共查询到20条相似文献,搜索用时 9 毫秒
1.
Markus Schordan Adrian Prantl 《International Journal on Software Tools for Technology Transfer (STTT)》2014,16(5):493-505
We present a combination of approaches for the verification of event-condition-action (ECA) systems. The analyzed ECA systems range from structurally simple to structurally complex systems. We address the verification of reachability properties and behavioral properties. Reachability properties are represented by assertions in the program and we determine statically whether an assertion holds for all execution paths. Behavioral properties are represented as linear temporal logic formulas specifying the input/output behavior of the program. Our approach assumes a finite state space. We compare a symbolic analysis with an exhaustive state space exploration and discuss the trade-offs between the approaches in terms of the number of computed states and run-time behavior. All variants compute a state transition graph which can also be passed to an LTL verifier. The variants have a different impact on the number of computed states in the state transition graph which in turn impacts the run-time and memory consumption of subsequent phases. We evaluate the different analysis variants with the RERS benchmarks. 相似文献
2.
Jeremy Morse Lucas Cordeiro Denis Nicole Bernd Fischer 《International Journal on Software Tools for Technology Transfer (STTT)》2014,16(5):519-529
We describe the application of ESBMC, a symbolic bounded model checker for C programs, to the 2012 RERS greybox challenge. We checked the reachability properties via reachability of the error labels, and the behavioral properties via a bounded LTL model checking approach. Our approach could solve about 700 properties for the small and medium problems from the offline phase, and scored overall about 5,000 marks but still ranked last in the competition. 相似文献
3.
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value 总被引:4,自引:0,他引:4
Radio Frequency IDentification (RFID ) system is a contactless automatic identification system using small, low-cost RFID tags. It enables recognition of the tag information via radio frequency communication, by attaching an RFID tag to an animate or inanimate object. Since an RFID system has the advantage of simultaneously recognizing massive amounts of information, it is expected to replace the bar-code system. The most important problem with an RFID system is that an adversary can access the tag information, which gives rise to privacy and forgery problems. This paper presents a hash-based mutual authentication protocol as a solution. The proposed protocol is designed to send a random number generated by a tag to a back-end server without disclosure. Moreover it substitutes a random number with a secret value, which is employed in a response message. The properties of the proposed protocol enable constant creation of distinct response messages without interferences from intended or meaningless requests generated by an adversary, while the secret value is not directly transmitted. Our proposed protocol make is difficult for an attacker to launch successful brute-force attacks against our approach. 相似文献
4.
Adams W K Kong David Zhang Mohamed Kamel 《IEEE transactions on systems, man, and cybernetics. Part B, Cybernetics》2006,36(5):1201-1205
Biometric authentication systems are widely applied because they offer inherent advantages over classical knowledge-based and token-based personal-identification approaches. This has led to the development of products using palmprints as biometric traits and their use in several real applications. However, as biometric systems are vulnerable to replay, database, and brute-force attacks, such potential attacks must be analyzed before biometric systems are massively deployed in security systems. This correspondence proposes a projected multinomial distribution for studying the probability of successfully using brute-force attacks to break into a palmprint system. To validate the proposed model, we have conducted a simulation. Its results demonstrate that the proposed model can accurately estimate the probability. The proposed model indicates that it is computationally infeasible to break into the palmprint system using brute-force attacks. 相似文献
6.
7.
A considerable body of work on model-based software debugging (MBSD) has been published in the past decade. We summarise the underlying ideas and present the different approaches as abstractions of the concrete semantics of the programming language. We compare the model-based framework with other well-known Automated Debugging approaches and present open issues, challenges and potential future directions of MBSD. 相似文献
8.
9.
Ed Burton 《Computer Graphics Forum》1995,14(3):159-170
An interpretation of children's drawing is presented that is based on active perception of the world and the construction of an equivalent self contained two-dimensional world. This model is implemented in a computer program called Rose (Representation Of Spatial Experience). Inspired by the drawings of young children, Rose simulates the perception of the general form and structure of three-dimensional computer models and constructs equivalent childlike two-dimensional representations from them. Rose serves to illustrate the plausibility of the constructive process as a model for real children's drawing and in addition serves as an alternative approach to traditional computer graphic rendering. 相似文献
10.
11.
