Unlock instant, AI-driven research and patent intelligence for your innovation.

Heterogeneous compiling algorithm feasibility evaluation method and system

A compiling algorithm and feasible technology, applied in the field of network security, can solve the problems of not considering the impact of software running performance, changing structural characteristics, increasing the probability of attackers' reverse success, etc.

Active Publication Date: 2020-07-28
郑州昂视信息科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, as a way to realize software diversity, the diversification compilation algorithm’s main purpose is to change the structural characteristics of the software itself as much as possible to increase the probability of an attacker’s reverse success. Impact

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Heterogeneous compiling algorithm feasibility evaluation method and system
  • Heterogeneous compiling algorithm feasibility evaluation method and system
  • Heterogeneous compiling algorithm feasibility evaluation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0052] Such as figure 1 As shown, it is a method flowchart of Embodiment 1 of a heterogeneous compilation algorithm feasibility evaluation method disclosed in the present invention, and the method may include the following steps:

[0053] S101. Determine heterogeneity of heterogeneous server software;

[0054] When evaluating the feasibility of heterogeneous compilation algorithms, first quantify the heterogeneity EH of heterogeneous server software i .

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a heterogeneous compiling algorithm feasibility evaluation method and system, and the method comprises the steps: determining the heterogeneity of heterogeneous server software, and determining a performance loss value of the heterogeneous server software; based on the ratio of the performance loss value to the isomerism, calculating and obtaining the isomerism cost-effectratio of the isomerism server software; and obtaining an evaluation result of the feasibility of the heterogeneous compiling algorithm based on the heterogeneous cost-effect ratio. According to the method, the heterogeneity of the server software in the system and the performance loss values of the server software before and after diversified compilation can be quantified, so that the actual benefit generated by each heterogeneous software compilation algorithm can be quantitatively evaluated, and data support is provided for further selecting the heterogeneous server software to establish a web server with a mimicry structure.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and system for evaluating the feasibility of a heterogeneous compilation algorithm. Background technique [0002] As the country pays more and more attention to cyberspace security, more security defense technologies are gradually emerging. As an innovative security defense technology, cyberspace mimicry defense technology adopts the core architecture of "Dynamic Heterogeneous Redundancy" (DHR, Dynamic Heterogeneous Redundancy), which is the premise of ensuring the functional equivalence of each executive body and the high probability of calculation results. In this way, the probability of common mode faults in the system due to design defects (or unwanted redundant functions or "dark functions") is reduced, and the security of the system is further improved. [0003] As a typical engineering implementation of mimic defense technology, web server with mimic str...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36
CPCG06F11/3604G06F11/3616
Inventor 韩首魁张高举李昂
Owner 郑州昂视信息科技有限公司