• Title/Summary/Keyword: 정적 분석 도구

Search Result 277, Processing Time 0.021 seconds

A study for Build the Concept Image about Natural Logarithm under GeoGebra Environment (GeoGebra 환경에서 정적분을 이용한 자연로그의 개념이미지 형성 학습 개선방안)

  • Lee, Jeong-Gon
    • Journal for History of Mathematics
    • /
    • v.25 no.1
    • /
    • pp.71-88
    • /
    • 2012
  • The purpose of this study is to find the way to build the concept image about natural logarithm and the method is using definite integral in calculus under GeoGebra environment. When the students approach to natural logarithm, need to use dynamic program about the definite integral in calculus. Visible reasoning process through using dynamic program(GeoGebra) is the most important part that make the concept image to students. Also, for understand mathematical concept to students, using GeoGebra environment in dynamic program is not only useful but helpful method of teaching and studying. In this article, about graph of natural logarithm using the definite integral, to explore process of understand and to find special feature under GeoGebra environment. And it was obtained from a survey of undergraduate students of mathmatics. Also, relate to this process, examine an aspect of students, how understand about connection between natural logarithm and the definite integral, definition of natural logarithm and mathematical link of e. As a result, we found that undergraduate students of mathmatics can understand clearly more about the graph of natural logarithm using the definite integral when using GeoGebra environment. Futhermore, in process of handling the dynamic program that provide opportunity that to observe and analysis about process for problem solving and real concept of mathematics.

Verification Methods for Vulnerabilities of Airborne Object-Oriented Software (항공용 객체지향 소프트웨어에 대한 취약점 검증 방안)

  • Jang, Jeong-hoon;Kim, Sung-su;Lee, Ji-hyun
    • Journal of Aerospace System Engineering
    • /
    • v.16 no.2
    • /
    • pp.13-24
    • /
    • 2022
  • As the scale of airborne system software increases, the use of OOT (Object-Oriented Technology) is increasing for functional expansion, efficient development, and code reuse, but the verification method for airborne object-oriented software is conducted from the perspective of the existing procedure-oriented program. The purpose of this paper was to analyze the characteristics of OOT and the vulnerabilities derived from the functional characteristics of OOT, and present a verification method applicable to each software development process (Design, Coding and Testing) to ensure the functional safety integrity of aviation software to which OOT is applied. Additionally, we analyzed the meaning of the static analysis results among the step-by-step verification measures proposed by applying LDRA, a static analysis automation tool, to PX4, an open source used to implement flight control software.

Component Analysis of DevOps and DevSecOps (DevOps와 DevSecOps의 컴포넌트 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.9
    • /
    • pp.47-53
    • /
    • 2019
  • This paper is analyzed of the characteristics of development operations and development security operations of the software and product, and the use analysis tools from a software code perspective. Also, it is emphasized the importance of human factors and the need to strengthen them, when considering security design rules. In this paper, we consider a secure process for managing change, focusing on fast and accurate decision-making in terms of procedural factors, when considering development security operations. In addition, the paper discussed the need for maturity model analysis in relation to the development security operating characteristics, and analyzed the meaning of the analysis elements through detailed procedures for the strength and integration elements of the dynamic and static elements accordingly. The paper also analyzed factors such as scanning activity and code analysis for threat modeling and compliance and control.

The mediating effect of decision making ability on the relationship between courage and happiness in young children (유아의 용기와 행복감 간의 관계 분석 및 의사결정력의 매개효과)

  • Won, Myung-Soon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.568-575
    • /
    • 2017
  • This study examined the effects of courage on happiness and the mediating effects of the decision making ability on the relationship between courage and happiness. The courage Inventory for Young Children (Park & Lee, 2011), The Children's decision making ability Scale (Park, 2012) and the happiness Questionnaire (Kim, 2008) were administered to 220 young children (112 boys, 108 girls, 5 year of age). The collected data were analyzed by descriptive statistics, Pearson's correlation analysis, multiple regression analysis, and a sobel test using the computer program, SPSS/PC 21.0. The results were as follows. First, there were significant positive relationships among courage, decision making ability, and happiness. Second, courage was an important factor in predicting the happiness of young children, and the decision making ability had mediating effects on the relationship between courage and happiness.

