The byte stream is widely used in malware detection due to its independence of reverse engineering.However,existing methods based on the byte stream implement an indiscriminate feature extraction strategy,which ignore...The byte stream is widely used in malware detection due to its independence of reverse engineering.However,existing methods based on the byte stream implement an indiscriminate feature extraction strategy,which ignores the byte function difference in different segments and fails to achieve targeted feature extraction for various byte semantic representation modes,resulting in byte semantic confusion.To address this issue,an enhanced adversarial byte function associated method for malware backdoor attack is proposed in this paper by categorizing various function bytes into three functions involving structure,code,and data.The Minhash algorithm,grayscale mapping,and state transition probability statistics are then used to capture byte semantics from the perspectives of text signature,spatial structure,and statistical aspects,respectively,to increase the accuracy of byte semantic representation.Finally,the three-channel malware feature image is constructed based on different function byte semantics,and a convolutional neural network is applied for detection.Experiments on multiple data sets from 2018 to 2021 show that the method can effectively combine byte functions to achieve targeted feature extraction,avoid byte semantic confusion,and improve the accuracy of malware detection.展开更多
Last August, a well-prepared exhibition titled "Chinese Scripts: From Oracle Bones to Computer Bytes" opened in Beijing-based Chinese Modern Literature Museum. This exhibition toured Egypt last October as a ...Last August, a well-prepared exhibition titled "Chinese Scripts: From Oracle Bones to Computer Bytes" opened in Beijing-based Chinese Modern Literature Museum. This exhibition toured Egypt last October as a cultural event in celebration of the opening of China Cultural Center in Egypt. After that, it will be displayed in France, Malta and the Republic of Korea.展开更多
The AI revolution is altering the innovation ecosystem at an unprecedented pace.Breakthroughs in generative AI,big data analytics,autonomous driving,and other fields have rendered conventional IP frameworks increasing...The AI revolution is altering the innovation ecosystem at an unprecedented pace.Breakthroughs in generative AI,big data analytics,autonomous driving,and other fields have rendered conventional IP frameworks increasingly inadequate.A central challenge confronting global IP systems is how to safeguard innovators’rights while fostering technological progress.展开更多
电场积分方程(electric field integral equation,EFIE)“低频崩溃”现象是指当电磁波波长远大于离散单元的尺寸时,分析结果不准确的现象。它的发生与计算机浮点数的字长有关,高精度浮点数的普及有助于缓解低频崩溃现象的发生,但目前还...电场积分方程(electric field integral equation,EFIE)“低频崩溃”现象是指当电磁波波长远大于离散单元的尺寸时,分析结果不准确的现象。它的发生与计算机浮点数的字长有关,高精度浮点数的普及有助于缓解低频崩溃现象的发生,但目前还没有关于不同精度的浮点数的低频崩溃临界阈值的研究报道。本文定量研究了不同字长浮点数的EFIE不发生低频崩溃的适用范围,以便在该适用范围内,研究人员仅须简单地修改现有EFIE代码的浮点数字长就可以进行电磁特性的准确分析而不发生低频崩溃,避免现有低频问题都需要修改基函数或积分方程等分析技术,为低频电磁分析增加了一种可选择的简便解决办法。经过数值算例的验证,高精度浮点数的EFIE可以将低频崩溃现象发生的离散网格的电尺寸降低到2.5×10^(−13),这已经能够处理我们常见的低频崩溃问题。展开更多
介绍了J1939协议配置化通信的应用方案。首先,阐述了J1939协议的基本原理和特点,包括其分层结构、消息格式和通信机制。然后提出并验证了一种配置化通信技术方法,通过配置数据在J1939通信报文中字节长度、所处报文位置来解析报文中的数...介绍了J1939协议配置化通信的应用方案。首先,阐述了J1939协议的基本原理和特点,包括其分层结构、消息格式和通信机制。然后提出并验证了一种配置化通信技术方法,通过配置数据在J1939通信报文中字节长度、所处报文位置来解析报文中的数据,并将其写入数据中心;根据配置的需要发送参数组号(Parameter Group Number,PGN)信息,从数据中心取出相关数据,按照数据的位置和数据长度,填写J1939报文发送帧,实现了J1939协议的快速解析和交互,具有很高的灵活性和一定的参考价值。展开更多
As the traditional character-oriented frame synchronization methods are no longer applicable to the byte-misaligned stream, and the efficiency of the bit-oriented method is hardly acceptable, a character-oriented bit-...As the traditional character-oriented frame synchronization methods are no longer applicable to the byte-misaligned stream, and the efficiency of the bit-oriented method is hardly acceptable, a character-oriented bit-shift stream frame synchronization (COBS-FS) method is presented. In order to measure the performance of the given method, a bit-oriented frame synchronization method, based on Knuth-Morris-Pratt (KMP-FS) algorithm, is used for comparison. It is proven in theory that the COBS-FS has a much lower cost in frame header searching. Experiment shows that the COBS-FS method is with better performance than the KMP-FS algorithm in both computational effort and execution time.展开更多
基金This work is supported in part by the Information Security Software Project(2020)of the Ministry of Industry and Information Technology,PR China under Grant CEIEC-2020-ZM02-0134.
