The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we discuss the implementation of a CrOss-layer Based testbed with Analysis Tool (COmBAT). COmBAT is developed to enable the design and development process of next-generation cross-layer based wireless communication technologies for tactical ad-hoc networks. The COmBAT architecture comprises of two major components; (i) Adaptive cross-layer (AXL) framework implemented on each node in...
The article is described the Auger spectrometer automatic control system, the principle of formation of the script and the technical implementation of the control system is shown. The principle of forming a multi-bit digital code to control the scanning Auger spectrometer is described, the technical realization of the output data acquisition and post-processing system of Auger spectrometer providing...
With the rapid development of computer science and Internet technology, software security issues have become one of the main threats to information system. The technique of execution path tracking based on control flow integrity is an effective method to improve software security. However, the dynamic tracking method may incur considerable performance overhead. To address this problem, this paper...
SOAP2 is a high precision, high performance and high efficiency alignment tool which is developed by the Beijing Genomics Institute. SOAP2 has become one of the mainstream biological sequence alignment software. However, SOAP2 is developed for X86 architecture, so we port and optimize SOAP2 to Loongson platform. Firstly, we make SOAP2 to be able to run on Loongson machine correctly. Second, its speed,...
This paper aims to help to differentiate security related crashes from benign vulnerabilities, using static taint-analysis. To achieve this goal, we propose a tool named Crash Filter, which determines if a crash can be made to be exploitable or not, by analyzing ARM binary codes. We envision that the proposed analysis would help to timely fix security-critical bugs.
Security has become a very demanding parameter in today's world of speed communication. It plays an important role in the network and communication fields where cryptographic processes are involved. These processes involve hash function generation which is a one-way encryption code used for security of data. The main examples include digital signatures, MAC (message authentication codes) and in smart...
In the open hardware graphics accelerator (ORGFX), there are rectangle, line, triangle and curve rasterization modules. This paper is only focused on the improvement of line rasterization speed. Besides modifying the algorithm itself, hardware implementation and resource consumption are put into consideration here. Originally, ORGFX uses the classic Bresenham line algorithm with high precision and...
This paper investigate the analysis of power and area of Advanced Encryption Standard (AES) algorithm using different design tool like ARM based, Hardware (VHDL/Verilog) and HW/SW. Results of area and power consumption for different design are varying and the percentage improvement in the power and area is marginable.The power improvement range is between 22.5% to 90% and the area improvement range...
Software exception analysis can not only improve software stability before putting into commercial, but also could optimize the priority of patch updates subsequently. We propose a more practical software exception analysis approach based on taint analysis, from the view that whether an exception of the software can be exploited by an attacker. It first identifies the type of exceptions, then do taint...
Translation of machine code to intermediate representation is an essential part of a platform-independent obfuscator that deals with intermediate code. The paper discusses a method of assembly code analysis and its translation to three-address code. The focus is set on basic block splitting, alias analysis, value-sets analysis, and interprocedural analysis. The presented techniques are universal,...
MD5 and SHA-1 are the two known Hash Algorithms which are widely applied in information security. They are both developed from MD4. This paper introduces their algorithm logic in detail and their realization using C Language, and compares them through software testing, forms, etc. And finally, we draw a conclusion.
In modern computer architecture, memory is an indispensable medium that software and systems relies upon when running on the computer. Messages about memory access could reflect attributes of programs, which should be invaluable with decompilation and security-related fields. This paper presents a novel memory access algorithm-SEA (Static Execution Analysis) for analyzing stripped executables. In...
To efficiently solve the problem low degree of SIMD (Single Instruction Multiple Data) vectorization caused by the lower speed of memory access and the lack of vector registers in the SIMD mathematical function library, an optimizing method based on vector register data reuse is introduced aiming at relative address access mode. Furthermore, to improve the access frequency of vector registers, a novel...
Preparations for exascale computing have led to the realization that computing environments will be significantly different from those that provide petascale capabilities. This change is driven by energy constraints, which has compelled hardware architects to design systems that will require a significant re-thinking of how application algorithms are selected and implemented. The “codesign” principle...
This paper focuses on designing a 3-color LED display panel based on CPU processor. These kinds of displays are produced in two ways—linear and multilinear. Regarding the block design presented in this study, we can produce both types of said displays with ideal dimensions. The content of this paper is presented in a way that it can be used for implementation of various types and sizes of displays...
The paper describes the hardware implementation and optimization of recursive algorithms that sort data using binary trees. Since recursive calls are not directly supported by hardware description languages, they are implemented using the known model of a hierarchical finite state machine (HFSM). The paper suggests new hardware-oriented recursive algorithms, describes their implementation in hardware;...
The Multi-Protocol Multi-Band (MPMB) Software Defined Radio (SDR) devices require flexible as well as efficient physical layer (PHY) processing. We address an efficient implementation of flexible PHY for Interleaving and De-Interleaving operation through Application Specific Instruction Set Processors (ASIPs). We propose a multi-standard (802.11a, 802.16e/m) supporting Interleaver / De-Interleaver...
Code obfuscation, a tool converts a program into one that is functionally identical to the original but which is much more difficult for attacker to understand is currently the most viable technique for preventing malicious reverse engineering of software. This paper examines the use of opaque predicates as one of the building blocks of obfuscating transformations that conceal the control flow of...
As an important implementation of Cryptographic algorithm, processor should be thought about the ability of resistant power attack. In this paper we show a processor architecture, which automatically detects the execution of the encryption algorithms, and interleaves the execution of cryptographic algorithm code with that of dummy instructions to reduce the correlations between the leakage and the...
As a key part of reverse engineering, decompilation plays a very important role in software security and maintenance. Unfortunately, most existing decompilation tools suffer from the low accuracy in identifying variables, functions and composite structures, which results in poor readability. To address these limitations, we present a practical decompiler called C-Decompiler for Windows C programs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.