To see the other types of publications on this topic, follow the link: Anti-Debugging.

Journal articles on the topic 'Anti-Debugging'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 37 journal articles for your research on the topic 'Anti-Debugging.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kim, Jong-Wouk, Jiwon Bang, and Mi-Jung Choi. "Anti-Anti-Debugging Study to Understand and Disable Anti-Debugging for Malware Analysis." Journal of Korean Institute of Communications and Information Sciences 45, no. 1 (January 31, 2020): 105–16. http://dx.doi.org/10.7840/kics.2020.45.1.105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gagnon, Michael N., Stephen Taylor, and Anup K. Ghosh. "Software Protection through Anti-Debugging." IEEE Security & Privacy Magazine 5, no. 3 (May 2007): 82–84. http://dx.doi.org/10.1109/msp.2007.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Bowen. "Research Summary of Anti-debugging Technology." Journal of Physics: Conference Series 1744, no. 4 (February 1, 2021): 042186. http://dx.doi.org/10.1088/1742-6596/1744/4/042186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Apostolopoulos, Theodoros, Vasilios Katos, Kim-Kwang Raymond Choo, and Constantinos Patsakis. "Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks." Future Generation Computer Systems 116 (March 2021): 393–405. http://dx.doi.org/10.1016/j.future.2020.11.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weng, Jian Tao, Qing Mu, Xin Yi Liao, Yuan Zhang Li, Quan Xin Zhang, and Yuan Tan. "Code Protection Technology on iOS." Applied Mechanics and Materials 644-650 (September 2014): 3371–74. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.3371.

Full text
Abstract:
This paper targets to the lag of code protection technology for Mach-O executable file on iOS. Consideration of code tamper, code injection on iOS, this paper has proposed a code protection scheme MFP(Mach-O File Protector) featuring with both encryption function and anti-debugging function based on UPX(the Ultimate Packer for eXecutables). Compared with UPX, MFP encrypt Mach-O executable file through 3DES and insert anti-debugging code to disable mainstream debugging software.
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, JaeKeun, BooJoong Kang, and Eul Gyu Im. "Evading Anti-debugging Techniques with Binary Substitution." International Journal of Security and Its Applications 8, no. 1 (January 31, 2014): 183–92. http://dx.doi.org/10.14257/ijsia.2014.8.1.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Sun-Kyun, Hajin Kim, and Mi-Jung Choi. "Design and Implementation of Malware Automatic Unpacking System in Anti-VM/Debugging Environment." Journal of Korean Institute of Communications and Information Sciences 43, no. 11 (November 30, 2018): 1929–40. http://dx.doi.org/10.7840/kics.2018.43.11.1929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, Seung-Hwan, Hyo-Jeong Shin, and Hyong-Shik Kim. "Methods of bypassing anti-debugging APIs for security test." Journal of Security Engineering 15, no. 1 (February 28, 2018): 25–40. http://dx.doi.org/10.14257/jse.2018.02.01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Jong-Wouk, Jiwon Bang, and Mi-Jung Choi. "Defeating Anti-Debugging Techniques for Malware Analysis Using a Debugger." Advances in Science, Technology and Engineering Systems Journal 5, no. 6 (2020): 1178–89. http://dx.doi.org/10.25046/aj0506142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cho, Haehyun, Jongsu Lim, Hyunki Kim, and Jeong Hyun Yi. "Anti-debugging scheme for protecting mobile apps on android platform." Journal of Supercomputing 72, no. 1 (November 6, 2015): 232–46. http://dx.doi.org/10.1007/s11227-015-1559-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Bing, Xu, Qian Ping, Xu Cheng Qian, and Yuan Fang Hong. "Anti-Explosion Control System for Fine Powder Processing." Applied Mechanics and Materials 130-134 (October 2011): 1978–81. http://dx.doi.org/10.4028/www.scientific.net/amm.130-134.1978.

