Loading...
首页
期刊介绍
期刊订阅
联系我们
快速检索
引用检索
图表检索
高级检索
最新录用
|
预出版
|
当期目录
|
过刊浏览
|
阅读排行
|
下载排行
|
引用排行
|
百年期刊
ISSN 1000-0585
CN 11-1848/P
Started in 1982
About the Journal
»
About Journal
»
Editorial Board
»
Indexed in
»
Rewarded
Authors
»
Online Submission
»
Guidelines for Authors
»
Templates
»
Copyright Agreement
Reviewers
»
Guidelines for Reviewers
»
Online Peer Review
Office
»
Editor-in-chief
»
Office Work
»
Production Centre
Table of Content
, Volume 56 Issue 1
Previous Issue
Next Issue
For Selected:
View Abstracts
Download Citations
EndNote
Reference Manager
ProCite
BibTeX
RefWorks
Toggle Thumbnails
INFORMATION SECURITY
Select
Design and implementation of a side-channel resistant and low power RSA processor
REN Yanting, WU Liji, LI Xiangyu, WANG An, ZHANG Xiangmin
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 1-6. DOI: 10.16511/j.cnki.qhdxxb.2016.23.012
Abstract
PDF
(1106KB) (
1350
)
RSA is the most widely used public-key algorithm, and is specified as the signature algorithm in bank IC cards. The unprotected RSA implementation is vulnerable to side-channel attacks as pointed out in several works. Due to the complexity of the algorithm, the power consumption of an RSA module is usually high. A side-channel resistant, efficient and low-power RSA processor was designed using countermeasures against side-channel attacks based on the Montgomery ladder with a modified Montgomery algorithm then proposed, which combines CIOS and Karatsuba algorithms. The computation time of modular multiplication can be reduced by 25% with the length of RSA being configurable and up to 2 048 bits. The proposed RSA module was verified with C*Core C0 in FPGA board. With SMIC 0.13 μm CMOS process, the EDA synthesis result indicates that the area is about 24 000 gates, and the throughput of 1024-bit RSA is 8.3 kb/s under the frequency of 30 MHz with the power consumption of 1.15 mW.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Research of taint-analysis based API in-memory fuzzing tests
CUI Baojiang, WANG Fuwei, GUO Tao, LIU Benjin
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 7-13. DOI: 10.16511/j.cnki.qhdxxb.2016.23.011
Abstract
PDF
(1185KB) (
1376
)
Fuzzing testing is widely utilized as an automatic solution to discover vulnerabilities in file-processing binary programs. Restricted by the high blindness and low code path coverage, fuzzing tests normally work quite inefficiently. An API in-memory fuzzing testing technique was developed to eliminate the blindness. The technique employs dynamic taint analysis to locate the routines and instructions which belong to the target binary executables and involve the input data parsing and processing. Within the testing phase, binary instrumentation was used to construct circulations around such routines, where the contained taint memory values were mutated in each loop. According to the experiments on the prototype tool, this technique can effectively detect defects such as stack overflows. The results also show that the API in-memory fuzzing testing eliminates the bottleneck of interrupting execution paths while gaining an over 95% enhancement of the execution speed in comparison with traditional fuzzing tools.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Scenario fingerprint of an industrial control system and abnormally detection
PENG Yong, XIANG Chong, ZHANG Miao, CHEN Dongqing, GAO Haihui, XIE Feng, DAI Zhonghua
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 14-21. DOI: 10.16511/j.cnki.qhdxxb.2016.23.013
Abstract
PDF
(2386KB) (
1750
)
Industrial control systems (ICSs) are cyber-physical systems (CPSs) which supervise and control physical processes in critical infrastructure industries such as electric power, water treatment, oil & natural gas exploration, transportation, and chemical industry. Based on the observation of ICS'stable and persistent communication data flow control patterns, a concept and a methodology of ICS scenario fingerprinting were proposed which analyze industrial control protocol interactive behavior to represent ICS system-level normal behavior characteristics. ICS scenario fingerprint can identify unique ICS installation, while being used as a more generalized method to establish ICS systems'behavior benchmark and further being used to identify ICS systems'abnormal behavior. Experiments were made to validate the proposed viewpoint, which use real equipment for ICS cyber domain and use simulation for ICS physical domain. Experimental results demonstrate that ICS scenario fingerprinting technique provides ICS security research with a promising method.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Unpredictability of a kind of combined linear congruential generator
HUANG Xiaoli, SHI Hongsong, ZHANG Chongbin, YANG Yongsheng, ZHU Kelei
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 22-27. DOI: 10.16511/j.cnki.qhdxxb.2016.23.003
Abstract
PDF
(965KB) (
755
)
The linear congruential generator (LCG) is a kind of widely used random number generator. Several generators can be combined as combined linear congruential generators (CLCG) to compensate LCG's shortages. Unpredictability is an important index of measuring the security of sequences, which is indispensable in some applications. Unpredictability of some kind of CLCG was studied using the algebraic method to evaluate the unpredictability of the CLCG, with data complexity and time complexity of predicting the CLCG being given. Five CLCGs from three important references were analyzed as examples, which presents the analytic results of predicting the five CLCGs. The results show that the CLCGs are predictable under some recommended parameters, while these CLCGs are unsuitable for cryptographic applications.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Approach ofgenerating vulnerability signature based on taint analysis and symbolic execution
