Current IssuePrevious Issue   Next Issue

Volume 22 No. 5
26 September 2017

Rui Chang,Liehui Jiang,Wenzhi Chen,Yaobin Xie,Zhongyong Lu

2017, 22(5): 447-457.   doi:10.23919/TST.2017.8030534
Abstract ( 247 HTML ( 26   PDF(3289KB) ( 357 )   Save

The run-time security guarantee is a hotspot in current cyberspace security research, especially on embedded terminals, such as smart hardware as well as wearable and mobile devices. Typically, these devices use universal hardware and software to connect with public networks via the Internet, and are probably open to security threats from Trojan viruses and other malware. As a result, the security of sensitive personal data is threatened and economic interests in the industry are compromised....

Rui Ma,Shuaimin Ren,Ke Ma,Changzhen Hu,Jingfeng Xue

2017, 22(5): 458-468.   doi:10.23919/TST.2017.8030535
Abstract ( 377 HTML ( 13   PDF(2519KB) ( 268 )   Save

Network protocols are divided into stateless and stateful. Stateful network protocols have complex communication interactions and state transitions. However, the existing network protocol fuzzing does not support state transitions very well. This paper focuses on this issue and proposes the Semi-valid Fuzzing for the Stateful Network Protocol (SFSNP). The SFSNP analyzes protocol interactions and builds an extended finite state machine with a path marker for the network protocol; then it obtai...

Xin Jin,Xingshu Chen,Cheng Zhao,Dandan Zhao

2017, 22(5): 469-478.   doi:10.23919/TST.2017.8030536
Abstract ( 406 HTML ( 6   PDF(2310KB) ( 433 )   Save

Trusted attestation is the main obstruction preventing large-scale promotion of cloud computing. How to extend a trusted relationship from a single physical node to an Infrastructure-as-a-Service (IaaS) platform is a problem that must be solved. The IaaS platform provides the Virtual Machine (VM), and the Trusted VM, equipped with a virtual Trusted Platform Module (vTPM), is the foundation of the trusted IaaS platform. We propose a multi-dimensional trusted attestation architecture that can c...

Aijuan Zhang,Cheng Ji,Yu Bao,Xin Li

2017, 22(5): 478-488.   doi:10.23919/TST.2017.8030537
Abstract ( 232 HTML ( 1   PDF(3975KB) ( 236 )   Save

In this paper, we propose a Multi-granularity Spatial Access Control (MSAC) model, in which multi-granularity spatial objects introduce more types of policy rule conflicts than single-granularity objects do. To analyze and detect these conflicts, we first analyze the conflict types with respect to the relationship among the policy rules, and then formalize the conflicts by template matrices. We designed a model-checking algorithm to detect potential conflicts by establishing formalized matric...

Ke Niu,Xiaoyuan Yang,Yingnan Zhang

2017, 22(5): 489-498.   doi:10.23919/TST.2017.8030538
Abstract ( 290 HTML ( 2   PDF(1298KB) ( 231 )   Save

A novel reversible data hiding algorithm for H.264/AVC videos is proposed. Histogram Shifting (HS) of motion vector values is used efficiently in reversible data hiding to embed data. By designating a specific decoded reference frame, the distortion accumulation effects due to modification of the motion vectors is overcome. All the extracted information can be recovered without loss of the original compressed video carrier. The experimental results show that the proposed algorithm is simple, ...

Chao Wang,Feng Hu,Huanguo Zhang,Jie Wu

2017, 22(5): 499-510.   doi:10.23919/TST.2017.8030539
Abstract ( 271 HTML ( 5   PDF(8513KB) ( 80 )   Save

Ant Colony Optimization (ACO) has the character of positive feedback, distributed searching, and greedy searching. It is applicable to optimization grouping problems. Traditional cryptographic research is mainly based on pure mathematical methods which have complicated theories and algorithm. It seems that there is no relationship between cryptography and ACO. Actually, some problems in cryptography are due to optimization grouping problems that could be improved using an evolutionary algorit...

Feng Hu,Chao Wang,Huanguo Zhang,Jie Wu

2017, 22(5): 511-519.   doi:10.23919/TST.2017.8030540
Abstract ( 198 HTML ( 4   PDF(1788KB) ( 238 )   Save

How to quickly compute the number of points on an Elliptic Curve (EC) has been a longstanding challenge. The computational complexity of the algorithm usually employed makes it highly inefficient. Unlike the general EC, a simple method called the Weil theorem can be used to compute the order of an EC characterized by a small prime number, such as the Kobltiz EC characterized by two. The fifteen secure ECs recommended by the National Institute of Standards and Technology (NIST) Digital Signatu...

Dengao Li,Jinqiang Liu,Jumin Zhao,Gang Wu,Xiaofang Zhao

2017, 22(5): 520-528.   doi:10.23919/TST.2017.8030541
Abstract ( 280 HTML ( 2   PDF(4626KB) ( 342 )   Save

In wireless communication, the space-time anti-jamming method is widely applied because it shows better performance than the pure airspace and pure temporal anti-jamming methods. However, its application is limited by its computational complexity, and it cannot suppress narrowband interference that is in the same direction as the navigation signal. To solve these problems, we propose improved frequency filter to filter the narrowband interference from the desired signal direction in advance, ...

Li Wang,Yueting Chai,Yi Liu

2017, 22(5): 529-538.   doi:10.23919/TST.2017.8030542
Abstract ( 272 HTML ( 6   PDF(6722KB) ( 213 )   Save

The specialized production of e-commerce transaction systems is an important research topic, which is of great significance for evaluating the development level and forecasting the development direction of e-commerce. However, there is a certain disparity between the current mainstream research model and reality, which leads to a deviated result. This paper puts forward a definition of “transaction efficiency” based on essential transaction services and establishes a model of the middleman’s ...

Jishiyu Ding,Shuo Feng,Li Li,Yi Zhang

2017, 22(5): 539-550.   doi:10.23919/TST.2017.8030543
Abstract ( 297 HTML ( 10   PDF(5696KB) ( 308 )   Save

A campus bus network design and evaluation, taking Tsinghua University as an example, is investigated in this paper. To minimize the total cost for both passengers and operator, the campus bus system planning in a sequential approach is discussed, including the route network design, headway (i.e., the inverse of service frequency) optimization, and system evaluation. The improved genetic algorithm is proposed to optimize the route network based on the route property, and the impacts of the fl...