期刊文献+
共找到576篇文章
< 1 2 29 >
每页显示 20 50 100
ADFEmu:Enhancing Firmware Fuzzing with Direct Memory Access(DMA)Input Emulation Using Concolic Execution and Large Language Models(LLMs)
1
作者 Yixin Ding Xinjian Zhao +3 位作者 Zicheng Wu Yichen Zhu Longkun Bai Hao Han 《Computers, Materials & Continua》 2025年第9期5977-5993,共17页
Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques inef... Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques ineffective.When peripheral responses are missing or incorrect,fuzzing a firmware may crash or exit prematurely,significantly limiting code coverage.While prior re-hosting approaches have made progress in simulating Memory-Mapped Input/Output(MMIO)and interrupt-based peripherals,they either ignore Direct Memory Access(DMA)or handle it oversimplified.In this work,we present ADFEmu,a novel automated firmware re-hosting framework that enables effective fuzzing of DMA-enabled firmware.ADFEmu integrates concolic execution with large language models(LLMs)to semantically emulate DMA operations and synthesize peripheral input sequences intelligently.Specifically,it learns DMA transfer patterns from the firmware’s context and employs guided symbolic execution to explore deeper and more diverse execution paths.This approach allows firmware to operate stably without hardware dependencies while achieving higher fidelity in emulation.Evaluated on real-world embedded firmware samples,ADFEmu achieves a 100%re-hosting success rate,improves total execution path exploration by 5.31%,and triggers more crashes compared to the state-of-the-art.These results highlight ADFEmu’s effectiveness in overcoming long-standing limitations of DMA emulation and its potential to advance automated vulnerability discovery in peripheral-rich embedded environments. 展开更多
关键词 Fuzz testing firmware rehosting DMA concolic execution LLMs
在线阅读 下载PDF
The Current Situation and Trends of Trusted Execution Environment Applications
2
作者 Yanling Liu Yun Li 《Proceedings of Business and Economic Studies》 2025年第2期121-126,共6页
With the rapid development of digital technologies such as big data,cloud computing,and the Internet of Things(loT),data security and privacy protection have become the core challenges facing modern computing systems.... With the rapid development of digital technologies such as big data,cloud computing,and the Internet of Things(loT),data security and privacy protection have become the core challenges facing modern computing systems.Traditional security mechanisms are difficult to effectively deal with advanced adversarial attacks due to their reliance on a centralized trust model.In this context,the Trusted Execution Environment(TEE),as a hardware-enabled secure isolation technology,offers a potential solution to protect sensitive computations and data.This paper systematically discusses TEE's technical principle,application status,and future development trend.First,the underlying architecture of TEE and its core characteristics,including isolation,integrity,and confidentiality,are analyzed.Secondly,practical application cases of TEE in fields such as finance,the IoT,artificial intelligence,and privacy computing are studied.Finally,the future development direction of TEE is prospected. 展开更多
关键词 Trusted execution environment Data security Privacy protection Cloud computing
在线阅读 下载PDF
Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution
3
作者 Yan Cao Zhizhuang Zhou Yan Zhuang 《Computers, Materials & Continua》 2025年第7期1545-1565,共21页
Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are w... Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are widely used to increase control-flow complexity.However,traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution(DSE)attacks,which can efficiently identify and eliminate them.To address this issue,this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation.Our method introduces two key techniques:single-way function opaque predicates,which leverage hash functions and logarithmic transformations to prevent constraint solvers from generating feasible inputs,and path-explosion opaque predicates,which generate an excessive number of execution paths,overwhelming symbolic execution engines.To evaluate the effectiveness of our approach,we implemented a prototype obfuscation tool and tested it against prominent symbolic execution engines.Experimental results demonstrate that our approach signifi-cantly increases resilience against symbolic execution attacks while maintaining acceptable performance overhead.This paper provides a robust and scalable obfuscation technique,contributing to the enhancement of software protection strategies in adversarial environments. 展开更多
关键词 Dynamic symbolic execution opaque predicates code obfuscation
在线阅读 下载PDF
Efficient Task Allocation for Energy and Execution Time Trade-Off in Edge Computing Using Multi-Objective IPSO
4
作者 Jafar Aminu Rohaya Latip +2 位作者 Zurina Mohd Hanafi Shafinah Kamarudin Danlami Gabi 《Computers, Materials & Continua》 2025年第8期2989-3011,共23页
