• Title/Summary/Keyword: Binary Code Analysis

Search Result 127, Processing Time 0.028 seconds

A Study on Hybrid Fuzzing using Dynamic Analysis for Automatic Binary Vulnerability Detection (바이너리 취약점의 자동 탐색을 위한 동적분석 정보 기반 하이브리드 퍼징 연구)

  • Kim, Taeeun;Jurn, Jeesoo;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.541-547
    • /
    • 2019
  • Recent developments in hacking technology are continuing to increase the number of new security vulnerabilities. Approximately 80,000 new vulnerabilities have been registered in the Common Vulnerability Enumeration (CVE) database, which is a representative vulnerability database, from 2010 to 2015, and the trend is gradually increasing in recent years. While security vulnerabilities are growing at a rapid pace, responses to security vulnerabilities are slow to respond because they rely on manual analysis. To solve this problem, there is a need for a technology that can automatically detect and patch security vulnerabilities and respond to security vulnerabilities in advance. In this paper, we propose the technology to extract the features of the vulnerability-discovery target binary through complexity analysis, and select a vulnerability-discovery strategy suitable for the feature and automatically explore the vulnerability. The proposed technology was compared to the AFL, ANGR, and Driller tools, with about 6% improvement in code coverage, about 2.4 times increase in crash count, and about 11% improvement in crash incidence.

performance Evaluation of a Multi-Media DS/SSMA System (다매체 직접수열 대역확산 다중접속 시스템의 성능분석)

  • 김홍직;송익호;김상우;한진희
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1996.06a
    • /
    • pp.33-38
    • /
    • 1996
  • A multi-media binary DS/CDMA system with variable processing gain and coherent correlation receivers are considered under additive white Gaussian noise channels. Two types of information sources with different rates and transmitting powers are assumed to be transmitted simultaneously in the same channel. Average signal-to-noise ratios at the correlation receiver outputs for each type of information sources are analytically derived as functions of discrete partial cross-correlations between spreading code sequences. The analysis is expected to provide analytical tools for use in preliminary system design and spreading code selection.

  • PDF

A Study on 24/25 I-NRZI Modulation (24/25 I-NRZI 변조기 설계에 관한 연구)

  • 박기서;박종진조원경
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.277-280
    • /
    • 1998
  • The paper provides an overview of those requirements. A detailed description is given of the construction of the new channel code, called 24/25 code, that compiles with the given constraints and involves only a minor drawback in terms of the overhead needs. The servo position information is recorded as low frequency componets, pilot tracking tones, which are embedded in the recorded stream of binary digits. Pilot tracking Tones are used to derive head position reference information in camcorders and DVCRs. A simple pilot tone encoder has been designed by using a new approach, "2 path precoder". Owing to this method, the hardware size can be significantly reduced. the correctness of the method has been verified by theoretical analysis and by extensive simulation.imulation.

  • PDF

A Study on Noise Automatic Inspection System for Washing Machine Auto-Transmission (세탁기용 자동변속기 (Auto-Transmission)의 이상음 검사자동화 시스템에 관한 연구)

  • 김재열
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 1998.03a
    • /
    • pp.310-315
    • /
    • 1998
  • This study includes noise automatic inspection system for washing machine auto-transmission one of modern home necessary. We effort to find and certificate sound noisesource by sound power and sound intensity, and apply to frequency analysis in vibration related sound noise. Still more we have been studying to data acquisition and programming for MS VisualBasic version 5.0. System component is below. 1) Pentium PC for data acquisition. 2) DSO for noise acquisition. 3) S/W for comparison and decision. 4) I/F Board for data communication. Wave form data through the DSO are converting to ASCII code data. The ASCII code through binary converting S/W are to be decision fitness or the badness comparison S/W. Finally, we will making noise monitoring system and automatic inspection system.

  • PDF

DS/CDMA Signature Sequences for 4-phase Signaling (4-위상 신호 방식에 알맞은 직접수열 부호분할 다중접속 서명수열)

  • Park So Ryoung;Song Iickho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5C
    • /
    • pp.313-319
    • /
    • 2005
  • In this paper, we propose a class of polyphase signature sequences, whose general odd correlation properties are useful for 4-phase signaling systems. The performance of the direct sequence code division multiple access (DS/CDMA) systems using the proposed sequences is compared with that using binary pseudo-noise sequences. The performance of the system using the proposed sequence is shown to be better than that using other conventional sequences both from the worst-case analysis and bit error rate simulations.

