CIC).The LGTA-CIC has a low time complexity and the OGSA-CIC has a better approximation rate.Extensive simulation results demonstrate that the OGSA-CIC is able to achieve lower deployment cost and the performance of the proposed algorithms outperforms GRNP,TPNP and EENP algorithms. 展开更多
关键词 Energy harvesting WSN Deployment optimization Confident information coverage(CIC) Target perpetual coverage
下载PDF
基于污点和概率的逃逸恶意软件多路径探索
3
作者 徐钫洲 张网 +1 位作者 羌卫中 金海 《Security and Safety》 2023年第3期83-106,共24页
Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution information.Unfortu... Static analysis is often impeded by malware obfuscation techniques,such as encryption and packing,whereas dynamic analysis tends to be more resistant to obfuscation by leveraging concrete execution information.Unfortunately,malware can employ evasive techniques to detect the analysis environment and alter its behavior accordingly.While known evasive techniques can be explicitly dismantled,the challenge lies in generically dismantling evasions without full knowledge of their conditions or implementations,such as logic bombs that rely on uncertain conditions,let alone unsupported evasive techniques,which contain evasions without corresponding dismantling strategies and those leveraging unknown implementations.In this paper,we present Antitoxin,a prototype for automatically exploring evasive malware.Antitoxin utilizes multi-path exploration guided by taint analysis and probability calculations to effectively dismantle evasive techniques.The probabilities of branch execution are derived from dynamic coverage,while taint analysis helps identify paths associated with evasive techniques that rely on uncertain conditions.Subsequently,Antitoxin prioritizes branches with lower execution probabilities and those influenced by taint analysis for multi-path exploration.This is achieved through forced execution,which forcefully sets the outcomes of branches on selected paths.Additionally,Antitoxin employs active anti-evasion countermeasures to dismantle known evasive techniques,thereby reducing exploration overhead.Furthermore,Antitoxin provides valuable insights into sensitive behaviors,facilitating deeper manual analysis.Our experiments on a set of highly evasive samples demonstrate that Antitoxin can effectively dismantle evasive techniques in a generic manner.The probability calculations guide the multi-path exploration of evasions without requiring prior knowledge of their conditions or implementations,enabling the dismantling of unsupported techniques such as C2 and significantly improving efficiency compared to linear exploration when dealing with complex control flows.Additionally,taint analysis can accurately identify branches related to logic bombs,facilitating preferential exploration. 展开更多
关键词 Malware analysis dynamic binary instrumentation forced execution taint analysis evasion detection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部