Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,inclu...Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios.展开更多
Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajecto...Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.展开更多
Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to thei...Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center.展开更多
This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute resp...This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)Omicron EG.5.1,its descendant HV.1 as well as BA.2.86 and its descendant JN.1 subvariants in Egypt in 2024.These subvariants are well-known for their highly evolved immune-evasive properties and the manifestations include some peculiar manifestations as persistent cough besides high fever in young children as well as high fever,persistent severe cough,change of voice,loss of taste and smell,epigastric pain,nausea,vomiting,diarrhea,generalized malaise and marked bone aches in adults including the high-risk groups.It’s suggested that the ongoing SARS-CoV-2 evolution is continuing to mostly affect the high-risk groups of patients,to some of whom we’ve also successfully prescribed nitazoxanide and/or NSAIDs for post-exposure prophylaxis of all household contacts.We also continue to recommend starting the immune-modulatory antiviral Kelleni’s protocol as soon as possible in the course of infection and adjusting it in a personalized manner to be more aggressive from the beginning for the high risk patients,at least until the currently encountered surge of infections subsides.展开更多
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation...The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control.展开更多
Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-len...Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results.展开更多
“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of F...“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research.展开更多
文摘Message structure reconstruction is a critical task in protocol reverse engineering,aiming to recover protocol field structures without access to source code.It enables important applications in network security,including malware analysis and protocol fuzzing.However,existing methods suffer from inaccurate field boundary delineation and lack hierarchical relationship recovery,resulting in imprecise and incomplete reconstructions.In this paper,we propose ProRE,a novel method for reconstructing protocol field structures based on program execution slice embedding.ProRE extracts code slices from protocol parsing at runtime,converts them into embedding vectors using a data flow-sensitive assembly language model,and performs hierarchical clustering to recover complete protocol field structures.Evaluation on two datasets containing 12 protocols shows that ProRE achieves an average F1 score of 0.85 and a cophenetic correlation coefficient of 0.189,improving by 19%and 0.126%respectively over state-of-the-art methods(including BinPRE,Tupni,Netlifter,and QwQ-32B-preview),demonstrating significant superiority in both accuracy and completeness of field structure recovery.Case studies further validate the effectiveness of ProRE in practical malware analysis scenarios.
文摘Rwanda secured access to one of the world’s most lucrative agricultural markets this month when it finalised a trade protocol allowing fresh avocado exports to China,a deal that could fundamentally alter the trajectory of the country’s trade.
基金supported by the National Natural Science Foundation of China (Grant Nos.12475012,62461160263 for P.W.,and 62276171 for H.L.)Quantum Science and Technology-National Science and Technology Major Project of China (Project No.2023ZD0300600 for P.W.)+3 种基金Guangdong Provincial Quantum Science Strategic Initiative (Grant Nos.GDZX240-3009 and GDZX2303005 for P.W.)Guangdong Basic and Applied Basic Research Foundation (Grant No.2024-A1515011938 for H.L.)Shenzhen Fundamental ResearchGeneral Project (Grant No.JCYJ20240813141503005 for H.L.)the Talents Introduction Foundation of Beijing Normal University (Grant No.310432106 for P.W.)。
文摘Hyperpolarization of nuclear spins is crucial for advancing nuclear magnetic resonance and quantum information technologies,as nuclear spins typically exhibit extremely low polarization at room temperature due to their small gyromagnetic ratios.A promising approach to achieving high nuclear spin polarization is transferring the polarization of electrons to nuclear spins.The nitrogen-vacancy(NV)center in diamond has emerged as a highly effective medium for this purpose,and various hyperpolarization protocols have been developed.Among these,the pulsed polarization(PulsePol)method has been extensively studied due to its robustness against static energy shifts of the electron spin.In this work,we present a novel polarization protocol and uncover a family of magic sequences for hyperpolarizing nuclear spins,with PulsePol emerging as a special case of our general approach.Notably,we demonstrate that some of these magic sequences exhibit significantly greater robustness compared to the PulsePol protocol in the presence of finite half𝜋pulse duration of the protocol,Rabi and detuning errors.This enhanced robustness positions our protocol as a more suitable candidate for hyper-polarizing nuclear spins species with large gyromagnetic ratios and also ensures better compatibility with high-efficiency readout techniques at high magnetic fields.Additionally,the generality of our protocol allows for its direct application to other solid-state quantum systems beyond the NV center.