As mobile edge computing continues to develop,the demand for resource-intensive applications is steadily increasing,placing a significant strain on edge nodes.These nodes are normally subject to various constraints,fo... As mobile edge computing continues to develop,the demand for resource-intensive applications is steadily increasing,placing a significant strain on edge nodes.These nodes are normally subject to various constraints,for instance,limited processing capability,a few energy sources,and erratic availability being some of the common ones.Correspondingly,these problems require an effective task allocation algorithmto optimize the resources through continued high system performance and dependability in dynamic environments.This paper proposes an improved Particle Swarm Optimization technique,known as IPSO,for multi-objective optimization in edge computing to overcome these issues.To this end,the IPSO algorithm tries to make a trade-off between two important objectives,which are energy consumption minimization and task execution time reduction.Because of global optimal position mutation and dynamic adjustment to inertia weight,the proposed optimization algorithm can effectively distribute tasks among edge nodes.As a result,it reduces the execution time of tasks and energy consumption.In comparative assessments carried out by IPSO with benchmark methods such as Energy-aware Double-fitness Particle Swarm Optimization(EADPSO)and ICBA,IPSO provides better results than these algorithms.For the maximum task size,when compared with the benchmark methods,IPSO reduces the execution time by 17.1%and energy consumption by 31.58%.These results allow the conclusion that IPSO is an efficient and scalable technique for task allocation at the edge environment.It provides peak efficiency while handling scarce resources and variable workloads. 展开更多
关键词 Keyword edge computing energy consumption execution time particle swarm optimization task allocation
在线阅读 下载PDF
Planning,monitoring and replanning techniques for handling abnormity in HTN-based planning and execution
5
作者 KANG Kai CHENG Kai +2 位作者 SHAO Tianhao ZHANG Hongjun ZHANG Ke 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1264-1275,共12页
A framework that integrates planning,monitoring and replanning techniques is proposed.It can devise the best solution based on the current state according to specific objectives and properly deal with the influence of... A framework that integrates planning,monitoring and replanning techniques is proposed.It can devise the best solution based on the current state according to specific objectives and properly deal with the influence of abnormity on the plan execution.The framework consists of three parts:the hierarchical task network(HTN)planner based on Monte Carlo tree search(MCTS),hybrid plan monitoring based on forward and backward and norm-based replanning method selection.The HTN planner based on MCTS selects the optimal method for HTN compound task through pre-exploration.Based on specific objectives,it can identify the best solution to the current problem.The hybrid plan monitoring has the capability to detect the influence of abnormity on the effect of an executed action and the premise of an unexecuted action,thus trigger the replanning.The norm-based replanning selection method can measure the difference between the expected state and the actual state,and then select the best replanning algorithm.The experimental results reveal that our method can effectively deal with the influence of abnormity on the implementation of the plan and achieve the target task in an optimal way. 展开更多
关键词 hierarchical task network Monte carlo tree search(MCTS) PLANNING execution abnormity
在线阅读 下载PDF
Development of a distributed and integratable manufacturing execution system framework 被引量:4
6
作者 杨浩 周娜 +1 位作者 朱剑英 罗翔 《Journal of Southeast University(English Edition)》 EI CAS 2003年第1期64-69,共6页
Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, d... Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, distributed, configurable, interoperable and maintainable. Moreover, the design patterns for the framework .are developed and a variety of functional components are designed by inheriting appropriate patterns. And then an application is constructed by invoking corresponding methods of related components. An MES system implementing the framework and design patterns can be facilely integrated with other manufacturing applications, such as enterprise resource planning (ERP) and floor control system (FCS) . 展开更多
关键词 manufacturing execution system framework design pattern distributed object-oriented remote method invocation
在线阅读 下载PDF
Optimization of RDF link traversal based query execution 被引量:2
7
作者 朱艳琴 花岭 《Journal of Southeast University(English Edition)》 EI CAS 2013年第1期27-32,共6页
Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal ba... Aiming at the problem that only some types of SPARQL ( simple protocal and resource description framework query language) queries can be answered by using the current resource description framework link traversal based query execution (RDF-LTE) approach, this paper discusses how the execution order of the triple pattern affects the query results and cost based on concrete SPARQL queries, and analyzes two properties of the web of linked data, missing backward links and missing contingency solution. Then three heuristic principles for logic query plan optimization, namely, the filtered basic graph pattern (FBGP) principle, the triple pattern chain principle and the seed URIs principle, are proposed. The three principles contribute to decrease the intermediate solutions and increase the types of queries that can be answered. The effectiveness and feasibility of the proposed approach is evaluated. The experimental results show that more query results can be returned with less cost, thus enabling users to develop the full potential of the web of linked data. 展开更多
