期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Research on Data Extraction and Analysis of Software Defect in IoT Communication Software
1
作者 Wenbin Bi Fang Yu +5 位作者 Ning Cao wei huo Guangsheng Cao Xiuli Han Lili Sun Russell Higgs 《Computers, Materials & Continua》 SCIE EI 2020年第11期1837-1854,共18页
Software defect feature selection has problems of feature space dimensionality reduction and large search space.This research proposes a defect prediction feature selection framework based on improved shuffled frog le... Software defect feature selection has problems of feature space dimensionality reduction and large search space.This research proposes a defect prediction feature selection framework based on improved shuffled frog leaping algorithm(ISFLA).Using the two-level structure of the framework and the improved hybrid leapfrog algorithm's own advantages,the feature values are sorted,and some features with high correlation are selected to avoid other heuristic algorithms in the defect prediction that are easy to produce local The case where the convergence rate of the optimal or parameter optimization process is relatively slow.The framework improves generalization of predictions of unknown data samples and enhances the ability to search for features related to learning tasks.At the same time,this framework further reduces the dimension of the feature space.After the contrast simulation experiment with other common defect prediction methods,we used the actual test data set to verify the framework for multiple iterations on Internet of Things(IoT)system platform.The experimental results show that the software defect prediction feature selection framework based on ISFLA is very effective in defect prediction of IoT communication software.This framework can save the testing time of IoT communication software,effectively improve the performance of software defect prediction,and ensure the software quality. 展开更多
关键词 Improved shuffled frog leaping algorithm defect prediction feature selection framework Internet of Things
下载PDF
Comparison of the serum contents of inflammatory mediators and oxidative stress mediators between patients with gram-positive bacteria and gram-negative bacteria infection
2
作者 Yu-Qing Hao Fang Chen +1 位作者 Li-Sha Jiang wei huo 《Journal of Hainan Medical University》 2017年第22期132-135,共4页
Objective: To compare the serum contents of inflammatory mediators and oxidative stress mediators between patients with gram-positive bacteria and gram-negative bacteria infection. Methods: Patients who were diagnosed... Objective: To compare the serum contents of inflammatory mediators and oxidative stress mediators between patients with gram-positive bacteria and gram-negative bacteria infection. Methods: Patients who were diagnosed with bloodstream bacterial infection in Zigong Third People's Hospital between March 2015 and April 2017 were selected as the research subjects and divided into gram-positive group and gram-negative group according to the results of blood culture and strain identification, and serum levels of inflammatory mediators PCT, IL-1β, IL-6, sTREM-1, TNF-α, NGAL, SAA, HPT and hs-CRP as well as oxidative stress mediators MDA, AOPP, TAC, CAT and SOD were determined. Results: Serum PCT, IL-1β, IL-6, sTREM-1, TNF-α, NGAL, SAA, HPT, hs-CRP, MDA and AOPP levels of gram-negative group were greatly higher than those of gram-positive group while TAC, CAT and SOD levels were greatly lower than those of gram-positive group. Conclusion: The changes of inflammatory mediators and oxidative stress mediators in the serum of patients with gram-negative bacteria infection are more significant than those of patients with gram-positive bacteria infection. 展开更多
关键词 BLOODSTREAM INFECTION GRAM-POSITIVE BACTERIA GRAM-NEGATIVE BACTERIA Inflammatory RESPONSE Oxidative stress RESPONSE
