• Title/Summary/Keyword: Binary Code Analysis

Search Result 126, Processing Time 0.027 seconds

Analysis of the error performance objective on Turbo code for satellite communication systems (위성통신시스템에서의 터보부호에 대한 오류성능 목표 분석)

  • Yeo, Sung-Moon;Kim, Soo-Young
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.49-50
    • /
    • 2006
  • Digital satellite systems are usually integrated with terrestrial systems to provide various services, and in these cases they should satisfy the performance objectives defined by the terrestrial systems. Recommendation ITU-R S.1062 specifies the performance of digital satellite systems. The performance objectives were given in terms of bit error probability divided by the average number of errors per burst versus percentage of time. This paper presents theoretical method to estimate performance measure of digital satellite systems defined in Recommendation ITU-R S.1062. We show performance estimation results of duo-binary Turbo codes, and verify them by comparing to the simulation results.

  • PDF

Wavelet-Based Digital Image Watermarking by Using Lorenz Chaotic Signal Localization

  • Panyavaraporn, Jantana;Horkaew, Paramate
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.169-180
    • /
    • 2019
  • Transmitting visual information over a broadcasting network is not only prone to a copyright violation but also is a forgery. Authenticating such information and protecting its authorship rights call for more advanced data encoding. To this end, electronic watermarking is often adopted to embed inscriptive signature in imaging data. Most existing watermarking methods while focusing on robustness against degradation remain lacking of measurement against security loophole in which the encrypting scheme once discovered may be recreated by an unauthorized party. This could reveal the underlying signature which may potentially be replaced or forged. This paper therefore proposes a novel digital watermarking scheme in temporal-frequency domain. Unlike other typical wavelet based watermarking, the proposed scheme employed the Lorenz chaotic map to specify embedding positions. Effectively making this is not only a formidable method to decrypt but also a stronger will against deterministic attacks. Simulation report herein highlights its strength to withstand spatial and frequent adulterations, e.g., lossy compression, filtering, zooming and noise.

Design and Analysis of Code Sequence Generating Algorithms using Almost Perfect Nonlinear Functions (APN 함수를 이용한 부호계열 발생 알고리즘 설계 빛 분석)

  • Lee, Jeong-Jae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.1
    • /
    • pp.47-52
    • /
    • 2010
  • For cryptographic systems, nonlinearity is crucial since most linear systems are easily decipherable. C.Bracken, Z.Zhaetc., propose the APN(Almost Perfect Nonlinear) functions with the properties similar to those of the bent functions with perfect nonlinearity. We design two kinds of new code sequence generating algorithms using the above APN functions. And we find that the out of phase ${\tau}\;{\neq}\;0$, autocorrelation functions, $R_{ii}(\tau)$ and the crosscorrelation functions, $R_{ik}(\tau)$ of the binary code sequences generated by two new algorithms over GF(2), have three values of {-1, $-1-2^{n/2}$, $-1+2^{n/2}$}. We also find that the out of phase ${\tau}\;{\neq}\;0$, autocorrelation functions, $R_{p,ii}(\tau)$ and the crosscorrelation functions, $R_{p,ik}(\tau)$ of the nonbinary code sequences generated by the modified algorithms over GF(p), $p\;{\geq}\;3$, have also three values of {$-1+p^{n-1}$, $-1-p^{(n-1)/2}+p^{n-1}$, $-1+p^{(n-1)/2}p^{n-1}$}. We show that these code sequences have the characteristics of the correlation functions similar to those of Gold code sequences.

