• Title/Summary/Keyword: 탐지 커버리지

Search Result 17, Processing Time 0.023 seconds

Automated Building Fuzzing Environment Using Test Framework (테스트 프레임워크를 활용한 라이브러리 퍼징 환경 구축 자동화)

  • Ryu, Minsoo;Kim, Dong Young;Jeon Sanghoonn;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.587-604
    • /
    • 2021
  • Because the library cannot be run independently and used by many applications, it is important to detect vulnerabilities in the library. Fuzzing, which is a dynamic analysis, is used to discover vulnerabilities for the library. Although this fuzzing technique shows excellent results in terms of code coverage and unique crash counts, it is difficult to apply its effects to library fuzzing. In particular, a fuzzing executable and a seed corpus are needed that execute the library code by calling a specific function sequence and passing the input of the fuzzer to reproduce the various states of the library. Generating the fuzzing environment such as fuzzing executable and a seed corpus is challenging because it requires both understanding about the library and fuzzing knowledge. We propose a novel method to improve the ease of library fuzzing and enhance code coverage and crash detection performance by using a test framework. The systems's performance in this paper was applied to nine open-source libraries and was verified through comparison with previous studies.

M&S Tool for Analysis of Detection Coverage and Target Localization in Bistatic Radar Systems (바이스태틱 레이더의 탐지 커버리지 분석 및 표적 위치 산출을 위한 M&S Tool)

  • Park, Jung-Hee;Lee, Won-Woo;Yoo, Jin-Cheol;Yang, Hoon-Gee;Chung, Young-Seek;Bae, Kyung-Bin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.5
    • /
    • pp.904-912
    • /
    • 2011
  • In this paper, we have proposed a M&S tool for analyzing detection coverage and target localization in bistatic radar system. The detection coverage determined by radar parameters is meaningful when it satisfies the clear line-of-sight condition. We improved the method to find the minimum altitudes of transmitter and receiver for meeting the condition by considering three-dimensional coverage. Its computational burden is not problematic because the calculation is for maximizing the performance of the radar and does not demand a real-time operation. In addition, target localization on three-dimensional earth model based on the information of the height, longitude, and latitude is proposed instead of the previous unpractical calculation on two-dimensional bistatic plane. Its precalculated result can reduce its computation burden and it is suitable for real-time estimation of target location.

Analysis of the Detection Time of Distress Signal for LEOSAR and MEOSAR Systems (LEOSAR 및 MEOSAR 시스템의 조난신호 탐지시간 해석)

  • Lim, Sang-Seok
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.4
    • /
    • pp.377-384
    • /
    • 2006
  • In this paper the detection time of the distress signal for the satellite-based search and rescue (SAR) system is evaluated. Present LEOSAR system in operation employs a few Low-altitude Earth Orbit (LEO) satellites and hence provides poor and local coverage availability. This results in a considerably long waiting time for a distress beacon to be detected by a rescue mission control center. One can expect that the detection time of the distress signal will be significantly reduced if the proposed MEOSAR system, which is based on the Medium-altitude Earth Orbit (MEO) satellites, is implemented. Taking into account the influence of the obstacles on the beacon signal, simulations are carried out to evaluate the detection time of distress signals for the LEOSAR and MEOSAR systems and the corresponding results are analyzed.

  • PDF

Analysis of the Connectivity of Monitoring Nodes and the Coverage of Normal Nodes for Behavior-based Attack Detection in Wireless Sensor Networks (무선 센서 네트워크에서 행위 기반 공격 탐지를 위한 감시 노드의 연결성과 일반 노드의 커버리지 분석)

  • Chong, Kyun-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.27-34
    • /
    • 2013
  • In wireless sensor networks, sensors need to communicate with each other to send their sensing data to the administration node and so they are susceptible to many attacks like garbage packet injection that cannot be prevented by using traditional cryptographic approaches. A behavior-based detection is used to defend against such attacks in which some specialized monitoring nodes overhear the communications of their neighbors to detect bad packets. As monitoring nodes use more energy, it is desirable to use the minimal number of monitoring nodes to cover the whole or maximal part of the network. The monitoring nodes can either be selected among the deployed normal nodes or differ in type from normal nodes. In this study, we have developed an algorithm for selecting the predefined number of monitoring nodes needed to cover the maximum number of normal nodes when the different types of normal nodes and monitoring nodes are deployed. We also have investigated experimentally how the number of monitoring nodes and their transmission range affect the connection ratio of the monitoring nodes and the coverage of the normal nodes.

