Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems最新文献

筛选
英文 中文
Dynamic code whitelist for efficient analysis of Android code 动态代码白名单,用于有效分析Android代码
Jeongwoo Choi, Yongmin Kim, Jinwoo Lee, Jiman Hong
{"title":"Dynamic code whitelist for efficient analysis of Android code","authors":"Jeongwoo Choi, Yongmin Kim, Jinwoo Lee, Jiman Hong","doi":"10.1145/3264746.3264812","DOIUrl":"https://doi.org/10.1145/3264746.3264812","url":null,"abstract":"Recently, as the number of malicious codes targeting Android platform is increasing, various researches are conducted to analyze them. However, Android applications tend to include various 3rd-party libraries which makes difficult to accurate analysis and takes long time. In this paper, we propose a dynamic code whitelist structure that excludes unnecessary 3rd-party libraries code. By using the proposed structures, we can efficiently analyze the malicious code in Android applications.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124345588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware-accelerated cache simulation for multicore by FPGA 基于FPGA的多核硬件加速缓存仿真
Shih-Hao Hung, Yi-Mo Ho, C. Yeh, C. Liu, Chen-Pang Lee
{"title":"Hardware-accelerated cache simulation for multicore by FPGA","authors":"Shih-Hao Hung, Yi-Mo Ho, C. Yeh, C. Liu, Chen-Pang Lee","doi":"10.1145/3264746.3264766","DOIUrl":"https://doi.org/10.1145/3264746.3264766","url":null,"abstract":"Developers often use a virtual platform to develop software before the hardware is available. For software optimization, it is important to profile the cache misses of applications in a realistic operating environment under the virtual platform. In the multicore era, it is hard to simulate the coherence cache miss in a high speed way. In this paper, we propose a hardware-accelerated architecture to simulate the cache misses of a multicore system. We implement the cache miss simulator over a virtual platform with FPGA. Users can profile their software as running over the multicore system. The evaluation shows the throughput achieves 65 MB of trace log per second, when FPGA works in 100 MHz and about 570,000 logic elements are occupied to simulate 4 sets of L1 cache and 1 set of L2 cache in the multicore system with 4 virtual CPUs. The system achieves 1.6 to 2 times of speedup, when comparing with the popular cache miss simulator, Dinero IV. Dinero does less work and does not support coherence cache misses in the multicore system. The evaluation result shows high advantage to speed up the cache miss simulation of the multicore system by the hardware-accelerated architecture as well as FPGA.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126087400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep-learning based web UI automatic programming 基于深度学习的web UI自动编程
Bada Kim, Sangmin Park, Taeyeon Won, Junyoung Heo, Bongjae Kim
{"title":"Deep-learning based web UI automatic programming","authors":"Bada Kim, Sangmin Park, Taeyeon Won, Junyoung Heo, Bongjae Kim","doi":"10.1145/3264746.3264807","DOIUrl":"https://doi.org/10.1145/3264746.3264807","url":null,"abstract":"The GUI building is an important part of web application development. Various studies such as WYSWYG web editor have been conducted to make this job convenient, where the job is composed of sketching of GUI and coding of HTML/CSS from the sketch. In this paper, we propose a novel way of web GUI building with computer vision and deep-learning. The proposed method requires only a hand-drawn sketch to build GUI. It recognizes web layout using computer vision algorithm, and web widgets using Faster R-CNN. With the recognized information, it makes HTML code automatically.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127249509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Vulnerability analysis of secure USB: based on the fingerprint authentication of product B 安全USB漏洞分析:基于产品B的指纹认证
Kyungroul Lee, Byeonggeun Son, Sun-Young Lee, Kangbin Yim
