Nanjing Institute of Artillery Corps

Nanjing, China

Nanjing Institute of Artillery Corps

Nanjing, China
SEARCH FILTERS
Time filter
Source Type

Qin Z.,Nanjing Southeast University | Yang Z.,Nanjing Southeast University | Di Y.,Nanjing Institute of Artillery Corps | Zhang Q.,Nanjing Institute of Artillery Corps | And 2 more authors.
Lecture Notes in Electrical Engineering | Year: 2014

The rapid development of the smartphone brings immense convenience to people. Recently more and more developers publish their own applications (or apps) on the android markets to make profits. The so-called repackaged apps emerge by embedding malicious codes or injecting ads into the existing apps and then republishing them. In this paper, focusing on the shortcomings of existing detection system, we propose an efficient repackaged apps detection scheme based on context-triggered piecewise hash (CTPH). We also optimize the similarity calculation method (edit distance) and filter unnecessary matching process to make the matching more efficient. Experimental results show that there are about 5 % repackaged apps in pre-collected data. The proposed scheme improves the detection accuracy of the repackaged apps and has positive significance to the ecosystem of android markets. © 2014 Springer International Publishing Switzerland.


Qin Z.,Nanjing Southeast University | Zhang X.,Nanjing Southeast University | Feng K.,Nanjing Southeast University | Zhang Q.,Nanjing Institute of Artillery Corps | Huang J.,Nanjing Southeast University
International Journal of Distributed Sensor Networks | Year: 2015

With the wide adoption of wireless sensor network (WSN), security problems emerge as a challenging issue because of the limited computational power and energy of the sensor nodes. Furthermore, the deployment of WSN in the hostile area with a large number of nodes also poses a threat. In this paper, we proposed a new efficient key management scheme based on Elliptic Curve Cryptography (ECC) and AVL tree for large scale WSNs. In our scheme the Elliptic Curve Paillier Encryption (ECPE) cryptography is adopted for communication and the AVL tree is used to store the neighbors' ID and public key. The number of keys used in our scheme is smaller than the proposed schemes as we store these keys using AVL tree to shorten the search time. Regular key updates are also designed to further improve the security of the whole network. Our scheme has a good scalability where the node addition and deletion are supported. Experimental results and analysis show our scheme can significantly reduce the energy consumed by the node and reduce the memory and computational overhead. © 2015 Zhongyuan Qin et al.


Qin Z.,Nanjing Southeast University | Zhang X.,Nanjing Southeast University | Feng K.,Nanjing Southeast University | Zhang Q.,Nanjing Institute of Artillery Corps | Huang J.,Nanjing Southeast University
Sensors (Basel, Switzerland) | Year: 2014

With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead.


Wang Y.,Nanjing Southeast University | Qin Z.,Nanjing Southeast University | Zhang Q.,Nanjing Institute of Artillery Corps | Wang H.,Nanjing Southeast University | Huang J.,Nanjing Southeast University
Proceedings - 2014 10th International Conference on Computational Intelligence and Security, CIS 2014 | Year: 2015

To achieve security in wireless sensor networks, it is needed to encrypt and authenticate message sent between sensor nodes. Key management is a very critical problem. However, as sensor nodes are resource-constrained, achieving key agreement is nontrivial. In this paper, we propose a key pre-distribution scheme based on multiple key spaces. The scheme combines the advantages of BIBD and Blom. Detailed analysis of the performance for this scheme is also given which shows that it has acceptable storage, computation, communication overhead and increases the network connectivity compared to previous schemes. © 2014 IEEE.


Qin Z.,Nanjing Southeast University | Chen N.,Nanjing Southeast University | Zhang Q.,Nanjing Institute of Artillery Corps | Di Y.,Nanjing Institute of Artillery Corps
Proceedings - 3rd International Conference on Multimedia Information Networking and Security, MINES 2011 | Year: 2011

The rapid development of smart phone prospered mobile phone viruses. It is of great importance to prevent the breaking out of mobile viruses. The features and principle of mobile phone virus are introduced in this paper, together with the attack mode. In this paper the current detection methods are reviewed, especially those based on behavior detection, the pros and cons are also concluded. Finally, we proposed a mobile phone viruses defense technique based on HMM, and the further research directions are discussed. © 2011 IEEE.


