• Title/Summary/Keyword: 역공학

Search Result 269, Processing Time 0.024 seconds

A Method to Verify the Reachability of Real-Time Systems using Abstract Timed Machines (추상 시간 기계를 이용한 실시간 시스템의 도달성에 대한 검증 방법)

  • Park, Ji-Yeon;Lee, Mun-Geun
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.3
    • /
    • pp.224-238
    • /
    • 2001
  • 본 논문은 ATM(Abstract Timed Machine)으로 명세된 실시간 시스템을 검증하기 위한 방법을 기술한다. ATM은 임무 위급 시스템인 실시간 시스템을 명세, 분석, 검증하기 위한 정형기법이다. ATM은 모드와 전이, 포트로 구성되어 있으며 모드는 머신의 압축된 상태를 표현한다. 전이는 하나의 모드에서 다른 모드로의 전환을 나타내며 조건과 이벤트로 구성되어 있다. 포트는 ATM간의 상호작용을 위한 진입을 표현한다. 다른 정형기법과 비교하여 ATM은 소프트웨어의 순환공학 과정에서 사용하기 위해 설계되었다. 역공학 측면에서 볼 때 ATM은 계산 논리뿐만 아니라 실시간 시스템의 실제 소스코드에 있는 설계나 환경정보를 표현할 수 있다. 이러한 목적을 위해 ATM의 모드는 계산모드, 추상화 모드, 주제모드로 구분된다. 계산 모드는 코드 상에서의 논리와 계산을 나타내며 추상화 모드는 모드와 전이의 블록을 하나의 ATM으로써 표현한다. 대개의 경우, 이것은 코드 상에서의 블록을 ATM내 하나의 모드로 나타낼 때 사용한다. 주제 모드는 예외나 주기적 동작 등과 같은 다수의 ATM의 주제를 표현한다. 실시간 시스템을 검증하기 위해 시스템의 소스 코드는 역명세 과정을 통하여 ATM으로 표현된다. 검증은 ATM에 대한 도달성 그래프를 생성하는 것에 의해 수행된다. 도달성 그래프는 상태와 시간을 추상화되고 압축된 형태로 표현할 수 있으며 그 결과 시간 속성을 지닌 상태 공간을 감소시킬 수 있다. 또한 시스템의 교착상태를 쉽게 발견할 수 있다. 본 논문은 ATM과 실행 모델, 도달성 그래프, 검증을 위한 속성 등을 기술하며 이들을 다른 정형 방법들과 예제를 통하여 비교한다.수 있다. 모피우스는 헤더나 광고와 같은 불필요한 정보들을 제거하는 별도의 단계를 거치지 않으므로 wrapper를 빠르게 생성한다. 궁극적으로 모피우스는 새로운 웹 상점을 사용자가 자유롭게 추가, 삭제할 수 있는 환경을 제공한다.X>와 반응시킬 경우에는 반응식 c에 의거 진행됨을 예측할 수 있었다.의거 진행됨을 예측할 수 있었다.이 거의 산화되지 않았고, $700^{\circ}C$에서도 ZnS와 ZnO 상이 공존한 것으로 보아 SnO$_2$코팅이 ZnS의 산화를 억제하는 것으로 나타났다.pplied not only to the strike system in the RSC circle, but also to the logistics system in the SLC circle. Thus, the RSLC model can maximize combat synergy effects by integrating the RSC and the SLC. With a similar logic, this paper develops "A Revised System of Systems with Logistics (RSSL)" which combines "A New system of Systems" and logistics. These tow models proposed here help explain several issues such as logistics environment in future warfare, MOE(Measure of Effectiveness( on logistics performance, and COA(Course of Actions)

  • PDF

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

The Evaluation for Web Mining and Analytics Service from the View of Personal Information Protection and Privacy (개인정보보호 관점에서의 웹 트래픽 수집 및 분석 서비스에 대한 타당성 연구)

  • Kang, Daniel;Shim, Mi-Na;Bang, Je-Wan;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.121-134
    • /
    • 2009
  • Consumer-centric marketing business is surely one of the most successful emerging business but it poses a threat to personal privacy. Between the service provider and the user there are many contrary issues to each other. The enterprise asserts that to abuse the privacy data which is anonymous there is not a problem. The individual only will not be able to willingly submit the problem which is latent. Web traffic analysis technology itself doesn't create issues, but this technology when used on data of personal nature might cause concerns. The most criticized ethical issue involving web traffic analysis is the invasion of privacy. So we need to inspect how many and what kind of personal informations being used and if there is any illegal treatment of personal information. In this paper, we inspect the operation of consumer-centric marketing tools such as web log analysis solutions and data gathering services with web browser toolbar. Also we inspect Microsoft explorer-based toolbar application which records and analyzes personal web browsing pattern through reverse engineering technology. Finally, this identified and explored security and privacy requirement issues to develop more reliable solutions. This study is very important for the balanced development with personal privacy protection and web traffic analysis industry.

