期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
One-to-Any Command and Control Model:Precisely Coordinated Operation on Uncooperative Controlled Nodes 被引量:1
1
作者 QIU Han LI Yufeng +1 位作者 LI Heshuai ZHU Junhu 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第6期490-498,共9页
New precisely cooperative attacks, such as the coordi- nated cross plane session termination (CXPST) attack, need thou- sands upon thousands machines to attack diverse selected links simultaneously with the given ra... New precisely cooperative attacks, such as the coordi- nated cross plane session termination (CXPST) attack, need thou- sands upon thousands machines to attack diverse selected links simultaneously with the given rate. However, almost all command and control(C&C) mechanisms only provide publishing one com- mand to the whole once, so-called one-to-all C&C model, and are not productive to support CXPST-alike attacks. In this paper, we present one-to-any C&C model on coordination among the unco- operative controlled nodes. As an instance of one-to-any C&C model, directional command publishing (DCP) mechanism lever- aging on Kademlia is provided with a range-mapping key creating algorithm for commands to compute the publishing range and a statistically stochastic node querying scheme to obtain the com- mands immediately. With theoretical analysis and simulation, it is indicated that one-to-any C&C model fits for precisely coordi- nated operation on uncooperative controlled nodes with least complexity, better accuracy and efficiency. Furthermore, DCP mechanism can support one-to-all command publishing at the same time. As an example of future C&C model, studying on one-to-any C&C model may help to promote the development of more efficient countermeasures. 展开更多
关键词 one-to-any command and control(C&C) model directional command publishing(DCP) mechanism precisely cooperative attack uncooperative controlled node
原文传递
A TrustEnclave-Based Architecture for Ensuring Run-Time Security in Embedded Terminals 被引量:1
2
作者 Rui Chang Liehui Jiang +2 位作者 Wenzhi Chen Yaobin Xie Zhongyong Lu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第5期447-457,共11页
The run-time security guarantee is a hotspot in current cyberspace security research, especially on embedded terminals, such as smart hardware as well as wearable and mobile devices. Typically, these devices use unive... The run-time security guarantee is a hotspot in current cyberspace security research, especially on embedded terminals, such as smart hardware as well as wearable and mobile devices. Typically, these devices use universal hardware and software to connect with public networks via the Internet, and are probably open to security threats from Trojan viruses and other malware. As a result, the security of sensitive personal data is threatened and economic interests in the industry are compromised. To address the run-time security problems efficiently, first, a TrustEnclave-based secure architecture is proposed, and the trusted execution environment is constructed by hardware isolation technology. Then the prototype system is implemented on real TrustZone-enabled hardware devices. Finally, both analytical and experimental evaluations are provided. The experimental results demonstrate the effectiveness and feasibility of the proposed security scheme. 展开更多
关键词 run-time security trusted execution environment hardware isolation TRUSTZONE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部