• Title/Summary/Keyword: 테스트 도구

Search Result 394, Processing Time 0.027 seconds

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

Visualization of 3D Scanned Model for Interpretation of Heritage - Case of Dinosaur Tracks for Documentation and Interpretation (문화 및 자연 유산의 해석을 위한 3차원 스캔 모델의 가시화 - 공룡발자국의 기록과 해석 사례)

  • Ahn, Jaehong;Kong, Dal-Yong;Wohn, Kwang-Yun
    • Journal of the HCI Society of Korea
    • /
    • v.8 no.1
    • /
    • pp.19-28
    • /
    • 2013
  • As yet the use of 3D scanning technology has been limited to documentation, preservation and monitoring in cultural and natural heritage domain. Appropriate visualization of precise geometric information in scan data can support scientific interpretation of the domain experts. We studied the rendering techniques which visualize the required features from scanned models, and proposed a 3D scan data visualization pipeline, rendering methods, and a classification scheme. As a case study, we analyzed the traditional method in the study of dinosaur tracks and performed the visualization of 3D scanned models. A user test based on the result confirmed an effectiveness of the proposed method. This research showed a practical method in which 3D scanned models can be used to effective interpretation of heritage.

  • PDF

A Study on the Development Environment for Flight Software using PowerPC (PowerPC를 이용한 저궤도 위성용 탑재소프트웨어 개발환경에 대한 연구)

  • Lee, Jae-Seung;Park, Hee-Sung;Park, Sung-Woo;Kim, Day-Young;Lee, Jong-In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1473-1476
    • /
    • 2004
  • 위성의 개발을 위해서는 오랜 개발기간과 많은 예산, 축적된 기술이 요구된다. 또한 위성에는 다양한 분야의 기술이 사용되어지기 때문에 각 서브시스템마다 독자적인 개발환경을 구축할 필요가 있다. 특히 위성의 제어, 임무수행 및 지상과의 통신 등을 담당하는 탑재소프트웨어는 위성의 용도 및 목적에 따라 개발환경이 크게 달라진다. 실시간 운영체제는 무엇을 사용하는지, 개발 및 검증을 위한 도구로 어떤 프로그램을 사용하는지, 내외부의 인터페이스는 어떠한 방식으로 수행할지, 새로운 기능의 CPU나 하드웨어에 대한 제어 등 위성의 탑재소프트웨어를 개발하기 위해서는 다양한 사항들이 고려되어야 한다. 새로운 위성을 개발할 경우 신기술의 적용과 새로운 위성시스템의 검증 및 개발을 위한 개발검증장비가 요구되며, 위성시스템의 변경 때마다 개발검증장비를 새로이 구축하게 되면 많은 기간과 막대한 비용이 위성개발 시마다 소요된다. 위성선진국에서는 다양한 위성의 개발 시 비용절감 및 개발기간 단축을 위하여 범용위성용 개발검증장비를 개발하여 이용하고 있는 추세이다. 국내에서는 다목적실용위성 1 호가 발사되어 성공적으로 임무를 수행하고 있으며 다목적 실용위성 2 호가 개발되어 현재 통합 및 검증시험이 진행 중이다. 그러나 새로운 위성시스템의 사전검증 및 신기술의 적용을 위한 범용위성 시스템 테스트베드에 대한 기술은 미비한 실정이다. 이러한 범용위성용 개발검증장비의 기반기술을 확보하기 위하여 현재 위성전자전산시스템 개발검증장비에 대한 연구가 수행되고 있다. 본 논문에서는 현재 수행되고 있는 PowerPC를 이용한 위성 탑재소프트웨어 개발검증시스템의 설계 및 개발에 대하여 설명한다.

  • PDF

Implementation of an Arduino Compatible Modular Kit for Educational Purpose (모듈 기반 교육용 아두이노 호환 키트 제작)

  • Heo, Gyeongyong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.547-554
    • /
    • 2019
  • With the curriculum revision in 2015, informatics for secondary high schools was designated as mandatory. As a result, there is an increasing interest in programming in elementary and junior high schools as well as in universities. Arduino is one of the famous tools for programming education, and the usefulness of it has been proven through various case studies. However, existing Arduino-based kits have hardware-dependent drawbacks such as complicated wiring, poor scalability, etc. To overcome these problems, we proposed a kit design, which has a module-based structure, can be extended through one common interface, and can be used for learning at various levels. In this paper, we describe the implementation details of FRUTO kit and a software to use it, which satisfies the proposed design criteria. FRUTO kit has been determined in its current form through several design changes, and is under pre-test before launching.

Development of Multiple Channel Measurement System for IC Socket (IC 소켓 검사용 다중 채널 측정 시스템 개발)

  • Gang, Sang-Il;Song, Sung-Yong;Yoon, Dal-Hwan
    • Journal of IKEEE
    • /
    • v.25 no.2
    • /
    • pp.315-321
    • /
    • 2021
  • In this paper, we have developed the multiple channel measurement system for IC Socket Test. The one can test the current-voltage measurements for pitting the several device specification, which analyze the thin current from several ㎂ to 5A with very low resistor mΩ. The increasement of the IC socket channel with lead pitch under 0.25 mm be need to perform several functions, concurrently. The system to perform these functions be designed to integrate several SMU(source measure unit) on board. So, we can reduce the 2 minutes test time per channel point to 40 sec, with daisy chain test method. Using by graphic interface, I-V curve mode and data logging technologies, we can implement the test flow methods and can make economies the time and cost.