{"title":"Vulnerability analysis of secure USB: based on the fingerprint authentication of product B","authors":"Kyungroul Lee, Byeonggeun Son, Sun-Young Lee, Kangbin Yim","doi":"10.1145/3264746.3264813","DOIUrl":"https://doi.org/10.1145/3264746.3264813","url":null,"abstract":"In order to improve the security of data stored in the USB memory, a secure USB has appeared on the consumer market. The secure USB protects data stored into the device by user authentication, data encryption, and access control. However, in several products, there is a problem in that the data can be stolen due to authentication bypass or key exposure. To solve this problem, a method for enhancing user authentication has been studied, and product B, which typically provides user authentication with biometric authentication, has emerged. In this paper, we analyze the vulnerability of product B that provides a biometric authentication, and we verified the possibility of bypassing the authentication and the incident of potential stealing of the data. Consequently, we consider that it will be possible to develop a more secure USB product based on counteracting analyzed vulnerability as described in this paper.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"140 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129049710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Machine learning-based colorectal cancer detection 基于机器学习的大肠癌检测
V. Blanes-Vidal, G. Baatrup, E. Nadimi
{"title":"Machine learning-based colorectal cancer detection","authors":"V. Blanes-Vidal, G. Baatrup, E. Nadimi","doi":"10.1145/3264746.3264785","DOIUrl":"https://doi.org/10.1145/3264746.3264785","url":null,"abstract":"Colorectal capsule endoscopy (CCE) is a potentially valuable patient-friendly technique for colorectal cancer screening in large populations. However, before it can be widely applied, significant research priorities need to be addressed. In this study, we present an innovative machine learning-based algorithm which can considerably improve acquisition and analysis of relevant data on colorectal polyps obtained from capsule endoscopy. The algorithm is to match CCE and colonoscopy polyps, based on objective measures of similarity between polyps. our matching algorithm is able to objectively quantify the similarity between CCE and colonoscopy polyps based on their size, morphology and location, and provides a one-to-one unequivocal match between CCE and colonoscopy polyps.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132309399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implement of mobile server based on micro-webpage for multi-lingual support menu 基于微网页的多语种支持菜单移动服务器的实现
Seoyeon Kim, Jinmang Jung, T. Son, Chang-Hyoung Ryu, Heesung Woo
{"title":"Implement of mobile server based on micro-webpage for multi-lingual support menu","authors":"Seoyeon Kim, Jinmang Jung, T. Son, Chang-Hyoung Ryu, Heesung Woo","doi":"10.1145/3264746.3264804","DOIUrl":"https://doi.org/10.1145/3264746.3264804","url":null,"abstract":"Recently, along with the increase in the number of foreign tourists around the world, various tourism services are being provided in each country, although there are difficulties in supporting multiple languages, providing real-time information, etc. In this paper, a micro-webpage-based mobile server is proposed to provide the multi-lingual support to foreign tourists. Internet connection is crucial for the conventional methods, because central servers are inter-operated. However, the proposed method supports multiple languages through Wireless Personal Area Network (WPAN). In the proposed method, a mobile client composes and shows a menu by receiving essential data in the native language from a mobile server through WPAN, such as the Wi-Fi Direct.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131849696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequence homology in circular RNA detection 环状RNA检测中的序列同源性
Mohammed Sayed, J. Hwang, J. Park
{"title":"Sequence homology in circular RNA detection","authors":"Mohammed Sayed, J. Hwang, J. Park","doi":"10.1145/3264746.3264796","DOIUrl":"https://doi.org/10.1145/3264746.3264796","url":null,"abstract":"Over the past two decades, researchers have shown an increasing interest in a special form of alternative splicing (AS) that produces a circular form of RNA distinct from the canonical linear form of RNA. Although several circular RNA detection tools have been developed, achieving both high sensitivity and high precision has been quite challenging in this area. Homologous coding sequences (exons) in the same transcript can lead to incorrect assignment of a read to a back-splicing junction instead of a linear-splicing junction, producing a source of false-positives in circular RNA detection. Although this problem has been mentioned in previous research articles, there has been no effort made to better understand the extent to which it affects sensitivity and precision. In this paper, we investigate the frequency of exon sequence homology in three different species (human, mouse and rat) and how this issue affects accurate detection of circular RNAs from high-throughput sequencing data.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123767844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Depth-of-field effect in subjective and objective evaluation of image quality 景深效应是评价图像质量的主客观因素