下载PDF
CHD4-induced up-regulation of ERαactivity contributes to breast cancer progression
3
作者 Aman Sattout Xiaomin Yu +5 位作者 Zhuo Sun Yanan Li Yulin Li Shujing Li wei huo Huijian Wu 《Genes & Diseases》 SCIE CSCD 2024年第3期132-135,共4页
The estrogen signaling system is a crucial regulator of metabolicandphysiologicalprocesses.However,abnormal activation of estrogen signaling may play a role in breast cancer initiation and progression.Crucial to this ... The estrogen signaling system is a crucial regulator of metabolicandphysiologicalprocesses.However,abnormal activation of estrogen signaling may play a role in breast cancer initiation and progression.Crucial to this pathway is the interaction between estrogen receptor alpha(ERa)and various co-transcription activators.1 Although numerous studies have investigated ER coregulators,the protein-protein interaction networks of ERa are not fully understood.Recent research has shown that high chromodomain helicase DNA-binding 4(CHD4)expression is linked to poor prognosis in various cancers.2,?In this study,we demonstrated that both CHD4 and ERαcontribute to breast cancer progression while providing evidence of the regulatory processes and functional interplay between these two proteins. 展开更多
关键词 BREAST CANCER ERΑ
原文传递
ELAID:detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis 被引量:1
4
作者 Lili Xu Mingjie Xu +1 位作者 Feng Li wei huo 《Cybersecurity》 CSCD 2020年第1期248-266,共19页
The Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability has been widely exploited by attackers to cause severe damages to computer systems.Automatically identifying this kind of vulnerability is critical for softw... The Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability has been widely exploited by attackers to cause severe damages to computer systems.Automatically identifying this kind of vulnerability is critical for software security.Despite many works have been done to mitigate integer overflow,existing tools either report large number of false positives or introduce unacceptable time consumption.To address this problem,in this article we present a static analysis framework.It first constructs an inter-procedural call graph and utilizes taint analysis to accurately identify potential IO2BO vulnerabilities.Then it uses a light-weight method to further filter out false positives.Specifically,it generates constraints representing the conditions under which a potential IO2BO vulnerability can be triggered,and feeds the constraints to SMT solver to decide their satisfiability.We have implemented a prototype system ELAID based on LLVM,and evaluated it on 228 programs of the NIST’s SAMATE Juliet test suite and 14 known IO2BO vulnerabilities in real world.The experiment results show that our system can effectively and efficiently detect all known IO2BO vulnerabilities. 展开更多
关键词 Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability Inter-procedural dataflow analysis Taint analysis Path satisfiability
原文传递
ELAID:detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
5
作者 Lili Xu Mingjie Xu +1 位作者 Feng Li wei huo 《Cybersecurity》 2018年第1期860-878,共19页
The Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability has been widely exploited by attackers to cause severe damages to computer systems.Automatically identifying this kind of vulnerability is critical for softw... The Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability has been widely exploited by attackers to cause severe damages to computer systems.Automatically identifying this kind of vulnerability is critical for software security.Despite many works have been done to mitigate integer overflow,existing tools either report large number of false positives or introduce unacceptable time consumption.To address this problem,in this article we present