• Title/Summary/Keyword: 검사메커니즘

Search Result 83, Processing Time 0.027 seconds

A Source-Level Discovery Methodology for Vulnerabilities of Linux Kernel Variables (리눅스 커널 변수 취약성에 대한 소스레벨 발견 방법론)

  • Ko Kwangsun;Kang Yong-hyeog;Eom Young Ik;Kim Jaekwang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.13-25
    • /
    • 2005
  • In these days, there are various uses of Linux such as small embedded systems, routers, and huge servers, because Linux gives several advantages to system developers by allowing to use the open source code of the Linux kernel. On the other hand, the open source nature of the Linux kernel gives a bad influence on system security. If someone wants to exploit Linux-based systems, the attacker can easily do it by finding vulnerabilities of their Linux kernel sources. There are many kinds of existing methods for lading source-level vulnerabilities of softwares, but they are not suitable for finding source-level vulnerabilities of the Linux kernel which has an enormous amount of source code. In this paper, we propose the Onion mechanism as a methodology of finding source-level vulnerabilities of Linux kernel variables. The Onion mechanism is made up of two steps. The Int step is to select variables that may be vulnerable by using pattern matching mechanism and the second step is to inspect vulnerability of each selected variable by constructing and analyzing the system call trees. We also evaluate our proposed methodology by applying it to two well-known source-level vulnerabilities.

A Study on Security Analysis and Security Design for IPv6 Transition Mechanisms (IPv6 전환 기술의 보안 위협 분석 및 보안 설계에 대한 연구)

  • Choi, In-Seok;Kim, Young-Han;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.689-697
    • /
    • 2005
  • The IETF has created the v6ops Working Group to assist IPv6 transition and propose technical solutions to achieve it. But it's quite problem which security consideration for a stage of IPv4/IPv6 transition and co-existence. There are new security problem threat that it caused by the characteristics of heterogeneity. In this paper, we describe IPv6 transition mechanisms and analyze security problem for IPv6 transition mechanism. also we propose security consideration and new security mechanism. We analyzed DoS and DRDoS in 6to4 environment and presented a address sanity check as a solution. We also showed an attack of address exhaustion in address allocation server. To solve this problem, we proposed challenge-response mechanism in DSTM.

A deisgn of VHDL compiler front-end for the VHDL-to-C mapping (VHDL-to-C 사상을 위한 VHDL 컴파일러 전반부의 설계)

  • 공진흥;고형일
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2834-2851
    • /
    • 1997
  • In this paper, a design and implementation of VHDL compiler front-end, aims at supporting the full-set of VHDL '87 & '93 LRM and carring out the preprocessing of VHDL-to-C, is described. The VHDL compiler front-end includes 1)the symbol tree of analyzed data to represent the hierarchy, the scope and visibility, the overloading and homograph, the concurrent multiple stacks in VHDL, 2)the data structure and supportig routies to deal with the objects, the type and subtype, the attribute and operation in VHDL, 3)the analysis of the concurrent/sequential statements, the behavior/structural descriptions, of semantic token and the propagation of symbol & type to improve the registration and retrieval procedure of analyzed data. In the experiments with Validation Suite, the VHDL compiler front-end could support the full-set specification of VHDL LRM '87 & '93; and in the experiments to asses the performance of symantic token for the VHDL hierachy/visibility/concurrency/semantic checking, the improvement of about 20-30% could be achieved.

  • PDF

Research on Efficiency of Western China's Universities under the "Double First-Class" Initiative ("더블 퍼스트 클래스"를 통한 중국 서부 대학의 연구 효율성에 관한 연구)

  • Youming Li;Jae-Yeon Sim
    • Industry Promotion Research
    • /
    • v.8 no.4
    • /
    • pp.257-266
    • /
    • 2023
  • The research focuses on the provincial universities in the western region of China and investigates the research level of 12 provincial universities from 2017 to 2021, considering both static efficiency and dynamic efficiency. The static efficiency is examined using Data Envelopment Analysis (DEA), while the dynamic efficiency is analyzed using the Malmquist model. The analysis results are as follows: the scientific research efficiency of universities in the 12 western provinces is generally not high. Against the background of the "Double First-Class" construction, the overall efficiency of scientific research in universities is showing an increasing trend. The main reason for the increase in scientific research efficiency is the increase in scale efficiency in recent years. The total factor productivity (TFP) of research activities is influenced by the technology progress index and exhibits a pattern of initial increase, followed by a decline, and then an increase again. Research conclusion: Western colleges and universities should reasonably allocate resources for scientific research activities, perfect scientific research mechanisms, improve management standards, promote scientific innovation and corresponding achievements, and ultimately raise the scientific and technological level in western China.

