Loading...

Table of Content

    15 March 2017, Volume 3 Issue 3
    Innovative Technology Promotes Smart City and Network Security —A Case Study of Hikvision
    2017, 3(3):  194-199. 
    Asbtract ( )   PDF (938KB) ( )  
    Related Articles | Metrics
    Blockchain Technology and Its Prospect of Industrial Application
    2017, 3(3):  200-210. 
    Asbtract ( )   PDF (9369KB) ( )  
    References | Related Articles | Metrics
    The Blockchain industry is current developing rapidly globally, with a clearer picture of the whole industry chain. The underlying infrastructure and platform, Blockchain applications in different industry segments, and venture capital investment all have sound foundations. The paper introduces the basic concept and work principle of Blockchain, describes the design philosophy, technological application and security issues of the three mainstream Blockchain platforms nowadays (Bitcoin, Ethernet and Hyperledger), and then puts forward a number of potential Blockchain application scenarios in the world. With great attention on Blockchain in terms of industry application, its helpful for Blockchain practices with Design Thinking and IBM Garage. Both in China and around the world, the paper summarizes the status quo of the Blockchain industry development, and outlines its future in general.
    The Design of Smart Contracts on Crowd Funding Private Blockchain
    2017, 3(3):  211-219. 
    Asbtract ( )   PDF (7360KB) ( )  
    References | Related Articles | Metrics
    P2P Crowdfunding is a hotspot model based on Internet financial technology. Currently, there are problems such as the lack of trust and supervision, and blockchain and smart contract provide a new way to solve these problems. As a distributed ledger database, the blockchain records the immutable asset data. The smart contract stored in the blockchain can directly control the digital asset, and constructs the trusted computing environment for crowd funding. Crowdfunding Private Blockchain (CPBC) stores and executes the code and data on the blockchain, not only makes that all the projects on the chain true and reliable, but also makes the execution of the project credible, greatly enhance the trusty of the platform, and reduce the broker fee. The design of smart contract for the crowdfunding blockchain is given, which includes the execution model and state storage model, and gives the concrete examples in Java. The research results show that smart contract design on the CPBC could meet the 80% demand for business, and obtain the preliminary application and achieve good results.
    CFL Authentication System and Its Applications in the Blockchain
    2017, 3(3):  220-226. 
    Asbtract ( )   PDF (5196KB) ( )  
    References | Related Articles | Metrics
    tBased on the technical shortcomings of two kinds of authentication systems of PKI and IBE, this paper introduces the authentication system of CFL about development backgrounds, history, patents and its technology advantages, such as decentralization, destorilization, one person one key, roots high security. CFLs Ukey has not afraid to steal. The technology properties of CFL authentication system also included process to process high security authentication within a machine, high security the scene to authenticate, mandatory access control features and etc. This paper presents the products of CFL, and those under research. With the help of CFL, it can be provided further information in the network information system high security protection about confidentiality, integrity, availability, controllability and certification. Finally, the relationship between the CFL authentication system and the blockchain is discussed.
    Research on Private Blockchain Based on Crowdfunding
    2017, 3(3):  227-236. 
    Asbtract ( )   PDF (8179KB) ( )  
    References | Related Articles | Metrics
    As a new financing mode of Fintech, P2P crowdfunding has been widely concerned and used. However, there are still some problems in technology and management mechanism, such as credibility, security and regulation, which could limit the development of crowdfunding. As a result, how to promote the improvement of this mode technically becomes a problem to be solved. A Blockchain based solution is proposed, which utilizes the nontampering, traceability and data security features of the Blockchain distributed database, and this paper designs a crowdfunding private Blockchain architecture (CPBC). The double chain structure keeps the ledger open and the user privacy protected, and distributes the consensus nodes to the supervisor or the third party to form a supervisory mechanism. The key issues such as multichain structure, consensus algorithm and supervisory model are studied. The research results show that CPBC can meet the needs of crowdfunding and has been greatly strengthened in financial data security and credibility. CPBC has been applied in practice and has achieved good results.
    Blockchain Technology and Its Applications
    Zheng Huang
    2017, 3(3):  237-245. 
    Asbtract ( )   PDF (7380KB) ( )  
    References | Related Articles | Metrics
    Blockchain is a hash chain maintained by a large number of participants. Blockchain has the merit of securing multiparty computation, and Blockchain can be used in a network with limited trust between each node. It also has the merit of hash chain which can be used to prevent tampering time series data. The industry and academia pay a lot of attention to Blockchain and its applications in areas such as electronic currency, electronic contract and notary service. This paper describes the basic technology behind Blockchain and the threats to Blockchain network. Based on current Blockchain applications, this paper analyzes the deficiency of Blockchain and identifies the key problems in Blockchain research. Finally, this paper analyzes both the domestic and foreign patents on Blockchain and describes the potential applications of Blockchain.
    Research and Implementation of Detection Method of Manual DLL Injection
    2017, 3(3):  246-253. 
    Asbtract ( )   PDF (5896KB) ( )  
    References | Related Articles | Metrics
    With the development of computer system and network technology, the technology of malicious code detection is facing new challenges, “DLL injection” is a common means of using malicious code to infect normal executable files. Based on the indepth understanding of the basic structure of PE files, this paper studies a technique for implementing DLL injection by manually modifying PE file, and proposes a method to detect the malicious injected DLL in the PE file. The method proposed has positive significance for research of DLL injection and detection.
    Phishing Attack Threat of Dark Mobile Bank
    2017, 3(3):  254-269. 
    Asbtract ( )   PDF (13044KB) ( )  
    References | Related Articles | Metrics
    As one of the important branches of dark mobile bank, phishing attacks have shown a trend of rapid burst in recent years. With the popularity of electronic commerce and mobile payment, phishing has also undergone new changes. In addition to the traditional phishing updated, it also evolved into a new way of phishing which targets mobile terminal users. Phishing attacks that make use of malicious code, malicious WiFi and pseudo base stations to send text messages are becoming more and more. Meanwhile, iPhone fishing industry is gradually emerged, the number of mobile phishing continues to rise. We believe that frequent phishing attacks and other highrisk events are closely related with black industry chain which has a huge amount of disclosure of privacy data, privacy disclosure contributes a lot to phishing attacks. AVL Mobile Security and YUNDI made a deep analysis of phishing attacks under the current Internet environment, revealing the relevant underground industry chain. The report aims at providing recommendations for national regulators and operators to set up network security administration regulations, laws and measures, and reminding enterprises and public users to enhance security awareness and comprehensively improve the level of security technology.
    Research on Quantitative Assessment Method of Vulnerability of Warship System Based on Workflow
    2017, 3(3):  270-276. 
    Asbtract ( )  
    References | Related Articles | Metrics
    Warship system is a typical cyberphysical system. The characteristics of the fusion of cyber part and physical part of warship system needs to be fully considered during the security vulnerability assessment. In this paper, a workflow based vulnerability assessment method for security of the warship system is proposed after analyzing the security issues of the warship deeply and studying the principle of workflow. In detail, A workflow based vulnerability assessment model is established for the business process which is to be evaluated. Further, the composition of equipment that performs the workflow task and the vulnerability of the equipment are analyzed, respectively. And then, the security vulnerability of the equipment is evaluated by analytic hierarchy process (AHP) method. According to the logical relationship between workflow tasks and the results of vulnerability assessment of equipment, the security vulnerability of the workflow tasks is evaluated, and finally the security vulnerability of the business process is evaluated.
    Progress and Challenges of Intelligent Surveillance Industry Security
    2017, 3(3):  277-280. 
    Asbtract ( )   PDF (936KB) ( )  
    Related Articles | Metrics
    The Common and Differences of Visualization Products in Network Security — Product Manager's Perspective of RSA Conference
    2017, 3(3):  281-288. 
    Asbtract ( )   PDF (3555KB) ( )  
    Related Articles | Metrics