The aim of this paper is to simulate and study the early moments of the reactive ballistics of a large caliber projectile fired from a gun,combining 0D and 2D axisymmetric Computational Fluid Dynamics(CFD)approaches.F...The aim of this paper is to simulate and study the early moments of the reactive ballistics of a large caliber projectile fired from a gun,combining 0D and 2D axisymmetric Computational Fluid Dynamics(CFD)approaches.First,the methodology is introduced with the development of an interior ballistics(IB)lumped parameter code(LPC),integrating an original image processing method for calculating the specific regression of propellant grains that compose the gun propellant.The ONERA CFD code CEDRE,equipped with a Dynamic Mesh Technique(DMT),is then used in conjunction with the developed LPC to build a dedicated methodology to calculate IB.First results obtained on the AGARD gun and 40 mm gun test cases are in a good agreement with the existing literature.CEDRE is also used to calculate inter-mediate ballistics(first milliseconds of free flight of the projectile)with a multispecies and reactive approach either starting from the gun muzzle plane or directly following IB.In the latter case,an inverse problem involving a Latin hypercube sampling method is used to find a gun propellant configuration that allows the projectile to reach a given exit velocity and base pressure when IB ends.The methodology developed in this work makes it possible to study the flame front of the intermediate flash and depressurization that occurs in a base bleed(BB)channel at the gun muzzle.Average pressure variations in the BB channel during depressurization are in good agreement with literature.展开更多
针对传统的IP欺骗攻击缓解方法存在运算开销大、缺乏灵活性等问题,提出了一种基于动态限制策略的软件定义网络(software defined network,SDN)中IP欺骗攻击缓解方法。首先,利用Packet-In消息中三元组信息回溯攻击路径,定位IP欺骗攻击源...针对传统的IP欺骗攻击缓解方法存在运算开销大、缺乏灵活性等问题,提出了一种基于动态限制策略的软件定义网络(software defined network,SDN)中IP欺骗攻击缓解方法。首先,利用Packet-In消息中三元组信息回溯攻击路径,定位IP欺骗攻击源头主机;然后,由控制器制定动态限制策略对连接攻击源头主机的交换机端口的新流转发功能进行限制,待限制期满再恢复其转发新流的功能,限制期的大小随着被检测为攻击源的次数而增长。研究结果表明:这种动态的限制策略可阻隔攻击流进入SDN网络,从而有效避免SDN交换机、控制器以及链路过载;由于在限制期间无需再对这些限制的交换机端口进行实时监测,该方法在应对长时攻击时较传统方法具有更高的缓解效率和更少的资源消耗。展开更多
先前的固件静态污点分析方案通过识别中间污点源来精确污点分析的起点,过滤部分情况的安全的命令劫持类危险函数调用点以精简污点分析的目标终点,减少了待分析的污点传播路径,缩短了漏洞挖掘的时间。但由于其在识别中间污点源时所用时...先前的固件静态污点分析方案通过识别中间污点源来精确污点分析的起点,过滤部分情况的安全的命令劫持类危险函数调用点以精简污点分析的目标终点,减少了待分析的污点传播路径,缩短了漏洞挖掘的时间。但由于其在识别中间污点源时所用时间过长,以及没有实现充分过滤安全的危险函数调用点,导致固件漏洞挖掘的整体时间依旧较长。为改进这一现状,提出了一种利用精确中间污点源和危险函数定位加速固件漏洞分析方案ALTSDF(Accurate Locating of intermediate Taint Sources and Dangerous Functions)。在快速精确识别中间污点源作为污点分析的起点时,收集每个函数在程序中不同调用点处使用的参数字符串构成每个函数的函数参数字符串集合,并计算此集合在前后端共享关键字集合中的占比,根据占比对所有函数进行降序排列,占比越高,则此函数越有可能是中间污点源。在过滤安全的危险函数调用点时,通过函数参数静态回溯分析参数类型,排除参数来源是常量的复杂情况的安全的命令劫持类危险函数调用点和安全的缓冲区溢出类危险函数调用点。最终缩短定位中间污点源所用时间,减少由中间污点源到危险函数调用点所构成的污点传播路径数量,进而缩短将污点分析应用于污点传播路径所需的分析时间,达到缩短漏洞挖掘时间的目的。对21个真实设备固件的嵌入式Web程序进行测试后得出,ALTSDF相比先进工具FITS,在中间污点源推断方面所用时间大幅缩短;在安全的危险函数调用点过滤方面,相比先进工具CINDY,ALTSDF使污点分析路径减少了8%,最终使漏洞挖掘时间相比SaTC结合FITS与CINDY的整合方案缩短32%。结果表明,ALTSDF可加速识别固件嵌入式Web程序中的漏洞。展开更多
