http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Efficient Privacy Leakage Discovery for Android Applications Based on Static Analysis
Songyang Wu,Yong Zhang,Xiong Xiong 보안공학연구지원센터 2016 International Journal of Hybrid Information Techno Vol.9 No.3
Android smart phones often carry personal sensitive information, which makes Android a tempting target for malwares. Recent studies have showed that Android applications frequently are over privileged and the risk of personal privacy leakage is very high. With known Android statics security analysis techniques in literatures, due to lack of considering the control flow between components, the static analysis of sensitive data transmission paths often costs a larger computation overheads, static analysis methods have to make a trade-off between computing time and the precision of analysis results. In this work, we propose a static analysis framework to discovery the sensitive data propagation paths and extract execution conditions (including data inputs and events inputs) of these paths. Our approach first extract a asynchronously executing events sequence graph that directly handles inter-components control flows, it then can be used to archive higher efficient taint analysis when the data propagation path asynchronously cross the boundaries of multiply components. The represented analysis results (data and events inputs) will make the analyst easier to determine if the sensitive data transmission is really a privacy leakage. We present an evaluation with a typical Android malicious app. The result of case study shows that our scheme can effectively help discover the privacy leakage behaviors in the malicious apps.
An Ant Colony based Routing Algorithm for Wireless Sensor Network
Xiaodong Liu,Songyang Li,Miao Wang 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.6
Wireless sensor network (WSN) is a new research area of computer science and technology and has a wide application future,more and more attention. It will be much market in application of military, health, home, environment, etc. In WSN, sensor devices have limited supply of energy. The sensor death due to dissipating battery energy is one of the fundamental design issues in WSNs. Hence, energy efficiency is argued to be the most important requirement for WSN. Aiming at the limitation of energy of wireless sensor network node, this paper presents a routing algorithm which is based on the ant’s capability of finding the best paths between a food source and their nests. The pheromone and the energy of the node and delay of the node were combined to affect the pheromone concentration in optimization.Simulation results show that it can balance energy consumption between nodes and prolong the lifecycle of the whole network.
Tan Long,Li Songyang,Zhao Liangyin,Wang Lulu,Zhao Xiuxiu 한국원자력학회 2023 Nuclear Engineering and Technology Vol.55 No.11
This study employs the microshear test method to examine the local mechanical properties of narrow-gap welded joints, revealing the mechanical inhomogeneity by evaluating the microshear strength, stress‒strain curves, and failure strain. On this basis, the influence of weld joints micromechanical inhomogeneity on the crack tip opening displacement (CTOD) fracture toughness is investigated. From the root weld layer to the cover weld layer, the fracture toughness at the center of the weld seam demonstrates an increasing trend, with the experimental and calculated CTOD values showing a good correspondence. The microproperties of the welded joints significantly impact the load-bearing capacity and fracture toughness. During the deformation process of the “low-matching” microregions, the plastic zone expansion is hindered by the surrounding microregion strength constraints, thus reducing the fracture toughness. In contrast, during the deformation of the “high-matching” microregions, the surrounding microregions absorb some of the loading energy, partially releasing the concentrated stress at the crack tip, which in turn increases the fracture toughness.
Neutronic design and evaluation of the solid microencapsulated fuel in LWR
Deng Qianliang,Li Songyang,Wang Dingqu,Liu Zhihong,Xie Fei,Zhao Jing,Liang Jingang,Jiang Yueyuan 한국원자력학회 2022 Nuclear Engineering and Technology Vol.54 No.8
Solid Microencapsulated Fuel (SMF) is a type of solid fuel rod design that disperses TRISO coated fuel particles directly into a kind of matrix. SMF is expected to provide improved performance because of the elimination of cladding tube and associated failure mechanisms. This study focused on the neutronics and some of the fuel cycle characteristics of SMF by using OpenMC. Two kinds of SMFs have been designed and evaluated - fuel particles dispersed into a silicon carbide matrix and fuel particles dispersed into a zirconium matrix. A 7x7 fuel assembly with increased rod diameter transformed from the standard NHR200-II 9x9 array was also introduced to increase the heavy metal inventory. A preliminary study of two kinds of burnable poisons (Erbia & Gadolinia) in two forms (BISO and QUADRISO particles) was also included. This study found that SMF requires about 12% enriched UN TRISO particles to match the cycle length of standard fuel when loaded in NHR200-II, which is about 7% for SMF with increased rod diameter. Feedback coefficients are less negative through the life of SMF than the reference. And it is estimated that the average center temperature of fuel kernel at fuel rod centerline is about 60 K below that of reference in this paper
GMPG: A Geometric Multipath Generating Method in Software-Defined Service Overlay Network
Yunchong Guan,Weimin Lei,Wei Zhang,Yuzhuo Zhan,Hao Li,Songyang Zhang 한국통신학회 2019 한국통신학회 학술대회논문집 Vol.2019 No.1
Multipath diversity (MPD) significantly impacts multipath transmission quality. Enough MPD helps improve concurrent link utilization and weaken negative impacts from a single path, thus improves abilities of congestion and failure tolerance. However, MPD is hard to guarantee on overlay networks because of little awareness of underlay network and few evaluation methods. In this paper, we design a multidimension orchestration view and propose a geometric multipath generating (GMPG) method. Overlay nodes are orchestrated in a two-dimension, i.e., intra-AS and inter-AS dimensions, view to enhance the awareness of underlay networks. Firstly, we generate coordinate-based views independently in each autonomous system. Then independent views are merged by embedding predicted switch points. The GMPG method evaluates and improves MPD from a novel perspective. Considering that MPD could be characterized by node diversity (ND), we impose some geometric mechanisms on the view to convert ND to MPD, including Transmission Direction to facilitate path convergence, Transmission Surface to reduce search complexity and Deviation Angle to evaluate link diversity. GMPG is conducted on the control plane of software-defined service overlay network both in inter-AS and intra-AS phases to establish end-to-end multiple paths. Experiments demonstrate that GMPG guarantees MPD better and the transmission quality is improved.
A pairing-free key-insulated certificate-based signature scheme with provable security
( Hu Xiong ),( Shikun Wu ),( Ji Geng ),( Emmanuel Ahene ),( Songyang Wu ),( Zhiguang Qin ) 한국인터넷정보학회 2015 KSII Transactions on Internet and Information Syst Vol.9 No.3
Certificate-based signature (CBS) combines the advantages of both public key-based signature and identity-based signature, while saving from the disadvantages of drawbacks in both PKS and IBS. The insecure deployment of CBS under the hostile circumstances usually causes the exposure of signing key to be inescapable. To resist the threat of key leakage, we present a pairing-free key insulated CBS scheme by incorporating the idea of key insulated mechanism and CBS. Our scheme eliminates the costly pairing operations and as a matter of fact outperforms the existing key insulated CBS schemes. It is more suitable for low-power devices. Furthermore, the unforgeability of our scheme has been formally proven to rest on the discrete logarithm assumption in the random oracle model.