Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

349 results about "Reverse analysis" patented technology

Consumable chip and a communication method thereof, and system and method for communication between consumable chip and imaging device

The invention, which belongs to the technical field of printer consumables, provides a consumable chip and a communication method thereof, and a system and method for communication between a consumable chip and an imaging device. The communication method comprises: command encrypted data sent by an imaging device are decrypted and restored into command data; command processing is carried out basedon the command data and command feedback data are generated; and the command feedback data are encrypted to generate command feedback encrypted data and the command feedback encrypted data are sent to the imaging device, wherein the command feedback encrypted data are decrypted in the imaging device to restore the command feedback data. The consumable chip comprises a decryption unit for carryingout decryption and restoration on command encrypted data sent by an imaging device, an execution chip for carrying out command processing based on the command data and generating command feedback data, and an encryption unit for encrypting the command feedback data, generating command feedback encrypted data, and sending the command feedback encrypted data to the imaging device. The encrypted communication is simple; and a phenomenon of cracking the communication data by reverse analysis of the communication waveform is avoided.
Owner:HANGZHOU CHIPJET TECH

Embedded software testing auxiliary system

The invention provides an embedded software testing auxiliary system, and aims at providing a software testing auxiliary system which can improve the efficiency of building a testing environment, lower the operation difficulty and improve the usability. According to the technical scheme, an upper computer constructs a testing crosslinking environment of tested equipment and testing equipment, describes bus attributes, an interface control document ICD, testing case preconditions and testing steps, forms control law data according to the preconditions and the testing steps to dispatch testing data, sends, judges and receives the data, and conducts reverse analysis on the received data according to an ICD format; a lower computer cooperates with the upper computer to send the data through adetailed bus, then the data is received, testing cases and design constructed by data simulation and receiving-sending procedure control are automatically executed, and simulation of embedded softwareperipheral equipment and monitoring and detecting of the interaction process of peripheral equipment data are achieved. According to the embedded software testing auxiliary system, the testing casesof controlling a construction testing scene are executed based on the data receiving-sending procedure, and the time for developing a simulation system is shortened.
Owner:10TH RES INST OF CETC

Dynamic taint analysis device and application thereof to document format reverse analysis

The invention relates to a dynamic taint analysis device and application of the dynamic taint analysis device to document format reverse analysis, wherein the dynamic taint analysis device comprises a dynamic instrumentation executive logging module and a static snapshoot analysis taint tracking module, wherein the dynamic instrumentation executive logging module is used for calling and executing a tested program by using a binary program instrumentation platform, monitoring opening, analyzing and closing behaviors of a data document including original taint data in a process of executing the tested program, and acquiring snapshoot logs of all command processes, context information and memory access information in the process of executing the tested program according to the process of executing the tested program; the static snapshoot analysis taint tracking module is used for analyzing the snapshoot logs and simulating replay execution of a progress according to information obtained by analysis and recording processing and spread information of original taint data in the data document to obtain a taint data stream path. According to the dynamic taint analysis device, I / O (Input / Output), time and space overhead of dynamic taint analysis in a dynamic execution process can be reduced, an extended instruction set can be supported, and the continuity and incidence relation of original taint data can be obtained.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Intelligent fuzzy testing method and system based on vulnerability learning

The invention discloses an intelligent fuzzy testing method and system based on vulnerability learning. The intelligent fuzzy testing system comprises a data preprocessing module, a bug prediction module and a bug-oriented fuzzy testing module, wherein the data preprocessing module is used for performing reverse analysis on a to-be-tested binary program to obtain a control flow chart of the to-be-tested binary program and performing feature extraction on each basic block in the control flow chart to obtain a feature vector of each basic block; the bug prediction module is used for predicting the probability of bugs exiting in each function in the program according to the control flow chart of the to-be-tested binary program; and the bug-oriented fuzzy testing module is used for testing theto-be-tested binary program and calculating input fitness scores by combining a certain input execution path, the probability of bugs existing in a function in the execution path and an execution result; input of a high-fitness score is used as a seed to perform heritable variation to generate next-generation input, and the to-be-tested binary program is tested cyclically till testing is over. Through the intelligent fuzzy testing system, the bugs in the binary program can be mined more efficiently.
Owner:ZHEJIANG UNIV

Alternation statement reverse analysis method, database alternating and backspacing method and database alternating and backspacing system

The invention discloses an alternation statement reverse analysis method, a database alternating and backspacing method and a database alternating and backspacing system. The reverse analysis method includes S1, determining objects and alternation commands both involved in an alternation statement and backspacing commands corresponding to the alternation commands; S2, in case of creating/adding of the alternation statement, directly determining a backspacing statement according to the objects and the backspacing commands, and in case of changing/ deleting of the alternation statement, determining changed/ deleted source data/content, and determining the backspacing statement according to the objects, the source data/content and the backspacing commands. The backspacing method includes S10, acquiring input, database version and database authorization of an SQL (structured query language) alternation script; S20, analyzing the SQL alternation script to generate a statement analysis result; S30, based on the statement analysis result, generating the backspacing statement and transforming the backspacing statement into an executable backspacing SQL script file according to the alternation statement reverse analysis method. The backspacing method has the advantages of wide application range, high operability, safety and high automation.
Owner:中移信息技术有限公司

Software protection method based on API (Application Program Interface) security attribute hiding and attack threat monitoring