Histological Examination of Engineered Mesenchymal Stem Cells Improve Bladder Function in Rat (랫드에서 방광기능 향상의 엔지니어링 중간엽 줄기세포의 조직학적 소견)

  • Cho, Eun Kyung;Jeon, Seung Hwan
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.52 no.2
    • /
    • pp.112-118
    • /
    • 2020
  • This study was undertaken to examine the effects and to investigate the relevant mechanisms of overexpressing stromal cell-derived factor-1 (SDF-1) produced by engineered mesenchymal stem cells, in a neurogenic bladder (NB) rat model. Sprague-Dawley (SD) rats (N=48) were randomly divided into 4 groups comprising 12 rats each: control group, Injury group, Injury+imMSC group, and Injury+SDF-1 eMSC group. Rats in the Injury+imMSC group were treated with imMSCs, whereas the Injury+SDF-1 eMSC group were administered SDF-1 eMSCs. After 4-weeks therapy, the bladder and pelvic nerve (PN) tissues were examined by subjecting to Masson's trichrome staining and immunofluorescence. Administration of SDF-1 eMSC resulted in improved smooth muscle content in the bladder tissue, significantly increased β-III tubulin expression of the PN, and enhanced SDF-1 expression (P<0.05). The bladder wall repair can be attributed to the overexpression of SDF-1 by SDF-1 eMSCs. Significantly increased SDF-1 expression was obtained in the Injury+SDF-1 eMSC group (P<0.05). The crushed PN also showed significant recovery in the Injury+SDF-1 eMSC group (P<0.05). In conclusion, our results indicate that SDF-1 eMSCs express more SDF-1 in vivo, thereby facilitating the repair of injured nerve and recovery of NB in rats.

Analysis and Evaluation of Degrees of Contribution of Aroma Components in Hongro Apples (홍로사과의 향에 영향을 주는 향 성분 분석과 기여도 평가)

  • Koh, Jin-Tae;Yu, Young-Jae;Kim, Man-Goo
    • Korean Journal of Food Science and Technology
    • /
    • v.41 no.6
    • /
    • pp.603-608
    • /
    • 2009
  • In this study, "Hongro" apples for test samples were selected from a market for aroma analysis. Analysis was done after 1 hr, in a forming headspace while maintaining a temperature of $25^{\circ}C$. First, the complex aroma of the apples was assessed by a Direct Sensory Method. Secondly, the complex aroma was analyzed under individual aroma conditions separated by GC/FID/Olfactometry. Finally, aroma component analysis by GC/MS was performed. Degrees of contribution of aroma components were evaluated by an aroma value calculation considering aroma duration time, frequency, and intensity. The contribution rate (%) of the aroma induction component influencing apple aroma was determined by aroma component analysis and aroma contribution degree. As a result, it was found that the top four components were as follows, by contribution rate (%): acetic acid (23%), 1-hexanol (16%), butyl ethanoate (13%), 4-methoxy-2-methylbutane (9%). These four components constitute the complex aroma tested by the direct sensory method, and was largely recognized by the apple aroma test panel. Consequently, it was found that these components are the key factors in apple aroma. If the mechanism of formation of these components can be found, it could have a significant influence on consumers' acceptance of new varieties of apples.

Evaluation of Ultrasonic Nonlinear Characteristics in Artificially Aged Al6061-T6 (인공시효된 Al6061-T6의 초음파 비선형 특성 평가)

  • Kim, Jongbeom;Lee, KyoungJun;Jhang, Kyung-Young;Kim, ChungSeok
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.34 no.3
    • /
    • pp.220-225
    • /
    • 2014
  • Generally, the nonlinearity of ultrasonic waves is measured using a nonlinear parameter ${\beta}$, which is defined as the ratio of the second harmonic's magnitude to the power of the fundamental frequency component after the ultrasonic wave propagates through a material. Nonlinear parameter ${\beta}$ is recognized as an effective parameter for evaluating material degradation. In this paper, we evaluated the nonlinear parameter of Al6061-T6 which had been subjected to an artificial aging heat treatment. The measurement was using the transmitted signal obtained from contact-type transducers. After the ultrasonic test, a micro Vickers hardness test was conducted. From the result of the ultrasonic nonlinear parameter, the microstructural changes resulting from the heat treatment were estimated and the hardness test proved that these estimates were reasonable. Experimental results showed a correlation between the ultrasonic nonlinear parameter and microstructural changes produced by precipitation behavior in the material. These results suggest that the evaluation of mechanical properties using ultrasonic nonlinear parameter ${\beta}$ can be used to monitor variations in the mechanical hardness of aluminum alloys in response to an artificial aging heat-treatment.

