Please wait a minute...


    15 September 2017, Volume 3 Issue 9
    Comprehensive Review
    Research on hardware Trojan defense
    Kan WANG,Hao CHEN,Xu-guang GUAN,Yong GU
    2017, 3(9):  1-12.  doi:10.11959/j.issn.2096-109x.2017.00197
    Asbtract ( 1585 )   HTML ( 4)   PDF (1015KB) ( 2902 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The definition and features of hardware Trojan were described firstly.After that,recent researches of defense and detection techniques were categorized with complete comparison and analysis.Then,current researches limitations were discussed based on the concepts and the trends perspectives of hardware Trojan defense and detection were proposed.

    Cloud computing forensic model
    Yuan-zhao GAO,Xue-juan LI,Bing-long LI,Xi-xi WU
    2017, 3(9):  13-23.  doi:10.11959/j.issn.2096-109x.2017.00194
    Asbtract ( 1535 )   HTML ( 3)   PDF (739KB) ( 1852 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the main challenges facing cloud forensics,cloud characteristics were analyzed and a cloud forensic model was proposed.In the model,the deployment of persistent forensic readiness service,multi-round identification strategy based on “iteration” and multi-level evidence location method for distributed file system,“data isolation” and “on-demand collection” strategies,and the establishment of comprehensive evidence analysis platform based on cloud resources were presented.Finally,the validity of the model was analyzed combining the forensic scene in the cloud environment.

    Threshold model for hot events spreading based on relative impact weight of the user
    De-yang ZHANG,Yi-liang HAN,Xiao-long LI,Feng PAN,Yi-xing ZHOU
    2017, 3(9):  24-30.  doi:10.11959/j.issn.2096-109x.2017.00195
    Asbtract ( 928 )   HTML ( 0)   PDF (682KB) ( 1937 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A new relative influence weight function was proposed in combination with the existing linear threshold model.Combining with the information itself sensitivity and the threshold characteristic of the node itself,a threshold model(URLT model) was proposed,which can measure the information communication ability.By simulating the spread of different networks,different sensitivity information and different node thresholds,and comparing the final propagation situation,the experimental results show that the final influence range is consistent with the real spread situation.Therefore,the model has some reference value for the discovery and suppression of the law of information dissemination.

    Analysis model of binary code security flaws based on structure characteristics
    Tuan XU,Lei-lei QU,Wen-chang SHI
    2017, 3(9):  31-39.  doi:10.11959/j.issn.2096-109x.2017.00200
    Asbtract ( 1088 )   HTML ( 3)   PDF (843KB) ( 2609 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the shortcomings of the existing methods to detect the security flaws that have complex structures,a new analysis model and its application method was proposed.First,analysis models based on key information of code structures extracted from path subsets of characteristic element sets that are generated by source code element sets of code security flaws were constructed.Then the analysis model according to the statistical probability of each kind of IR statement was calculated,and the IR code group which matched the feature model was found.Finally,through the translating relation between binary codes and IR codes,various code security flaws of binary program were found out.The analysis models can be applied to both common single-process binary programs and binary parallel programs.Experimental results show that compared with the existing methods,the application of the analysis model can be more comprehensive and in-depth in detecting various types of complex binary code security flaws with higher accuracy.

    Fault tolerance of balanced hypercubes
    Xin-xin ZHANG,Li XU,Li-mei LIN
    2017, 3(9):  40-46.  doi:10.11959/j.issn.2096-109x.2017.00193
    Asbtract ( 1113 )   HTML ( 2)   PDF (1036KB) ( 2308 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Fault tolerance is one of the important ways to measure the reliability of multiprocessor interconnection networks.g-restricted edge connectivity and g-restricted connectivity can ensure every remaining component is disconnected ,the number of neighbors of vertex is no less than g,which can measure the fault tolerance and reliability of multiprocessor and multichannel system more accurately.Balanced hypercubes is a variant of the hypercube,which has some specific topological properties,it can better meet the needs of the multiprocessor system and many new networks.The {1,2}-restricted edge connectivity and the {1,2}-restricted connectivity of balanced hypercubes were proposed,which could enrich the evaluation system of network fault tolerance and reliability in balanced hypercubes topology and it laid a good foundation for the fault diagnosis algorithm of balances hypercube.

    Design and implementation of proxy-protected proxy signature based on SM2
    Qing-xiao GUO,Da-wei ZHANG,Liang CHANG,Xiao-dong LIU,Jing-wen SONG
    2017, 3(9):  47-54.  doi:10.11959/j.issn.2096-109x.2017.00192
    Asbtract ( 1119 )   HTML ( 7)   PDF (597KB) ( 2722 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the SM2 digital signature standard,a proxy-protected proxy signature scheme was designed.Through the design of the agent authorization mechanism,the protection of the proxy signer was realized.The proxy signature was realized by the proxy signer who represents the original signer through the improvement of the SM2 digital signature algorithm.The security analysis shows that the designed algorithm is verifiable,identifiable,distinguishable,non-repudiation,and strong unforgeability.Finally,the program was implemented using the C language and the Polarssl library,and the performance was compared with the SM2 digital signature.The analysis shows that the algorithm has good usability in performance.

    Human action recognition based on back propagation neural network
    Jian ZOU
    2017, 3(9):  55-60.  doi:10.11959/j.issn.2096-109x.2017.00196
    Asbtract ( 1203 )   HTML ( 6)   PDF (765KB) ( 2241 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For human action recognition,an algorithm for classifying human action based on back propagation (BP) neural network was proposed.Firstly,singular value decomposition (SVD) was used to extract the singular value of each frame of the video.Then each row of a matrix was composed of the singular value of each video.Every single row of the matrix is a sample of human action.Secondly,the principle component analysis (PCA) algorithm was proposed to remove correlation and reduce dimension.Then the linear discriminant analysis (LDA) algorithm was applied to matrix processed by PCA to make samples linearly separable.Finally,the back propagation neural network was used as a classifier.The experimental results show that the proposed method,compared with nearest neighbor classifier and K-nearest neighbor (kNN) classifier,has a higher recognition rate.

    Practice and exploration of network information security course teaching innovation based on mobile learning and inverted classroom depth integration
    Xin-min FAN
    2017, 3(9):  61-66.  doi:10.11959/j.issn.2096-109x.2017.00198
    Asbtract ( 871 )   HTML ( 3)   PDF (485KB) ( 2035 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Mobile learning,MOOC,flip classroom,mixed learning and a series of new ideas are gradually integrated into the teaching reform of higher education.Based on the long-term development of network education and non-academic distance training experience,mobile learning and MOOC concept were integrated into the traditional network teaching mode.In the network information,the reform and innovation of deep integration between information technology and traditional classroom teaching were researched.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:YI Dong-shan
Address:F8,You Dian Publisher Building,No.11,Chengshousi Road,Fengtai District,Beijing 100078,PR China
Tel:+8610-81055479, 81055456
ISSN 2096-109X
CN 10-1366/TP
Total visitors:
Visitors of today:
Now online: