• Title/Summary/Keyword: 실행 제어 명령어

Search Result 35, Processing Time 0.025 seconds

An Error Concurrency Control System for Web Based Multimedia Application Sharing Environment (웹 기반 멀티미디어 응용 공유 환경에서 오류 동시성 제어 시스템)

  • 고응남
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.499-501
    • /
    • 2004
  • 본 논문에서 제안하는 웹 기반 멀티미디어 공동 작업 환경에서의 오류 문제를 위한 동시성 제어란 모든 시스템에 분산 시계를 설정하고 명령어에 분산 시계에서 받은 생성 시간(issuing time)을 실어 순서화 분산된 다른 시스템에게 명령어의 발생과 발생 시간을 알린다 발생된 명령어는 자신의 명령어를 먼저 실행하고, 다른 곳에서 도착한 명령어의 시간 값이 다를 경우에만 뷰를 재 생성한다. 이를 통해 비록 네트워크를 통한 동시성 제어 부담을 간접적으로 제거하고 사용자에서의 반응성을 증진시켰다. 즉, 오류 발생 시에 오류도 하나의 명령어로 취급하고 명령어와 오류가 동시에 발생할 시에 명령어를 순서화해 주는 문제에 대한 시스템을 기술한다.

  • PDF

Software Attack Detection Method by Validation of Flow Control Instruction’s Target Address (실행 제어 명령어의 목적 주소 검증을 통한 소프트웨어 공격 탐지 기법)

  • Choi Myeong-Ryeol;Park Sang-Seo;Park Jong-Wook;Lee Kyoon-Ha
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.397-404
    • /
    • 2006
  • Successful software attacks require both injecting malicious code into a program's address space and altering the program's flow control to the injected code. Code section can not be changed at program's runtime, so malicious code must be injected into data section. Detoured flow control into data section is a signal of software attack. We propose a new software attack detection method which verify the target address of CALL, JMP, RET instructions, which alter program's flow control, and detect a software attack when the address is not in code section. Proposed method can detect all change of flow control related data, not only program's return address but also function pointer, buffer of longjmp() function and old base pointer, so it can detect the more attacks.

Development of Mission Language for Autonomous Underwater Vehicle (자율무인잠수정을 위한 임무 언어 개발)

  • Kim, Bang-Hyun;Lee, Fill-Youb;Sim, Hyung-Won;Jun, Bong-Huan;Lee, Pan-Mook
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06c
    • /
    • pp.554-559
    • /
    • 2010
  • 자율무인잠수정은 탐사 목적에 따라 다양한 임무를 수행해야 하며, 임무에 따라 자율무인잠수정 행동의 유형과 순서는 달라질 수 있다. 그러나 대부분의 자율무인잠수정은 한정된 임무에 대하여 프로그램 내부에 고정된 행동 유형으로 동작하며, 다른 유형의 임무를 수행해야 할 경우에는 프로그램을 수정해야 하는 문제점이 있다. 따라서 본 연구에서는 자율무인잠수정이 수행할 수 있는 다양한 임무를 명시할 수 있는 임무 언어를 개발하였다. 이 임무 언어는 명령어의 실행 순서를 제어할 수 있는 제어문과 자율무인잠수정의 행동을 지정하거나 자율무인잠수정의 상태를 입출력 할 수 있는 명령어, 그리고 변수 정의를 제공하기 때문에, 사용자가 자율무인잠수정의 임무를 자유롭게 표현하는 것이 가능하다. 임무 언어로 작성된 임무 파일은 전용 어셈블러에 의해 이진 형식의 실행이미지로 변환된 후에, 자율무인잠수정 내장 소프트웨어 내부의 가상기계 기억장치에 적재되어 실행된다. 실행이미지를 가상기계에서 해석하고 실행하는데 필요한 시스템의 자원을 최소화하기 위하여 임무 언어는 자율무인잠수정의 임무를 표현하기 위한 필수적인 부분만을 고려하여 설계되었으며, 문법은 ARM v5 어셈블리와 유사한 형태이다. 개발된 임무 언어는 한국해양연구원에서 개발한 이심이100 자율무인잠수정에 적용되었으며, 이후 개발할 6,000m급의 이심이6000 자율무인잠수정에도 사용될 예정이다.

  • PDF

A Code Block Cipher Method to Protect Application Programs From Reverse Engineering (응용프로그램 역분석 방지를 위한 코드블록 암호화 방법)

  • Jung, Dong-Woo;Kim, Hyong-Shik;Park, Joong-Gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.85-96
    • /
    • 2008
  • One of the typical methods to prevent tampering and reverse engineering on executable codes is to encrypt them. This paper proposes a code block cipher method based on key chaining to encrypt the code. The block cipher by key chaining has been known to be inadequate for encrypting the code with control transfer, even though the key chaining has advantage of hiding the keys in blocks and making the individual keys different from block to block. This paper proposes a block transformation and duplication method to apply the block cipher by key chaining to the executable codes with control transfer instructions, and shows the idea works with the MIPS instruction set.

