Visible to the public Biblio

Filters: Author is SHAO, Zhipeng  [Clear All Filters]
2022-01-10
Guan, Xiaojuan, Ma, Yuanyuan, SHAO, Zhipeng, Cao, Wantian.  2021.  Research on Key Node Method of Network Attack Graph Based on Power Information Physical System. 2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC)2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC). :48–51.
With the increasing scale of network, the scale of attack graph has been becoming larger and larger, and the number of nodes in attack graph is also increasing, which can not directly reflect the impact of nodes on the whole system. Therefore, in this paper, a method was proposed to determine the key nodes of network attack graph of power information physical system to solve the problem of uncertain emphasis of security protection of attack graph.
2020-02-17
Chen, Lu, Ma, Yuanyuan, SHAO, Zhipeng, CHEN, Mu.  2019.  Research on Mobile Application Local Denial of Service Vulnerability Detection Technology Based on Rule Matching. 2019 IEEE International Conference on Energy Internet (ICEI). :585–590.
Aiming at malicious application flooding in mobile application market, this paper proposed a method based on rule matching for mobile application local denial of service vulnerability detection. By combining the advantages of static detection and dynamic detection, static detection adopts smali abstract syntax tree as rule matching object. This static detection method has higher code coverage and better guarantees the integrity of mobile application information. The dynamic detection performs targeted hook verification on the static detection result, which improves the accuracy of the detection result and saves the test workload at the same time. This dynamic detection method has good scalability, can be upgraded with discovery and variants of the vulnerability. Through experiments, it is verified that the mobile application with this vulnerability can be accurately found in a large number of mobile applications, and the effectiveness of the system is verified.