• Title/Summary/Keyword: 리버스 엔지니어링

Search Result 20, Processing Time 0.036 seconds

Database Reverse Engineering Using Master Data in Microservice Architecture (마스터 데이터를 활용한 마이크로 서비스 아키텍처에서의 데이터베이스 리버스 엔지니어링)

  • Shin, Kwang-chul;Lee, Choon Y.
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.523-532
    • /
    • 2019
  • Microservice architecture focuses on dividing it into small and lightweight services to build for the purpose of performing very close business functions. So it tends to concentrate only on agility, productivity, reliability, and ease of deployment of software development. Microservice architecture considers database as just a file or storage for storing and extracting data, emphasizing that data quality can be sacrificed for convenience and scalability of software development. Database reverse engineering for understanding database structure and data semantics is needed for data utilization for business decision making. However, it is difficult that reverse database engineering is applied in microservice architecture that neglects data quality. This study proposes database reverse engineering method that utilizes master data to restore the conceptual data model as a solution. The proposed method is applied to the return service database implemented by microservice architecture and verified its applicability.

Diesel Engine Intake-Port Analysis Using Reverse-Engineering Technique (리버스 엔지니어링을 통한 디젤엔진 흡기포트의 분석)

  • Park, Sung-Young;Kim, Yong-Tae
    • Proceedings of the KAIS Fall Conference
    • /
    • 2012.05b
    • /
    • pp.674-676
    • /
    • 2012
  • 본 논문에서는 3차원 설계데이터가 부재한 디젤엔진 실린더 헤드의 흡기포트 데이터를 확보하기 위하여 리버스 엔지니어링 기법을 적용하였다. 획득된 해석 모델을 이용하여 디젤엔진 흡기포트에 대한 유동해석을 수행하였으며, 텀블 유동과 스월유동의 존재를 해석 결과로서 확인할 수 있었다. 이러한 기법의 적용은 향후 3차원 설계데이터가 부재한 엔진이나 경쟁엔진의 분석에 유용하게 적용될 수 있을 것으로 판단된다.

  • PDF

A study on the vulnerability of OTP implementation by using MITM attack and reverse engineering (MITM 공격과 리버스 엔지니어링을 이용한 OTP 적용환경의 취약점 연구)

  • Kang, Byung-Tak;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.83-99
    • /
    • 2011
  • OTP (One Time Password) is widely used for protecting accounts on Internet banking, portal services and online game services in Korea. OTP is very strong method for enforcing account security but there are several ways for exploiting vulnerabilities caused by implementation errors. These attacks can work because of the weakness from OTP enabled system's vulnerabilities, not for OTP's algorithm itself. In this paper, we present the known attack scenarios such as MITM (Man-in-the-Middle) attack and various reverse engineering techniques; also, we show the test result of the attacks and countermeasures for these attacks.

A Study on the Inference of Detailed Protocol Structure in Protocol Reverse Engineering (상세한 프로토콜 구조를 추론하는 프로토콜 리버스 엔지니어링 방법에 대한 연구)

  • Chae, Byeong-Min;Moon, Ho-Won;Goo, Young-Hoon;Shim, Kyu-Seok;Lee, Min-Seob;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.42-51
    • /
    • 2019
  • Recently, the amount of internet traffic is increasing due to the increase in speed and capacity of the network environment, and protocol data is increasing due to mobile, IoT, application, and malicious behavior. Most of these private protocols are unknown in structure. For efficient network management and security, analysis of the structure of private protocols must be performed. Many protocol reverse engineering methodologies have been proposed for this purpose, but there are disadvantages to applying them. In this paper, we propose a methodology for inferring a detailed protocol structure based on network trace analysis by hierarchically combining CSP (Contiguous Sequential Pattern) and SP (Sequential Pattern) Algorithm. The proposed methodology is designed and implemented in a way that improves the preceeding study, A2PRE, We describe performance index for comparing methodologies and demonstrate the superiority of the proposed methodology through the example of HTTP, DNS protocol.

A technical study on mold of productivity improvement for Insert Injection of Reverse Engineering (리버스 엔지니어링을 통한 인서트 사출의 생산성향상을 위한 금형기술연구)

  • Lee, S.Y.;Kim, Y.G.;Woo, C.K.;Kim, O.R.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2008.05a
    • /
    • pp.535-538
    • /
    • 2008
  • Insert-injection molding can inject two different materials or two colors in the same mold and process. If this injection process use, product has ability because the base part maintain strength and specified part can inject soft-material. It makes the cost down by single operation automatically for saving wages. In this paper, we designed double-injection mold for automobile remote control to inject secondary using this part as insert after inject external appearance of product. CAE analysis was progressed gate location and runner size as variable and analysis result is reflected in mold design process. As a result, it could solved badness that is generated at the conventional mold. Additionally, cost is downed by reducing loss of runner as well as could omit painting process because surface of finished product is improved through new mold.