The invention discloses a software protection method based on API (Application Program Interface) security attribute hiding and attack threat monitoring. The software protection method comprises the following steps: obtaining the original input information record chart of a file to be protected, extracting the execution control flow graph of the file, extracting an API calling point, extracting an API parameter passing code block, extracting an API returned value decryption point, dumping a DLL (Dynamic Link Library), calculating a new API entry address, constructing a springboard function block, inserting an exception instruction in the returned value decryption point, constructing a node, generating a node library, deploying a node network, constructing a node background, constructing a returned value decryption processing function, and reconstructing a PE (Portable Executable) file. From internal and external aspects, software is protected so as to analyze the function of API boundary information in a reverse analysis process from an angle of the reverse engineering of the attackers, the API security attribute which needs to be hidden and a detection node library are put in a program new node, and a new node entry is subjected to encryption processing to further prevent the attackers from carrying out reverse analysis on the protected PE file.
Owner:NORTHWEST UNIV(CN)

Method and device for protocol automatic reverse analysis of embedded equipment

The invention discloses a method for protocol automatic reverse analysis of embedded equipment. The method for the protocol automatic reverse analysis of the embedded equipment comprises the following steps that clustering analysis is conducted on information messages, and the information messages of the same type are found; the information messages are compared with the information messages which are the same in type and are already found, the fixed part of the information messages and the changing part of the information messages are found, and the format of the information messages are obtained; timing sequence analysis is conducted on the information message sequence with the information message format being already found, a threshold value is set, and the information messages with the time intervals lower than the threshold value are found and are associated in one set; sensors are used for collecting environment data, timestamps of one set of information message sequence in the associated information messages are compared, and language information is labeled. Meanwhile, the invention further discloses a device for the protocol automatic reverse analysis of the embedded equipment, and the device for the protocol automatic reverse analysis of the embedded equipment comprises the following modules: an information message clustering analysis module, an information message format acquiring module, an information message association module and a semantic information labeling module.
Owner:TSINGHUA UNIV

Method for machining bolt holes in hanging subassembly of aircraft engine by using numerical control equipment

The invention belongs to the field of numerical control machining methods, and particularly relates to a method for machining bolt holes in a hanging subassembly of an aircraft engine by using mechanical control equipment. The method comprises the following steps of preassembling the hanging subassembly by using an assembling tool; positioning the hanging subassembly on a special machining supporting clamp; performing measurement and reverse analysis and adjusting numerical control machining programs; positioning the subassembly and the clamp on a machine tool in an integrated manner; automatically forming holes by using the machine tool and examining a machining result; preassembling the hanging subassembly by using a small number of bolts; establishing a measuring benchmark on the product under aircraft axes; positioning the product on the special machining supporting clamp and then examining the appearance error and the location degree of the product; performing reverse modeling and analysis by using CATIA (computer-graphics aided three-dimensional interactive application) software; adjusting a normal tolerance point of a curved surface of the subassembly; correcting a hole-forming machining program; and positioning the whole pre-assembled hanging subassembly by using the benchmark of the special machining clamp on the machine tool as a tool setting benchmark and using the measuring benchmark established on the subassembly as an examination point, and then forming the holes on the subassembly in a machining manner.
Owner:AVIC SAC COMML AIRCRAFT

Reverse-based intrusion detection system and reverse-based intrusion detection method

The invention discloses a reverse-based intrusion detection system and a reverse-based intrusion detection method and relates to the field of network encryption protocols. The system comprises a data extraction module, a reverse analysis module, an intrusion rule module, a response module and a data management module. The method comprises the following steps: (1) capturing all network data packages running through an Android phone by the data extraction module, sending to a reverse analysis engine, acquiring network processes and user behaviors by the data extraction module to generate a system log and a weblog, and sending the system log and the weblog to the data management module; (2) identifying intrusion behaviors by the reverse analysis engine through the TCP/IP (transmission control protocol /Internet protocol) analysis technology and the apk decompilation reverse technology by combining the system log and the weblog; (3) performing warning and recording on the intrusion behaviors identified by the reverse analysis engine through the response module; (4) storing all information of a user in the data management module so as to facilitate later evidence collection and lookup. The reverse-based intrusion detection system and the reverse-based intrusion detection method disclosed by the invention have safety, timeliness, expandability and advancement.
Owner:WUHAN HONGXU INFORMATION TECH

Method for constructing light gauge welding residual stress field on basis of small-hole process tested data

The invention discloses a method for constructing a light gauge welding residual stress field on the basis of small-hole process tested data. The method comprises the following steps of: firstly, testing a residual stress of a weld assembly by adopting a small hole process, carrying out interpolation fitting on the tested stress values, then sequentially substituting each first-order polynomial in a finite element model by using a high-order Chebyshev polynomial as a primary function of representing unknown intrinsic strain causing the welding residual stress, carrying out calculation of elasticity to obtain calculated stress values of coordinate points with same tested stresses, selecting a coefficient enabling the quadratic sum of differences of the calculated stress values and the fitted tested stress values to be minimum as an intrinsic strain coefficient, multiplying the intrinsic strain coefficient by corresponding all order polynomials and then linearly overlapping to be used as an intrinsic strain, and finally obtaining a welding residual stress field through a finite element process. On the basis of the small hole process tested data, the intrinsic strain causing the welding residual stress is constructed by using a thermo-elasticity finite element method and a reverse analysis method, therefore, the distribution of the light gauge welding residual stress field is obtained; and the method is convenient to operate and high in efficiency.
Owner:JIANGSU UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products