Development of Automatic Program for Noise Inspection of Auto-transmission (자동변속기(Auto-Transmission)의 이상음 검사자동화 시스템개발)

  • 김재열
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.9 no.6
    • /
    • pp.9-18
    • /
    • 2000
  • This study includes noise automatic inspection system for washing machine auto-transmission one of modern home necessary. We effort to find and certificate sound noise source by sound power and sound intensity, and apply to frequency analysis in vibration related sound noise. still more we have been studying to data acquisition and programming for MS VisualBasic version 5.0. System component is below. 1) Pentium PC or data acquisition. 2) DSO for noise acquisition. 3)S/W for comparison and decision. 4) I/F Board for data communication. Wave form data through the DSO are converting to ASCII code data. The ASCII code through binary converting S/W. Finally we will making noise monitoring system and automatic inspection system.

  • PDF

Reverse engineering of data abstractions on fragmented binary code (단편화된 실행파일을 위한 데이터 구조 역공학 기법)

  • Lee, Jong-Hyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.615-619
    • /
    • 2012
  • Reverse engineering via static analysis is an essential step in software security and it focuses on reconstructing code structures and data abstractions. In particular, reverse engineering of data abstractions is critical to understand software but the previous scheme, VSA, is not suitable for applying to fragmented binaries. This paper proposes an enhanced method through dynamic region assignment.

Warning Classification Method Based On Artificial Neural Network Using Topics of Source Code (소스코드 주제를 이용한 인공신경망 기반 경고 분류 방법)

  • Lee, Jung-Been
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.273-280
    • /
    • 2020
  • Automatic Static Analysis Tools help developers to quickly find potential defects in source code with less effort. However, the tools reports a large number of false positive warnings which do not have to fix. In our study, we proposed an artificial neural network-based warning classification method using topic models of source code blocks. We collect revisions for fixing bugs from software change management (SCM) system and extract code blocks modified by developers. In deep learning stage, topic distribution values of the code blocks and the binary data that present the warning removal in the blocks are used as input and target data in an simple artificial neural network, respectively. In our experimental results, our warning classification model based on neural network shows very high performance to predict label of warnings such as true or false positive.

A Disassembly Technique of ARM Position-Independent Code with Value-Set Analysis Having Symbol-Form Domain (기호 형태의 값-집합 분석을 이용한 ARM 위치 독립적 코드의 정교한 역어셈블리 기법)

  • Ha, Dongsoo;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1233-1246
    • /
    • 2018
  • With the proliferation of smart mobiles, disassembly techniques for position-independent code (PIC) composed of ARM architecture instructions in computer security are becoming more important. However, existing techniques have been studied on x86 architecture and are focused on solving problems of non-PIC and generality. Therefore, the accuracy of the collected address information is low to apply to advanced security technologies such as binary measurement. In this paper, we propose a disassembly technique that reflects the characteristics of PIC composed of ARM instructions. For accuratly collecting traceable addresses, we designed value-set analysis having symbol-form domain. To solve the main problem of disassembly, we devised a heuristic using the characteristics of the code generated by the compiler. To verify the accuracy and effectiveness of our technique, we tested 669 shared libraries and executables in the Android 8.1 build, resulting in a total disassembly rate of 91.47%.

Jeju Jong Nang Channel Code II (제주 정낭 채널 Code II)

  • Lee, Moon Ho;Khan, Md. Hashem Ali;Park, Ju Yong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.36-44
    • /
    • 2012
  • We had introduced the backgrounds, history and physical meanings of Jong Nang in "Jeju Jong Nang Channel Code I". In this paper, we introduce practical the root of digital human binary coded Jong Nang communications as the wooden gate in Korea Jeju Island custom. We investigate Jong Nang gatemodels as an approximation of the AWGN model. The objective is to find a deterministic model, which is accessible to capacity analysis. Furthermore, this analysis should provide insights on the capacity of the AWGN model. Motivated by backhaul cooperation in cellular networks where cooperation is among base stations, we term the interference channel with conferencing transmitters. Jong Nang communicationsis normal 3 rafters placed on two vertical stones with three holes to convey the family's whereabouts that is deterministic signal, nowadays it is applied to backhaul in mobile base station and traffic signal.