  • PDF

Extraction Scheme of Function Information in Stripped Binaries using LSTM (스트립된 바이너리에서 LSTM을 이용한 함수정보 추출 기법)

  • Chang, Duhyeuk;Kim, Seon-Min;Heo, Junyoung
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.39-46
    • /
    • 2021
  • To analyze and defend malware codes, reverse engineering is used as identify function location information. However, the stripped binary is not easy to find information such as function location because function symbol information is removed. To solve this problem, there are various binary analysis tools such as BAP and BitBlaze IDA Pro, but they are based on heuristics method, so they do not perform well in general. In this paper, we propose a technique to extract function information using LSTM-based models by applying algorithms of N-byte method that is extracted binaries corresponding to reverse assembling instruments in a recursive descent method. Through experiments, the proposed techniques were superior to the existing techniques in terms of time and accuracy.

Rapid Prototyping from Reverse Engineered Geometric Data (리버스 엔지니어링으로 생성된 데이터를 이용한 쾌속 조형 기술 연구)

  • Woo, Hyuck-Je;Lee, Kwan-Heng
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.1 s.94
    • /
    • pp.95-107
    • /
    • 1999
  • The design models of a new product in general are created using clay models or wooden mock-ups. The reverse engineering(RE) technology enables us to quickly create the CAD model of the new product by capturing the surface of the model using laser digitizers or coordinate measuring machines. Rapid prototyping (RP) is another technology that can reduce the product development time by fabricating the physical prototype of a part using a layered manufacturing technique. In reverse engineering process, however, the digitizer generates an enormous amount of point data, and it is time consuming and also inefficient to create surfaces out of these data. In addition, the surfacing operation takes a great deal of time and skill and becomes a bottleneck. In rapid prototyping, a faceted model called STL file has been the industry standard for providing the CAD input to RP machines. It approximates the CAD model of a part using many planar triangular patches and has drawbacks. A novel procedure that overcomes these problems and integrates RE with RP is proposed. Algorithms that drastically reduce the point clouds data have been developed. These methods will facilitate the use of reverse engineered geometric data for rapid prototyping, and thereby will contribute in reducing the product development time.

  • PDF

Diesel Engine Intake Port Analysis Using Reverse-engineering Technique (리버스 엔지니어링을 통한 디젤엔진 흡기포트의 성능 비교)

  • Kim, Chang-Su;Park, Sung-Young
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.23 no.5
    • /
    • pp.502-507
    • /
    • 2015
  • In this paper, we built a three-dimensional model by applying reverse engineering techniques on targeting the intake port of 2900cc class diesel engine before that three-dimensional design technique is applied. The performance of the intake port is predicted and analysed using the computational flow analysis. Flow Coefficient and Swirl Ratio have been analyzed for two intake port models. One is the intake port for the diesel engine with plunger-type fuel system, and the other is for the diesel engine with CRDI fuel system. Computational result shows that the Flow Coefficient of the intake port with CRDI fuel system is increased upto 10 percentage compared with that with plunger-type. Also, the intake port with plunger-type has high Swirl Ratio at high valve lift, and the intake port with CRDI fuel system has high Swirl Ratio at relatively low valve lift. It is believed that because of high performance of the fuel injector, the intake port with CRDI fuel system is designed for more air amount and not much swirl flow at high valve lift. However, high swirl flow is required at low valve lift for initial fuel and air mixing. The result of this study may be useful for the re-manufacturing industry of automotive parts.

Precision Measurement of Vehicle Shape using Industrial Photogrammetry (산업 사진측량에 의한 자동차의 외형 정밀 측정)

  • 정성혁;박찬홍;이재기
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.22 no.2
    • /
    • pp.179-186
    • /
    • 2004
  • This study describes that the method of precision measurement of vehicle shape and the method of measurement the deformation that it is occurred the reason of accident using industrial photogrammatry. The curved shape is measured using the projection target which is able to acquire the point cloud data. 3D coordinates of the target were able to acquire through object picturing and analysis of coordinates. The acquired point cloud data was done 3D modeling to form the surface with TIN. Also, It able to interpretate a deformation surveying accurately the occurred parts of deformation, then can furnish to the analysis of traffic accident the precise and effective data.