文摘The byte stream is widely used in malware detection due to its independence of reverse engineering.However,existing methods based on the byte stream implement an indiscriminate feature extraction strategy,which ignores the byte function difference in different segments and fails to achieve targeted feature extraction for various byte semantic representation modes,resulting in byte semantic confusion.To address this issue,an enhanced adversarial byte function associated method for malware backdoor attack is proposed in this paper by categorizing various function bytes into three functions involving structure,code,and data.The Minhash algorithm,grayscale mapping,and state transition probability statistics are then used to capture byte semantics from the perspectives of text signature,spatial structure,and statistical aspects,respectively,to increase the accuracy of byte semantic representation.Finally,the three-channel malware feature image is constructed based on different function byte semantics,and a convolutional neural network is applied for detection.Experiments on multiple data sets from 2018 to 2021 show that the method can effectively combine byte functions to achieve targeted feature extraction,avoid byte semantic confusion,and improve the accuracy of malware detection.
文摘Last August, a well-prepared exhibition titled "Chinese Scripts: From Oracle Bones to Computer Bytes" opened in Beijing-based Chinese Modern Literature Museum. This exhibition toured Egypt last October as a cultural event in celebration of the opening of China Cultural Center in Egypt. After that, it will be displayed in France, Malta and the Republic of Korea.
文摘The AI revolution is altering the innovation ecosystem at an unprecedented pace.Breakthroughs in generative AI,big data analytics,autonomous driving,and other fields have rendered conventional IP frameworks increasingly inadequate.A central challenge confronting global IP systems is how to safeguard innovators’rights while fostering technological progress.
文摘电场积分方程(electric field integral equation,EFIE)“低频崩溃”现象是指当电磁波波长远大于离散单元的尺寸时,分析结果不准确的现象。它的发生与计算机浮点数的字长有关,高精度浮点数的普及有助于缓解低频崩溃现象的发生,但目前还没有关于不同精度的浮点数的低频崩溃临界阈值的研究报道。本文定量研究了不同字长浮点数的EFIE不发生低频崩溃的适用范围,以便在该适用范围内,研究人员仅须简单地修改现有EFIE代码的浮点数字长就可以进行电磁特性的准确分析而不发生低频崩溃,避免现有低频问题都需要修改基函数或积分方程等分析技术,为低频电磁分析增加了一种可选择的简便解决办法。经过数值算例的验证,高精度浮点数的EFIE可以将低频崩溃现象发生的离散网格的电尺寸降低到2.5×10^(−13),这已经能够处理我们常见的低频崩溃问题。
文摘介绍了J1939协议配置化通信的应用方案。首先,阐述了J1939协议的基本原理和特点,包括其分层结构、消息格式和通信机制。然后提出并验证了一种配置化通信技术方法,通过配置数据在J1939通信报文中字节长度、所处报文位置来解析报文中的数据,并将其写入数据中心;根据配置的需要发送参数组号(Parameter Group Number,PGN)信息,从数据中心取出相关数据,按照数据的位置和数据长度,填写J1939报文发送帧,实现了J1939协议的快速解析和交互,具有很高的灵活性和一定的参考价值。
文摘As the traditional character-oriented frame synchronization methods are no longer applicable to the byte-misaligned stream, and the efficiency of the bit-oriented method is hardly acceptable, a character-oriented bit-shift stream frame synchronization (COBS-FS) method is presented. In order to measure the performance of the given method, a bit-oriented frame synchronization method, based on Knuth-Morris-Pratt (KMP-FS) algorithm, is used for comparison. It is proven in theory that the COBS-FS has a much lower cost in frame header searching. Experiment shows that the COBS-FS method is with better performance than the KMP-FS algorithm in both computational effort and execution time.