Full text
Abstract:
This paper discusses the anti-explosion control system project for the fine powder processing. To prevent explosion, safety interlock control system is brought up. The article describes the hardware configuration and software establishment of the project, and makes suggestions for the project implement about sensor installing and program debugging.
APA, Harvard, Vancouver, ISO, and other styles
12

PARK, J., Y. H. JANG, S. HONG, and Y. PARK. "Automatic Detection and Bypassing of Anti-Debugging Techniques for Microsoft Windows Environments." Advances in Electrical and Computer Engineering 19, no. 2 (2019): 23–28. http://dx.doi.org/10.4316/aece.2019.02003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Berlato, Stefano, and Mariano Ceccato. "A large-scale study on the adoption of anti-debugging and anti-tampering protections in android apps." Journal of Information Security and Applications 52 (June 2020): 102463. http://dx.doi.org/10.1016/j.jisa.2020.102463.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Wu, Yin Min, and Yun Zhi Chen. "Design of Anti-Theft Public Bicycle System Based on RFID Technology." Applied Mechanics and Materials 475-476 (December 2013): 743–48. http://dx.doi.org/10.4028/www.scientific.net/amm.475-476.743.

Full text
Abstract:
This paper introduces an anti-theft detection system for public bicycles, which can work in ways of both passive RFID and active RFID. The overall systematic framework is analyzed, and the circuits for microcontroller for RFID and RF front-end in the system are focused on. The anti-theft software process in the project implementation is also presented. We have done the design of RFID, including the software and hardware. After debugging, the RFID operates well. The RFID had done well in reducing traffic pressure in Hangzhou, Jiangyin and the other cities.
APA, Harvard, Vancouver, ISO, and other styles
15

Park, Jin-Woo, and Yong-Su Park. "An automatic detection scheme of anti-debugging routines to the environment for analysis." Journal of Internet Computing and Services 15, no. 6 (December 31, 2014): 47–54. http://dx.doi.org/10.7472/jksii.2014.15.6.47.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hong, Soohwa, and Yongsu Park. "The design and implementation of pin plugin tool to bypass anti-debugging techniques." Journal of Internet Computing and Services 17, no. 5 (October 31, 2016): 33–42. http://dx.doi.org/10.7472/jksii.2016.17.5.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ye, Xuerong, Yue Wang, Jun Tan, Wei Tang, Guofu Zhai, Wenwen Li, and Ruiming Yuan. "Analysis of the anti-vibration qualified rate of relay considering manual debugging process." IOP Conference Series: Materials Science and Engineering 1043, no. 2 (January 1, 2021): 022070. http://dx.doi.org/10.1088/1757-899x/1043/2/022070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Zuo, Li Xia, and Rong Guang Di. "Hardware Design of Microcomputer Relay Protection Device Based on ARM&DSP." Advanced Materials Research 706-708 (June 2013): 814–17. http://dx.doi.org/10.4028/www.scientific.net/amr.706-708.814.

Full text
Abstract:
In order to ensure electrical railway’s safe and stable operation, a kind of microcomputer feeder protection device based on a double "ARM+DSP" CPU framework is designed. The hardware design can not only Improve protection performance, but also realize IEC61850 communication protocol. According to electromagnetic compatibility and anti-interference requirements, the whole hardware circuit is designed in detail, the debugging effect is good and can fully meet the demand of the system.
APA, Harvard, Vancouver, ISO, and other styles
19

Yang, Wooyeol, and Yongsu Park. "Identifying Symmetric-Key Algorithms Using CNN in Intel Processor Trace." Electronics 10, no. 20 (October 13, 2021): 2491. http://dx.doi.org/10.3390/electronics10202491.

Full text
Abstract:
Malware and ransomware are often encrypted to protect their own code, making it challenging to apply reverse engineering to analyze them. Recently, various studies have been underway to identify cryptography algorithms in malware or ransomware that use anti-reversing technology via deep-learning technology. In particular, CNNs (convolution neural networks) are deep-learning algorithms with superior performance, as compared to existing machine-learning algorithms in image classification. In the cases of malicious files to which anti-debugging techniques or anti-DBI (dynamic binary instrumentation) techniques are applied, if the traces are extracted using various debuggers or DBI, the traces are cut off due to these techniques. The IPT (Intel processor trace) has the advantage of extracting an accurate trace of a program by bypassing the anti-debugging or anti-DBI technique. This paper presents a novel method by which to identify the symmetric-key algorithms by applying a CNN to the traces extracted from the IPT. The IPT minimally interrupts software execution. First, the trace encrypted by the symmetric-key algorithms is extracted using the IPT. Then it is converted into an image to be an input into the CNN. The experiments were carried out with two different datasets. The first dataset contained traces extracted by different types of symmetric-key algorithms, and the training results were classified into nine classes with 100% accuracy. The second dataset contained traces that included the various bit sizes of the security keys and the block-cipher modes for each type of symmetric-key algorithm. Training results were classified into 36 classes with an accuracy of 70.55%. While previous studies have identified the types of encryption algorithms, this study employed a CNN to identify the number of key bits and the block-cipher modes as well.
APA, Harvard, Vancouver, ISO, and other styles
20

Yang, Wooyeol, and Yongsu Park. "Identifying Symmetric-Key Algorithms Using CNN in Intel Processor Trace." Electronics 10, no. 20 (October 13, 2021): 2491. http://dx.doi.org/10.3390/electronics10202491.

Full text
Abstract:
Malware and ransomware are often encrypted to protect their own code, making it challenging to apply reverse engineering to analyze them. Recently, various studies have been underway to identify cryptography algorithms in malware or ransomware that use anti-reversing technology via deep-learning technology. In particular, CNNs (convolution neural networks) are deep-learning algorithms with superior performance, as compared to existing machine-learning algorithms in image classification. In the cases of malicious files to which anti-debugging techniques or anti-DBI (dynamic binary instrumentation) techniques are applied, if the traces are extracted using various debuggers or DBI, the traces are cut off due to these techniques. The IPT (Intel processor trace) has the advantage of extracting an accurate trace of a program by bypassing the anti-debugging or anti-DBI technique. This paper presents a novel method by which to identify the symmetric-key algorithms by applying a CNN to the traces extracted from the IPT. The IPT minimally interrupts software execution. First, the trace encrypted by the symmetric-key algorithms is extracted using the IPT. Then it is converted into an image to be an input into the CNN. The experiments were carried out with two different datasets. The first dataset contained traces extracted by different types of symmetric-key algorithms, and the training results were classified into nine classes with 100% accuracy. The second dataset contained traces that included the various bit sizes of the security keys and the block-cipher modes for each type of symmetric-key algorithm. Training results were classified into 36 classes with an accuracy of 70.55%. While previous studies have identified the types of encryption algorithms, this study employed a CNN to identify the number of key bits and the block-cipher modes as well.
APA, Harvard, Vancouver, ISO, and other styles
21

Chen, Dan Qiang, Guo Hua Cao, Hui Lin Fan, Jing Hua Wang, and Duo Qi. "Software Design of Test System for Missile Flight Control System." Applied Mechanics and Materials 241-244 (December 2012): 2764–68. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2764.

Full text
Abstract:
Before final assembly and while debugging a missile, in order to ensure the flight control system can work stably and reliably, it is necessary to develop an auto test system. Test software is an important part of the test system. After describing the composition and working principle of the flight control system, summarizing the test requirements, the test software is designed. The design ideas, test algorithm, realization and key technologies, software anti-jamming techniques are introduced in detail. The test software guarantees the test system test the flight control system generally and reliably.
APA, Harvard, Vancouver, ISO, and other styles
22

Zheng, Song, Chao Bi, and Yilin Song. "A New Method of Applying Data Engine Technology to Realize Neural Network Control." Algorithms 12, no. 5 (May 9, 2019): 97. http://dx.doi.org/10.3390/a12050097.

Full text
Abstract:
This paper presents a novel diagonal recurrent neural network hybrid controller based on the shared memory of real-time database structure. The controller uses Data Engine (DE) technology, through the establishment of a unified and standardized software architecture and real-time database in different control stations, effectively solves many problems caused by technical standard, communication protocol, and programming language in actual industrial application: the advanced control algorithm and control system co-debugging difficulties, algorithm implementation and update inefficiency, and high development and operation and maintenance costs effectively fill the current technical gap. More importantly, the control algorithm development uses a unified visual graphics configuration programming environment, effectively solving the problem of integrated control of heterogeneous devices; and has the advantages of intuitive configuration and transparent data processing process, reducing the difficulty of the advanced control algorithms debugging in engineering applications. In this paper, the application of a neural network hybrid controller based on DE in motor speed measurement and control system shows that the system has excellent control characteristics and anti-disturbance ability, and provides an integrated method for neural network control algorithm in a practical industrial control system, which is the major contribution of this article.
APA, Harvard, Vancouver, ISO, and other styles
23

Chen, Dan Qiang, Guo Hua Cao, Hui Lin Fan, Man Yi Hou, and Jing Hua Wang. "Hardware Design of Test System for Missile Flight Control System." Applied Mechanics and Materials 241-244 (December 2012): 9–13. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.9.

