• Title/Summary/Keyword: Assembly information codes

Search Result 17, Processing Time 0.029 seconds

STEP-based Algorithms for Extraction and Code Generation of Assembly Information (STEP 기반의 조립정보 추출과 코드 생성 알고리즘)

  • Kim K.S.;Choi H.G.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.10 no.6
    • /
    • pp.412-420
    • /
    • 2005
  • The integration of CAD and CAM is critical for computer aided process planning. Recently, STEP has been emerged and utilized as a product data exchange standard format in CAD/CAM areas. The assembly information consists of assembly component relations, assembly features, assembly directions and mating conditions. The purpose of this study is to develop an efficient algorithm to extract assembly information directly from the STEP based files and to generate automatically assembly process plan from the extracted assembly features. The developed algorithms will generate assembly information codes for STEP(AICS). The results from this study can be a reasonable link between design and manufacturing for developing better CAAPP(Computer-Aided Assembly Process Planning) systems.

A Method of Detecting Pointer Access Error based on Disassembled Codes (역어셈블에 기반한 포인터 참조 오류 검출 방법)

  • Kim, Hyunsoo;Kim, Byeong Man;Huh, Nam Chul;Shin, Yoon Sik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.5
    • /
    • pp.13-23
    • /
    • 2015
  • This thesis proposes a method for effectively detecting memory errors with low occurrence frequency that may occur depending on runtime situation by analyzing assembly codes obtained by disassembling an executable file. When applying the proposed method to various programs having no compilation error, a total of about 750 potential errors taken about 90 seconds are detected among 1 million lines of assembly codes corresponding to a total of about 10 thousand functions.

Detection of Potential Invalid Function Pointer Access Error based on Assembly Codes (어셈블리어 코드 기반의 Invalid Function Pointer Access Error 가능성 검출)

  • Kim, Hyun-Soo;Kim, Byeong-Man
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.938-941
    • /
    • 2010
  • Though a compiler checks memory errors, it is difficult for the compiler to detect function pointer errors in code level. Thus, in this paper, we propose a method for effectively detecting Invalid function pointer access errors, by analyzing assembly codes that are obtained by disassembling an executable file. To detect the errors, assembly codes in disassembled files are checked out based on the instruction transition diagrams which are constructed through analyzing normal usage patterns of function pointer access. When applying the proposed method to various programs having no compilation error, a total of about 500 potential errors including the ones of well-known open source programs such as Apache web server and PHP script interpreter are detected among 1 million lines of assembly codes corresponding to a total of about 10 thousand functions.

  • PDF

Low-Power Encryption Algorithm Block Cipher in JavaScript

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.252-256
    • /
    • 2014
  • Traditional block cipher Advanced Encryption Standard (AES) is widely used in the field of network security, but it has high overhead on each operation. In the 15th international workshop on information security applications, a novel lightweight and low-power encryption algorithm named low-power encryption algorithm (LEA) was released. This algorithm has certain useful features for hardware and software implementations, that is, simple addition, rotation, exclusive-or (ARX) operations, non-Substitute-BOX architecture, and 32-bit word size. In this study, we further improve the LEA encryptions for cloud computing. The Web-based implementations include JavaScript and assembly codes. Unlike normal implementation, JavaScript does not support unsigned integer and rotation operations; therefore, we present several techniques for resolving this issue. Furthermore, the proposed method yields a speed-optimized result and shows high performance enhancements. Each implementation is tested using various Web browsers, such as Google Chrome, Internet Explorer, and Mozilla Firefox, and on various devices including personal computers and mobile devices. These results extend the use of LEA encryption to any circumstance.

Design of a cosynthesis system for pipelined application-specific instruction processors (파이프라인을 지원하는 ASIP 합성 시스템의 설계)

  • 현민호;이석근;박창욱;황선영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.3
    • /
    • pp.444-453
    • /
    • 1997
  • This paper presents the prototype design of hardware/software cosynthesis system for pipelined application-specific instruction processors. Taking application programs in VHDL as inputs, the proposed system generates a pipelined instruction-set processor and the instruction sequences running on the generated machine. The design space of datapath and controller is defined by the architectural templates embedded in the system. Generating the intyermediate code adequate for parallelism analysis and extraction, the system converts it into assembly codes. Experimental results show the effectiveness of the proposed system.

