• Title/Summary/Keyword: 역함수 기호

Search Result 2, Processing Time 0.015 seconds

An Analysis on Prospective Teachers' HCK : Focused on Understandings of Inverse Function Symbol (예비교사들의 HCK 분석 : 역함수 기호에 대한 이해를 중심으로)

  • Shin, Bomi
    • Journal of the Korean School Mathematics Society
    • /
    • v.23 no.1
    • /
    • pp.67-88
    • /
    • 2020
  • This study analyzed the characteristics of prospective teachers' Horizon Content Knowledge(HCK) related to understandings of an inverse function symbol. This study aimed to deduce implications of developing HCK in terms of the means which would enhance mathematics teachers' professional development. In order to achieve the aim, this study identified features of HCK by examining the previous literature on HCK, which has conformed Ball & Bass(2009) and exploring the research in AMT, including Zazkis & Leikin(2010) which has emphasized cultivating AMT through university mathematics education. In addition, a questionnaire was developed regarding the features of HCK and taken by 57 prospective teachers. By analyzing the data obtained from the written responses the participants presented, this study delineated the specific characteristics of the teachers' HCK with regard to an inverse function symbol. Additionally, several issues in the teacher education for improving HCK were discussed, and the results of this research could inspire designing and implementing a teacher education program relevant to HCK.

Efficient Null Pointer Dereference Vulnerability Detection by Data Dependency Analysis on Binary (효율적 데이터 의존성 분석을 이용한 바이너리 기반 Null Pointer Dereference 취약점 탐지 도구)

  • Wenhui Jin;Heekuck Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.253-266
    • /
    • 2023
  • The Null Pointer Dereference vulnerability is a significant vulnerability that can cause severe attacks such as denial-of-service. Previous research has proposed methods for detecting vulnerabilities, but large and complex programs pose a challenge to their efficiency. In this paper, we present a lightweight tool for detecting specific functions in large binaryprograms through symbolizing variables and emulating program execution. The tool detects vulnerabilities through data dependency analysis and heuristics in each execution path. While our tool had an 8% higher false positive rate than the bap_toolkit, it detected all existing vulnerabilities in our dataset.