David F. Barrero Julio César Hernández‐Castro Pedro Peris‐Lopez David Camacho María D. R‐Moreno 《Expert Systems》2014,31(1):9-19
Radio frequency identification (RFID) is a powerful technology that enables wireless information storage and control in an economical way. These properties have generated a wide range of applications in different areas. Due to economic and technological constrains, RFID devices are seriously limited, having small or even tiny computational capabilities. This issue is particularly challenging from the security point of view. Security protocols in RFID environments have to deal with strong computational limitations, and classical protocols cannot be used in this context. There have been several attempts to overcome these limitations in the form of new lightweight security protocols designed to be used in very constrained (sometimes called ultra‐lightweight) RFID environments. One of these proposals is the David–Prasad ultra‐lightweight authentication protocol. This protocol was successfully attacked using a cryptanalysis technique named Tango attack. The capacity of the attack depends on a set of boolean approximations. In this paper, we present an enhanced version of the Tango attack, named Genetic Tango attack, that uses Genetic Programming to design those approximations, easing the generation of automatic cryptanalysis and improving its power compared to a manually designed attack. Experimental results are given to illustrate the effectiveness of this new attack. 相似文献
12.
13.
14.
Continuing professional development (CPD) and life-long learning are vital to both individual and organisational success. For higher education, the intensive resource requirements requisite in the development of e-learning content and the challenges in accommodating different learning styles, developing an e-learning program can be a resource intensive exercise. A blended learning program has been developed in Ireland in an attempt to address the CPD needs of Irish construction professionals. This initiative attempts to strike a balance between the considerable resources required in the development of an e-learning initiative while addressing staff concerns in integrating technology in the delivery of programs. This pilot explores the issues encountered in integrating a simulation game, called MERIT, on a module as part of this blended learning program. The key finding from this research indicates that simulation games can play a very effective role in the delivery of lifelong learning opportunities aimed at the construction industry. However, management of the integration of a simulation game into a program requires careful planning, establishing key milestone dates and encouraging online collaboration through assigning of marks for effort and use of voice over IP communications. 相似文献
15.
本文对严重影响Web安全的XSS漏洞进行了概述,剖析了其产生的原因,对其攻击的类型和攻击的方式进行了说明和验证,并且针对XSS漏洞的攻击提出了一些有效的防范措施。 相似文献
16.
贾建忠 《网络安全技术与应用》2012,(5):30-32
本文先从病毒集团产生的原因、组织结构及分工、获利手段和侵害方式、自我保护能力等方面详述病毒集团的发展现状。后从怎样保障互联网企业的正常获利、各方配合形成合力、主动出击追本溯源、用户自我防护及法律、法规对计算机病毒的重新界定等方面提出遏制病毒集团发展的一些设想。 相似文献
17.
贾建忠 《网络安全技术与应用》2012,(4):40-42
智能手机市场发展蕴含着巨大商机,也给病毒制造者带来了足够的动力。本文对目前主要的智能手机病毒侵入方式及侵害结果进行分类描述,对其发展趋势进行预测,并从普通用户、业务监管、网站监督等角度探讨如何应对智能手机病毒危害。 相似文献
18.
Alhaj Taqwa Ahmed Siraj Maheyzah Md Zainal Anazida Idris Inshirah Nazir Anjum Elhaj Fatin Darwish Tasneem 《International Journal of Information Security》2023,22(5):1481-1496
International Journal of Information Security - A Network Intrusion Detection System is a network security technology for detecting intruder attacks. However, it produces a great amount of... 相似文献
19.
Many authors have shown how to break the AES cryptographic algorithm with side channel attacks; specially the timing attacks oriented to caches, like Prime+Probe. In this paper, we present two practical timing attacks on NoC that improve Prime+Probe technique, the P+P Firecracker, and P+P Arrow. Our attacks target the communication between an ARM Cortex-A9 core and a shared cache memory. Furthermore, we evaluate a secure enhanced NoC as a countermeasure against the timing attack. Finally, we demonstrate that attacks on MPSoCs through the NoC are a real threat and need to be further explored. 相似文献
20.
The shrinking generator is a simple keystream generator with applications in stream ciphers, which is still considered as a secure generator. This work shows that, in order to cryptanalyze it, fewer intercepted bits than indicated by the linear complexity are necessary. Indeed, whereas the linear complexity of shrunken sequences is between A⋅2(S−2) and A⋅2(S−1), we claim that the initial states of both component registers are easily computed with fewer than A⋅S shrunken bits located at particular positions. Such a result is proven thanks to the definition of shrunken sequences as interleaved sequences. Consequently, it is conjectured that this statement can be extended to all interleaved sequences. Furthermore, this paper confirms that certain bits of the interleaved sequences have a greater strategic importance than others, which must be considered as a proof of weakness of interleaved generators. 相似文献