Full text
Abstract:
Before final assembly and while debugging a missile, in order to ensure the flight control system can work stably and reliably, it is necessary to develop an auto test system for a general performance test, including electrical performance, inertial measurement device and navigation accuracy. After describing the composition and working principle of the flight control system, summarizing the test requirements, this paper puts forward to a test plan based on a industrial computer, introduces the hardware design and hardware anti-jamming techniques in detail. The test system with self-test function has been applied in testing the flight control system generally and reliably.
APA, Harvard, Vancouver, ISO, and other styles
24

Bai, Jin Rong, Guo Zhong Zou, and Shi Guang Mu. "Malware Analysis Platform Based on Secondary Development of Xen." Applied Mechanics and Materials 530-531 (February 2014): 865–68. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.865.

Full text
Abstract:
The API calls reflect the functional levels of a program, analysis of the API calls would lead to an understanding of the behavior of the malware. Malware analysis environment has been widely used, but some malware already have the anti-virtual, anti-debugging and anti-tracking ability with the evolution of the malware. These analysis environments use a combination of API hooking and/or API virtualization, which are detectable by malware running at the same privilege level. In this work, we develop the fully automated platform to trace the native API calls based on secondary development of Xen and have obtained the most transparent and similar system to a Windows OS as possible in order to obtain an execution trace of a program as if it was run in an environment with no tracer present. In contrast to other approaches, the hardware-assisted nature of our approach implicitly avoids many shortcomings that arise from incomplete or inaccurate system emulation.
APA, Harvard, Vancouver, ISO, and other styles
25

Zhang, Chang Li, Jin Jin Zhang, and Hai Bo Liu. "Velocity-Current Double Closed-Loop Control Model and Simulation of BLDCM in Pure Electric Vehicle Applications." Advanced Materials Research 466-467 (February 2012): 881–85. http://dx.doi.org/10.4028/www.scientific.net/amr.466-467.881.

Full text
Abstract:
Traditional control models of BLDCM, in which only the internal parameters of motors are considered, have some shortcoming in smoothing the vehicle velocity. To achieve a better controlling capability, a velocity-current double closed-loop control system model for BLDCM of PEV is constructed on Matlab, in which the inner current loop is for quickly adjusting BLDCM’s actions, the outer velocity loop is for an optimized control of PEV’s speed. The results of a simulating experiment show that the new model has a good performance and a strong anti-interfere ability. Therefore, this model is applicable for designing and debugging of BLDCM in PEV applications.
APA, Harvard, Vancouver, ISO, and other styles
26

Lian, Jing, Ya Fu Zhou, Teng Ma, and Xiao Yong Shen. "Development of Automotive Electronics HIL Simulation Experimental Platform." Applied Mechanics and Materials 44-47 (December 2010): 1893–97. http://dx.doi.org/10.4028/www.scientific.net/amm.44-47.1893.

Full text
Abstract:
This paper presents a low-cost, simple and reliable solution for automotive electronics Hardware-In-Loop (HIL) simulation, taking Jetta AT1.6 car as object, designs and develops automotive electronics HIL simulation platform. Firstly, the overall structure of the platform is designed; secondly, system hardware platform is developed and built using Protel DXP; then, HIL simulation models of ABS (Anti-lock Braking System), engine and automatic transmission are built using Matlab/Simulink and develop automotive electronics HIL simulation platform; finally, carry on the experiment and the results show that the designed HIL simulation experimental platform is good. The platform has widespread applicability in the teaching experiments and the aspects of developing, debugging and testing of automotive electronics control systems.
APA, Harvard, Vancouver, ISO, and other styles
27

Zhang, Shou Zhong. "Research on Outward-Bound to Improve College Students' Social Adaptation Ability with AQ as the Mediating Effect." Advanced Materials Research 971-973 (June 2014): 2611–16. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.2611.