Development and Verification Methodology for Small Civil Unmanned Aerial Vehicle System based on Open System Architecture (개방형 시스템 아키텍처 기반의 소형 민간 무인항공기 시스템 개발 및 검증 방법)

  • Jo, Hyun-Chul;Park, Keunyoung
    • Journal of Platform Technology
    • /
    • v.8 no.2
    • /
    • pp.32-43
    • /
    • 2020
  • The Unmanned Aerial Vehicle(UAV) system has been mainly used for military domains, but it also widely applied to used in the civilian domains. In civilian domains, low-cost and small-sized UAV systems are mainly applied in various industries. The software that operates UAV systems has a lot of common functions. However, even though there are many common functionalities of the software, changing the devices may cause a problem requiring software modification. These problems degrade interoperability, modularity and portability in UAV systems. In order to solve the problems, an Open System Architecture(OSA) has been proposed. In this paper, we propose a UAV system software architecture based on Future Airborne Capability Environment(FACE) standard. Our system can support UAV systems of various platforms in the civilian domains, which is supplied in small quantity batch production. And it has the advantages of software consolidation and portability. Finally, We describe the development and conformant methodology of the software based on the FACE standard using open development tools.

  • PDF

Implementation of an APT Attack Detection System through ATT&CK-Based Attack Chain Reconstruction (ATT&CK 기반 공격체인 구성을 통한 APT 공격탐지 시스템 구현)

  • Cho, Sungyoung;Park, Yongwoo;Lee, Kyeongsik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.527-545
    • /
    • 2022
  • In order to effectively detect APT attacks performed by well-organized adversaries, we implemented a system to detect attacks by reconstructing attack chains of APT attacks. Our attack chain-based APT attack detection system consists of 'events collection and indexing' part which collects various events generated from hosts and network monitoring tools, 'unit attack detection' part which detects unit-level attacks defined in MITRE ATT&CK® techniques, and 'attack chain reconstruction' part which reconstructs attack chains by performing causality analysis based on provenance graphs. To evaluate our system, we implemented a test-bed and conducted several simulated attack scenarios provided by MITRE ATT&CK Evaluation program. As a result of the experiment, we were able to confirm that our system effectively reconstructed the attack chains for the simulated attack scenarios. Using the system implemented in this study, rather than to understand attacks as fragmentary parts, it will be possible to understand and respond to attacks from the perspective of progress of attacks.

A Multiclass Classification of the Security Severity Level of Multi-Source Event Log Based on Natural Language Processing (자연어 처리 기반 멀티 소스 이벤트 로그의 보안 심각도 다중 클래스 분류)

  • Seo, Yangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1009-1017
    • /
    • 2022
  • Log data has been used as a basis in understanding and deciding the main functions and state of information systems. It has also been used as an important input for the various applications in cybersecurity. It is an essential part to get necessary information from log data, to make a decision with the information, and to take a suitable countermeasure according to the information for protecting and operating systems in stability and reliability, but due to the explosive increase of various types and amounts of log, it is quite challenging to effectively and efficiently deal with the problem using existing tools. Therefore, this study has suggested a multiclass classification of the security severity level of multi-source event log using machine learning based on natural language processing. The experimental results with the training and test samples of 472,972 show that our approach has archived the accuracy of 99.59%.

A technique to support the personalized learning based on the log data of piano chords practicing (피아노 코드 연습 데이터를 활용한 맞춤형 학습 지원)

  • Woosung, Jung;Eunjoo, Lee;Suah, Choe
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.1
    • /
    • pp.191-201
    • /
    • 2023
  • As Edutech arises which is integrating IT technology into education, many related attempts have been tried on music education area. The focus has been shifted from the teachers to the learners, and this makes the personalized learning emerge. The learner's proficiency is an essential factor to support the personalized learning. The chord fingering is an important technique in piano learning. In this paper, a personalized learning tool for piano chords has been suggested. And then, several utilization ways have been described by analyzing the chords patterns. Specifically, the difficulty of the chords and the proficiency of the learner are derived from the accumulated practicing log data of the users. More effective learning way of the chords has been presented through hierarchical clustering based on chords similarity. Furthermore, the suggested approach where only the practicing log data are used lessens the learner's burden to measure the proficiency and the chord's difficulty without additional efforts like taking tests.

Bit Register Based Algorithm for Thread Pool Management (스레드 풀 관리를 위한 비트 레지스터 기반 알고리즘)

  • Shin, Seung-Hyeok;Jeon, Jun-Cheol
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.331-339
    • /
    • 2017
  • This paper proposes a thread pool management technique of an websocket server that is applicable to embedded systems. WebSocket is a proposed technique for consisting a dynamic web, and is constructed using HTML5 and jQuery. Various studies have been progressing to construct a dynamic web by Apache, Oracle and etc. Previous web service systems require high-capacity, high-performance hardware specifications and are not suitable for embedded systems. The node.js which is consist of HTML5 and jQuery is a typical websocket server which is made by open sources, and is a java script based web application which is composed of a single thread. The node.js has a limitation on the performance for processing a high velocity data on the embedded system. We make up a multi-thread based websoket server which can solve the mentioned problem. The thread pool is managed by a bit register and suitable for embedded systems. To evaluate the performance of the proposed algorithm, we uses JMeter that is a network test tool.