A Study on the Possibility of Securing Command of the Air in Local War (지상군의 국지제공권 확보 가능성 연구)

  • Lee, Chang In;Jung, Min Sup;Cho, Sang Keun;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.173-179
    • /
    • 2022
  • Through the 2014 Donbas conflict and the 2022 Ukraine-Russia war, we are experiencing that the command of the air is no longer only secured by the Air Force. Long-range surveillance reconnaissance and strikes carried out by the Air Force could be replaced by drones and missiles, and the enemy's aerial attacks could be controlled by air defense systems such as Panchir and portable anti-aircraft missiles, allowing ground forces to carry out maneuvers freely. In other words, it is much more advantageous for the air force and the navy to take control of the air through long-distance operations, and the ground forces should support them. Therefore, this study aims to consider the cost-effectiveness aspect of the delivery command of the air; it provides implications for quickly responding to enemy air attacks by developing the air defense weapon system, drones, missiles, precision-guided munitions, etc rather than focusing on expensive fighter jets.

A Scalable and Modular Approach to Understanding of Real-time Software: An Architecture-based Software Understanding(ARSU) and the Software Re/reverse-engineering Environment(SRE) (실시간 소프트웨어의 조절적${\cdot}$단위적 이해 방법 : ARSU(Architecture-based Software Understanding)와 SRE(Software Re/reverse-engineering Environment))

  • Lee, Moon-Kun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3159-3174
    • /
    • 1997
  • This paper reports a research to develop a methodology and a tool for understanding of very large and complex real-time software. The methodology and the tool mostly developed by the author are called the Architecture-based Real-time Software Understanding (ARSU) and the Software Re/reverse-engineering Environment (SRE) respectively. Due to size and complexity, it is commonly very hard to understand the software during reengineering process. However the research facilitates scalable re/reverse-engineering of such real-time software based on the architecture of the software in three-dimensional perspectives: structural, functional, and behavioral views. Firstly, the structural view reveals the overall architecture, specification (outline), and the algorithm (detail) views of the software, based on hierarchically organized parent-chi1d relationship. The basic building block of the architecture is a software Unit (SWU), generated by user-defined criteria. The architecture facilitates navigation of the software in top-down or bottom-up way. It captures the specification and algorithm views at different levels of abstraction. It also shows the functional and the behavioral information at these levels. Secondly, the functional view includes graphs of data/control flow, input/output, definition/use, variable/reference, etc. Each feature of the view contains different kind of functionality of the software. Thirdly, the behavioral view includes state diagrams, interleaved event lists, etc. This view shows the dynamic properties or the software at runtime. Beside these views, there are a number of other documents: capabilities, interfaces, comments, code, etc. One of the most powerful characteristics of this approach is the capability of abstracting and exploding these dimensional information in the architecture through navigation. These capabilities establish the foundation for scalable and modular understanding of the software. This approach allows engineers to extract reusable components from the software during reengineering process.

  • PDF

The Design Trends of Outdoor Space in Commercial Multi-Complexes in Korea (국내 복합상업시설 외부공간의 특성과 변화 양상)

  • Choi, YoungJoon
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.48 no.5
    • /
    • pp.89-106
    • /
    • 2020
  • This study examines the functionality and landscape design specifics of the outdoor space of representative commercial multi-complexes in Korea in order to overview the design trends of outdoor landscaping trends. Through surveying the composition of outdoor spaces along with their relation to the surrounding landscape, open spaces, and the neighboring communities, this paper identified the change in trends regarding the characteristics of outdoor landscape planning and acknowledged the enhanced public value of outdoor space. This study asserts that the characteristics of outdoor spaces can best be understood by examining the ways in which the outdoor space relates to adjoining commercial multi-complexes and the surrounding landscape. Focusing on the relationships that outdoor space establishes, commercial multi-complexes can be categorized as follows: in/outdoor separated type, in/outdoor semi-open type, surrounding landscape-projected type, and surrounding landscape-combined type. By studying the landscape design specifics of the outdoor space of representative cases of each type, the following has been concluded: First, the amount of outdoor space has expanded in terms of importance and function while serving to assist in various activities and participatory experiences, and no longer merely serves as a backdrop of commercial facilities. Second, with the strengthened connectivity between in/outdoor spaces, the elements of outdoor surroundings are more actively introduced indoors to improve amenities. Through directly connecting certain indoor program spaces with outdoor spaces, commercial multi-complexes tend to provide richer combined experiences. Third, with the expansion of outdoor space functionality, commercial multi-complexes are increasingly recognized as a quasi-public space, making good example of liminal space. In light of the recent case of development plans linked with public open spaces in suburban settings, commercial landscape design shows the possibility of creating an open space that can function as a center for local culture and green networks in the community.