PubMed | Nanjing Institute of Artillery Corps and Nanjing Southeast University
Type: Journal Article | Journal: Sensors (Basel, Switzerland) | Year: 2014

With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead.


Xin K.,Nanjing Sample Technology Co. | Li G.,Nanjing Sample Technology Co. | Qin Z.,Nanjing Southeast University | Zhang Q.,Nanjing Institute of Artillery Corps
Proceedings - 2012 4th International Conference on Multimedia and Security, MINES 2012 | Year: 2012

In recent years, smart phone technology is becoming increasingly popular. The dangers of mobile phone malwares are becoming more and more serious. In this paper we present a new mobile smartphone malware detection scheme based on Hidden Markov Model (HMM) which is different from the traditional signature scanning methods. Firstly, we monitor the key press and system function call sequence, and take the key press as hidden state. After decoding HMM model, abnormal process can be detected using the matching rate of HMM output to the actual key press sequence. The experimental results demonstrate that the proposed method can effectively detect mobile malwares. © 2012 IEEE.


Qin Z.,Nanjing Southeast University | Zhang Q.,Nanjing Institute of Artillery Corps | Wan C.,Nanjing Southeast University | Di Y.,Nanjing Institute of Artillery Corps
Journal of Information and Computational Science | Year: 2012

Cloud computing is an active and prosperous field of computer science, both academically and industrially. Meanwhile, security is one of major concerns that may prevent the wide acceptance of cloud computing. In particular, as the key technique behind cloud computing, virtualization may be vulnerable to many attacks. In this paper, we review and classify the state-of-the-art virtual machine security techniques according to their roles in the virtual machine architecture, i.e., at the hardware level, as the hypervisor and inside the virtual machines. Finally, we discuss additional problems that remain to be addressed. © 2012 by Binary Information Press.


Qin Z.,Nanjing Southeast University | Zhang X.,Nanjing Southeast University | Zhang Q.,Nanjing Institute of Artillery Corps | Yang Z.,Nanjing Southeast University
IET Conference Publications | Year: 2014

With the massive popularity of smartphones, many third-party marketplaces are emerged to meet smartphone users' need. These third-party marketplaces usually provide thousands of applications, but can't guarantee their security. Among the malicious applications, repackaging is one of the most common techniques to piggyback malicious payloads into legitimate applications. In order to keep the android ecosystem healthy, an app similarity measurement system is proposed to detect repackaged applications directly from the DEX file. We use the string length as the fingerprint to measure the similarity between third-party application and the original one, afterwards according to the similarity score whether one third-party application is repackaged or not can be determined. We perform a systematic study on five popular Android-based third-party marketplaces with randomly 200 samples from each third-party marketplace. Further manual investigation shows that these repackaged apps are mainly used to replace existing in-app advertisements or embed new ones to "steal" or re-route ad revenues. We also identify a few cases with planted malicious payloads among repackaged apps.


Qin Z.,Nanjing Southeast University | Xu Y.,Nanjing Southeast University | Di Y.,Nanjing Institute of Artillery Corps | Zhang Q.,Nanjing Institute of Artillery Corps | Huang J.,Nanjing Southeast University
IET Conference Publications | Year: 2014

The development of mobile Internet and application store accelerates the spread of malicious applications on smartphones, especially on Android platform. In this paper, we propose an integrated Android malware detection scheme, combining permission and behavior analysis. For APK files which had been detected, their MD5 values are extracted as signature for detection. For APK files which had not been detected, detection is carried based on permission and behavior analysis. Behavior analysis contained taint propagation analysis and semantic analysis. Experiment results show that this system can detect the malware of privacy stealing and malicious deduction successfully.

Loading Nanjing Institute of Artillery Corps collaborators
Loading Nanjing Institute of Artillery Corps collaborators