a static analysis framework.It first constructs an inter-procedural call graph and utilizes taint analysis to accurately identify potential IO2BO vulnerabilities.Then it uses a light-weight method to further filter out false positives.Specifically,it generates constraints representing the conditions under which a potential IO2BO vulnerability can be triggered,and feeds the constraints to SMT solver to decide their satisfiability.We have implemented a prototype system ELAID based on LLVM,and evaluated it on 228 programs of the NIST’s SAMATE Juliet test suite and 14 known IO2BO vulnerabilities in real world.The experiment results show that our system can effectively and efficiently detect all known IO2BO vulnerabilities. 展开更多
关键词 Integer-Overflow-to-Buffer-Overflow(IO2BO)vulnerability Inter-procedural dataflow analysis Taint analysis Path satisfiability
原文传递
隐私保护计算密码技术研究进展与应用 被引量:1
6
作者 霍炜 郁昱 +4 位作者 杨糠 郑中翔 李祥学 姚立 谢杰 《中国科学:信息科学》 CSCD 北大核心 2023年第9期1688-1733,共46页
“云、大、物、移、智、链”等新技术的发展伴生了诸多安全问题特别是隐私泄露问题.密码学为这些问题的解决提供了独特视角和可行路线.这些新技术也促进了密码学研究的深入发展,许多新型密码原语、功能强大的高等密码算法与协议新型构... “云、大、物、移、智、链”等新技术的发展伴生了诸多安全问题特别是隐私泄露问题.密码学为这些问题的解决提供了独特视角和可行路线.这些新技术也促进了密码学研究的深入发展,许多新型密码原语、功能强大的高等密码算法与协议新型构造不断涌现.本文给出了具有隐私保护计算能力的几类高等密码算法与协议的研究进展综述,特别是安全多方计算、同态加密、零知识证明、以及不可区分混淆四类算法与协议的设计和分析研究进展,也通过具体示例讨论了它们的潜在应用场景.本综述既着眼于各类算法与协议的不同层级安全属性,也侧重于从模块化角度剖析具体构造的内在技巧逻辑甚至缺陷.本文有助于读者掌握这些高等密码算法与协议的最新理论和技术进展、背后的发展逻辑,并深悟其中的关键技术原理,在密码学理论和实践的结合过程中得到有益启发. 展开更多
关键词 隐私保护 安全多方计算 同态加密 零知识证明 不可区分混淆
原文传递
NDFuzz:a non-intrusive coverage-guided fuzzing framework for virtualized network devices
7
作者 Yu Zhang Nanyu Zhong +6 位作者 wei You Yanyan Zou Kunpeng Jian Jiahuan Xu Jian Sun Baoxu Liu wei huo 《Cybersecurity》 EI CSCD 2023年第1期54-74,共21页
Network function virtualization provides programmable in-network middlewares by leveraging virtualization tech-nologies and commodity hardware and has gained popularity among all mainstream network device manufacturer... Network function virtualization provides programmable in-network middlewares by leveraging virtualization tech-nologies and commodity hardware and has gained popularity among all mainstream network device manufacturers.Yet it is challenging to apply coverage-guided fuzzing,one of the state-of-the-art vulnerability discovery approaches,to those virtualized network devices,due to inevitable integrity protection adopted by those devices.In this paper,we propose a coverage-guided fuzzing framework NDFuzz for virtualized network devices with a novel integrity protec-tion bypassing method,which is able to distinguish processes of virtualized network devices from hypervisors with a carefully designed non-intrusive page global directory inference technique.We implement NDFuzz atop of two black-box fuzzers and evaluate NDFuzz with three representative network protocols,SNMP,DHCP and NTP,on nine popular virtualized network devices.NDFuzz obtains an average 36%coverage improvement in comparison with its black-box counterparts.NDFuzz discovers 2 O-Day vulnerabilities and 11-Day vulnerability with coverage guidance while the black-box fuzzer can find only one of them.All discovered vulnerabilities are confirmed by corresponding vendors. 展开更多
关键词 Coverage-guided fuzzing Network devices Network function virtualization
原文传递
PosFuzz:augmenting greybox fuzzing with effective position distribution
8
作者 Yanyan Zou wei Zou +4 位作者 JiaCheng Zhao Nanyu Zhong Yu Zhang Ji Shi wei huo 《Cybersecurity》 EI CSCD 2023年第4期123-143,共21页