A Node Deployment Strategy Considering Environmental Factors and the Number of Nodes in Surveillance and Reconnaissance Sensor Network (감시정찰 센서네트워크에서 환경요소와 노드수량을 고려한 노드 배치 전략)

  • Kim, Yong-Hyun;Chung, Kwang-Sue
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1670-1679
    • /
    • 2011
  • In the area of wireless sensor networks, sensor coverage and network connectivity problems are caused by a limited detection range and the communication distance of the nodes. To solve the coverage and connectivity problems, many studies are suggested, but most research is restricted to apply into the real environment because they didn't consider various environmental factors on wireless sensor network deployment. So in this paper, we propose a node deployment strategy considering environmental factors and the number of nodes in surveillance and reconnaissance sensor networks(SRSN). The proposed node deployment method divides the installation of the surveillance and reconnaissance sensor networks system into four steps such as identification of influences factors for node placement through IPB process, sensor node deployment based on sensing range, selection of monitoring site, and relay node deployment based on RF communication range. And it deploys the sensor nodes and relay nodes considered the features of the surveillance and reconnaissance sensor network system and environmental factors. The result of simulation indicates that the proposed node deployment method improves sensor coverage and network connectivity.

스몰셀 분야 특허 동향 및 추진 전략

  • Jeong, Jin-Seop
    • Information and Communications Magazine
    • /
    • v.31 no.10
    • /
    • pp.80-86
    • /
    • 2014
  • 스마트 폰을 비롯한 모바일 기기들은 멀티미디어 정보를 포함하는 대용량 무선 데이터 서비스를 위해 진화하고 있다. 이에 따라 통신 서비스 제공업체의 네트워크들은 점점 더 복잡해지고 다양한 서비스를 위한 장비들로 구성되고 있다. 스몰셀 기지국(access point, Henb)들은 기존의 매크로셀과 같이 이동통신 사업자에 의해 지정된 최적의 위치에 설치되는 것이 아니고 사용자가 개별적으로 구매하여 설치하기 때문에, 셀의 배치를 위한 지역적인 설계가 없다. 따라서 스몰셀 기지국 스스로가 주변 환경을 탐지하여, 각종 파라미터를 최적으로 설정하는 것을 기본 성능으로 요구한다. 이에 따라, 과거 일정한 커버리지를 갖는 소형의 기지국 장비들을 지칭하던 펨토셀, 피코셀 등의 명칭도 현재에는 적응적인 커버리지 조절의 기능을 고려하여 스몰셀(small cell)로 통칭되고 있다. 스몰셀 기술은, 3GPP에서 스몰셀 기술이 제안되기 시작하면서 급증하고 있으며 국내외 학계와 업계가 표준을 기반으로 하는 R&D와 특허 출원을 현재에도 진행하고 있다. 각 국가들의 스몰셀 기술은 현재까지 발전기에 속하여 앞으로도 지속적인 연구개발과 표준화, 그리고 특허 출원으로 이어지는 국가간의 경쟁이 치열할 것으로 전망된다. 본 고에서는 스몰셀 표준을 통해 세부 기술을 도출하고, 이로부터 관련 특허를 검색하고 분석하여 향후 표준 특허로 확보하는 방법론을 제시한다.

