Suggested Topics within your search.
Suggested Topics within your search.
-
41
Method of diversity software protection based on fusion compilation
Published 2020-12-01“…For the obvious characteristics and single mode of the existing common protection methods,with the help of the LLVM framework,a diversity software protection method based on fusion compilation was proposed.In the proposed method,the target software is encrypted randomly,and deeply integrated with the bunker code at the compilation level,and the encrypted target software is decrypted by memory execution technology.Then it is executed in the form of no process in memory,and the diversified protection effect of the target software is realized by the diversity of the bunker and the randomness of the fusion strategies.A number of commonly used software are selected as the test case,and the proposed method is tested from the aspects of resource cost,protection effect,comparative experiment and so on.Compared with the traditional methods such as obfuscation and packing,the proposed method has great advantages in anti-static analysis and anti-dynamic debugging,and can effectively resist the mainstream methods of reverse analyzing and cracking.…”
Get full text
Article -
42
Universal patching method for side-channel vulnerabilities based on atomic obfuscation
Published 2022-04-01“…Executing code containing side-channel vulnerabilities exhibits different non-functional behaviors related to inputs.Attackers can obtain these behaviors by leveraging micro architecture side-channel attacks and then analyze the pattern between the behaviors and the inputs to access sensitive data.Vulnerability repairing at the software layer brings low overheads to a program’s execution.Besides, it does not require modifying hardware or system, which enables fast patching and widespread deployment.It becomes the mainstream strategy applied to the current cryptographic implementations.However, existing solutions are deeply bound to the program’s implementation and requires manual intervention.This brings challenge to implement and is not versatile enough.A general patching method was proposed for side-channel vulnerabilities that combined dynamic obfuscated execution with hardware atomic transaction.To hide the real accesses of the side-channel vulnerabilities of a program, the proposed method inserted dynamic confusing accesses into the vulnerabilities.To avoid an attacker using fine-grained side-channel attack to distinguish the real access and the confusing access, both of them were encapsulated as transactions and they were guaranteed to be uninterrupted during the running period.In addition, a prototype system called SC-Patcher was implemented based on the LLVM compiler.Various optimization strategies were supported, including secure springboard and transaction aggregation, to further improve system security and performance.Experimental results show that the proposed method makes it impossible for an attacker to restore accurate sensitive data through side-channel attack, and it also brings almost no additional performance overhead to the program.…”
Get full text
Article -
43
Calculation Method for Critical Conditions of Distribution Network Considering Distributed Generation “Plug and Play”
Published 2020-04-01“…And based on the consideration of load and DG power fluctuation, a critical condition execution strategy is proposed. Furthermore, through theoretical analysis, the constraint conditions in the critical condition model are equivalently simplified, and a fast estimation method for solving the “plug and play” critical conditions of DG is obtained. …”
Get full text
Article -
44
Regularizing Data for Improving Execution Time of NLP Model
Published 2022-05-01Get full text
Article -
45
Legal regime of records management in Russian executive authorities
Published 2020-10-01“…Problems of legislative regulation of information and records management in executive authorities activity are raised.The purpose of the article is confirmation or confutation of the hypothesis that the lack of centralization of legal regulation of records management in Russian executive authorities causes problems in public governance.The methodology includes formal-legal method, systematic approach, formal-logical method, analysis, synthesis. …”
Get full text
Article -
46
CONCEPT OF THE CLOUD INFORMATION SPACE OF EXECUTIVE BODIES OF REGION
Published 2016-08-01Get full text
Article -
47
ACCOUNTING FRAUD AND CHARACTERISTICS OF COMPANY EXECUTIVES: AN EMPIRICAL INVESTIGATION
Published 2014-11-01“…This study examines accounting fraud in relation to the characteristics of company executives. The study portrays the degree to which company as well as personal motives could urge an executive to commit fraud. …”
Get full text
Article -
48
Adaptation of Executive Functions Rating Scale in Preschool Children
Published 2022-04-01“…This study aims to develop measurement instruments for executive functions (EF) in preschool children based on behavioral observation using a rating scale to identify the level of EF ability in children from an early age. …”
Get full text
Article -
49
CAN AUDIENCE REPLACE EXECUTION JUDGES IN MALE GYMNASTICS?
Published 2015-02-01“… The aim of research was to test the quality of spectator’s execution evaluation of gymnast’s performance compared to official judges. …”
Get full text
Article -
50
Fusion Execution of NaCl on Tree-Shaped MSA
Published 2018-01-01“…Fractal tree microstrip antenna utilizing NaCl execution strategy is exhibited in this paper. The fractal tree MSA provides scaling down and multiband operation. …”
Get full text
Article -
51
Impact of Asset Bubbles on Exercise of Executive Stock Options
Published 2025-05-01“…This study examines whether Chief Executive Officers (CEOs) exercise a greater proportion of their exercisable options in response to firm-specific stock price bubbles. …”
Get full text
Article -
52
The First Digital Strategy-Based Method for Training of Executive Functions: Impact on Cognition and Behavioral and Emotional Regulation, and Academic Success in Children With and Without Psychosocial Risk
Published 2025-05-01“…STap2Go is the first purely digital strategy-based method for the training of executive functions, making its evaluation relevant. …”
Get full text
Article -
53
On the study of one way to detect anomalous program execution
Published 2024-06-01“…Developing more accurate and adaptive methods for detecting malicious code is a critical challenge in the context of constantly evolving cybersecurity threats. …”
Get full text
Article -
54
Interrelationships Between Personality, Executive Function and Physical Activity
Published 2017-08-01“…Background: The purpose of this study was to examine the interrelationships between personality, executive function (EF) and physical activity. Methods: Multivariable regression analyses examined the association between personality, executive function, and physical activity. …”
Get full text
Article -
55
TREASURY EXECUTION OF LOCAL SPENDING BUDGETS: PROBLEMS AND SOLUTIONS
Published 2017-10-01“…Current problems of treasury-based execution of local spending budgets are investigated and main deregulating factors affecting the procedure of cash execution of budgets are arranged in a system.Ways to improve budget funds management at the local level are proposed including: improvement of regulatory and software support of the budget process participants; improvement of a system of information exchange between Federal Treasury authorities, budget holders and operational financial bodies; replacement and retrofitting of outdated operating systems and the technological structure of information-analytical support of the Ukrainian State Communications Committee bodies; enhancement and extension of methods for controlling budget revenues and expenditures of budget holders and recipients; improvement of the practice of keeping account of local budget operations on budget resources.…”
Get full text
Article -
56
Effectiveness of Engineering Service Organizations in Global Projects Execution
Published 2020-12-01Get full text
Article -
57
The integral visit to the family. Methodological guide for its execution
Published 2019-11-01“…<p><strong>Foundation:</strong> the comprehensive visit to the family contributes achieving the actions and the specific functions declared in the Program of the Family Doctor and Nurse in Cuba. It must be executed by basic health teams in each of the doctor's offices. …”
Get full text
Article -
58
Short playful interactions improve executive functions in children
Published 2025-07-01“…Abstract Executive Functions (EFs) are foundational for lifelong flourishing, supporting critical capacities such as planning, decision-making, and self-regulation. …”
Get full text
Article -
59
Метод оценки частоты выполнения фрагментов кода последовательной программы
Published 2010-06-01Subjects: “…execution frequency…”
Get full text
Article -
60