Reliability and Validity of the Korean Version of the Short Michigan Alcoholism Screening Test for Fathers and Mothers (부모의 음주문제를 선별하는 도구의 신뢰도 및 타당도 분석 -한국어판 Short Michigan Alcoholism Screening Test for Fathers and Mothers의 평가-)

  • Kim, Yong-Seok
    • Korean Journal of Social Welfare
    • /
    • v.56 no.3
    • /
    • pp.37-59
    • /
    • 2004
  • Short Michigan Alcoholism Screening Test for Fathers(F-SMAST) and Mothers(M-SMAST) is to measure the presence of an alcohol use disorder in one's father and/or mother. The purpose of this study is to evaluate the Korean version of the F-SMAST and M-SMAST. A total of 241 college students, who resided in Seoul and two other cities, participated in this study. The internal consistency of the Korean version of the F-SMAST and M-SMAST was assessed using alpha coefficient. The alpha coefficient of both the F-SMAST and the M-SMAST was 0.82. Standard Errors of Measurement(SEM) were also computed. SEMs of the F-SMAST and the M-SMAST were quite low. With a cut-off score of 3, the F-SMAST correctly identified 91 percent of respondents who were presumed to be children of alcoholics and correctly identified 81 percent of respondents who were presumed not to be children of alcoholics. Sensitivity and specificity of the M-SMAST with a cut-off score of 1 are 0.33 and 0.81, respectively. Several variables were examined in relation to the F-SMAST and the M-SMAST to examine convergent and discriminant validity. It was found that the F-SMAST and the M-SMAST were significantly correlated with most of convergent variables(average amount of drinking per day, AUDIT, distress) and had not statistically significant relationships with discriminant variables(demographic variables). This study suggests that the Korean version of the F-SMAST and the M-SMAST be repeatedly assessed across different sample in order to confirm the findings of this study.

  • PDF

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

Design and Implementation of PS-Block Timing Model Using PS-Block Structue (PS-Block 구조를 사용한 PS-Block Timing Model의 설계 및 구현)

  • Kim Yun-Kwan;Shin Won;Chang Chun-Hyon;Kim Tae-Wan
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.399-404
    • /
    • 2006
  • A real-time system is used for various systems from small embedded systems to distributed enterprise systems. Because it has a characteristic that provides a service on time, developers should make efforts to keep this property about time when developing real-time applications. As the result of research about real-time system indicates, TMO model supports various functions for time processing according to the real-time concept. And it guarantees response time which developers defined. So developers need a point of reference to define deadline and check the correctness of time. This paper proposes an improved PS-Block as an infrastructure of analysis tools for TMO to present a point of reference. There is a problem that the existing PS-Block has overhead caused by a policy making duplicated blocks. As such, this paper implements a PS-Block Timing Model to reduce the overhead due to block duplication, and defines a base class for searching in PS-Block. The PS-Block Timing Model, using an improved PS-Block structure, offers a point of reference of deadline and an infrastructure of execution time analysis according to the PS-Block configuration policy. Therefore, TMO developers can easily verify deadline of real-time methods, and improve reliability, and reduce development terms.

Defect-Type Analysis of Regional SW Development Companies using CodeSonar (CodeSonar를 이용한 지역 SW개발 업체의 결함 유형분석)

  • Noh, Jeong-Hyun;Lee, Jong-Min;Park, Yoo-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.3
    • /
    • pp.683-688
    • /
    • 2015
  • Recently, various static analysis tools for software defect detection are becoming widely used in practice. However, there is little public information of the most frequent defects in commercial areas until now. In this paper, we analyze the defects found by CodeSonar, a static analysis tool that finds defects in C/C++, Java programs. So we report the most frequent defects by various aspects in Dongnam area, Korea.

The influence of parent attachment on the parenting perception for university student (대학생이 지각한 부모애착이 부모역할 인식에 미치는 영향)

  • Ma, Ji-Sun;Park, Jung-Hwan;Moon, Chang-Bae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3321-3330
    • /
    • 2009
  • This research was about influence on parenting by parent attachment. The subjects were W university students 223 of Jeon-buk province. The questionnaire included Inventory of Parent and Peer Attachment(IPPA) and parenting perception. Data were analyzed by Pearson's correlation and Stepwise. The findings were as follows: First, the relationship between parent(mother and father) attachment and parenting perception was found to a positive relationship. especially, communication and reliability of parent attachment. But between isolation of parent attachment and parenting perception was found to a negative relationship. Second, the parenting perception influenced by father's reliability among of parent attachment and the next was mother's communication.

Efficient Null Pointer Dereference Vulnerability Detection by Data Dependency Analysis on Binary (효율적 데이터 의존성 분석을 이용한 바이너리 기반 Null Pointer Dereference 취약점 탐지 도구)

  • Wenhui Jin;Heekuck Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.253-266
    • /
    • 2023
  • The Null Pointer Dereference vulnerability is a significant vulnerability that can cause severe attacks such as denial-of-service. Previous research has proposed methods for detecting vulnerabilities, but large and complex programs pose a challenge to their efficiency. In this paper, we present a lightweight tool for detecting specific functions in large binaryprograms through symbolizing variables and emulating program execution. The tool detects vulnerabilities through data dependency analysis and heuristics in each execution path. While our tool had an 8% higher false positive rate than the bap_toolkit, it detected all existing vulnerabilities in our dataset.