  • PDF

Detection of Potential Memory Access Errors based on Assembly Codes (어셈블리어 코드 기반의 메모리 오류 가능성 검출)

  • Kim, Hyun-Soo;Kim, Byeong-Man;Bae, Hyun-Seop;Chung, In-Sang
    • The KIPS Transactions:PartD
    • /
    • v.18D no.1
    • /
    • pp.35-44
    • /
    • 2011
  • Memory errors can cause not only program malfunctions but also even unexpected system halt. Though a programmer checks memory errors, some memory errors with low occurrence frequency are missed to detect. In this paper, we propose a method for effectively detecting such memory errors using instruction transition diagrams through analyzing assembly codes obtained by disassembling an executable file. Out of various memory errors, local memory return errors, null pointer access errors and uninitialized pointer access errors are targeted for detection. When applying the proposed method to various programs including well-known open source programs such as Apache web server and PHP script interpreter, some potential memory errors are detected.

A Study on Evaluation of Information Security Awareness and Security Level about Legislative Authority (입법기관의 보안성 평가와 정보보호 인식 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.269-273
    • /
    • 2010
  • 7.7 DDoS incident due to recent events and the emerging importance of privacy and Privacy laws are being discussed in the National Assembly. In this study, Legislative Assembly Secretariat support organization focused on using the system, such as the Internet network and the administrative, technical and physical security elements on the status of confidentiality, availability, integrity and security criteria to identify and follow and We are analyzing. In addition, the Internet, including network and use the system primarily for use, Legislative support agency, The National Assembly Secretariat staff awareness about information security and privacy on the survey for compliance with codes of conduct and We are analyzing. Through this analysis of legislative support agencies' security status, and social responsibility as an institution will wish to encourage the role.

  • PDF

Implementation of Nondeterministic Compiler Using Monad (모나드를 이용한 비결정적 컴파일러 구현)

  • Byun, Sugwoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.151-159
    • /
    • 2014
  • We discuss the implementation of a compiler for an imperative programming language, using monad in Haskell. This compiler involves a recursive-descent parser conducting nondeterministic parsing, in which backtracking occurs to try with other rules when the application of a production rule fails to parse an input string. Haskell has some strong facilities for parsing. Its algebraic types represent abstract syntax trees in a smooth way, and program codes by monad parsing are so concise that they are highly readable and code size is reduced significantly, comparing with other languages. We also deal with the runtime environment of the assembler and code generation whose target is the Stack-Assembly language based on a stack machine.

System Design and Realization for Real Time DVR System with Robust Video Watermarking (강인한 비디오 워터마킹을 적용한 실시간 DVR 시스템의 설계 구현)

  • Ryu Kwang-Ryol;Kim Ja-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1019-1024
    • /
    • 2006
  • A system design and realization for real time DVR system with robust video watermarking algorithm for contents security is presented in this paper. The robust video watermarking is used the intraframe space region and interframe insertion simultaneously, and to be processed at real time on image data and algorithm is used the 64bits special purpose quad DSP processor with assembly and soft pipeline codes. The experimental result shows that the processing time takes about 2.5ms in the D1 image per frame for 60% moving image.

An Automatic Translation Method Between Assembly Codes (어셈블리 코드 간의 자동 변환 방법)

  • Shim, Jung-Min;Lim, Jin-Su;Woo, Gyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.322-325
    • /
    • 2010
  • 본 논문은 다른 프로세서간의 어셈블리 코드를 자동으로 변환하는 방법에 대해 소개한다. 어셈블리 언어는 기계어를 사람이 알아보기 쉽도록 만든 저급 언어로서 레지스터 접근과 같은 하드웨어 수준의 작업이 가능한 반면, 컴퓨터 아키텍처에 따라 어셈블리도 다르다. 이에 따라 새로운 프로세서에서 어셈블리 코드가 포함된 프로그램을 동작시키기 위해서는 어셈블리 코드 부분을 새로 작성하여야 한다. 어셈블리를 작성하는 것은 많은 시간이 필요하고 버그가 발생할 확률이 높다. 본 논문에서는 새로 작성할 어셈블리 코드를 동일한 동작을 하는 다른 프로세서의 어셈블리 코드를 통해 생성해내는 방법을 소개한다.