文摘This article discusses the evolving real-world practice using nitazoxanide,nonsteroidal anti-inflammatory drugs(NSAIDs)and/or azithromycin(Kelleni’s protocol)to manage the evolving manifestations of severe acute respiratory syndrome coronavirus 2(SARS-CoV-2)Omicron EG.5.1,its descendant HV.1 as well as BA.2.86 and its descendant JN.1 subvariants in Egypt in 2024.These subvariants are well-known for their highly evolved immune-evasive properties and the manifestations include some peculiar manifestations as persistent cough besides high fever in young children as well as high fever,persistent severe cough,change of voice,loss of taste and smell,epigastric pain,nausea,vomiting,diarrhea,generalized malaise and marked bone aches in adults including the high-risk groups.It’s suggested that the ongoing SARS-CoV-2 evolution is continuing to mostly affect the high-risk groups of patients,to some of whom we’ve also successfully prescribed nitazoxanide and/or NSAIDs for post-exposure prophylaxis of all household contacts.We also continue to recommend starting the immune-modulatory antiviral Kelleni’s protocol as soon as possible in the course of infection and adjusting it in a personalized manner to be more aggressive from the beginning for the high risk patients,at least until the currently encountered surge of infections subsides.
文摘The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control.
文摘Protocol Reverse Engineering(PRE)is of great practical importance in Internet security-related fields such as intrusion detection,vulnerability mining,and protocol fuzzing.For unknown binary protocols having fixed-length fields,and the accurate identification of field boundaries has a great impact on the subsequent analysis and final performance.Hence,this paper proposes a new protocol segmentation method based on Information-theoretic statistical analysis for binary protocols by formulating the field segmentation of unsupervised binary protocols as a probabilistic inference problem and modeling its uncertainty.Specifically,we design four related constructions between entropy changes and protocol field segmentation,introduce random variables,and construct joint probability distributions with traffic sample observations.Probabilistic inference is then performed to identify the possible protocol segmentation points.Extensive trials on nine common public and industrial control protocols show that the proposed method yields higher-quality protocol segmentation results.
基金support the findings of this study are openly available in(Scopus database)at www.scopus.com(accessed on 07 January 2025).
文摘“Flying Ad Hoc Networks(FANETs)”,which use“Unmanned Aerial Vehicles(UAVs)”,are developing as a critical mechanism for numerous applications,such as military operations and civilian services.The dynamic nature of FANETs,with high mobility,quick node migration,and frequent topology changes,presents substantial hurdles for routing protocol development.Over the preceding few years,researchers have found that machine learning gives productive solutions in routing while preserving the nature of FANET,which is topology change and high mobility.This paper reviews current research on routing protocols and Machine Learning(ML)approaches applied to FANETs,emphasizing developments between 2021 and 2023.The research uses the PRISMA approach to sift through the literature,filtering results from the SCOPUS database to find 82 relevant publications.The research study uses machine learning-based routing algorithms to beat the issues of high mobility,dynamic topologies,and intermittent connection in FANETs.When compared with conventional routing,it gives an energy-efficient and fast decision-making solution in a real-time environment,with greater fault tolerance capabilities.These protocols aim to increase routing efficiency,flexibility,and network stability using ML’s predictive and adaptive capabilities.This comprehensive review seeks to integrate existing information,offer novel integration approaches,and recommend future research topics for improving routing efficiency and flexibility in FANETs.Moreover,the study highlights emerging trends in ML integration,discusses challenges faced during the review,and discusses overcoming these hurdles in future research.