Research on Key Technologies of Cyberspace Security


Preface

Source: Professor Li Xiaohong, Associate Dean of the School of Cyber ​​Security, Faculty of Intelligence and Computing, Tianjin University


The content is divided into software network security, mobile network security, and web security

1. Automatic cycle analysis technology based on path dependence

Use path-dependent automata to represent the relationship between the various paths of the program.
1) Integer loop summary
2) String loop summary
3) Termination analysis

key word: disjunctive, conjunctive, increase and decrease analysis, rank function
Core: do increase and decrease analysis
, each path in the control flow graph is regarded as a state

2. Man-in-the-middle attack defense strategy based on security game theory

1. Instrumentation

2. Hanging code

Problem: data imbalance

3. Mobile application malicious behavior detection technology based on small sample learning

Training based on twin network

Thank you very much Professor Li Xiaohong for sharing!

Guess you like

Origin blog.csdn.net/Cirtus/article/details/108668438