基金the French Defense Innovation Agency (AID)the French Procurement Agency for Armament (DGA)ONERA's scientific direction for funding and supporting the present work
文摘The aim of this paper is to simulate and study the early moments of the reactive ballistics of a large caliber projectile fired from a gun,combining 0D and 2D axisymmetric Computational Fluid Dynamics(CFD)approaches.First,the methodology is introduced with the development of an interior ballistics(IB)lumped parameter code(LPC),integrating an original image processing method for calculating the specific regression of propellant grains that compose the gun propellant.The ONERA CFD code CEDRE,equipped with a Dynamic Mesh Technique(DMT),is then used in conjunction with the developed LPC to build a dedicated methodology to calculate IB.First results obtained on the AGARD gun and 40 mm gun test cases are in a good agreement with the existing literature.CEDRE is also used to calculate inter-mediate ballistics(first milliseconds of free flight of the projectile)with a multispecies and reactive approach either starting from the gun muzzle plane or directly following IB.In the latter case,an inverse problem involving a Latin hypercube sampling method is used to find a gun propellant configuration that allows the projectile to reach a given exit velocity and base pressure when IB ends.The methodology developed in this work makes it possible to study the flame front of the intermediate flash and depressurization that occurs in a base bleed(BB)channel at the gun muzzle.Average pressure variations in the BB channel during depressurization are in good agreement with literature.
文摘针对传统的IP欺骗攻击缓解方法存在运算开销大、缺乏灵活性等问题,提出了一种基于动态限制策略的软件定义网络(software defined network,SDN)中IP欺骗攻击缓解方法。首先,利用Packet-In消息中三元组信息回溯攻击路径,定位IP欺骗攻击源头主机;然后,由控制器制定动态限制策略对连接攻击源头主机的交换机端口的新流转发功能进行限制,待限制期满再恢复其转发新流的功能,限制期的大小随着被检测为攻击源的次数而增长。研究结果表明:这种动态的限制策略可阻隔攻击流进入SDN网络,从而有效避免SDN交换机、控制器以及链路过载;由于在限制期间无需再对这些限制的交换机端口进行实时监测,该方法在应对长时攻击时较传统方法具有更高的缓解效率和更少的资源消耗。
文摘先前的固件静态污点分析方案通过识别中间污点源来精确污点分析的起点,过滤部分情况的安全的命令劫持类危险函数调用点以精简污点分析的目标终点,减少了待分析的污点传播路径,缩短了漏洞挖掘的时间。但由于其在识别中间污点源时所用时间过长,以及没有实现充分过滤安全的危险函数调用点,导致固件漏洞挖掘的整体时间依旧较长。为改进这一现状,提出了一种利用精确中间污点源和危险函数定位加速固件漏洞分析方案ALTSDF(Accurate Locating of intermediate Taint Sources and Dangerous Functions)。在快速精确识别中间污点源作为污点分析的起点时,收集每个函数在程序中不同调用点处使用的参数字符串构成每个函数的函数参数字符串集合,并计算此集合在前后端共享关键字集合中的占比,根据占比对所有函数进行降序排列,占比越高,则此函数越有可能是中间污点源。在过滤安全的危险函数调用点时,通过函数参数静态回溯分析参数类型,排除参数来源是常量的复杂情况的安全的命令劫持类危险函数调用点和安全的缓冲区溢出类危险函数调用点。最终缩短定位中间污点源所用时间,减少由中间污点源到危险函数调用点所构成的污点传播路径数量,进而缩短将污点分析应用于污点传播路径所需的分析时间,达到缩短漏洞挖掘时间的目的。对21个真实设备固件的嵌入式Web程序进行测试后得出,ALTSDF相比先进工具FITS,在中间污点源推断方面所用时间大幅缩短;在安全的危险函数调用点过滤方面,相比先进工具CINDY,ALTSDF使污点分析路径减少了8%,最终使漏洞挖掘时间相比SaTC结合FITS与CINDY的整合方案缩短32%。结果表明,ALTSDF可加速识别固件嵌入式Web程序中的漏洞。