• Title/Summary/Keyword: 실행코드

Search Result 780, Processing Time 0.025 seconds

Analysis on Development Methodology of Modern Secure boot: Focusing on Platform Environment (현대의 보안부팅 개발 방식 분석: 플랫폼 환경을 중심으로)

  • Kim, Jin-Woo;Lee, Sang-Gil;Lee, Jeong-Guk;Lee, Sang-Han;Shin, Dong-Woo;Lee, Cheol-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.15-26
    • /
    • 2020
  • Secure boot is security technology that verifies the integrity of the computer system in boot stage and controls the boot process accordingly. The computer system can establish a secure execution environment from the threat of various malwares by security boot and also supports the recovery when system in emergency case. Recently, Secure boot has been adopted by various modern computer manufacturers to protect users' information from hacker attacks and to prevent abuse of their products by malicious users. In this paper, we classify security boot developed by various companies and organizations by platform, and analyze the design and development purpose of each security boot and investigate the limitation of design. It can be used as a reference for system security designers in various information of security boot development method and security design of system.

MPEG-I RVS Software Speed-up for Real-time Application (실시간 렌더링을 위한 MPEG-I RVS 가속화 기법)

  • Ahn, Heejune;Lee, Myeong-jin
    • Journal of Broadcast Engineering
    • /
    • v.25 no.5
    • /
    • pp.655-664
    • /
    • 2020
  • Free viewpoint image synthesis technology is one of the important technologies in the MPEG-I (Immersive) standard. RVS (Reference View Synthesizer) developed by MPEG-I and in use in MPEG group is a DIBR (Depth Information-Based Rendering) program that generates an image at a virtual (intermediate) viewpoint from multiple viewpoints' inputs. RVS uses the mesh surface method based on computer graphics, and outperforms the pixel-based ones by 2.5dB or more compared to the previous pixel method. Even though its OpenGL version provides 10 times speed up over the non OpenGL based one, it still shows a non-real-time processing speed, i.e., 0.75 fps on the two 2k resolution input images. In this paper, we analyze the internal of RVS implementation and modify its structure, achieving 34 times speed up, therefore, real-time performance (22-26 fps), through the 3 key improvements: 1) the reuse of OpenGL buffers and texture objects 2) the parallelization of file I/O and OpenGL execution 3) the parallelization of GPU shader program and buffer transfer.

An Android API Obfuscation Tool using Reflection and String Encryption (리플렉션과 문자열 암호화를 이용한 안드로이드 API 난독화 도구)

  • Lee, Joohyuk;Park, Heewan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.1
    • /
    • pp.23-30
    • /
    • 2015
  • Reflection is a feature of the Java programming language that can examine and manipulate components of program itself. If you use the reflection, you can get an obfuscation effect of Java source because it converts sources into complicated structures. However, when using it, strings of components name of program are exposed. Therefore, it cannot prevent static analysis. In this paper, we presents a method and a tool of interfere with static analysis using reflection. And in this case, exposed strings are encoded using Vigen$\acute{e}$re cipher. Experimental results show that this tool is effective in increasing the overall complexity of the source code. Also the tool provides two types decryption method based on server and local. It can be selected based on the importance of the API because it affects the execution speed of the application.

SystemVerilog-based Verification Environment using SystemC Constructs (SystemC 구성요소를 이용한 SystemVerilog 기반 검증환경)

  • Oh, Young-Jin;Song, Gi-Yong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.4
    • /
    • pp.309-314
    • /
    • 2011
  • As a system becomes more complex, a design relies more heavily on a methodology based on high-level abstraction and functional verification. SystemVerilog includes characteristics of hardware design language and verification language in the form of extensions to the Verilog HDL. However, the OOP of System Veri log does not allow multiple inheritance. In this paper, we propose adoption of SystemC to introduce multiple inheritance. After being created, a SystemC unit is combined with a SystemVerilog-based verification environment using SystemVerilog DPI and ModelSim macro. Employing multiple inheritance of SystemC makes a design of a verification environment simple and easy through source code reuse. Moreover, a verification environment including SysemC unit has a benefit of reconfigurability due to OOP.