Design and Implementation of Efficient Mitigation against Return-oriented Programming (반환 지향 프로그래밍 공격에 대한 효율적인 방어 기법 설계 및 구현)

  • Kim, Jeehong;Kim, Inhyeok;Min, Changwoo;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1018-1025
    • /
    • 2014
  • An ROP attack creates gadget sequences which consist of existing code snippets in a program, and hijacks the control flow of a program by chaining and executing gadget sequences consecutively. Existing defense schemes have limitations in that they cause high execution overhead, an increase in the binary size overhead, and a low applicability. In this paper, we solve these problems by introducing zero-sum defender, which is a fast and space-efficient mitigation scheme against ROP attacks. We find a fundamental property of gadget execution in which control flow starts in the middle of a function without a call instruction and ends with a return instruction. So, we exploit this property by monitoring whether the execution is abused by ROP attacks. We achieve a very low runtime overhead with a very small increase in the binary size. In our experimental results, we verified that our defense scheme prevents real world ROP attacks, and we showed that there is only a 2% performance overhead and a 1% binary size increase overhead in several benchmarks.

Unifing Robot Control Programming Language And Dolittle Using Robot Objects (두리틀 로봇 프로그래밍 일원화를 위한 로봇 객체 설계)

  • Kwon, Dai-Young;Yeum, Yong-Cheul;Yoo, Seoung-Wook;Lee, Won-Gyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.6
    • /
    • pp.23-32
    • /
    • 2005
  • Dolittle is a educational programming language that helps students learning principles and concepts of computer science with programming. Learning programming with robot improve learning achievements robot motivate to be interest with programming. However, Dolittle robot programming is a different from Dolittle programming in process of interpretation and execution mechanism. Therefore, students have virtually to learn two languages to control robot and it would reduce the worth of Dolittle as educational programming language. In order to solve this problem, we tried to Unify Dolittle and robot control language using parser that Dolittle program with turtle object convert robot program. But this try couldn't overcome completely this problem because attributes of turtle object is different from robot. In this research we unified Dolittle programming and Dolittle robot programming as a way of adding new robot object in dolittle standard object group. it would improve educational effect of learning programming with robot in Dolittle.

  • PDF

A Design of Superscalar Digital Signal Processor (다중 명령어 처리 DSP 설계)

  • Park, Sung-Wook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.3
    • /
    • pp.323-328
    • /
    • 2008
  • This paper presents a Digital Signal Processor achieving high through-put for both decision intensive and computation intensive tasks. The proposed processor employees a multiplier, two ALU and load/store. Unit as operational units. Those four units are controlled and works parallel by superscalar control scheme, which is different from prior DSP architecture. The performance evaluation was done by implementing AC-3 decoding algorithm and 37.8% improvement was achieved. This study is valuable especially for the consumer electronics applications, which require very low cost.

Simulation and Synthesis of RISC-V Processor (RISC-V 프로세서의 모의실행 및 합성)

  • Lee, Jongbok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.239-245
    • /
    • 2019
  • RISC-V is a free and open ISA enabling a new era of processor innovation through open standard collaboration. Born in academia and research, RISC-V ISA delivers a new level of free, extensible software and hardware freedom on architecture, paving the way for the next 50 years of computing design and innovation. In this paper, according to the emergence of RISC-V architecture, we describe the RISC-V processor instruction set constituted by arithmetic logic, memory, branch, control, status register, environment call and break point instructions. Using ModelSim and Quartus-II, 38 instructions of RISC-V has been successfully simulated and synthesized.

Measuring Method of Worst-case Execution Time by Analyzing Relation between Source Code and Executable Code (소스코드와 실행코드의 상관관계 분석을 통한 최악실행시간 측정 방법)

  • Seo, Yongjin;Kim, Hyeon Soo
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.51-60
    • /
    • 2016
  • Embedded software has requirements such as real-time and environment independency. The real-time requirement is affected from worst-case execution time of loaded tasks. Therefore, to guarantee real-time requirement, we need to determine a program's worst-case execution time using static analysis approach. However, the existing methods for worst-case execution time analysis do not consider the environment independency. Thus, in this paper, in order to provide environment independency, we propose a method for measuring task's execution time from the source codes. The proposed method measures the execution time through the control flow graph created from the source codes instead of the executable codes. However, the control flow graph created from the source code does not have information about execution time. Therefore, in order to provide this information, the proposed method identifies the relationships between statements in the source code and instructions in the executable code. By parameterizing those parts that are dependent on processors based on the relationships, it is possible to enhance the flexibility of the tool that measures the worst-case execution time.

Security Verification of FTP-Proxy Security Model Coloured Petri Net (컬러드 페트리 네트를 기반으로 한 FTP 프록시 보안 모델의 안전성 검증)

  • Lee, Moon-Ku;Jun, Moon-Seog
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.369-376
    • /
    • 2001
  • The firewall systems can be installed between the intemal network and the extemal network. The firewall systems has the least privilege, so its does not provide transparency to user. This problem of transparency can be solved by using the proxy. In this thesis, I have designed and verified the FTP-PSM(FTP-Proxy Security Mode]) which provides transparency for the firewall systems and has a strong security function. FTP-PSM doesn't finish its work after implementing a command. Instead, its does several security functions such as user authentication, MAC(MandatOlY Access Controll, DAC(Discretionary Access Controll and authentication of user group. Those data must not be lost under any circumstances in order to implement the above security functions. So, the security against such problems as falling into deadlock or unlimited loop during the implementation must be verified. Therefore, FTP-PSM suggested in thesis was verified its security through PHPlace Invariant) based on CPNlCo]oured Petri Net).

  • PDF