Article Directory
Preface
Source: Professor Li Xiaohong, Associate Dean of the School of Cyber Security, Faculty of Intelligence and Computing, Tianjin University
The content is divided into software network security, mobile network security, and web security
1. Automatic cycle analysis technology based on path dependence
Use path-dependent automata to represent the relationship between the various paths of the program.
1) Integer loop summary
2) String loop summary
3) Termination analysis
key word: disjunctive, conjunctive, increase and decrease analysis, rank function
Core: do increase and decrease analysis
, each path in the control flow graph is regarded as a state
2. Man-in-the-middle attack defense strategy based on security game theory
1. Instrumentation
2. Hanging code
Problem: data imbalance
3. Mobile application malicious behavior detection technology based on small sample learning
Training based on twin network
Thank you very much Professor Li Xiaohong for sharing!