Numerical Modeling of Physical Property and Electrochemical Reaction for Solid Oxide Fuel Cells (고체 산화물 연료전지를 위한 물성치 및 전기화학반응의 수치해석 모델링)

  • Park, Joon-Guen;Kim, Sun-Young;Bae, Joong-Myeon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.34 no.2
    • /
    • pp.157-163
    • /
    • 2010
  • Solid oxide fuel cells (SOFCs) are commonly composed of ceramic compartments, and it is known that the physical properties of the ceramic materials can be changed according to the operating temperature. Thus, the physical properties of the ceramic materials have to be properly predicted to develop a highly reliable simulation model. In this study, several physical properties that can affect the performance of SOFCs were selected, and simulation models for those physical properties were developed using our own code. The Gibbs free energy for the open circuit voltage, exchange current densities for the activation polarization, and electrical conductivity for the electrolyte were calculated. In addition, the diffusion coefficient-including the binary and Knudsen diffusion mechanisms-was calculated for mass transport analysis at the porous electrode. The physical property and electrochemical reaction models were then simulated simultaneously. The numerical results were compared with the experimental results and previous works studied by Chan et al. for code validation.

On the Analysis of DS/CDMA Multi-hop Packet Radio Network with Auxiliary Markov Transient Matrix. (보조 Markov 천이행렬을 이용한 DS/CDMA 다중도약 패킷무선망 분석)

  • 이정재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.5
    • /
    • pp.805-814
    • /
    • 1994
  • In this paper, we introduce a new method which is available for analyzing the throughput of the packet radio network by using the auxiliary Markov transient matrix with a failure state and a success state. And we consider the effect of symbol error for the network state(X, R) consisted of the number of transmitting PRU X and receiving PRU R. We examine the packet radio network of a continuous time Markov chain model, and the direct sequence binary phase shift keying CDMA radio channel with hard decision Viterbi decoding and bit-by-bit changing spreading code. For the unslotted distributed multi-hop packet radio network, we assume that the packet error due to a symbol error of radio channel has Poisson process, and the time period of an error occurrence is exponentially distributed. Through the throughputs which are found as a function of radio channel parameters, such as the received signal to noise ratio and chips of spreading code per symbol, and of network parameters, such as the number of PRU and offered traffic rate, it is shown that this composite analysis enables us to combine the Markovian packet radio network model with a coded DS/BPSK CDMA radio channel.

  • PDF

PHOTOMETRIC SOLUTIONS AND SPOT MODEL OF THE CONTACT BINARY AB ANDROMEDAE (접촉쌍성 AB Andromedae의 측광해와 흑점모델)

  • Lee, Jae-Woo;Kim, Chun-Hwey;Han, Won-yong;Jin, Ho;Oh, Kyu-Dong
    • Journal of Astronomy and Space Sciences
    • /
    • v.20 no.2
    • /
    • pp.123-132
    • /
    • 2003
  • We performed CCD photometric observations of the W-type contact binary AB And for 10 nights from November 1995 to December 1999 using the 61-cm reflector and BVR filters at Sobaeksan Optical Astronomy Observatory. From our observations, the seasonal light curves of AB And for 1995, 1996 and 1999 were completed and 8 new times of minimum light were determined. Newly obtained light curves show that strong light variations occurred in AB And during the past five years. We adopted the 1996 light curves as reference ones and obtained the photometric solutions of them with contact mode in the Wilson-Devinney binary code. Assuming such light variations were produced by the existence of a star spot (or star spots) in the analysis, we derived the system parameters and analyzed the 1995 and 1999 light curves by adjusting only the spot parameters. As the results, we interpreted that those light variations are produced by the simultaneous existence of a hot spot and a cool spot on the secondary. We could infer that the hot spot on the secondary is produced due to mass exchange between the components suggested by Lee (1999).

Expression of Dengue virus EIII domain-coding gene in maize as an edible vaccine candidate

  • Kim, Hyun A;Kwon, Suk Yoon;Yang, Moon Sik;Choi, Pil Son
    • Journal of Plant Biotechnology
    • /
    • v.41 no.1
    • /
    • pp.50-55
    • /
    • 2014
  • Plant-based vaccines possess some advantages over other types of vaccine biotechnology such as safety, low cost of mass vaccination programs, and wider use of vaccines for medicine. This study was undertaken to develop the transgenic maize as edible vaccine candidates for humans. The immature embryos of HiII genotype were inoculated with A. tumefaciens strain C58C1 containing the binary vectors (V662 or V663). The vectors carrying nptII gene as selection marker and scEDIII (V662) or wCTB-scEDIII (V663) target gene, which code EIII proteins inhibite viral adsorption by cells. In total, 721 maize immature embryos were transformed and twenty-two putative transgenic plants were regenerated after 12 weeks selection regime. Of them, two- and six-plants were proved to be integrated with scEDIII and wCTB-scEDIII genes, respectively, by Southern blot analysis. However, only one plant (V662-29-3864) can express the gene of interest confirmed by Northern blot analysis. These results demonstrated that this plant could be used as a candidated source of the vaccine production.