关键词 web of linked data resource description framework link traversal based query execution (RDF-LTE) SPARQL query query optimization
在线阅读 下载PDF
Method for test case selection and execution of web application regression testing
8
作者 曹曦 许蕾 《Journal of Southeast University(English Edition)》 EI CAS 2008年第3期325-329,共5页
In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case select... In order to improve the efficiency of regression testing in web application,the control flow graph and the greedy algorithm are adopted.This paper considers a web page as a basic unit and introduces a test case selection method for web application regression testing based on the control flow graph.This method is safe enough to the test case selection.On the base of features of request sequence in web application,the minimization technique and the priority of test cases are taken into consideration in the process of execution of test cases in regression testing for web application.The improved greedy algorithm is also raised resulting in optimization of execution of test cases.The experiments indicate that the number of test cases which need to be retested is reduced,and the efficiency of execution of test cases is also improved. 展开更多
关键词 regression testing web application test case selection control flow graph optimizing execution
在线阅读 下载PDF
The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android
9
作者 Thien-Phuc Doan Ngoc-Tu Chau +1 位作者 Jungsoo Park Souhwan Jung 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3059-3073,共15页
Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for s... Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security.However,for Android,TEE technologies still contain restrictions and limitations.The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE.Another issue of hardware-based TEE is the cross-platform problem.Since every mobile device supports different TEE vendors,it becomes an obstacle for developers to migrate their trusted applications to other Android devices.A software-based TEE solution is a potential approach that allows developers to customize,package and deliver the product efficiently.Motivated by that idea,this paper introduces a VTEE model,a software-based TEE solution,on Android devices.This research contributes to the analysis of the feasibility of using a virtualized TEE on Android devices by considering two metrics:computing performance and security.The experiment shows that the VTEE model can host other software-based TEE services and deliver various cryptography TEE functions on theAndroid environment.The security evaluation shows that adding the VTEE model to the existing Android does not addmore security issues to the traditional design.Overall,this paper shows applicable solutions to adjust the balance between computing performance and security. 展开更多
关键词 Mobile security trusted execution model virtualized trusted execution environment HYPERVISOR
在线阅读 下载PDF
ARCHITECTURE OF MANUFACTURING EXECUTION SYSTEM IN THE EXTENDED ENTERPRISE 被引量:6
10
作者 Song Haisheng College of Electronic and Mechanical Engineering, Hebei University of Science and Technology,Shijiazhuang 050054,China Wang Jiahai Zhang Shu Tongji University 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2002年第1期90-93,共4页
The extended enterprise is formed according to the philosophy of dispersednetworked manufacturing. Manufacturing execution system (MES) can close the information gap whichexists between device control system and produ... The extended enterprise is formed according to the philosophy of dispersednetworked manufacturing. Manufacturing execution system (MES) can close the information gap whichexists between device control system and production information management system. The functions andthe web-based architecture of the MES in the extended enterprise are introduced. Using thecooperating system models of object-oriented and distributed agents and CORBA, all objects keep touniform interface standards and are easily inserted to object request broker. The utilization ofdistributed MES in extended enterprise can adapt fast change of manufacturing environment andresource. It also can improve the independent management capability of manufacturing cell and theenterprise response capability to global economic competition. 展开更多
关键词 Extended enterprise Manufacturing execution system Dispersed networkedmanufacturing AGENT
在线阅读 下载PDF
Material-flow Modeling Technology and Its Application in Manufacturing Execution Systems of Petrochemical Industry 被引量:4
11
作者 李备芳 刘鲁 +1 位作者 朱炜 荣冈 《Chinese Journal of Chemical Engineering》 SCIE EI CAS CSCD 2008年第1期71-78,共8页