XIN Wei, SHI Zhiwei, HAO Yongle, DONG Guowei
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 28-34. DOI: 10.16511/j.cnki.qhdxxb.2016.23.006
Abstract
PDF
(1152KB) (
1029
)
A vulnerability signature matches a set of inputs which trigger software vulnerability. Application of vulnerability signature to input filtering is one of the most popular and effective defense mechanisms for protecting vulnerable programs against exploits. A method for generating vulnerability signature was developed using taint analysis and symbolic execution. The method locates bytes in input that direct execution to vulnerable points using taint analysis. Path constraints are generated via dynamic symbolic execution with the final vulnerability signature obtained through constraint solving.A proof-of-concept system, TASEVS, was implemented based on instrumentation tool Pin and constraint solver Z3. Experimental results show that the TASEVS can effectively generate vulnerability signature.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Detriment evaluation method for application security incidents based on service correlation
LV Yanli, LI Yuanlong, XIANG Shuang, XIA Chunhe
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 35-41. DOI: 10.16511/j.cnki.qhdxxb.2016.23.004
Abstract
PDF
(1226KB) (
645
)
Detriment evaluation is the foundation of risk management and defense strategy adjustment. More and more security incidents which target services occur in the application layer and cause great harm to the system and data. This paper analyzes the correlations between services, including interface correlation, application correlation and statistics correlation to evaluate the detriment caused by the incidents mentioned above, with a quantitative evaluation method then proposed. In this method, indirect detriment caused by security incidents is calculated based on network layers to obtain the comprehensive detriments so that administrators have an overall view of the detriments and enhance the protection to the services having significant influence to the network and other services based on the severity and spread path of detriments. This method also helps administrators to prioritize treatment to incidents and prevent the security situation from getting worse. The method has been implemented and verified in experimental environment with its effectiveness and feasibility being approved.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Analysis of a method for attacking WTBlink layers in a train communication network
WAN Hai, SUN Lei, WANG Tian, HUANG Jin, ZHAO Xibin
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 42-50. DOI: 10.16511/j.cnki.qhdxxb.2016.23.010
Abstract
PDF
(1749KB) (
959
)
Train communication network (TCN) is a specialized industrial control network, whose safety and security problems are of great importance. The wire train bus (WTB) is one of the link layer communication modules of TCN architectures. A potential risk and a possible attack method were found based on the analysis of WTB communication protocol. Formal modeling verification and experiments show that the attack method is feasible. Based on the characteristics of the attack method, this paper also proposes a precautionary method.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Method for sensitive data protection of web servers in the cloud
HAN Xinhui, WANG Dongqi, CHEN Zhaofeng, ZHANG Huilin
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 51-57,65. DOI: 10.16511/j.cnki.qhdxxb.2016.23.007
Abstract
PDF
(1762KB) (
968
)
A sensitive data protection method (SDPM) for web servers in the cloud was proposed to prevent sensitive data leakage from the compromised web servers, which utilizes the features of virtualization and combines the concepts of data encryption and execution isolation. By predetermining and fixing a small amount of application codes that will compute over sensitive data, and by encrypting sensitive data before these data are available to the rest of untrusted codes, the SDPM provides strong defense against all malicious codes that an attacker may run in the server software stack. The SDPM was implemented based on the kernel of Xen Hypervisor and PHP. The results show that the amount of sensitive codes is small with a percentage of less than 2% and the overhead of protecting sensitive data is moderate with a percentage of less than 40% according to six popular web applications in this paper.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Defense of P2P live video systems facing Eclipse-delay attack
HAN Xinhui, LI Chen, XIAO Xiangquan, LIU Bingshuang, YE Jiayi
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 58-65. DOI: 10.16511/j.cnki.qhdxxb.2016.23.008
Abstract
PDF
(1275KB) (
861
)
P2P live video systems are widely used in today's Internet. Compared with eMule/BitTorrent and other traditional P2P file-sharing systems, a P2P live video system has higher requirements on real-time data, which becomes vulnerable weakness. Delay attack, with strong concealment, is potentially lethal for large P2P video broadcasting systems. Theoretical security threats of popular P2P live video systems were analyzed to propose three types of delay attack based on Eclipse attack, No-Offer attack, Delay-Chunk attack, and No-Chunk attack, with a high-availability defense strategy against delay attack being developed. Experiments were made on PlanetLab based on PeerStreamer, which proves the impact of delay attack and the effectiveness of the developed defense strategy.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Risk assessment expert system for the complex system