PHOTOMETRIC OBSERVATIONS OF THE CONTACT BINARY SYSTEM CC COM (접촉쌍성 CC Com의 측광학적 관측과 분석)

  • Jeong, Jang-Hae;Kim, Chun-Hwey;Kim, Yong-Gi
    • Journal of Astronomy and Space Sciences
    • /
    • v.24 no.2
    • /
    • pp.99-110
    • /
    • 2007
  • A total of 824 observations (206 in ${\Delta}B$, 206 in ${\Delta}V$, 206 in ${\Delta}R$, 206 in ${\Delta}I$ for CC Com were made on 3 nights from March 3 to April 3 in 2002 using the 61cm telescope with 2K CCD camera of the Sobaeksan Optical Astronomy Observatory of KASI. From our observations 9 times of minimum light were newly determined. Combined analysis of our new BVRI light curves with the double-lined radial velocity curves of Pribulla et al. (2007) were made with the 2004 Wilson-Devinney(WD) binary model code to yield new physical parameters of the CC Com system. Small asymmetries in light curves were explained with the adoption of two hot spots on the cool secondary.

Framework Design for Malware Dataset Extraction Using Code Patches in a Hybrid Analysis Environment (코드패치 및 하이브리드 분석 환경을 활용한 악성코드 데이터셋 추출 프레임워크 설계)

  • Ki-Sang Choi;Sang-Hoon Choi;Ki-Woong Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.403-416
    • /
    • 2024
  • Malware is being commercialized and sold on the black market, primarily driven by financial incentives. With the increasing demand driven by these sales, the scope of attacks via malware has expanded. In response, there has been a surge in research efforts leveraging artificial intelligence for detection and classification. However, adversaries are integrating various anti-analysis techniques into their malware to thwart analytical efforts. In this study, we introduce the "Malware Analysis with Dynamic Extraction (MADE)" framework, a hybrid binary analysis tool devised to procure datasets from advanced malware incorporating Anti-Analysis techniques. The MADE framework has the proficiency to autonomously execute dynamic analysis on binaries, encompassing those laden with Anti-VM and Anti-Debugging defenses. Experimental results substantiate that the MADE framework can effectively circumvent over 90% of diverse malware implementations using Anti-Analysis techniques and can adeptly extract relevant datasets.

The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification (공격자 그룹 특징 추출 프레임워크 : 악성코드 저자 그룹 식별을 위한 유전 알고리즘 기반 저자 클러스터링)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • Recently, the number of APT(Advanced Persistent Threats) attack using malware has been increasing, and research is underway to prevent and detect them. While it is important to detect and block attacks before they occur, it is also important to make an effective response through an accurate analysis for attack case and attack type, these respond which can be determined by analyzing the attack group of such attacks. Therefore, this paper propose a framework based on genetic algorithm for analyzing malware and understanding attacker group's features. The framework uses decompiler and disassembler to extract related code in collected malware, and analyzes information related to author through code analysis. Malware has unique characteristics that only it has, which can be said to be features that can identify the author or attacker groups of that malware. So, we select specific features only having attack group among the various features extracted from binary and source code through the authorship clustering method, and apply genetic algorithm to accurate clustering to infer specific features. Also, we find features which based on characteristics each group of malware authors has that can express each group, and create profiles to verify that the group of authors is correctly clustered. In this paper, we do experiment about author classification using genetic algorithm and finding specific features to express author characteristic. In experiment result, we identified an author classification accuracy of 86% and selected features to be used for authorship analysis among the information extracted through genetic algorithm.