-
5251.利用一个HICFG的可意识转换利用时代
[信息传输、软件和信息技术服务业] [2013-11-24]
We automate this intuition by describing an approach to discover the buffer structure (the chain of buffers used between transformations) of a program, and use this structure to construct an exploit input by inverting one transformat at a time. We propose a new program representation, a hybrid information- and control-flow graph (HI-CFG), and give algorithms to build a HI-CFG from instruction traces. We then describe how to guide program exploration using symbolic execution to efficiently search for transformation pre-images.
关键词:安全分析;大型代码库;缓冲结构
-
5252.扭曲框架广角成像和视角操纵
[信息传输、软件和信息技术服务业] [2013-11-24]
In this thesis we describe two projects based on image warping that give photographerssome of the same control over spatial layout that painters have always had. The first is a technique to minimize distortion in a wide-angle image. Any projection of a 3D scene onto a plane unavoidably results in distortion; current methods either bend straight lines in the scene or locally distort the shapes of scene objects.
关键词:图像扭曲;失真;场景;空间布局
-
5253.联合仿真的功能模型单元的决定性组成
[信息传输、软件和信息技术服务业] [2013-11-24]
In this paper, we explain how to achieve deterministic execution of FMUs (Functional Mockup Units)under the FMI (Functional Mockup Interface) standard.In particular, we focus on co-simulation, wherean FMU either contains its own internal simulation algorithm or serves as a gateway to a simulation tool. We give conditions on the design of FMUs and master algorithms (which orchestrate the execution of FMUs) to achieve deterministic co-simulation.We show that with the current version of the standard, these conditions demand capabilities from FMUs that are optional in the standard and rarely providedby an FMU in practice.
关键词:功能模型单元; 联合仿真; 数值积分算法
-
5254.针对物联网的简单安全的无线网络配置
[计算机、通信和其他电子设备制造业] [2013-11-24]
This paper discusses a simple and secure way of enabling “Internet of Things” to be configured with Wi-Fi PIN number and register it to the Internet. The Internet of Things are objects that are embedded with sensors and actuators (from printers to pacemakers), and they are linked through wired and wireless networks, often using the same Internet Protocol (IP) that connects the Internet [1]. Many Internet of things do not have interactive interface, so we present a system which requests information from physical objects by recording them and perform computer visio techniques to extract the PIN number. After that, we can register them to the access point (AP) through WPS (Wi-Fi Protected Setup) PIN based method protocol. The advantage of this projec is that the process saves people time to manually enter the PIN number into the router and there is no password to remember.
关键词:物联网;无线网络;安全性;信息网络;网络安全
-
5255.射电天文学实时信号处理管道的自动映射到异构集群
[信息传输、软件和信息技术服务业] [2013-11-24]
With instrument specifications and platforms constantly changing as technology progresses,the design space for these instruments is unstable and often unpredictable.Furthermore,the astronomers designing these instruments may not be technology experts, and assessing tradeoffs between different computing architectures, such as FPGAs, GPUs, and ASICs and determining how to partition an instrument can prove difficult.In this work, I present a toolcalled Optimal Rearrangement of Cluster-based Astronomy Signal Processing, or ORCAS, that automatically determines how to optimally partition an instrument across different types of hardware for radio astronomy based on a high level description of the instrument and a set of benchmarks.
关键词:计算架构;仪器;天文学信号处理工具
-
5256.对图像网络适应现实:隐式低秩转换的可伸缩性领域的适应
[信息传输、软件和信息技术服务业] [2013-11-24]
In this paper, we show how to learn transform-based domain adaptation classifiers in a scalable manner. The key idea is to exploit an implicit rank constraint, originated from a max-margin domain adaptation formulation, to make optimization tractable. Experiments show that the transformation between domains can be very efficiently learned from data and easily applied to new categories. This begins to bridge the gap between large-scaleinternet image collections and object images captured ineveryday life environments.
关键词:隐式约束;互联网图像;基于转换
-
5257.自私的代理引起的私人信息
[信息传输、软件和信息技术服务业] [2013-11-24]
This dissertation unifies and advances the theory of incentivized information elicitation. Using tools from convex analysis, we introduce a new model of elicitation with a matching characterization theorem which together encompass mechanism design, scoring rules, prediction markets, and other models. This lays a firm foundation on which the rest of the dissertation is built.
关键词:代理;私人信息;激励措施;激励信息抽取;凸分析;匹配特征定理
-
5258.可信计算的云代理道
[计算机、通信和其他电子设备制造业,信息传输、软件和信息技术服务业] [2013-11-24]
Applications running in a cloud data center face several challenges, including secure deployment, insider attacks, and cryptographic key management. Previous research shows how to securely start and run individual programs using the Trusted Platform Module or other secure co-processors, but none of that work solves the end-to-end problem of deploying and gaining assurance in distributed applications running on third-party hardware.
关键词:云数据;可信平台;云代理;云计算;信息安全;硬件;应用程序
-
5259.差别切片:标识安全应用的因果执行差异
[信息传输、软件和信息技术服务业] [2013-11-24]
A security analyst often needs to understand two runs of the same program that exhibit a difference in program state or output. This is important, for example, for vulnerability analysis, as well as for analyzing a malware program that features different behaviors when run in different environments. In this paper we propose a differential slicing approach that automates the analysis of such execution differences. Differential slicing outputs a causal difference graph that captures the input differences that triggered the observed difference and the causal path of differences that led from those input differences to the observed difference. The analyst uses the graph to quickly understand the observed difference. We implement differential slicing and evaluate it on the analysis of 11 real-world vulnerabilities and 2 malware samples with environment-dependent behaviors. We also evaluate it in an informal user study with two vulnerability analysts. Our results show that differential slicing successfully identifies the input differences that caused the observed difference and that the causal difference graph significantly reduces the amount of time and effort required for an analyst to understand the observed difference.
关键词:自动分析;执行差异;可观察差异
-
5260.Blazes:协调分析分布式程序
[信息传输、软件和信息技术服务业] [2013-11-24]
In this paper we present Blazes, a cross-platform program analysis framework that (a) identifies program locations that require coordination to ensure consistent executions, and (b) automatically synthesizes application-specific coordination code that can significantly outperform general-purpose techniques. We present two case studies, one using annotated programs in the Twitter Storm system, and another using the Bloom declarative language.
关键词:跨平台的程序分析框架;声明性语言;带注释的程序