MA Gang, DU Yuge, YANG Xi, ZHANG Bo, SHI Zhongzhi
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 66-76,82. DOI: 10.16511/j.cnki.qhdxxb.2016.23.005
Abstract
PDF
(2534KB) (
622
)
A set of simple and convenient risk assessment expert system with knowledge was developed based on the existing risk assessment algorithms and the object-oriented knowledge processing system to assess the security risk of complex systems. The risk assessment results for a typical complex system prove that the developed expert system can be used to collect the information and assess security risk for the complex system, while guiding the risk assessment analyzer to make a reasonable security protection strategy for assets in the complex system, which is more objective and more accurate compared with the traditional expert artificial analysis.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Detecting Android malware phishing login interface based on SURF algorithm
XU Qiang, LIANG Bin, YOU Wei, SHI Wenchang
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 77-82. DOI: 10.16511/j.cnki.qhdxxb.2016.23.009
Abstract
PDF
(1925KB) (
684
)
A detection method was developed based on computer vision technology to deal with the malicious application that makes phishing attacks through faking the login interface of the target application. The method detects malicious applications containing phishing login interfaces by measuring the similarities between the current login interface and the target application login interface using the SURF algorithm. A prototype system was implemented on the Android platform to detect phishing login interfaces. The experimental results indicate that the proposed detection method can effectively identify phishing login interfaces.
Figures and Tables
|
References
|
Related Articles
|
Metrics
Select
Data integrity check based on null space for network coding based cloud storage
WANG Weiping, ZHANG Junfeng, WANG Jianxin
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 83-88,96. DOI: 10.16511/j.cnki.qhdxxb.2016.23.002
Abstract
PDF
(1589KB) (
502
)
The process of data integrity check for network coding based cloud storage has problems of poor safety and large computational overhead. A scheme of data integrity check was developed based on null space for network coding based cloud storage (NS-NCCS) to solve these problems. In the scheme, the null space of original information is calculated and used to generate the integrity verification vector which is then sent to an independent third-party verification node for data integrity validation. Analyses and simulations show that compared with NC-Audit, NS-NCCS significantly decreases the omission factor during the data integrity checking and effectively prevents the original information disclosure in the process of verification, with the computational overhead reduced and data repair supported.
Figures and Tables
|
References
|
Related Articles
|
Metrics
CONSTRUCTION MANAGEMENT
Select
Influence of air pollution on urban residents' outdoor activity: Empirical study based on dining-out data from the Dianping website
ZHENG Siqi, ZHANG Xiaonan, SONG Zhida, SUN Cong
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 89-96. DOI: 10.16511/j.cnki.qhdxxb.2016.23.018
Abstract
PDF
(1036KB) (
1354
)
Air pollution has become an important element affecting the urban life quality in China, which not only directly affects health and life expectancy, but also affects working efficiency, mood, outdoor activity frequency, trip for consumption and social interaction, further reducing the economic vitality and social vitality of cities. Taking Beijing as a case, this paper works on how air pollution affects residents' dining out frequency and satisfaction based on the reviews from dianping.com and the PM2.5 concentration data released by the Ministry of Environmental Protection. The results show that by controlling other factors, air pollution can reduce dining-out frequency and satisfaction of residents. The quantitative results present the willingness intensity of urban residents to circumvent air pollution and contribute to an accurate assessment of to which degree socio-economic activities and resident life quality will be affected by air pollution increase.
Figures and Tables
|
References
|
Related Articles
|
Metrics
ENGINEERING PHYSICS
Select
Simulation of strategies for large-scale spread containment of infectious diseases
NI Shunjiang, WENG Wenguo, ZHANG Hui
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 97-101. DOI: 10.16511/j.cnki.qhdxxb.2016.23.014
Abstract
PDF
(1312KB) (
781
)
This paper investigates the inhibitory effects of four typical containment strategies, including quarantine, contact tracing, antiviral prophylaxis and vaccination, on the transmission process of infectious diseases. A large-scale individual-based simulation model for the spread of infectious diseases was built based on the complex network theory, with the containment strategies mentioned above then introduced into the model by quantifying the model parameters to rebuild an epidemic model. Simulation results show that these containment strategies can effectively inhibit the spread of infectious diseases, with the implementation cost significantly reduced through optimal combination of the containment strategies. The results can generate insights into scientific decision-making in the prevention and control of infectious disease spread for the public health sector.