Failure Analysis by Fracture Study of Connecting Rod Bolts in Diesel Engine for Military Tracked Vehicles (군용 궤도차량 디젤엔진의 커넥팅 로드 볼트 파손 검토를 통한 고장원인분석)

  • Oh, Dae San;Kim, Ji Hoon;Seo, Suk Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.7
    • /
    • pp.191-200
    • /
    • 2020
  • Tracked military vehicles are operated under harsher conditions and climates than ordinary vehicles, and the components require high degrees of reliability and durability. A diesel engine is the main power generator, and when the vehicle breaks down, there is a high possibility of causing a large-scale accident. Therefore, analyzing the cause of engine failure can be important for preventing similar cases that may occur. In this study, we clarified the mechanism of engine failure according to an overhaul test, hardness measurement, and an analysis of the fracture surface. The overhaul test confirmed that a bolt was separated from the connecting rod (number 4). In addition, the hardness measurement results of the connecting rod bolt conformed to the standard, and it was found that the bolt fracture was ductile fracture through an analysis of the fracture surface. Based on the results, it was concluded that damage to a diesel engine of a tracked military vehicle was caused by separating and damage caused by loosening of the connecting rod bolts, resulting in cascading damage. The results of the study could be used as reference examples and could be useful for another study on engine failure analysis.

Study on Laboratory Diagnosis of the Ebola Virus and Its Current Trends (에볼라 바이러스 진단법과 개발 동향에 관한 고찰 연구)

  • Jeong, Hye Seon;Kang, Yun-Jung
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.47 no.3
    • /
    • pp.105-111
    • /
    • 2015
  • In late December 2013, the Ebola virus emerged from West Africa. The outbreak started in Guinea and rapidly spread to Liberia and Sierra Leone. Initially, the virus is spread to the human population after contact with infected wildlife and then spread person-to-person through direct contact with body fluids such as blood, sweat, urine, semen, and breast milk. The Ebola virus infects endothelial cells, mononuclear phagocytes and hepatocytes. It causes massive damage to internal tissues and organs, such as blood vessels and the liver, and ultimately death. Most tests for the virus RNA rely on a technology called reverse-transcriptase polymerase chain reaction (RT-PCR). While this method is highly sensitive, it is also expensive, requiring skilled scientists, and delicate power supplies. The strip analytical technique (enzyme-linked immunosorbent assay or ELISA) detects antigens or antibodies to the Ebola virus. This test is cheap and does not require electricity or refrigeration. Despite ongoing efforts directed at experimental treatments and vaccine development, current medical work on the Ebola viral disease is largely limited to supportive therapy. Thus, rapid and reliable diagnoses of the Ebola virus are critically important for patient management, infections, prevention, and control measures.

L-CAA : An Architecture for Behavior-Based Reinforcement Learning (L-CAA : 행위 기반 강화학습 에이전트 구조)

  • Hwang, Jong-Geun;Kim, In-Cheol
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.3
    • /
    • pp.59-76
    • /
    • 2008
  • In this paper, we propose an agent architecture called L-CAA that is quite effective in real-time dynamic environments. L-CAA is an extension of CAA, the behavior-based agent architecture which was also developed by our research group. In order to improve adaptability to the changing environment, it is extended by adding reinforcement learning capability. To obtain stable performance, however, behavior selection and execution in the L-CAA architecture do not entirely rely on learning. In L-CAA, learning is utilized merely as a complimentary means for behavior selection and execution. Behavior selection mechanism in this architecture consists of two phases. In the first phase, the behaviors are extracted from the behavior library by checking the user-defined applicable conditions and utility of each behavior. If multiple behaviors are extracted in the first phase, the single behavior is selected to execute in the help of reinforcement learning in the second phase. That is, the behavior with the highest expected reward is selected by comparing Q values of individual behaviors updated through reinforcement learning. L-CAA can monitor the maintainable conditions of the executing behavior and stop immediately the behavior when some of the conditions fail due to dynamic change of the environment. Additionally, L-CAA can suspend and then resume the current behavior whenever it encounters a higher utility behavior. In order to analyze effectiveness of the L-CAA architecture, we implement an L-CAA-enabled agent autonomously playing in an Unreal Tournament game that is a well-known dynamic virtual environment, and then conduct several experiments using it.

  • PDF