Programming Model for Web-based Mobile Agent (웹을 기반으로 한 자바 이동에이전트 프로그래밍 모델)

  • Song, Sung-Hoon;Won, Yoo-Hun
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.4
    • /
    • pp.225-234
    • /
    • 2002
  • The developers of mobile agent systems are considering integrating the system into the web and the developers of web servers are also considering supporting mobile agents in the future. But they are not clearly suggesting the relationship between web programming which has basically client/server architecture and mobile agent programming which is based on autonomous code mobility. In this paper, firstly, we clarify the method for integrating mobile agent programming into web programming by suggesting the model for mobile agent programming on the web. Secondly, by developing APIs for Java which is widely used for both web programming and mobile agent programming, we made it possible for programmers to use them for programming mobile agent on the web. Thirdly, we show the usefulness of the proposed model by adding and testing modules for execution environment of mobile agents on W3C's Java based web server, Jigsaw.

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices (안드로이드 모바일 단말에서의 이벤트 수집을 통한 악성 앱 탐지 시스템 설계 및 구현)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.35-46
    • /
    • 2013
  • As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.

An Integrated Construction Management System Based on the Earned Value Concept (EV개념에 의한 통합건설공사관리시스템)

  • Chung Chul-Won;Lee Jeom-Su;Oh Kyu-Whan;Chang Jin-Sik;Lee Yu-Seop;Park Chan-Sik
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.155-162
    • /
    • 2001
  • Recently, in Korea, a few construction companies have been tried to develop a management system, which is able to integrate schedule and cost. In spite of these attempts, however, advanced management techniques can be hardly applied under the BoQ based management system. In order to improve these problems, many studies have been peformed, but yet could not overcome practical limitations. Besides, the application of historical data is below the level since it is so difficult to accumulate and feed-back historical data under the unique character of construction industry. Consequently, lots of time and effort have being wasted to establish control criteria. The newly generated Information is not systematically managed as well. Therefore, this study suggests Integrated Construction Management System complemented the existing practical problems.

  • PDF

A Design and Implementation of Mobile E-mail Transmission System Using PC Remote Control Technique (PC 원격 제어 기법을 사용한 모바일 이메일 전송 시스템 설계 및 구현)

  • Song, Hye-Ju;Kim, Hyun-Ju;You, Hyun-Jung;Lee, Jong-Woo
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.17-25
    • /
    • 2007
  • Recently, the ubiquitous computing environment being able to connect all kinds of computing elements at anytime anywhere becomes widespread in human life. In this paper, we focus on a PC remote control system using cellular phones. Especially, we design and implement an mobile e-mail transmission system using PC remote control technique. By using our remote controller, cellular phone users can login into their own PC, and then send any file to others by e-mail attachment. To show the correct running of our system, real demonstration results are presented. We are sure that by opening our source code to the public our results can play an important role to encourage development of the various mobile remote control functionalities.

  • PDF

Analysis on Dynamic Software Defects for Increasing Weapon System Reliability (국방 무기체계 소프트웨어 신뢰성 향상을 위한 소프트웨어 동적 결함 분석)

  • Park, Jihyun;Choi, Byoungju
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.7
    • /
    • pp.249-258
    • /
    • 2018
  • The importance of software in military weapon systems is increasing, and the software structure is becoming more complicated. We therefore must thoroughly verify its reliability. In particular, the defects from the interaction of the software components that make up the weapon system are difficult to prevent only with static testing and code coverage level dynamic testing. In this paper, we classify dynamic software defect types and analyze the issues reported in the Open Source Software (OSS) used in the US department of defense weapon systems. The dynamic defects classified in this paper usually occur after integration, and it is difficult to reproduce and identify the cause. Based on this analysis, we come to the point that the software integration test must be enhanced in order to verify the reliability of the weapon system.

Automation of Service Level Agreement based on Active SLA (Active SLA 기반 서비스 수준 협약의 자동화)

  • Kim, Sang-Rak;Kang, Man-Mo;Bae, Jae-Hak
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.229-237
    • /
    • 2013
  • As demand for IT services increase, which are based on SOA and cloud computing, service level agreements (SLAs) have received more attention in the parties concerned. An SLA is usually a paper contract written in natural language. SLA management tools which are commercially available, implement SLAs implicitly in the application with a procedural language. This makes automation of SLA management difficult. It is also laborious to maintain contract management systems because changes in a contract give rise to extensive modifications in the source code. We see the source of the trouble is the existence of documentary SLAs (paper contracts) and corresponding executable SLAs (contracts coded in the procedural language). In this paper, to resolve the current SLA management problems we propose an active SLM (Active Service Level Management) system, which is based on the active SLA (Active Service Level Agreement). In the proposed system, the separated management and processing of dual SLAs can be unified into a single process with the introduction of active SLAs (ASLAs).