• Title/Summary/Keyword: 역분석공학

Search Result 2, Processing Time 0.016 seconds

Discontinuity Analysis Method using Reverse Engineering (역분석공학기법을 이용한 불연속면 분석 프로그램 개발)

  • Park, Eui-Seob;Jung, Yong-Bok;Ryu, Chang-Ha;SunWoo, Choon;Choi, Yong-Kun;Heo, Sung;Cheon, Dae-Sung
    • Tunnel and Underground Space
    • /
    • v.17 no.3 s.68
    • /
    • pp.165-174
    • /
    • 2007
  • The technique, which reproduces the figures of objects from measured data of the objects using 3-D laser scanner, is called reverse engineering. Recently, research studies into applications of reverse engineering to rock engineering are increasing in number, in the discontinuity surveys for rock slopes out of man's reach, or rapid discontinuity surveys for wide range areas. For analysis of discontinuity using reverse engineering, a program for processing point clouds data from the 3-D laser scanner, for sampling from these point clouds data, and finally analyzing the discontinuity is needed. However, existing programs rarely have sufficient functions to properly analyze the discontinuities. In this study, a program was developed, which can automatically sample discontinuities from the point clouds data which measured in a rock slope using a 3-D laser scanner, and which can also undertake statistical analysis of the discontinuities. This developed program was verified by the application of discontinuity surveys in a rock slope and a tunnel. By undertaking the discontinuity survey using a 3-D laser scanner and the developed program, the feasibility and rapidity of such surveys is expected to improve in areas out of man's reach in geotechnical surveys. Taking into consideration the fact that the international level of related techniques is at a rudimentary stage, the possibility of prior occupation of a broad market is also expected.

A Code Block Cipher Method to Protect Application Programs From Reverse Engineering (응용프로그램 역분석 방지를 위한 코드블록 암호화 방법)

  • Jung, Dong-Woo;Kim, Hyong-Shik;Park, Joong-Gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.85-96
    • /
    • 2008
  • One of the typical methods to prevent tampering and reverse engineering on executable codes is to encrypt them. This paper proposes a code block cipher method based on key chaining to encrypt the code. The block cipher by key chaining has been known to be inadequate for encrypting the code with control transfer, even though the key chaining has advantage of hiding the keys in blocks and making the individual keys different from block to block. This paper proposes a block transformation and duplication method to apply the block cipher by key chaining to the executable codes with control transfer instructions, and shows the idea works with the MIPS instruction set.