Abstract:
A system and method for detecting sensitive user input leakages in software applications, such as applications created for smartphone platforms. The system and method are configured to parse user interface layout files of the software application to identify input fields and obtain information concerning the input fields. Input fields that contain sensitive information are identified and a list of sensitive input fields, such as contextual IDs, is generated. The sensitive information fields are identified by reviewing the attributes, hints and/or text labels of the user interface layout file. A taint analysis is performed using the list of sensitive input fields and a sink dataset in order to detect information leaks in the sensitive input fields.
Abstract:
A method implemented in a user equipment (UE) used in an orthogonal frequency division multiple access (OFDMA) wireless communications system supporting coordinated multi-point (CoMP) joint transmission (JT) is disclosed. The method includes measuring reference signal received power (RSRP), transmitting, to a network, first feedback on the RSRP, receiving, from the network, a CoMP measurement set, conducting pre-scheduling CoMP UE fallback according to the CoMP measurement set, computing channel quality and direction information according to a UE category, and transmitting, to the network, second feedback on the channel quality and direction information. Other methods, apparatuses, and systems also are disclosed.
Abstract:
Systems and methods for optimizing power flows using a harmony search, including decoupling phases in a multi-phase power generation system into individual phase agents in a multi-phase power flow model for separately controlling at least one of phase variables or parameters. One or more harmony segments from harmony memory are ranked and selected based on a utility value determined for each of the decoupled phases. A harmony search with gradient descent learning is performed to move the selected harmony segments to a better local neighborhood. A new utility value for each of the selected segments is determined based on historical performance, and the harmony memory is iteratively updated if one or more of the new utility values are higher than a utility value of a worst harmony segment stored in the harmony memory.
Abstract:
Methods and systems of sensing conditions in a fiber includes launching a light beam into a fiber. A first branch of scattered light is set to a mode other than a fundamental mode. A second branch of scattered light is optically filtered to remove unscattered input light. Brillouin scattered light is coherently detected on the first branch to produce a combined temperature/strain profile of the fiber. Raman scattered light on the second branch is directly detected to produce a temperature profile of the fiber. A strain profile of the fiber is determined, using a processor, based on the combined temperature/strain profile and the temperature profile.
Abstract:
A method and system are provided. The method includes performing, by a logs-to-time-series converter, a logs-to-time-series conversion by transforming a plurality of heterogeneous logs into a set of time series. Each of the heterogeneous logs includes a time stamp and text portion with one or more fields. The method further includes performing, by a time-series-to-sequential-pattern converter, a time-series-to-sequential-pattern conversion by mining invariant relationships between the set of time series, and discovering sequential message patterns and association rules in the plurality of heterogeneous logs using the invariant relationships. The method also includes executing, by a processor, a set of log management applications, based on the sequential message patterns and the association rules.
Abstract:
A method, system, and computer program product for minimizing intra-cell and inter-cell interference in a multi-cell full duplex communication system in a wireless network. The method includes selecting, by a clint selector, a plurality of clients, wherein the plurality of clients includes a plurality of uplink clients configured to transmit signals and a plurality of downlink clients configured to receive signals over a plurality of data streams in each cell of the multi-cell full duplex communication system, and performing, by a spatial interference aligner, spatial interference alignment on interfering data streams to align the interfering data streams of uplink clients towards downlink clients in its own cell and downlink clients in a neighboring cell.
Abstract:
Systems and methods for detection and prevention of Return-Oriented-Programming (ROP) attacks in one or more applications, including an attack detection device and a stack inspection device for performing stack inspection to detect ROP gadgets in a stack. The stack inspection includes stack walking from a stack frame at a top of the stack toward a bottom of the stack to detect one or more failure conditions, determining whether a valid stack frame and return code address is present; and determining a failure condition type if no valid stack frame and return code is present, with Type III failure conditions indicating an ROP attack. The ROP attack is contained using a containment device, and the ROP gadgets detected in the stack during the ROP attack are analyzed using an attack analysis device.
Abstract:
A method for data transport that includes providing a branch terminal between a first and second trunk terminal, wherein a branching unit is present at an intersect between the first and second trunk terminal and the branch terminal. The branching unit includes a reconfigurable add/drop multiplexers (ROADM) at least one attenuator. A signal is sent from a second terminal of the first and second trunk terminal to the branding unit. The signal may include a branch traffic component trunk traffic component. The branching unit includes at least one attenuator for attenuating the trunk traffic component so that the trunk traffic component of the signal cannot be detected at the branch terminal.
Abstract:
We propose an efficient procedure, namely disjoint pair procedure based cloud service embedding procedure that first maps working and backup virtual nodes over physical nodes while balancing computational resources of different types, and finally, maps working and backup virtual links over physical routes while balancing network spectral resources using the disjoint pair procedure.