The management and control of material flow forms the core of manufacturing execution systems (MES) in the petrochemical industry. The bottleneck in the application of MES is the ability to match the material-flow m... The management and control of material flow forms the core of manufacturing execution systems (MES) in the petrochemical industry. The bottleneck in the application of MES is the ability to match the material-flow model with the production processes. A dynamic material-flow model is proposed in this paper after an analysis of the material-flow characteristics of the production process in a petrochemical industry. The main material-flow events are described, including the movement, storage, shifting, recycling, and elimination of the materials. The spatial and temporal characters of the material-flow events are described, and the material-flow model is constructed. The dynamic material-flow model introduced herein is the basis for other subsystems in the MES. In addition, it is the subsystem with the least scale in MES. The dynamic-modeling method of material flow has been applied in the development of the SinoMES model. It helps the petrochemical plant to manage the entire flow information related to tanks and equipments from the aspects of measurement, storage, movement, and the remaining balance of the material. As a result, it matches the production process by error elimination and data reconciliation. In addition, it facilitates the integration of application modules into the MES and guarantees the potential development of SinoMES in future applications. 展开更多
关键词 manufacturing execution systems dynamic material-flow model material-flow events
在线阅读 下载PDF
Event-driven process execution model for process virtual machine 被引量:3
12
作者 WU Dong-yao WEI Jun GAO Chu-shu DOU Wen-shen 《计算机集成制造系统》 EI CSCD 北大核心 2012年第8期1675-1685,共11页
Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principle... Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM. 展开更多
关键词 business process modeling event-driven architecture process virtual machine service orchestration process execution language
在线阅读 下载PDF
Software Backdoor Analysis Based on Sensitive Flow Tracking and Concolic Execution 被引量:3
13
作者 XU Xin WANG Jiajie +2 位作者 CHENG Shaoyin ZHANG Tao JIANG Fan 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2016年第5期421-427,共7页
In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to ef... In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to effectively discover backdoor behaviors, such as stealing secret information and injecting evil data into system, with less false negatives. With concolic execution on predetermined path, the backdoor trigger condition can be extracted and analyzed to achieve high accuracy. BASEC has been implemented and experimented on several software backdoor samples widespread on the Internet, and over 90% of them can be detected. Compared with behavior-based and system-call-based detection methods, BASEC relies less on the historical sample collections, and is more effective in detecting software backdoors, especially those injected into software by modifying and recompiling source codes. 展开更多
关键词 software backdoor detection data flow tracking concolic execution malware detection
原文传递
Tension leg platform project execution 被引量:5
14
作者 Zhang Dagang Wang Chunsheng Zhang Tianyu 《Engineering Sciences》 EI 2013年第4期79-85,共7页
The first floating platform concept design work for South China Sea is undergoing in DMAR's office now. This tension leg platform has potential to become the first advanced floating production platform project. Pr... The first floating platform concept design work for South China Sea is undergoing in DMAR's office now. This tension leg platform has potential to become the first advanced floating production platform project. Project execution is always a challenge for floating system. This paper focuses on the critical elements of project execution for tension leg platform,and studies potential implications to future oil and gas exploration in South China Sea. There are many factors affecting successful execution of floating system project,including technical issues, engineering management,interface management,etc. There are also failure examples of project execution in the industry. The author has participated 28 large detailed projects and has gained extensive experience on floating projects,with ample hands-on project experiences. A detailed tension leg platform project study example and discussions in depth are presented for future project execution in China deepwater development. 展开更多
关键词 project execution deepwater project tension leg platform floating system project management
在线阅读 下载PDF
A model for mold collaborative manufacturing execution system based on Web Service 被引量:2
15
作者 赵立忠 Wang +2 位作者 Yanbin Gao Guoan 《High Technology Letters》 EI CAS 2006年第4期372-378,共7页
Mold manufacturing Extended Enterprise (EE) has the following characteristics: distributed in locality, tight cooperation and frequent information exchange. It needs a collaborative, highly efficient, reliable and ... Mold manufacturing Extended Enterprise (EE) has the following characteristics: distributed in locality, tight cooperation and frequent information exchange. It needs a collaborative, highly efficient, reliable and intelligent manufacturing management system. The background of the Collaborative Manufacturing is introduced. A mold Collaborative Manufacturing Execution System (c-MES) is proposed. The feature of Web Service platform is analyzed. The necessity and feasibility of importing the Web Service to mold c-MES are discussed. Based on Web Service, the model of mold c-MES is built. Every module' s function is described in detail, including the functions it supplies and the mechanism of information interaction among them. The feasibility of mold c-MES model is validated by a real mold manufacturing case. 展开更多
关键词 collaborative manufacturing execution system web service mold manufacturing Extended Enterprise
在线阅读 下载PDF
Reliable Estimation of Execution Time of MapReduce Program 被引量:1
16
作者 杨肖 孙建伶 《China Communications》 SCIE CSCD 2011年第6期11-18,共8页