Figures and Tables
|
References
|
Related Articles
|
Metrics
CHEMICAL ENGINEERING
Select
Effects of openings and nozzles on the load-carrying capability of a horizontal tank
SUN Hongmei, ZHAO Fei, ZHANG Yaxin
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 102-105. DOI: 10.16511/j.cnki.qhdxxb.2016.23.015
Abstract
PDF
(1055KB) (
752
)
Openings and nozzles in a pressure vessel may affect the load-carrying capability of the vessel. Finite element method was used to analyze the critical load of a horizontal vessel with a nozzle under external pressure loading and the limit load under internal pressure loading, with the effects of openings and nozzles with different sizes and thicknesses on the load-carrying capability of the horizontal tank being specially investigated. The results show that the critical load showing the vessel instability almost keeps constant when a nozzle is present at an opening, but that the limit load reflecting the vessel strength obviously decreases. For the same nozzle thickness, with increasing nozzle diameter, the limit load of the vessel remarkably decreases, with the critical load under the external pressure keeping constant. For the same nozzle diameter, the limit load of the vessel significantly increases with increasing nozzle thickness, with the external pressure increase being very limited.
Figures and Tables
|
References
|
Related Articles
|
Metrics
COMPUTER SCIENCE AND TECHNOLOGY
Select
Global asymptotically stable control for spacecraft docking
WEI Wei, ZUO Min, SU Tingli, DU Junping
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 106-110. DOI: 10.16511/j.cnki.qhdxxb.2016.23.016
Abstract
PDF
(1032KB) (
866
)
Spacecraft docking with electromagnetic mechanism has obvious advantages over traditional docking methods, such as no propellant consuming, no plume contamination or docking impact. A dynamic model for electromagnetic docking was employed based on the far-field electromagnetic force model and Hill's model. High nonlinearity, uncertainty and coupling make docking control a challenging work. A transformation was utilized to linearize the nonlinear docking model with a control approach based on Lyapunov function designed for spacecraft docking. Sufficient conditions were obtained for global asymptotical stability with simulations being performed. Both theoretical and numerical results support the proposed control approach.
Figures and Tables
|
References
|
Related Articles
|
Metrics
ELECTRONIC ENGINEERING
Select
Research on periodical opening of small base-stations for energy conservation
CAI Shijie, XIAO Limin, WANG Jing, ZHOU Shidong
Journal of Tsinghua University(Science and Technology). 2016,
56
(1): 111-116. DOI: 10.16511/j.cnki.qhdxxb.2016.23.017
Abstract
PDF
(1172KB) (
592
)
The development of wireless traffic toward high data rates and high dynamism has brought great challenges to traditional cellular networks. Heterogeneous networks with small base-station sleeping are an effective solution to this problem, which balances service quality and network energy consumption. The scheduling of small base-stations should be based on the status information about the channel between users and small base-stations. However, once the small base-stations are turned off, they switch to the sleeping mode, thus the system is unable to obtain the aforementioned information. To solve this problem, this paper presents a periodical opening mechanism for small base-stations: the system periodically opens the small base-stations to obtain channel information between the users and the small base-stations; once the users send an access request via the macro base-stations, the system makes the correspondent decision on the basis of the channel information obtained when the small base-stations were open at the last time. The design of the opening cycle is a key factor influencing the effect of this mechanism. This paper divides the total energy consumption of the network into two parts, the energy consumption for periodical opening of small base-stations and the energy consumption for user service, and works out an optimal cycle design solution balancing the two parts and minimizing the total energy consumption.
Figures and Tables
|
References
|
Related Articles
|
Metrics
News
More
»
aaa
2024-12-26
»
2023年度优秀论文、优秀审稿人、优秀组稿人评选结果
2023-12-12
»
2022年度优秀论文、优秀审稿人、优秀组稿人评选结果
2022-12-20
»
2020年度优秀论文、优秀审稿人评选结果
2021-12-01
»
aa
2020-11-03
»
2020年度优秀论文、优秀审稿人评选结果
2020-10-28
»
第十六届“清华大学—横山亮次优秀论文奖”暨2019年度“清华之友—日立化成学术交流奖”颁奖仪式
2020-01-17
»
a
2019-01-09
»
a
2018-12-28
»
a
2018-01-19
Links
More
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd