• Title/Summary/Keyword: 오류코드

Search Result 425, Processing Time 0.024 seconds

Function partitioning methods for malware variant similarity comparison (변종 악성코드 유사도 비교를 위한 코드영역의 함수 분할 방법)

  • Park, Chan-Kyu;Kim, Hyong-Shik;Lee, Tae Jin;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.321-330
    • /
    • 2015
  • There have been found many modified malwares which could avoid detection simply by replacing a sequence of characters or a part of code. Since the existing anti-virus program performs signature-based analysis, it is difficult to detect a malware which is slightly different from the well-known malware. This paper suggests a method of detecting modified malwares by extending a hash-value based code comparison. We generated hash values for individual functions and individual code blocks as well as the whole code, and thus use those values to find whether a pair of codes are similar in a certain degree. We also eliminated some numeric data such as constant and address before generating hash values to avoid incorrectness incurred from them. We found that the suggested method could effectively find inherent similarity between original malware and its derived ones.

Comparison procedure in evaluation analysis of source code comparison on Embedded system (정보기기 소스코드 유사성 분석에서 목적물 검증)

  • Nam, SangYep;Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.31-38
    • /
    • 2021
  • In order to analyze the similarity of the source code object material, the source code on both sides must be able to be compiled and executed. In particular, in the case of hardware-integrated software, it is necessary to check whether the hardware interface matches. However, currently, the source code is provided in an incomplete state which is not original of source code used in developing steps. The complainant confirms that the executing characteristics are similar to their own in the expression and function of the output, and request an evaluation. When a source code compilation error occurs during the evaluation process, the experts draw a flowchart of the source code and applies the method of tracing the code flow for each function as indirect method. However, this method is indirect and the subjective judgment is applied, so there is concern about the contention of objectivity in the similarity evaluation result. In this paper, the problems of unverified source code similarity analysis and improvement directions are dealt with, through the analysis cases of source code disputes applied to embedded systems.

Design of Hybrid Debugging System for Java Programs (자바 프로그램을 위한 복합 디버깅 시스템의 설계)

  • Kouh, Hoon-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.81-88
    • /
    • 2009
  • In the previous work, we presented HDTS for locating logical errors in Java programs. The HDTS locates an erroneous method at an execution tree using an algorithmic program debugging technique and locates a statement with errors in the erroneous method using a step-wise program debugging. The technique can remove the unnecessary statements and nodes in debugging using a program slicing technique at the execution tree. So HDTS reduces the number of program debugging. In this paper, we design HDTS system for debugging java programs. We define small subset of Java language and design the translator that translates java source codes and the virtual machine that runs java programs. We design GUI(Graphical User Interface) for debugging.

An Empirical Study of Diversity and Interoperability of Programming Languages (프로그래밍 언어의 다원성과 상호운영성의 실증적 분석)

  • Ko, Bongsuk;Lee, Byeongcheol
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.5
    • /
    • pp.304-309
    • /
    • 2017
  • Programmers use multiple languages to reuse legacy code best suited to their problems. However, it is quite challenging to develop error-free multilingual programs because new types of bugs occur since misunderstanding about language interfaces such as Java Native Interface (JNI) and Python/C. There is a considerable amount of research to overcome multilingual program bugs and errors but these researches have less consideration about substantiality of programming languages, language interfaces, and bugs to evaluate their analyses and tools. In this paper, we have identified and establish substantiality of multilingual programming research with empirical study about diversity and interoperability of programming languages in Ubuntu software ecosystem based on real-world statistical data.

Design of Hybrid Debugging Technique for Locating Logical Errors in Java Source Codes (자바 원시 코드에서 논리적인 오류를 찾는 복합 디버깅 기술의 설계)

  • Kouh, Hoon-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.10
    • /
    • pp.114-125
    • /
    • 2006
  • In the previous work, we presented HDT for locating logical errors in Java programs. The HDT locates an erroneous method at an execution tree using an algorithmic program debugging technique and locates a statement with errors in the erroneous method using a step-wise program debugging. It reduced the number of programmer debugging in Java programs. But the HDT still increases the number of debugging because the size of the recent programs increases than the past programs and the number of methods is increasing. This paper proposes HDTS using a program slicing technique (PST) at the MDT. HDTS can reduce the number of programmer debugging. Specially, the more the number of methods and statements increases, the more HDTS has effects.

  • PDF

Evaluation of the Quality of Records of the Serials Union Catalog Database (연속간행물 종합목록 데이터베이스의 레코드 품질 평가)

  • Yoon, Cheong-Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.37 no.1
    • /
    • pp.27-42
    • /
    • 2003
  • The purpose of this study is to evaluate the quality of the Serials Union Catalog(UCAT) of KISTI. In examining both MARC records and bibliographic display records of 172 Japanese serials, AACR2R and KORMARC formats were used as the standard rules. Those records were described in the minimum or incomplete level ; but had repeated errors in various data fields, which included the incorrect choice of main headings, parallel titles and other titles, the improper use of language codes and related data fields, and the provision of incomplete information, etc. To improve the overall quality of bibliographic database, thorough comprehension and application of cataloging rules and MARC formats are strongly required.

A Study on the Solution of Y2K Problem (Y2k 문제 해결 방안)

  • 박민수;최수길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.270-273
    • /
    • 1999
  • Y2k will be able to enormous disaster. The many make an effort to find a solution to problem of Y2k. Problem of Y2k must solution to as follow. First, problem of Y2k solution organization must constructed. Second, in step with each stage-the first, developing and complete stage, stage of Y2k solution must be constructed. Third, solution of Y2k must construct to hierarchy. hierarchy structure constructed form six stage to first stage, first stage is investigation resources, second stage is estimation influence, third stage is planing conversion, fourth stage is working conversion, fifte spot, sixth stage is diffusion on the spot.

  • PDF

An Adaptive FEC Algorithm for Sensor Networks with High Propagation Errors (전파 오류가 높은 센서 네트워크를 위한 적응적 FEC 알고리즘)

  • 안종석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.755-763
    • /
    • 2003
  • To improve performance over noisy wireless channels, mobile wireless networks employ forward error correction(FEC) techniques. The performance of static FEC algorithms, however, degrades by poorly matching the overhead of their correction code to the degree of the fluctuating underlying channel error. This paper proposes an adaptive FEC technique called FECA(FEC-level Adaptation), which dynamically tunes FEC strength to the currently estimated channel error rate at the data link layer. FECA is suitable for wireless networks whose error rate is high and slowly changing compared to the round-trip time between two communicating nodes. One such example network would be a sensor network in which the average bit error rate is higher than $10^{-6}$ and the detected error rate at one time lasts a few hundred milliseconds on average. Our experiments show that FECA performs 15% in simulations with theoretically modeled wireless channels and in trace-driven simulations based on the data collected from real sensor networks better than any other static FEC algorithms.

Executing System of Virtual Machine Code using Decompiling Method (역컴파일링 기법을 이용한 가상기계 코드 실행 시스템)

  • Ahn, Duk-Ki;Yi, Chang-Hwan;Oh, Se-Man
    • The KIPS Transactions:PartA
    • /
    • v.14A no.2
    • /
    • pp.91-98
    • /
    • 2007
  • Generally, virtual machine platform is composed of a compiler, an assembler, and VM(Virtual Machine). To develop it, the design of VMC(Virtual Machine Code) is an essential task. And it is very important to verify the virtual machine platform. To do this and furthermore to execute VMC, it needs to implement VMC execution system using compiling method, interpreting method, or decompiling method. In this paper, we suggested and implemented the executing system of VMC using decompiling method out of three methods to execute the VMC. In our implementation, the VMC is SIL(Standard Intermediate Language) that is an intermediate code of EVM(Embedded Virtual Machine). Actually, we verified the usefulness of the decompiling method. And the decompiling method suggested in this paper can be used to minimize the mistake in developing Virtual machine platform.

Towards a Reliable Operating System for Wireless Sensor Networks (신뢰성을 제공하는 센서 네트워크 운영체제 기법)

  • Kim, Hyo-Seung;Cha, Ho-Jung
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.790-792
    • /
    • 2005
  • 배포된 센서 네트워크에서 응용프로그램의 오류가 발생할 경우 시스템이 불안정하게 동작하거나 수행 불능 상태에 빠질 수 있다. 기존의 센서 네트워크 운영체제가 응용의 오류로부터 시스템을 보호하지 못함에 따라 본 논문에서는 신뢰성을 제공하는 센서 네트워크 운영체제 기법을 제안한다. 제안하는 기법은 소프트웨어 단계로 동작하여 특권모드와 페이징, 세그먼테이션 기능이 없는 하드웨어에서 사용 가능하며, 응용의 커널 및 다른 응용의 데이터 영역 훼손과 코드 실행, 하드웨어 직접 제어를 방지한다. 본 기법이 응용 오류로부터 시스템을 보호 가능함을 실제 구현과 평가를 통해 밝힌다.

  • PDF