• Title/Summary/Keyword: 정적 분석 도구

Search Result 277, Processing Time 0.024 seconds

Recidivism prediction of sex offender risk assessment tools: STATIC-99 and HAGSOR-Dynamic (교정시설내 성범죄자 재범위험성 평가도구의 재범 예측: STATIC-99와 HAGSOR-동적요인을 중심으로)

  • Yoon, Jeongsook
    • Korean Journal of Forensic Psychology
    • /
    • v.13 no.2
    • /
    • pp.99-119
    • /
    • 2022
  • Research on sex offense has shown that sex offenders are very heterogeneous. Sex offenders are heterogeneous in their probability of risk of recidivism. Some sex offenders are known to be much higher in their tendencies to reactivate than others. The study examined the predictive and explanatory power of static and dynamic risk factors in STATIC-99 and HAGSOR-Dynamic which have been used in Korean correctional facilities since 2014. STATIC-99 and HAGSOR-Dynamic showed moderate predictive accuracy for all crimes(AUC = .737, AUC = .597, respectively, ps < .001). However, when examining sex crime alone, only STATIC-99 predicted recidivism significantly(AUC = .743, p < .001). The incremental predictive power of HAGSOR-Dynamic was confirmed; the explanatory power of Model 2 comprising both static and dynamic risk factors were significant beyond Model 1 comprising only static factors(∆χ2= 12.721, p < .001), but this tendency was only applied to the model of all crimes. These findings were discussed with implications of practicing the sex offender assessment and treatment.

Software Security Vulnerability Improvement Using Open Static Analysis Tool (공개 정적 분석도구를 활용한 소프트웨어 보안취약성 개선)

  • Jang, Young Su;Jung, Geum Taek;Choi, Jin Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.796-799
    • /
    • 2010
  • 인터넷의 발전으로 인터넷을 통한 서비스가 증대하고 있다. 반면 응용 소프트웨어의 보안 취약점으로 인해 국가, 기업, 개인 모두에게 정보보호의 중요성이 더욱 강조 되고 있다. 임베디드 소프트웨어인 우주, 항공, 원자력 소프트웨어 등 오류 없이 수행되어야 하는 고안전성 소프트웨어의 개발기법은 이제 응용 소프트웨어의 보안강화 활동에 활용 되고 있다. 특히 시큐어 코딩 (Secure Coding)은 방어적 프로그램(Defensive Programming)을 포함하는 개념으로 소프트웨어의 안전성과 보안성을 향상 시킬 수 있다. 본 논문에서는 범용 보안 취약가능성 분석 도구를 이용하여 소프트웨어의 취약 가능성을 분석하고 보안 취약점 유발 명령어를 분류한다. 그 다음에 시큐어 코딩 기법을 적용하여 취약한 코드를 개선하였다. 이러한 개선을 통해 보안 취약성 가능한 코드 부분을 손쉽게 수정하여 소프트웨어 보안을 개선할 수 있다.

Effectiveness Analysis Tool for Underwater Acoustics Detection in Quasi-static Underwater Acoustics Channel based on Underwater Environmental Information DB (수중 환경 정보 DB 기반 준-정적 수중음향 채널 수중음향 탐지 효과도 분석 모의 도구 구현)

  • Kim, Jang Eun;Han, Dong Seog
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.10
    • /
    • pp.148-158
    • /
    • 2015
  • It is difficult to test a detection system in underwater acoustics channel environments. The system can be evaluated by using simulation analysis tool. In this paper, a simulation tool is proposed to analyze the effectiveness of underwater acoustics detection based on database for real environments. First, the underwater environment is built based on HYCOM underwater environment database. Then, a multipath characteristic is considered through calculating underwater acoustics propagation path/pressure based on the ray theory. Also, hydrophone thermal noise and underwater ambient noise are considered to reflect underwater noise characteristics.

Implementing A Code Static Anaylsis based on the Java Parser (기존 자바 파서 확장 기반의 코드 정적 분석기 구현)

  • Park, Jihoon;Park, Bokyung;Yi, Keunsang;Kim, R. Youngchul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.641-644
    • /
    • 2017
  • 현재 많은 테스팅 기법으로도 생산되는 결과물들의 잠재적 오류 발생을 예측하기 힘들다. 기존 오픈 소스 정적 분석 도구들(Source Navigator)은 불충분한 정보를 제공하여 원하는 내부 정보를 축출하기 어렵다. 이를 해결하기 위해, 기존 오픈 소스의 자바 파서의 개선을 통해, 코드 내부 품질 측정을 고려하고자 한다. 즉 기존 자바 파서 개선 기반의 "추상구문트리로 변환된 코드"에서 "직접 코드 정보 추출" 방안의 구현이다. 이를 통해, 기존의 SNDB보다 더 많은 코드 정보 추출로 코드 내부 품질 측정이 더 수월할 것을 기대한다.

Utilization of Information Technology and Organizational Culture of University Libraries (정보기술의 활용과 대학도서관 조직문화)

  • 윤혜영
    • Journal of Korean Library and Information Science Society
    • /
    • v.32 no.2
    • /
    • pp.145-164
    • /
    • 2001
  • This study attempts to identify use of information technology In university libraries and to analyze the relationship between utilization of information technology and organizational culture of university libraries. A questionnaire developed through literature review is used to survey staff in university libraries. In conclusion, utilization of information technology by librarian and rational goal model of culture have negative relation and two variables are correlated at .05 significant level.