A Study on Refined Information Generation through Classes Composition Based on Reengineering (재공학 기반의 클래스 합성을 통한 정련화된 정보 생성에 관한 연구)

  • 김행곤;한은주
    • Journal of Korea Multimedia Society
    • /
    • v.1 no.2
    • /
    • pp.239-248
    • /
    • 1998
  • Software reengineering is making various research for solutions against problem of maintain existing system. Reengineering has a meaning of development of softwares on existing systems through the reverse-engineering and the forward-engineering. It extracts classes from existing system's softwares to increase the comprehension of the system and enhance the maintenability of softwares. Most of the important concepts used in reengineering is composition that is restructuring of the existing objects from other components. The classes and clusters in storage have structural relationship with system's main components to reuse in the higher level. These are referenced as dynamic informations through structuring an architect for each of them. The classes are created by extractor, searcher and composer through representing existing object-oriented source code. Each of classes and clusters extract refined informations through optimization. New architecture is created from the cluster based on its classes' relationship in storage. This information can be used as an executable code later on. In this paper, we propose the tools, it presented by this thesis presents a new information to users through analysing, based on reengineering, Object-Oriented informations and practicing composition methodology. These composite classes will increase reusability and produce higher comprehension information to consist maintainability for existing codes.

  • PDF

A Methodology for Translation of Operating System Calls in Legacy Real-time Software to Ada (Legacy 실시간 소프트웨어의 운영체제 호출을 Ada로 번역하기 위한 방법론)

  • Lee, Moon-Kun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2874-2890
    • /
    • 1997
  • This paper describes a methodology for translation of concurrent software expressed in operating system (OS) calls to Ada. Concurrency is expressed in some legacy software by OS calls that perform concurrent process/task control. Examples considered in this paper are calls in programs in C to Unix and calls in programs in CMS-2 to the Executive Service Routines of ATES or SDEX-20 other software re/reverse engineering research has focused on translating the OS calls in a legacy software to calls to another OS. In this approach, the understanding of software has required knowledge of the underlying OS, which is usually very complicated and informally documented. The research in this paper has focused on translating the OS calls in a legacy software into the equivalent protocols using the Ada facilities. In translation to Ada, these calls are represented by Ada equivalent code that follow the scheme of a message-based kernel oriented architecture. To facilitate translation, it utilizes templates placed in library for data structures, tasks, procedures, and messages. This methodology is a new approach to modeling OS in Ada in software re/reverse engineering. There is no need of knowledge of the underlying OS for software understanding in this approach, since the dependency on the OS in the legacy software is removed. It is portable and interoperable on Ada run-time environments. This approach can handle the OS calls in different legacy software systems.

  • PDF

A Study of the Curriculum Design Modelling Focused on the Combination of National Competency Standards and the Already-Accredited Course in the Department of Social Welfare in the Junior College (과정이수형 자격제도 운영 학과의 NCS 기반 교육과정 설계모형 연구 - 전문대학 사회복지과를 중심으로)

  • Park, Yong Woon;Kim, Kyoung Mee;Yoo, Tae Wan
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.2
    • /
    • pp.652-665
    • /
    • 2016
  • National Competency Standards or NCS is an educational system that emphasizes developing job-related abilities. Therefore it will be an effective solution in training field-oriented work forces if properly applied. However, in the department of social welfare, it is not easy to apply NCS to the curriculum since most academic subjects concerning social welfare focus not on practice but on theory and in addition, most of social welfare departments in junior colleges have an accredited curriculum for the 2nd degree of the social worker qualification. This means it is preposterous if NCS is applied to the curriculum without prior changes in the existing qualification system. So, this paper proposes a draft model to apply NCS to the already-accredited curriculum for the 2nd degree social workers in the junior colleges and details are as follows. Firstly, the competency units will be customized for the existing academic subjects in the curriculum rather than developing new subjects in accordance with NCS competency units. Secondly, some client-related competency units including children, seniors, the disabled are newly developed and then applied to the curriculum, which are crucial for the career development at the junior college level. Thirdly, the competency units are categorized into three types in accordance with the degree of job relevancy - type 1, type 2, type 3. Fourthly, four out of 11 basic job abilities are selected and then developed into academic subjects. Fifthly, all competency units concerning the main job market are regarded as one virtual competency unit and then arranged in the order of type 1s, type 2s and type 3s and then the scope of their study is adjusted to the job abilities required at the main job market.