As data volume grows, many enterprises are considering using MapReduce for its simplicity. However, how to evaluate the performance improvement before deployment is still an issue. Current researches of MapReduce perf... As data volume grows, many enterprises are considering using MapReduce for its simplicity. However, how to evaluate the performance improvement before deployment is still an issue. Current researches of MapReduce performance are mainly based on monitoring and simulation, and lack mathematical models. In this paper, we present a simple but powerful performance model for the prediction of the execution time of a MapReduce program with limited resources. We study each component of MapReduce framework, and analyze the relation between the overall performance and the number of mappers and reducers based on our model. Two typical MapReduce programs are evaluated in a small cluster with 13 nodes. Experimental results show that the mathematical performance model can estimate the execution time of MapReduce programs reliably. According to our model, number of mappers and reducers can be tuned to form a better execution pipeline and lead to better performance. The model also points out potential bottlenecks of the framework and future improvement. 展开更多
关键词 performance model MAPREDUCE execution time
在线阅读 下载PDF
SecMVX:Analysis on the Vulnerability of Multi-Variant Execution 被引量:1
17
作者 Bingzheng Li Zheng Zhang +2 位作者 Xiaomei Wang Sheng Qu Jiangxing Wu 《China Communications》 SCIE CSCD 2021年第8期85-95,共11页
As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel execution.Compared with patch-style passive defense,MVX can defend ag... As an active defenses technique,multivariant execution(MVX)can detect attacks by monitoring the consistency of heterogeneous variants with parallel execution.Compared with patch-style passive defense,MVX can defend against known and even unknown vulnerability-based attacks without relying on attack feature information.However,variants generated with software diversity technologies will introduce new vulnerabilities when they execute in parallel.First,we analyze the security of MVX theory from the perspective of formal description.Then we summarize the general forms and techniques for attacks against MVX,and analyze the new vulnerabilities arising from the combination of variant generation technologies.We propose SecMVX,a secure MVX architecture and variant generation technology.Experimental evaluations based on CVEs and SPEC 2006 benchmark show that SecMVX introduces 11.29%of the average time overhead,and avoids vulnerabilities caused by the improper combination of variant generation technologies while keeping the defensive ability of MVX. 展开更多
关键词 multi-variant execution software diversity cyberspace security
在线阅读 下载PDF
Modeling Research on Manufacturing Execution System Based on Large-scale System Cybernetics 被引量:1
18
作者 吴瑜 许晓栋 李从心 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第6期744-747,共4页
A cybernetics model of manufacturing execution system(MES CM) was proposed and studied from the viewpoint of cybernetics.Combining with the features of manufacturing system, the MES CM was modeled by"generalized ... A cybernetics model of manufacturing execution system(MES CM) was proposed and studied from the viewpoint of cybernetics.Combining with the features of manufacturing system, the MES CM was modeled by"generalized modeling"method that is discussed in large-scale system theory.The mathematical model of MES CM was constructed by the generalized operator model, and the main characteristics of MES CM were analyzed. 展开更多
关键词 CYBERNETICS manufacturing execution system large scale system
原文传递
A Worst-Case Execution Time Analysis Approach Based on Independent Paths for ARM Programs
19
作者 KONG Liangliang JIANG Jianhui 《Wuhan University Journal of Natural Sciences》 CAS 2012年第5期391-399,共9页
To overcome disadvantages of traditional worst-case execution time (WCET) analysis approaches, we propose a new WCET analysis approach based on independent paths for ARM programs. Based on the results of program flo... To overcome disadvantages of traditional worst-case execution time (WCET) analysis approaches, we propose a new WCET analysis approach based on independent paths for ARM programs. Based on the results of program flow analysis, it reduces and partitions the control flow graph of the program and obtains a directed graph. Using linear combinations of independent paths of the directed graph, a set of feasible paths can be generated that gives complete coverage in terms of the program paths considered. Their timing measurements and execution counts of program segments are derived from a limited number of measurements of an instrumented version of the program. After the timing measurement of the feasible paths are linearly expressed by the execution times of program seg-ments, a system of equations is derived as a constraint problem, from which we can obtain the execution times of program segments. By assigning the execution times of program segments to weights of edges in the directed graph, the WCET estimate can be calculated on the basis of graph-theoretical techniques. Comparing our WCET estimate with the WCET measurement obtained by the exhaustive measurement, the maximum error ratio is only 8.259 3 %. It is shown that the proposed approach is an effective way to obtain the safe and tight WCET estimate for ARM programs. 展开更多
关键词 worst-case execution time independent path realtime system least squares ARM microprocessor
原文传递
上一页 1 2 29 下一页 到第
使用帮助 返回顶部