Full text
Abstract:
There is close relationship between social adaptation ability and the competition ability of college students .However, due to multiple factors such as individual, family and society, contemporary college students’ psychology undergoing dramatic changes and the non-intelligence factors in their AQ (Adversity Quotient) is not enough, showing the low ability of anti-frustration, the lack of debugging skills and cognitive attribution ,and a series of psychosocial tendencies not suited with the society. In this paper, through the study found that: Outward-Bound, as a new way to develop social adaptation ability, not only can directly improve college students' social adaptation ability, also can by cultivating students' AQ, as mediating effect to influence the social adaptation ability.
APA, Harvard, Vancouver, ISO, and other styles
28

Li, Ming Bin, Dong Wen Yin, and Song Mu. "Design and Implementation on a Novel of Solar Double-Direction Tracking-Device." Applied Mechanics and Materials 121-126 (October 2011): 2630–35. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.2630.

Full text
Abstract:
The development of solar energy tracking technology has important practical significance for promoting solar energy application. In the paper, double-direction tracking-device was designed based on the theory of calendar check tracking and worm gear mechanism, gear transmission mechanism, cam push-rod mechanism was used to achieve the function of “single driving, double-direction tracking” . So, the function of tracking solar azimuth and solar altitude angles was cleverly realized through controlling a single power. In the paper, design and manufacture of the device were completed by Solidworks software. Through the debugging experiment, the device’s advantages were proved of low energy consumption, high reliability, strong anti-interference ability, easy maintenance and suitable for a variety of small solar installations.
APA, Harvard, Vancouver, ISO, and other styles
29

Qiu, Yutao, Kai Qian, Liuming Liang, Zhangli Weng, Zhen Huang, and Yuchen Yan. "Research and Application of Full-Link Management Intellectual Inspection Robot with Remote Pre-Control and Information Digitization." Journal of Physics: Conference Series 2083, no. 3 (November 1, 2021): 032077. http://dx.doi.org/10.1088/1742-6596/2083/3/032077.

Full text
Abstract:
Abstract With the development of intelligent power grid maintenance, inspection robot has been widely used for its integrated perception and remote pre-control. Aiming at the problems of the weak information interaction capacity and the low correlation with digital requirements of inspection operation, a kind of Full-Link Management Intellectual Inspection Robot is proposed. The article introduces the system structure, function modules, engineering application and debugging process. It is with low response delay and strong anti-interference ability. The correct recognition rate of violations reached 88.2 %, meanwhile provided with the function of evaluation and early warning of workers’ unsafe behavior. The Full-Link Management Intellectual Inspection Robot has a broad application foreground in power grid maintenance.
APA, Harvard, Vancouver, ISO, and other styles
30

Zhang, Li Guo, and Jing Gao. "Switch Module Designed to Meet the EPS Reliability Intelligent Control." Applied Mechanics and Materials 623 (August 2014): 195–201. http://dx.doi.org/10.4028/www.scientific.net/amm.623.195.

Full text
Abstract:
This paper considers the design of switch module. It is a key part of intelligent control emergency power supply. The working reliability of the switch module is an important performance index. Firstly, paper according to the characteristics that watchdog microprocessor software vulnerabilities and a control state to maintain after crash recovery, the design software reset and hardware reset propose two solutions. Next, data acquisition and data communications hardware are using photoelectric isolation technology. To achieve true electrical isolation, the system uses three power supply witch are electrically independent. And then, module data communication protocol used MODBUS_RTU, and design force control configuration software debugging interface. Finally, Experimental verification of the software programs and hardware circuit correctness and reliability. Module design reflects the improved anti-jamming capability, while more suitable for general purpose, industrialization and production.
APA, Harvard, Vancouver, ISO, and other styles
31

Meng, Tian Xing. "Design of Fiber Optic Digital Telemetry System." Applied Mechanics and Materials 29-32 (August 2010): 2479–83. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2479.