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and effectiveness.Mu... Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and effectiveness.Mutation-based greybox fuzzing generates input cases by mutating the input seed,i.e.,applying a sequence of mutation operators to randomly selected mutation positions of the seed.However,existing fruitful research work focuses on scheduling mutation operators,leaving the schedule of mutation positions as an overlooked aspect of fuzzing efficiency.This paper proposes a novel greybox fuzzing method,PosFuzz,that statistically schedules mutation positions based on their historical performance.PosFuzz makes use of a concept of effective position distribution to represent the semantics of the input and to guide the mutations.PosFuzz first utilizes Good-Turing frequency estimation to calculate an effective position distribution for each mutation operator.It then leverages two sampling methods in different mutating stages to select the positions from the distribution.We have implemented PosFuzz on top of AFL,AFLFast and MOPT,called Pos-AFL,-AFLFast and-MOPT respectively,and evaluated them on the UNIFUZZ benchmark(20 widely used open source programs)and LAVA-M dataset.The result shows that,under the same testing time budget,the Pos-AFL,-AFLFast and-MOPT outperform their counterparts in code coverage and vulnerability discovery ability.Compared with AFL,AFLFast,and MOPT,PosFuzz gets 21%more edge coverage and finds 133%more paths on average.It also triggers 275%more unique bugs on average. 展开更多
关键词 Greybox fuzzing Mutation position Mutation operator Code coverage Vulnerability discovery
原文传递
Deacetylation of TFEB promotes fibrillar Aβ degradation by upregulating lysosomal biogenesis in microglia 被引量:10
9
作者 Jintao Bao Liangjun Zheng +11 位作者 Qi Zhang Xinya Li Xuefei Zhang Zeyang Li Xue Bai Zhong Zhang wei huo Xuyang Zhao Shujiang Shang Qingsong Wang Chen Zhang Jianguo Ji 《Protein & Cell》 SCIE CAS CSCD 2016年第6期417-433,共17页
Microglia 玩在由降级的 A 的清理的一个枢轴的角色他们在 lysosomes,在 Alzheimers 疾病(广告) 阻止淀粉的匾致病。最近的证据建议那个 lysosomal 机能障碍导致有毒的蛋白质总数的不够的消除。我们测试了是否与抄写因素 EB (TFEB ) 提... Microglia 玩在由降级的 A 的清理的一个枢轴的角色他们在 lysosomes,在 Alzheimers 疾病(广告) 阻止淀粉的匾致病。最近的证据建议那个 lysosomal 机能障碍导致有毒的蛋白质总数的不够的消除。我们测试了是否与抄写因素 EB (TFEB ) 提高 lysosomal 功能,必要管理者 modulating lysosomal 小径,将在 microglia 支持一个清理。这里,我们证明 TFEB 的那 microglial 表情便于降级和还原剂扔了的纤丝状的 A (fA ) 淀粉的匾,它被 TFEB 的 deacetylation 进一步提高。用集体 spectrometry 分析,我们第一证实了是的 acetylation 一以前 TFEB 的 unreported 修正并且发现那 SIRT1 直接交往了与并且在离氨酸残余 116 点的 deacetylated TFEB。随后,当 TFEB 被击倒时, SIRT1 overexpression 由 TFEB 下游的目标的 upregulating transcriptional 层次提高了 lysosomal 功能和 fA 降级,它能被禁止。而且,在在 microglia 变异的 K116R 的 deacetylated TFEB 的 overexpression 由刺激 lysosomal 生物的续生说加速了细胞内部的 fA 降级并且极大地在 APP/PS1 转基因的老鼠的大脑片减少了扔的淀粉的匾。我们的调查结果表明 TFEB 的 deacetylation 能调整 lysosomal 生物的续生说和 fA 降级,为 attenuating 使 TFEB 的 microglial 激活成为可能的策略在广告的淀粉的匾免职。 展开更多
关键词 小胶质细胞 降解过程 生物合成 脱乙酰基 溶酶体 纤维状 淀粉样蛋白 阿尔茨海默病
原文传递
T Helper 1 and T Helper 2 Cytokines Differentially Modulate Expression of Filaggrin and its Processing Proteases in Human Keratinocytes 被引量:5
10
作者 Zheng-Hong Di Lei Ma +7 位作者 Rui-Qun Qi Xiao-Dong Sun wei huo Li Zhang Ya-Ni Lyu Yu-Xiao Hong Hong-Duo Chen Xing-Hua Gao 《Chinese Medical Journal》 SCIE CAS CSCD 2016年第3期295-303,共9页
关键词 蛋白酶抑制剂 角质形成细胞 细胞因子 助细胞 加工 调节蛋白 皮肤屏障功能 IFN-γ
原文传递
B2SMatcher:fine-Grained version identification of open-Source software in binary files 被引量:1
11
作者 Gu Ban Lili Xu +3 位作者 Yang Xiao Xinhua Li Zimu Yuan wei huo 《Cybersecurity》 EI CSCD 2021年第1期316-336,共21页
Codes of Open Source Software(OSS)are widely reused during software development nowadays.However,reusing some specific versions of OSS introduces 1-day vulnerabilities of which details are publicly available,which may... Codes of Open Source Software(OSS)are widely reused during software development nowadays.However,reusing some specific versions of OSS introduces 1-day vulnerabilities of which details are publicly available,which may be exploited and lead to serious security issues.Existing state-of-the-art OSS reuse detection work can not identify the specific versions of reused OSS well.The features they selected are not distinguishable enough for version