To detect user’s privacy leakage in Android software, this paper proposes an automated detection system based on dynamic taint tracking, called TaintChaser. TaintChaser can detect behaviors of user’s data leakage in Android applications under test at a fine granularity, and the system also can analyze and test massive Android software in the automatic way. It uses TaintChaser to automatically analyze 28 369 popular Android applications and finds that 24.69% of them may leak user’s privacy.
In wireless video transmission system, the length of the frame changes and the source bit rate varies during the transmission. To reduce the system delay, this paper proposes a low delay wireless cooperative video transmission system with relays. The system delay is formulated and the reason of the delay reduction is analyzed. To improve the quality of the video transmission, a relay strategy and modulation and coding scheme are introduced for the system. The simulation results demonstrate that the transmission system can effectively reduce the video transmission delay and the Bit Error Rate(BER).
In order to solve the problem that recent researches on detection of Session Initiation Protocol(SIP) flooding attacks in IP Multimedia Subsystem(IMS) can not adapt the network environment, this paper puts forward a self-adaptive detection method for SIP flooding attacks based on extended state machine. It builds the extended SIP state machine according to adding a state which described that the network is being attacked or abnormal, then adaptive adjusts the threshold through the introduction of adaptive algorithm based on Kalman filtering. Experimental results prove that this method has better detection performance than detection methods using fixed threshold, and it is more available in the real network.
Remote sensing images have large spatial sizes, and large amount of system resources are occupied during browsing. To deal with these issues, so that arbitrary times of undo and redo operations can be done, and solve problems, such as the system supported less file formats or data types and the high complexity in the conversion of file formats and data types, this paper puts forward a mechanism which selectively builds and updates the cache with multiple threads and uses the path bracket method on image display. The method of combining structure array with stack objects is adopted, and the software system development is based on Geospatial Data Abstraction Library(GDAL). Test results show that the system has good stability and robustness, especially when displaying files with larger spatial sizes in RGB mode, zooming and roaming operate flexibly and respond quickly, which meet the engineering requirements and actual needs.
Most public key encryption schemes are unsecure, if a polynomial time adversary can get ciphertexts that are dependent on the secret key. In order to defend the attacks, this paper gives an instance of the general subgroup indistinguishability assumption——elliptic curve subgroup indistinguishability assumption and a reduction algorithm. It is the first to construct a public key scheme based on elliptic curves over ring and reduce the indistinguishability of the ciphertexts to elliptic curve subgroup indistinguishability assumption. The scheme is proved secure under the assumption.
In order to implement functions of the dual quaternion strapdown inertial navigation system, it is necessary to design dual quaternion update algorithms suitable for a navigation computer to execute. The optimization design of dual quaternion update algorithms by using screw vectors as the tool is presented in this paper. The solution of a screw vector is given and the typical sculling motion is chosen as the appropriate test condition by analysis. Then, as an example, the two-sample screw vector optimization algorithm for updating dual quaternions is derived. The presented dual optimization algorithm is compared with the conventional optimization algorithm for compensating sculling errors in the performance. It is shown that the dual optimization algorithm has the absolute superiority. It not only describes rotation and translation in a unified form, but also attains the optimal precision identically when estimating two kinds of motion parameters.
Implicit flow has a major impact on the accuracy of the taint analysis. In this paper, a method for implicit flow detection is proposed, which is based on the Static Single Assignment(SSA) form of program, including detecting control dependencies relationship by generating dominate tree on control flow graph, finding re-convergence point by computing dominance frontier, acquiring values by inserting virtual function at re-convergence point in SSA, and marking the correct taint type of variables. Compared with the manual auditing results, test results show that this method can diagnose the undertainting and overtainting problem of two analysis tools, and reduce false-positive and false-negative rate of implicit flow effectively.