Full text
Abstract:
The system uses the MCU to complete the functions such as regularly collecting, computing, error handling, storage, data transmission control, and so on, for the parameters required measurement. The system consists of four components: sensor and modulation circuit part, A/D transformation and send part, optical fiber coupling part and the receiver display part. The system has the following characteristics: The encoder is used to encode and send the digital signal of the measured parameters. Through the optical fiber coupling, this system displays the corresponding measurement parameters after decoding by the decoder. System circuit design is simple, easy debugging, reliable of information transmission, high precision of data transmission, particularly good anti-interference, no need of great sending power. It can be applied to a strong electric field or strong magnetic interference occasions at a distance from tens of meters to hundreds of meters.
APA, Harvard, Vancouver, ISO, and other styles
32

Meng, Da Wei, Yu Feng Lu, Yong Ming Xu, and Xi Feng Wang. "Design and Implementation of BLDCM Driver Based on SOPC." Key Engineering Materials 486 (July 2011): 29–32. http://dx.doi.org/10.4028/www.scientific.net/kem.486.29.

Full text
Abstract:
The Brushless Direct Current Motor (BLDCM) has been researched by many scholars because of its simple structure, high power density, high reliability and easy control. In this paper, a driver based on the system on a programmable chip (SOPC) is designed to implement adjustable subdivision. For SPWM, SVPWM frequency conversion control Direct Digital Synthesizer(DDS) is introduced, DDS Intellectual Property (IP) core is designed for motor control of frequency conversion. This driving system can solve the high subdivision problem, increase the driving torque and angle resolution, and smooth the motor angle. Employing the bottom-top design method, the circuit was described by the VHDL language, synthesized by integrated environment, and simulated by Modelsim in both behavior level and gate level through the PLI interface. According to experiment’s result, this driver has the advantages of easy debugging, high anti-interference ability, larger driving power, low volume and low cost in large scale production.
APA, Harvard, Vancouver, ISO, and other styles
33

Meng, Da Wei, Yu Feng Lu, Yong Ming Xu, and Xi Feng Wang. "Design of Sine-Wave Control System of BLDCM Regarding a New Permanent-Magnet Material." Advanced Materials Research 321 (August 2011): 37–40. http://dx.doi.org/10.4028/www.scientific.net/amr.321.37.

Full text
Abstract:
The Brushless Direct Current Motor (BLDCM) is in nature of high power density, high reliability and easy control etc, growing with the development of microcomputers, new power electronic devices, control theories and low cost rare earth permanent magnet material. The applications of a new permanent magnet material are described in this paper,such as in manufacture of parts of stereo,automobile devices,medical instruments and computer hardware, etc.Besides,the paper also discusses the prospect of its development and the problems in its production.Aiming at the BLDCM with a Hall rotor position sensor, a motor drive controller is designed by pure hardware approach. In this paper, a simple design procedures is described that can be implemented to decrease the material cost of a BLDCM often found in domestic appliances and automotive applications. According to the experiment’s result, this controller has the advantages of easy debugging, high anti-interference ability, larger driving power, low volume and low cost in large scale production.
APA, Harvard, Vancouver, ISO, and other styles
34

Piróg, S., R. Stala, and Ł. Stawiarski. "Power electronic converter for photovoltaic systems with the use of FPGA-based real-time modeling of single phase grid-connected systems." Bulletin of the Polish Academy of Sciences: Technical Sciences 57, no. 4 (December 1, 2009): 345–54. http://dx.doi.org/10.2478/v10175-010-0137-9.

Full text
Abstract:
Power electronic converter for photovoltaic systems with the use of FPGA-based real-time modeling of single phase grid-connected systemsThe paper presents a method of investigation of grid connected systems with a renewable energy source. The method enables fast prototyping of control systems and power converters components by real-time simulation of the system. Components of the system such as energy source (PV array), converters, filters, sensors and control algorithms are modeled in FPGA IC. Testing the systems before its practical application reduces cost and time-to-market. FPGA devices are commonly used for digital control. The resources of the FPGAs used for preliminary testing can be sufficient for the complete system modelling. Debugging tools for FPGA enable observation of many signals of the analyzed power system (as a result of the control), with very advanced triggering tools. The presented method of simulation with the use of hardware model of the power system in comparison to classical simulation tools gives better possibilities for verification of control algorithms such as MPPT or anti-islanding.
APA, Harvard, Vancouver, ISO, and other styles
35

Chen, Chen, Junqi Xu, Wen Ji, Ruijie Chao, and Yougang Sun. "Adaptive levitation control for characteristic model of low speed maglev vehicle." Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science 234, no. 7 (January 8, 2020): 1456–67. http://dx.doi.org/10.1177/0954406219899677.

