Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Noninvasive Repackaging Method Research for Android Supporting Packed Apps
LI Tongxin, HAN Xinhui, JIAN Rong, XIAO Jianguo
Acta Scientiarum Naturalium Universitatis Pekinensis    2018, 54 (6): 1147-1158.   DOI: 10.13209/j.0479-8023.2018.083
Abstract1449)   HTML    PDF(pc) (723KB)(513)       Save

The authors proposed a new Android repackaging method based on Android app characteristics. The new method can repackage apps without decompiling nor modifying the code and also supports packed apps. The method leverages multiple new code injection techniques to attach code to the app. Then, it adds a hook framework to provide capabilities to modify the code behaviors. Finally, the app’s behaviors will be changed during runtime, thus the app is repackaged. A prototype framework is also implemented. The experiments demonstrate that the framework is compatible to different Android platforms and multiple packers. This research has proved that the current packing techniques have some flaws and the method can be used in dynamic code analysis, defense policies deployment and app modification.

Related Articles | Metrics | Comments0
Cross Site Script Prevention Based on Delimiters
ZHANG Huilin, LI Guancheng, DING Yu, DUAN Lei, HAN Xinhui, XIAO Jianguo
Acta Scientiarum Naturalium Universitatis Pekinensis    2018, 54 (2): 320-330.   DOI: 10.13209/j.0479-8023.2017.172
Abstract885)   HTML1)    PDF(pc) (529KB)(329)       Save

The authors propose a practical and accurate cross site script prevention method based on delimiters for UTF-8 encoded web applications. Only trusted delimiters are tainted into corresponding UTF-8 shadow bytes, and these tainted shadow bytes are automatically propagated in web applications and can be directly delivered into output pages. Cross site script is prevented by analyzing the tainted delimiters and HTML context of output pages. A prototype called XSSCleaner is implemented on PHP. The evaluation shows that XSSCleaner can accurately protect web applications from real world cross site script attacks with an average overhead 12.9%.

Related Articles | Metrics | Comments0
Automatical System to Generate High-Quality Chinese Font Libraries Based on Component Assembling
LIU Chengdong, LIAN Zhouhui, TANG Yingmin, XIAO Jianguo
Acta Scientiarum Naturalium Universitatis Pekinensis    2018, 54 (1): 35-41.   DOI: 10.13209/j.0479-8023.2017.082
Abstract1622)   HTML25)    PDF(pc) (1362KB)(648)       Save

Current Chinese font library generation systems bear a major drawback that the user is required to write all characters contained in the font library, which is rather boring and time consuming. This paper proposes a system to automatically generate Chinese font libraries of high quality based on component assembling. An input set of a few characters for users is selected to write according to the instructive information of Chinese characters. Then components of each written characters are extracted. Several selected components are combined to construct each unwritten character. Finally the complete Chinese personal font library is obtained, which contains 6763 Chinese characters according to the GB2312 standard. Experimental results show that the proposed system can generate personal Chinese font libraries with dramatically shorter time and still keep excellent quality.

Related Articles | Metrics | Comments0
A Benchmark for Stroke Extraction of Chinese Characters
CHEN Xudong, LIAN Zhouhui, TANG Yingmin, XIAO Jianguo
Acta Scientiarum Naturalium Universitatis Pekinensis    2016, 52 (1): 49-57.   DOI: 10.13209/j.0479-8023.2016.025
Abstract1578)   HTML    PDF(pc) (533KB)(757)       Save

Abstract This paper presents a benchmark, which includes a manually-constructed database and evaluation tools.
Specifically, the database contains a number of images of Chinese characters represented in four commonly-used
font styles and corresponding stroke images manually segmented from character images. Performance of a given
stroke extraction method can be evaluated by calculating dissimilarities of the automatic segmentation results and
the ground truth using two specially-designed metrics. Moreover, the authors also propose a new method based on
Delaunay triangulation to effectively extract strokes from Chinese characters. Experimental results obtained by
comparing three algorithms demonstrate that the benchmark works well for the evaluation of stroke extraction
approaches and the proposed method performs considerably well in the application of stroke extraction for Chinese
characters.
Related Articles | Metrics | Comments0
Lens Distortion Detection and Quality Analysis for Stereoscopic Videos
DONG Quanwu,ZHOU Tong,GUO Zongming,XIAO Jianguo
Acta Scientiarum Naturalium Universitatis Pekinensis   
Abstract713)      PDF(pc) (5353KB)(719)       Save
The authors present a method to detect the stereo lens distortions, such as vertical misalignment, camera rotation, unsynchronized zooming, and color misalignment, which are introduced during the process of video capturing. Based on the result of stereoscopic correspondence, the geometrical errors are calculated for every matched feature point pairs. The overall lens distortion parameters are deduced from the statistical features of all points. Experiments are set on a video database which consists of video clips from an on-air 3DTV channel. Experiment result shows that the method is effective to find out distorted video clips. The subjective quality assessment experiment reveals some relationships between the lens distortions and the perceptual video quality.
Related Articles | Metrics | Comments0
Comparative News Summarization Using Co-ranking Graph Model
HUANG Xiaojiang,WAN Xiaojun,XIAO Jianguo
Acta Scientiarum Naturalium Universitatis Pekinensis   
Abstract691)      PDF(pc) (567KB)(367)       Save
The authors propose an approach of comparative news summarization using co-ranking graph model. The model makes use of the similarity between sentences within each topic and the comparativeness between sentences of different topics, and then calculates the saliences of sentences of both topics simultaneously using an iterative reinforcement approach. Experiment results show the effectiveness of the proposed approach.
Related Articles | Metrics | Comments0
XML-Based Context-Constraint Access Control Policy Management
ZHANG Zhikun,XIAO Jianguo,KONG Xiangning
Acta Scientiarum Naturalium Universitatis Pekinensis   
Abstract573)            Save
With concern of the current research results as well as the features of the demands for access control of the Web-based application system, the authors propose a context constraint access control theory model on the level of standard reference model, from the perspective of flexibility, generality, and feasibility, and elaborate on the theory of this model and the architecture of access control system. Then the authors give the description and modeling of the access control policy and defines the entities and relations in the model by using a XML-based policy specification grammar called X-Grammar. Finally the overall function description and structure design is given, and an engineering method to elicit and define context constraints is raised.
Related Articles | Metrics | Comments0