detection and the matching scores are only based on similarity.This paper presents B2SMatcher,a fine-grained version identification tool for OSS in commercial off-the-shelf(COTS)software.We first discuss five kinds of version-sensitive code features that are trackable in both binary and source code.We categorize these features into program-level features and function-level features and propose a two-stage version identification approach based on the two levels of code features.B2SMatcher also identifies different types of OSS version reuse based on matching scores and matched feature instances.In order to extract source code features as accurately as possible,B2SMatcher innovatively uses machine learning methods to obtain the source files involved in the compilation and uses function abstraction and normalization methods to eliminate the comparison costs on redundant functions across versions.We have evaluated B2SMatcher using 6351 candidate OSS versions and 585 binaries.The result shows that B2SMatcher achieves a high precision up to 89.2%and outperforms state-of-the-art tools.Finally,we show how B2SMatcher can be used to evaluate real-world software and find some security risks in practice. 展开更多
关键词 Version Indentification Binary-to-Source Mapping Component Analytics Code Features One-Day Risks
原文传递
ESRFuzzer:an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities
12
作者 Yu Zhang wei huo +5 位作者 Kunpeng Jian Ji Shi Longquan Liu Yanyan Zou Chao Zhang Baoxu Liu 《Cybersecurity》 EI CSCD 2021年第1期364-385,共22页
SOHO(small office/home office)routers provide services for end devices to connect to the Internet,playing an important role in cyberspace.Unfortunately,security vulnerabilities pervasively exist in these routers,espec... SOHO(small office/home office)routers provide services for end devices to connect to the Internet,playing an important role in cyberspace.Unfortunately,security vulnerabilities pervasively exist in these routers,especially in the web server modules,greatly endangering end users.To discover these vulnerabilities,fuzzing web server modules of SOHO routers is the most popular solution.However,its effectiveness is limited due to the lack of input specification,lack of routers’internal running states,and lack of testing environment recovery mechanisms.Moreover,existing works for device fuzzing are more likely to detect memory corruption vulnerabilities.In this paper,we propose a solution ESRFuzzer to address these issues.It is a fully automated fuzzing framework for testing physical SOHO devices.It continuously and effectively generates test cases by leveraging two input semantic models,i.e.,KEY-VALUE data model and CONF-READ communication model,and automatically recovers the testing environment with power management.It also coordinates diversified mutation rules with multiple monitoring mechanisms to trigger multi-type vulnerabilities.With the guidance of the two semantic models,ESRFuzzer can work in two ways:general mode fuzzing and D-CONF mode fuzzing.General mode fuzzing can discover both issues which occur in the CONF and READ operation,while D-CONF mode fuzzing focus on the READ-op issues especially missed by general mode fuzzing.We ran ESRFuzzer on 10 popular routers across five vendors.In total,it discovered 136 unique issues,120 of which have been confirmed as 0-day vulnerabilities we found.As an improvement of SRFuzzer,ESRFuzzer have discovered 35 previous undiscovered READ-op issues that belong to three vulnerability types,and 23 of them have been confirmed as 0-day vulnerabilities by vendors.The experimental results show that ESRFuzzer outperforms state-of-the-art solutions in terms of types and number of vulnerabilities found. 展开更多
关键词 FUZZING IOT Automatic vulnerability detection
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部