Full text
Abstract:
Due to the strong coupling and large disturbance between multiple electromagnetic coils, the previous dynamic model of low-speed maglev train cannot accurately model the complex system when it is levitated. Therefore, based on the general linear transfer function, the concept of feature modeling is introduced to describe the dynamic characteristics, environmental characteristics and control performance requirements of the system by defining feature variables. On the premise of satisfying a certain sampling frequency, the original dynamic model is approximately linearized, which is equivalent to a second-order difference equation, i.e. a system with slow time-varying parameters. On this basis, the design and implementation of the controller of the magnetic levitation system are discussed. First, by studying the application of PID controller in suspension system, the difficulty of parameter debugging of PID controller and the insufficiency of restraining coupling interference are pointed out. The generalized predictive control (GPC) is proposed and improved to improve the robustness and anti-jamming of the system. Finally, a large number of simulations and experiments show that the controller can effectively suppress the coupling interference. Compared with single-point levitation controller, it has higher application value in engineering practice.
APA, Harvard, Vancouver, ISO, and other styles
36

Mimura, Mamoru, and Ryo Ito. "Applying NLP techniques to malware detection in a practical environment." International Journal of Information Security, June 6, 2021. http://dx.doi.org/10.1007/s10207-021-00553-8.

Full text
Abstract:
AbstractExecutable files still remain popular to compromise the endpoint computers. These executable files are often obfuscated to avoid anti-virus programs. To examine all suspicious files from the Internet, dynamic analysis requires too much time. Therefore, a fast filtering method is required. With the recent development of natural language processing (NLP) techniques, printable strings became more effective to detect malware. The combination of the printable strings and NLP techniques can be used as a filtering method. In this paper, we apply NLP techniques to malware detection. This paper reveals that printable strings with NLP techniques are effective for detecting malware in a practical environment. Our dataset consists of more than 500,000 samples obtained from multiple sources. Our experimental results demonstrate that our method is effective to not only subspecies of the existing malware, but also new malware. Our method is effective against packed malware and anti-debugging techniques.
APA, Harvard, Vancouver, ISO, and other styles
37

"Exploring the API Calls for Malware Behavior Detection using Concordance and Document Frequency." International Journal of Engineering and Advanced Technology 8, no. 6 (August 30, 2019): 4991–97. http://dx.doi.org/10.35940/ijeat.f9144.088619.

Full text
Abstract:
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an endless battle between ever-evolving malware and antivirus programs that need to process ever-increasing security related data. Malwares are becoming persistent by creating full-fledged variants of the same or different family. Malwares belonging to same family share same characteristics in their functionality of spreading infections into the victim computer. We find that certain malicious functions are commonly included in malware even in different categories. From checking the existence of certain functions or API call sequence patterns matched, we can even detect new unknown malware. For malware detection, various approaches have been proposed. An Application Programming Interface (API) is widely is used for the software to interact with an operating system to do certain task such as opening file, deleting file etc., Users of the computers use this API to make it comfortable for their program to communicate with the operating system without having the prior knowledge of the hardware of the object system. The attacker also use the same type of APIs to create malware, hence it is very much difficult to know about these APIs. There are many researches done in this field, however, most researchers used n-gram to detect the sequence of API calls. Even though, it gave good results, it is time consuming to process through all the output. Hence, we proposed to use Concordance to search for the API call sequence of a malware because it use KWIC (Key Word in Context), thus only displayed the output based on the queried keyword. After that, Document Frequency (DF) is used to search for the most commonly used APIs in the dataset. The result of our experiment gave high accuracy than other methods and also found more categories than other methods. API call sequence can be extracted from most of the modern d evices. Hence we supposed that our method can detect the malware for all types of the ubiquitous devices. The results of the experiment show that Concordance can be used to search for API call sequence as we manage to identify Eight malicious Activities (Screen Capture, Hooking, Downloader, Enumerate all process, Anti debugging, Synchronization, Key Logger and Dropper) using this method.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography