The Mobility Equation and the Solvability of Joint Forces/Torques in Dynamic Analysis

1992 ◽  
Vol 114 (2) ◽  
pp. 257-262 ◽  
Author(s):  
Shin-Min Song ◽  
Xiaochun Gao

The mobility equation has been applied to predict the indeterminacy of unknown joint forces/torques in static analysis. In this paper, the mobility equation is modified to investigate the solvability of joint forces/torques of spatial mechanisms in dynamic analysis. Each factor which may contribute to indeterminacy is discussed and is explicitly expressed in the equation. With the modifications, the mobility equation can be applied to a system with or without redundant actuators. Together with the concept of subspaces and a few simple rules, the mobility equation can be used to identify the solvability of every joint unknown, as well as the equations which are required for the solutions, under the assumption of rigid bodies. This method can be used as a guidance of dynamic analysis in dealing with complicated systems such as walking machines and multi-fingered grippers.

Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Roee S. Leon ◽  
Michael Kiperberg ◽  
Anat Anatey Leon Zabag ◽  
Nezer Jacob Zaidenberg

AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transparent to the running OS and its applications. The evaluation of the system’s efficiency suggests that the induced performance overhead is negligible.


2020 ◽  
Vol 23 (3) ◽  
pp. 473-493
Author(s):  
Nikita Andreevich Kataev ◽  
Alexander Andreevich Smirnov ◽  
Andrey Dmitrievich Zhukov

The use of pointers and indirect memory accesses in the program, as well as the complex control flow are some of the main weaknesses of the static analysis of programs. The program properties investigated by this analysis are too conservative to accurately describe program behavior and hence they prevent parallel execution of the program. The application of dynamic analysis allows us to expand the capabilities of semi-automatic parallelization. In the SAPFOR system (System FOR Automated Parallelization), a dynamic analysis tool has been implemented, based on on the instrumentation of the LLVM representation of an analyzed program, which allows the system to explore programs in both C and Fortran programming languages. The capabilities of the static analysis implemented in SAPFOR are used to reduce the overhead program execution, while maintaining the completeness of the analysis. The use of static analysis allows to reduce the number of analyzed memory accesses and to ignore scalar variables, which can be explored in a static way. The developed tool was tested on performance tests from the NAS Parallel Benchmarks package for C and Fortran languages. The implementation of dynamic analysis, in addition to traditional types of data dependencies (flow, anit, output), allows us to determine privitizable variables and a possibility of pipeline execution of loops. Together with the capabilities of DVM and OpenMP these greatly facilitates program parallelization and simplify insertion of the appropriate compiler directives.


2021 ◽  
Vol 11 (22) ◽  
pp. 10976
Author(s):  
Rana Almohaini ◽  
Iman Almomani ◽  
Aala AlKhayer

Android ransomware is one of the most threatening attacks that is increasing at an alarming rate. Ransomware attacks usually target Android users by either locking their devices or encrypting their data files and then requesting them to pay money to unlock the devices or recover the files back. Existing solutions for detecting ransomware mainly use static analysis. However, limited approaches apply dynamic analysis specifically for ransomware detection. Furthermore, the performance of these approaches is either poor or often fails in the presence of code obfuscation techniques or benign applications that use cryptography methods for their APIs usage. Additionally, most of them are unable to detect ransomware attacks at early stages. Therefore, this paper proposes a hybrid detection system that effectively utilizes both static and dynamic analyses to detect ransomware with high accuracy. For the static analysis, the proposed hybrid system considered more than 70 state-of-the-art antivirus engines. For the dynamic analysis, this research explored the existing dynamic tools and conducted an in-depth comparative study to find the proper tool to integrate it in detecting ransomware whenever needed. To evaluate the performance of the proposed hybrid system, we analyzed statically and dynamically over one hundred ransomware samples. These samples originated from 10 different ransomware families. The experiments’ results revealed that static analysis achieved almost half of the detection accuracy—ranging around 40–55%, compared to the dynamic analysis, which reached a 100% accuracy rate. Moreover, this research reports some of the high API classes, methods, and permissions used in these ransomware apps. Finally, some case studies are highlighted, including failed running apps and crypto-ransomware patterns.


2012 ◽  
Vol 184-185 ◽  
pp. 1521-1525
Author(s):  
Yu En Wu ◽  
Yu Hui Hu ◽  
Ya Ying Jin ◽  
Jun Qiang Xi

A CAN-Bus protocol analysis and verification method with three key aspects which are static analysis, dynamic analysis and verification &control is put forward. Static analysis ascertains the communication information of each node by bus residual method; Synchronous contrast method is put in use to obtain practical and effective control protocol in the dynamic analysis; Verification &control is to verify the correctness of the analytical protocol and to achieve the control of the critical subsystems by bus gateway system. This scheme has been used to analyze a foreign parallel hybrid powertrain system, and it proves the correctness of the designed static analysis and dynamic analysis, the applicability of verification &control.


Author(s):  
Jian-Qing Zhang ◽  
Ting-Li Yang

Abstract This work presents a new method for kinetostatic analysis and dynamic analysis of complex planar mechanisms, i.e. the ordered single-opened-chains method. This method makes use of the ordered single-opened chains (in short, SOC,) along with the properties of SOC, and the network constraints relationship between SOC,. By this method, any planar complex mechanism can be automatically decomposed into a series of the ordered single-opened chains and the optimal structural decomposition route (s) can be automatically selected for dynamic analysis, the paper present the dynamic equation which can be used to solve both the kinetostatic problem and the general dynamic problem. The main advantage of the proposed approach is the possibility to reduce the number of equations to be solved simultaneously to the minimum, and its high automation as well. The other advantage is the simplification of the determination of the coefficients in the equations, and thus it maybe result in a much less time-consuming algorthem. The proposed approach is illustrated with three examples. The presented method can be easily extended to the dynamic analysis of spatial mechanisms.


2017 ◽  
Vol 11 (3) ◽  
pp. 15-28 ◽  
Author(s):  
Anjali Kumawat ◽  
Anil Kumar Sharma ◽  
Sunita Kumawat

Android based Smartphones are nowadays getting more popular. While using Smartphone, user is always concerned about security and malicious attacks, cryptographic vulnerability of the applications. With increase in the number of Android mobiles, Android malwares are also increasing very rapidly. So the authors have proposed the “Identification of cryptographic vulnerability and malware detection in Android” system. They have designed a user friendly android application, through which user and developer can easily test the application whether it is benign or vulnerable. The application will be tested firstly using static analysis and then the dynamic analysis will be carried out. The authors have implemented static and dynamic analysis of android application for vulnerable and malicious app detection. They have also created a web page. User can either use the application or the web page.


Sign in / Sign up

Export Citation Format

Share Document