The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author ...The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.展开更多
This paper describes and explores a maximum-entropy approach to continuous minimax problem, which is applicable in many fields, such as transportation planning and game theory. It illustrates that the maximum entropy ...This paper describes and explores a maximum-entropy approach to continuous minimax problem, which is applicable in many fields, such as transportation planning and game theory. It illustrates that the maximum entropy approcach has easy framework and proves that every accumulation of {x_k} generated by maximum-entropy programming is -optimal solution of initial continuous minimax problem. The paper also explains BFGS or TR method for it. Two numerical exam.ples for continuous minimax problem are展开更多
The secant methods discussed by Fontecilla (in 1988) are considerably revised through employing a trust region multiplier strategy and introducing a nondifferentiable merit function. In this paper the secant methods a...The secant methods discussed by Fontecilla (in 1988) are considerably revised through employing a trust region multiplier strategy and introducing a nondifferentiable merit function. In this paper the secant methods are also improved by adding a dogleg typed movement which allows to overcome a phenomena similar to the Maratos effect. Furthermore, these algorithms are analyzed and global convergence theorems as well as local superlinear convergence rate are proved.展开更多
Network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reduc...Network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reducing equipment costs and operational cost. However, virtual intrusion detection systems (VIDS) face more serious security threats due to running in a shared and virtualized environment instead of proprietary devices. Cloud service providers or malicious tenants may illegally access and tamper with the policies, packet information, and internal processing states of intrusion detection systems, thereby violating the privacy and security of tenant’s networks. To address these challenges, we use Intel Software Guard Extensions (SGX) to build a Trusted Virtual Intrusion Detection System (TVIDS). For TVIDS, to prevent cloud service providers from accessing sensitive information about the users’ network, we build a trusted execution environment for security policy, packets processing, and internal state so that cloud service providers and other malicious tenants can’t access the protected code, policy, processing states, and packets information of the intrusion detection system. We implemented TVIDS on the basis of the Snort which is a famous open-source IDS and evaluated its results on real SGX hardware.The results show that our method can protect the security of the virtual IDS and brings acceptable performance overhead.展开更多
基金the National Natural Science Foundation of China (60673071, 60743003, 90718005, 90718006)the National High Technology Research and Development Program of China (863 Program) (2006AA01Z442, 2007AA01Z411)
文摘The method of extracting and describing the intended behavior of software precisely has become one of the key points in the fields of software behavior's dynamic and trusted authentication. In this paper, the author proposes a specified measure of extracting SIBDS (software intended behaviors describing sets) statically from the binary executable using the software's API functions invoking, and also introduces the definition of the structure used to store the SIBDS in detail. Experimental results demonstrate that the extracting method and the storage structure definition offers three strong properties: (i) it can describe the software's intended behavior accurately; (ii) it demands a small storage expense; (iii) it provides strong capability to defend against mimicry attack.
基金The Project was supported by National Natural Science Foundation of china.
文摘This paper describes and explores a maximum-entropy approach to continuous minimax problem, which is applicable in many fields, such as transportation planning and game theory. It illustrates that the maximum entropy approcach has easy framework and proves that every accumulation of {x_k} generated by maximum-entropy programming is -optimal solution of initial continuous minimax problem. The paper also explains BFGS or TR method for it. Two numerical exam.ples for continuous minimax problem are
基金Supported by Science and Technology Foundation of Shanghai Higher Education
文摘The secant methods discussed by Fontecilla (in 1988) are considerably revised through employing a trust region multiplier strategy and introducing a nondifferentiable merit function. In this paper the secant methods are also improved by adding a dogleg typed movement which allows to overcome a phenomena similar to the Maratos effect. Furthermore, these algorithms are analyzed and global convergence theorems as well as local superlinear convergence rate are proved.
基金sponsored by the National Natural Science Foundation of China granted No.61872430, 61402342, 61772384the National Basic Research Program of China 973 Program granted No.2014CB340601Foundation of Science and Technology on Information Assurance Laboratory (No. KJ-17-103)
文摘Network functions such as intrusion detection systems (IDS) have been increasingly deployed as virtual network functions or outsourced to cloud service providers so as to achieve the scalability and agility, and reducing equipment costs and operational cost. However, virtual intrusion detection systems (VIDS) face more serious security threats due to running in a shared and virtualized environment instead of proprietary devices. Cloud service providers or malicious tenants may illegally access and tamper with the policies, packet information, and internal processing states of intrusion detection systems, thereby violating the privacy and security of tenant’s networks. To address these challenges, we use Intel Software Guard Extensions (SGX) to build a Trusted Virtual Intrusion Detection System (TVIDS). For TVIDS, to prevent cloud service providers from accessing sensitive information about the users’ network, we build a trusted execution environment for security policy, packets processing, and internal state so that cloud service providers and other malicious tenants can’t access the protected code, policy, processing states, and packets information of the intrusion detection system. We implemented TVIDS on the basis of the Snort which is a famous open-source IDS and evaluated its results on real SGX hardware.The results show that our method can protect the security of the virtual IDS and brings acceptable performance overhead.