Study on the Optimal Deployment of the Passive Radar System for Detecting Small Unmanned Aerial Vehicles (소형 무인기 탐지를 위한 패시브 레이더망 최적 배치 연구)

  • Baek, Inseon;Lee, Taesik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.4
    • /
    • pp.443-452
    • /
    • 2016
  • Current low-altitude radar system often fails to detect small unmanned aerial vehicles (UAV) because of their small radar cross section (RCS) compared with larger targets. As a potential alternative, a passive bistatic radar system has been considered. We study an optimal deployment problem for the passive bistatic radar system. We model this problem as a covering problem, and develop an integer programming model. The objective of the model is to maximize coverage of a passive bistatic radar system. Our model takes into account factors specific to a bistatic radar system, including bistatic RCS and transmitter-receiver pair coverage. Considering bistatic RCS instead of constant RCS is important because the slight difference of RCS value for small UAVs could significantly influence the detection probability. The paired radar coverage is defined by using the concept of gradual coverage and cooperative coverage to represent a realistic environment.

UAV Path Planning for ISR Mission and Survivability (무인항공기의 생존성을 고려한 감시정찰 임무 경로 계획)

  • Bae, Min-Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.211-217
    • /
    • 2019
  • In an complicated battlefield environment, information from enemy's camp is an important factor in carrying out military operations. For obtaining this information, the number of UAVs that can be deployed to the mission without our forces' loss and at low cost is increasing. Because the mission environment has anti-aircraft weapons, mission space is needed for UAV to guarantee survivability without being killed. The concept of Configuration Space is used to define the mission space considering with range of weapons and detect range of UAV. UAV must visit whole given area to obtain the information and perform Coverage Path Planning for this. Based on threats to UAV and importance of information that will be obtained, area that UAV should visit first is defined. Grid Map is generated and mapping threat information to each grid for UAV path planning. On this study, coverage conditions and path planning procedures are presented based on the threat information on Grid Map, and mission space is expanded to improve detection efficiency. Finally, simulations are performed, and results are presented using the suggested UAV path planning method in this study.

An Efficient Web Browser Fuzzing Strategy through Comparative Analysis of Fuzzers (퍼징 도구들의 비교 분석을 통한 효율적인 웹 브라우저 퍼징 전략)

  • Park, Yeong-Ung;Lee, Jun-Hyuk;Cho, Seong-Je
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.328-331
    • /
    • 2011
  • 최근 소프트웨어 결함이나 보안 취약점을 분석하고 발견하기 위해 퍼징(fuzzing)에 대한 연구가 활발하다. 퍼징은 무작위 입력 데이터를 대상 프로그램에 주입하여 그 결과를 관찰하면서 결함을 탐지하는 테스팅 방법이다. 본 논문에서는 웹 브라우저를 대상으로 기존의 '변이 기반의 덤 퍼징'(Mutation based Dumb Fuzzing) 방식과 '생성 기반의 지능적 퍼징'(Generation based Smart Fuzzing) 방식을 비교 분석하였다. 그리고 실험을 통해 기존의 퍼징 도구들의 성능을 측정하고 이를 바탕으로 브라우저 퍼징에서' 변이 기반의 덤 퍼징' 이 웹 브라우저의 결함 및 취약점 탐지에 더 효율적이라는 것을 보인다. 그리고 웹 브라우저를 대상으로 '변이 기반의 덤 퍼징' 방식을 적용할 때, 코드 실행 커버리지를 고려한 다수의 입력 템플릿 확보와 다수의 템플릿들에 대한 구성 요소들을 랜덤하게 섞어서 변이를 하는 효과적인 브라우저 퍼징 전략을 제안한다.

The Classification and Limitation of Coverage-based WebAssembly Fuzzer (커버리지 기반 웹어셈블리 퍼저의 분류와 한계점)

  • Ha-Young Kang;Su-Hyeon Song;Dong-Hyeon Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.154-155
    • /
    • 2023
  • WebAssembly(Wasm)은 웹에서 네이티브에 가까운 속도로 실행 가능하고, 고성능 어플리케이션의 구현도 가능하기 때문에 브라우저 및 기타 플랫폼에서 활발히 사용되고 있다. 이로 인해 Wasm에 대한 보안성이 대두되고 있는데, 이때 취약점을 탐지하는 Fuzzing 기법을 적용한 연구들이 있다. Fuzzing 기법에 대한 분류 및 대표적인 도구를 소개하고 각 기법 간 차이점 및 한계점과 향후 연구 방향을 제시한다.