Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are w...Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are widely used to increase control-flow complexity.However,traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution(DSE)attacks,which can efficiently identify and eliminate them.To address this issue,this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation.Our method introduces two key techniques:single-way function opaque predicates,which leverage hash functions and logarithmic transformations to prevent constraint solvers from generating feasible inputs,and path-explosion opaque predicates,which generate an excessive number of execution paths,overwhelming symbolic execution engines.To evaluate the effectiveness of our approach,we implemented a prototype obfuscation tool and tested it against prominent symbolic execution engines.Experimental results demonstrate that our approach signifi-cantly increases resilience against symbolic execution attacks while maintaining acceptable performance overhead.This paper provides a robust and scalable obfuscation technique,contributing to the enhancement of software protection strategies in adversarial environments.展开更多
Modern compression and acceleration methods for exploring efficient deep neural networks render real-world applications more feasible.Existing approaches uniformly apply the same procedure to every input image,overloo...Modern compression and acceleration methods for exploring efficient deep neural networks render real-world applications more feasible.Existing approaches uniformly apply the same procedure to every input image,overlooking instancewise complexity variations.Moreover,owing to pruning or decomposition techniques,the upper bound of network representation capabilities might be permanently diminished.In this work,an input-dependent multiscale dynamic inference method(MSDI)is developed to strike a better balance between model performance and inference acceleration.Specifically,we modify the main body of a convolutional network to obtain a series of parameter-sharing subnetworks with varying levels of complexity.A side branch structure is then introduced to assign an input instance to a suitable subnetwork as its inference route,and we expect to accelerate the inference by assigning the easy input to the subnetwork with low capacity.We further propose multiscale distillation training to optimize the training of the modified subnetworks.Additionally,we compare the entropy-based and learning-based grading approaches,aiming to obtain a more suitable route assignment method.Experiments show that MSDI can accelerate most existing convolutional models,achieving up to 74.7%computation savings across diverse datasets.展开更多
The paper presents an dynamic execution model of complex real-time software based on requirement description model RTRSM, and then propose a checking method based on configuration covering and its corresponding algori...The paper presents an dynamic execution model of complex real-time software based on requirement description model RTRSM, and then propose a checking method based on configuration covering and its corresponding algorithm. This checking method can check the execution situations between parallel elements in a dynamic execution step of real-time software systems. It also can check all the states and transitions which assure the completeness of checking. In the end, related theorem is proofed.展开更多
基金supported byOpen Foundation of Key Laboratory of Cyberspace Security,Ministry of Education of China(No.KLCS20240211)Henan Science and Technology Major Project No.241110210100.
文摘Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks.Among various obfuscation methods,opaque predicates,which are recognized as flexible and promising,are widely used to increase control-flow complexity.However,traditional opaque predicates are increasingly vulnerable to Dynamic Symbolic Execution(DSE)attacks,which can efficiently identify and eliminate them.To address this issue,this paper proposes a novel approach for anti-DSE opaque predicates that effectively resists symbolic execution-based deobfuscation.Our method introduces two key techniques:single-way function opaque predicates,which leverage hash functions and logarithmic transformations to prevent constraint solvers from generating feasible inputs,and path-explosion opaque predicates,which generate an excessive number of execution paths,overwhelming symbolic execution engines.To evaluate the effectiveness of our approach,we implemented a prototype obfuscation tool and tested it against prominent symbolic execution engines.Experimental results demonstrate that our approach signifi-cantly increases resilience against symbolic execution attacks while maintaining acceptable performance overhead.This paper provides a robust and scalable obfuscation technique,contributing to the enhancement of software protection strategies in adversarial environments.
文摘Modern compression and acceleration methods for exploring efficient deep neural networks render real-world applications more feasible.Existing approaches uniformly apply the same procedure to every input image,overlooking instancewise complexity variations.Moreover,owing to pruning or decomposition techniques,the upper bound of network representation capabilities might be permanently diminished.In this work,an input-dependent multiscale dynamic inference method(MSDI)is developed to strike a better balance between model performance and inference acceleration.Specifically,we modify the main body of a convolutional network to obtain a series of parameter-sharing subnetworks with varying levels of complexity.A side branch structure is then introduced to assign an input instance to a suitable subnetwork as its inference route,and we expect to accelerate the inference by assigning the easy input to the subnetwork with low capacity.We further propose multiscale distillation training to optimize the training of the modified subnetworks.Additionally,we compare the entropy-based and learning-based grading approaches,aiming to obtain a more suitable route assignment method.Experiments show that MSDI can accelerate most existing convolutional models,achieving up to 74.7%computation savings across diverse datasets.
基金Supported by the Natural Science Foundation ofHubei Province (99J165)
文摘The paper presents an dynamic execution model of complex real-time software based on requirement description model RTRSM, and then propose a checking method based on configuration covering and its corresponding algorithm. This checking method can check the execution situations between parallel elements in a dynamic execution step of real-time software systems. It also can check all the states and transitions which assure the completeness of checking. In the end, related theorem is proofed.