Tingting Zhang, H. Nefs, Hantao Liu, L. Xia, Xiaofeng Liu, Xiaoli Wu
{"title":"Depth-of-field effect in subjective and objective evaluation of image quality","authors":"Tingting Zhang, H. Nefs, Hantao Liu, L. Xia, Xiaofeng Liu, Xiaoli Wu","doi":"10.1145/3264746.3264757","DOIUrl":"https://doi.org/10.1145/3264746.3264757","url":null,"abstract":"Depth of field, as an important image feature, is always ignored when assessing the quality of photographs. The current study compared the subjective image quality evaluation with three NR image quality algorithms: BIQI, BRISQUE, and NIQE on the performance of scoring photographs with different levels of depth of field. The results showed that a large depth of field led to higher image quality in BRISQUE and depth of field did not influence the performance of the other two objective metrics and human perception. We also concluded that objective metrics such as BRISQUE, NIQE, BIQI underestimated the image quality of photographs compared with human perception.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116140587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ontology modeling for APT attack detection in an IoT-based power system 基于物联网的电力系统APT攻击检测本体建模
Gihoon Kim, Chang Choi, Junho Choi
{"title":"Ontology modeling for APT attack detection in an IoT-based power system","authors":"Gihoon Kim, Chang Choi, Junho Choi","doi":"10.1145/3264746.3264786","DOIUrl":"https://doi.org/10.1145/3264746.3264786","url":null,"abstract":"Smart grid technology is the core technology for the next-generation power grid system with enhanced energy efficiency through decision-making communication between suppliers and consumers enabled by integrating the IoT into the existing grid. This open architecture allowing bilateral information exchange makes it vulnerable to various types of cyberattack. APT attacks, one of the most common cyberattacks, are highly tricky and sophisticated attacks that can circumvent the existing detection technology and attack the targeted system after a certain latent period after intrusion. This paper proposes an ontology-based attack detection system capable of early detection of and response to APT attacks by analyzing their attacking patterns.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116473973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Android malware detection using convolutional neural networks and data section images Android恶意软件检测使用卷积神经网络和数据切片图像
Jaemin Jung, Jongmoo Choi, Seong-je Cho, Sangchul Han, Minkyu Park, Young-Sup Hwang
{"title":"Android malware detection using convolutional neural networks and data section images","authors":"Jaemin Jung, Jongmoo Choi, Seong-je Cho, Sangchul Han, Minkyu Park, Young-Sup Hwang","doi":"10.1145/3264746.3264780","DOIUrl":"https://doi.org/10.1145/3264746.3264780","url":null,"abstract":"The paper proposes a new technique to detect Android malware effectively based on converting malware binaries into images and applying machine learning techniques on those images. Existing research converts the whole executable files (e.g., DEX files in Android application package) of target apps into images and uses them for machine learning. However, the entire DEX file (consisting of header section, identifier section, data section, optional link data area, etc.) might contain noisy information for malware detection. In this paper, we convert only data sections of DEX files into grayscale images and apply machine learning on the images with Convolutional Neural Networks (CNN). By using only the data sections for 5,377 malicious and 6,249 benign apps, our technique reduces the storage capacity by 17.5% on average compared to using the whole DEX files. We apply two CNN models, Inception-v3 and Inception-ResNet-v2, which are known to be efficient in image processing, and examine the effectiveness of our technique in terms of accuracy. Experiment results show that the proposed technique achieves better accuracy with smaller storage capacity than the approach using the whole DEX files. Inception-ResNet-v2 with the stochastic gradient descent (SGD) optimization algorithm reaches 98.02% accuracy.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信