  • PDF

A Study on the Analysis of Effectiveness of 4-H Seoul Field-Experiential Learning Program (『4-H청소년 서울현장체험학습』 프로그램의 효과 분석 -청소년인증수련활동 효과성 측정도구를 중심으로-)

  • Kim, Jin Ho
    • Journal of Agricultural Extension & Community Development
    • /
    • v.20 no.3
    • /
    • pp.729-753
    • /
    • 2013
  • The purpose of this study was to analyze effectiveness of 4-H Seoul Field-Experiential Learning Program(4-H SFELP). The effectiveness scale of youth accredited activity was applied to analyze the effectiveness and satisfaction of the program. After screening the data, 155 responses were used to analyze the data for this study. The major findings of this study were as follows. First, 4-H SFELP has positive effects on the level of global leadership, initiative in exchange, and understanding other cultures which are related with effectiveness of youth exchange activity. Second, 4-H SFELP has positive effects on the level of confidence, challenge spirit, achievement motivation, and collective leadership which are related with effectiveness of youth adventure and challenge activity. Third, 4-H SFELP has positive effects on the level of problem-solving skills, morality, other-respect, and self-respect which are related with effectiveness of youth self-improvement activity. Fourth, 4-H SFELP has positive effects on the level of self-efficacy and autonomy but has not effects on the level of inquiring mind of participants. All these findings were discussed for youth workers and researchers.

Implementation of Testing Tool Verification of ATM Switching Software (ATM교환기 S/W검증을 위한 테스팅 도구 설계 및 구현)

  • Chung, Chang-Sin;Hwang, Sun-Myung;Lee, Kyung-Whan;Kim, Haeng-Kon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.8
    • /
    • pp.1987-1994
    • /
    • 1997
  • ATM switching software should be required high reliability, functionality, extendability and maintainability. After development of the software, it is verified and tested by analyzer whether the software is accomplished the characteristics of it or not. There are so many CASE tools in other area, but the CHILL testing tools that can verify ATM softwares have not various functions are not many. In this paper we develop the testing tool which can evaluate and test CHILL programmed ATM software. This Tool supports testing reports, debugging informations and maintenance informations including parallel process about CHILL original programs.

  • PDF

A Design of Exploit Vulnerability Analysis Module for Open Source IoT Security (Open Source IoT 보안을 위한 익스플로잇 취약점 분석 모듈 설계)

  • Park, Geunil;Park, Sanghyeon;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.313-314
    • /
    • 2016
  • 최근 컴퓨터, 휴대폰 등 전자기기만 인터넷 연결이 가능하던 시대를 지나 냉장고, 에어컨, 현관문 등 모든 종류의 사물들 간 사람의 개입이 필요 없는 초연결사회로 발전하고 있다. 이러한 모든 사물들 간 인터넷기반으로 상호 연결되어있는 IoT(Internet of Things)환경이 급격히 성장 하고 있는 가운데 더불어 OSIoT(Open Source IoT)의 수요도 함께 급성장하고 있다. OSIoT의 소프트웨어는 보안에 대한 전문적인 개발자의 체계적인 설계에 의해 개발되어야만 하트블리드(HeartBleed), 쉘쇼크(ShellShock)와 같은 다양한 보안취약점에 안전하다. 하지만 OSIoT소프트웨어는 누구나 쉽게 접근 설계가 가능하기 때문에 일반적으로 배포되고 있는 OSIoT의 소프트웨어 검증이 필요하다. 따라서 본 논문에서는 다른 소프트웨어 점검 도구들과 연계 가능한 정적분석 도구인 취약점 별 익스플로잇 적용 모듈 설계를 제안한다.

A Study on Vulnerability Analysis Techniques for Secure Weapon System Software (안전한 무기체계 소프트웨어를 위한 취약점 분석 기법에 관한 연구)

  • Kim, Jong-Bok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.8
    • /
    • pp.459-468
    • /
    • 2018
  • Cyberattacks on information systems used by applications related to weapon system and organizations associated with national defense put national security at risk. To reduce these threats, continuous efforts such as applying secure coding from the development stage or managing detected vulnerabilities systematically are being made. It also analyzes and detects vulnerabilities by using various analysis tools, eliminates at the development stage, and removes from developed applications. However, vulnerability analysis tools cause problems such as undetected, false positives, and overdetected, making accurate vulnerability detection difficult. In this paper, we propose a new vulnerability detection method to solve these problems, which can assess the risk of certain applications and create and manage secured application with this data.

A Study on Deobfuscation Method of Android and Implementation of Automatic Analysis Tool (APK에 적용된 난독화 기법 역난독화 방안 연구 및 자동화 분석 도구 구현)

  • Lee, Se Young;Park, Jin Hyung;Park, Moon Chan;Suk, Jae Hyuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1201-1215
    • /
    • 2015
  • Obfuscation tools can be used to protect android applications from reverse-engineering in android environment. However, obfuscation tools can also be misused to protect malicious applications. In order to evade detection of anti-virus, malware authors often apply obfuscation techniques to malicious applications. It is difficult to analyze the functionality of obfuscated malicious applications until it is deobfuscated. Therefore, a study on deobfuscation is certainly required to address the obfuscated malicious applications. In this paper, we analyze APKs which are obfuscated by commercial obfuscation tools and propose the deobfuscation method that can statically identify obfuscation options and deobfuscate it. Finally, we implement automatic identification and deobfuscation tool, then show the results of evaluation.