• Title/Summary/Keyword: Binary code

Search Result 507, Processing Time 0.026 seconds

Development of a Markov Chain Monte Carlo parameter estimation pipeline for compact binary coalescences with KAGRA GW detector (카그라 마코브 체인 몬테칼로 모수 추정 파이프라인 분석 개발과 밀집 쌍성의 물리량 측정)

  • Kim, Chunglee;Jeon, Chaeyeon;Lee, Hyung Won;Kim, Jeongcho;Tagoshi, Hideyuki
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.45 no.1
    • /
    • pp.51.3-52
    • /
    • 2020
  • We present the status of the development of a Markov Chain Monte Carlo (MCMC) parameter estimation (PE) pipeline for compact binary coalescences (CBCs) with the Japanese KAGRA gravitational-wave (GW) detector. The pipeline is included in the KAGRA Algorithm Library (KAGALI). Basic functionalities are benchmarked from the LIGO Algorithm Library (LALSuite) but the KAGRA MCMC PE pipeline will provide a simpler, memory-efficient pipeline to estimate physical parameters from gravitational waves emitted from compact binaries consisting of black holes or neutron stars. Applying inspiral-merge-ringdown and inspiral waveforms, we performed simulations of various black hole binaries, we performed the code sanity check and performance test. In this talk, we present the situation of GW observation with the Covid-19 pandemic. In addition to preliminary PE results with the KAGALI MCMC PE pipeline, we discuss how we can optimize a CBC PE pipeline toward the next observation run.

  • PDF

Android Application Call Relationship Analysis Based on DEX and ELF Binary Reverse Engineering (DEX와 ELF 바이너리 역공학 기반 안드로이드 어플리케이션 호출 관계 분석에 대한 연구)

  • Ahn, Jinung;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.45-55
    • /
    • 2019
  • DEX file and share objects (also known as the SO file) are important components that define the behaviors of an Android application. DEX file is implemented in Java code, whereas SO file under ELF file format is implemented in native code(C/C++). The two layers - Java and native can communicate with each other at runtime. Malicious applications have become more and more prevalent in mobile world, they are equipped with different evasion techniques to avoid being detected by anti-malware product. To avoid static analysis, some applications may perform malicious behavior in native code that is difficult to analyze. Existing researches fail to extract the call relationship which includes both Java code and native code, or can not analyze multi-DEX application. In this study, we design and implement a system that effectively extracts the call relationship between Java code and native code by analyzing DEX file and SO file of Android application.

Code Automatic Analysis Technique for Virtualization-based Obfuscation and Deobfuscation (가상화 기반 난독화 및 역난독화를 위한 코드 자동 분석 기술)

  • Kim, Soon-Gohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.724-731
    • /
    • 2018
  • Code obfuscation is a technology that makes programs difficult to understand for the purpose of interpreting programs or preventing forgery or tampering. Inverse reading is a technology that analyzes the meaning of origin through reverse engineering technology by receiving obfuscated programs as input. This paper is an analysis of obfuscation and reverse-toxicization technologies for binary code in a virtualized-based environment. Based on VMAttack, a detailed analysis of static code analysis, dynamic code analysis, and optimization techniques were analyzed specifically for obfuscation and reverse-dipidization techniques before obfuscating and reverse-dipulation techniques. Through this thesis, we expect to be able to carry out various research on virtualization and obfuscation. In particular, it is expected that research from stack-based virtual machines can be attempted by adding capabilities to enable them to run on register-based virtual machines.

Design of New Channel Codes for Speed Up Coding Procedure (코딩 속도향상을 위한 채널 코드의 설계)

  • 공형윤;이창희
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.5-8
    • /
    • 2000
  • In this paper, we present a new cぉnet coding method, so called MLC (Multi-Level Codes), for error detection and correction in digital wireless communication. MLC coding method we the same coding procedure wed in the convolutional coding but it is distinguished from the existing convolutional coding in point of generating the code word by using multi-level information data (M-ary signal) and in point of speed of coding procedure Through computer simulation, we analyze the performance of the coding method suggested here compared to convolutional coding method in case of modulo-operation and in case of non-binary coding Procedure respectively under various channel environments.

  • PDF

Performance Analysis aginst Single Tone Jamming for CPM DS-SS System with FSK Modulation. (FSK 변조에 의한 CPM DS-SS 통신시스템의 단일주파수 잡음에 대한 성능평가)

  • Park, Chong-Yeon;Hwang, Jun-Won
    • Journal of Industrial Technology
    • /
    • v.17
    • /
    • pp.153-160
    • /
    • 1997
  • This paper has analyzed the performance against a single tone jamming for the CPM DS-SS system with a Binary FSK Modulation. The CPM DS-SS system designed with the different phase shift of the same pseude-noise code has the advantage of reducing the jamming and interference effects on multi-users communication environment. Analytical results show that the system preformance improves by increasing parrallel users in the presence of the coherent single-tone, which is the worst interference since the jamming signal has the same frequency as a carrier.

  • PDF

A Study on the recognition of local name using Spatio-Temporal method (Spatio-temporal방법을 이용한 지역명 인식에 관한 연구)

  • 지원우
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1993.06a
    • /
    • pp.121-124
    • /
    • 1993
  • This paper is a study on the word recognition using neural network. A limited vocabulary, speaker independent, isolated word recognition system has been built. This system recognizes isolated word without performing segmentation, phoneme identification, or dynamic time wrapping. It needs a static pattern approach to recognize a spatio-temporal pattern. The preprocessing only includes preceding and tailing silence removal, and word length determination. A LPC analysis is performed on each of 24 equally spaced frames. The PARCOR coefficients plus 3 other features from each frame is extracted. In order to simplify a structure of neural network, we composed binary code form to decrease output nodes.

  • PDF

Optimum Convolutional Error Correction Codes for FQPSK-B Signals

  • Park, Hyung-Chul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.611-617
    • /
    • 2004
  • The optimum convolutional error correction codes for recently standardized Feher-patented quadrature phase-shift keying (FQPSK-B) modulation are proposed. We utilize the continuous phase modulation characteristics of FQPSK-B signals for calculating the minimum Euclidean distance of convolutional coded FQPSK-B signal. It is shown that the Euclidean distance between two FQPSK-B signals is proportional to the Hamming distance between two binary data sequence. Utilizing this characteristic, we show that the convolutional codes with optimum free Hamming distance is the optimum convolutional codes for FQPSK-B signals.

Performance Analysis of Turbo Code Based on DVB-RCS for Ship-Internet High-Quality Service (선박 Internet 고품질 서비스를 위한 DVB-RCS 기반 터보부호 성능 분석)

  • Kim, Min-Hyuk;Choi, Duk-Gun;Jung, Jin-Hee;Jung, Ji-Won
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2005.11a
    • /
    • pp.61-62
    • /
    • 2005
  • In this paper, we investigate the encoding and decoding method of turbo codes that offer a variety of coding rates from 1/3 to 6/7 in Digital Video Broadcast Return Channel via Satellite (DVB-RCS) standard to provide ship-internet service with high-quality.

  • PDF

Unequal Bit - Error - Probability of Convolutional codes and its Application (길쌈부호의 부등 오류 특성 및 그 응용)

  • Lee, Soo-In;Lee, Sang-Gon;Moon, Sang-Jae
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.194-197
    • /
    • 1988
  • The unequal bit-error-probability of rate r=b/n binary convolutional code is analyzed. The error protection affored each digit of the b-tuple information word can be different from that afforded other digit. The property of the unequal protection can be applied to transmitting sampled data in PCM system.

  • PDF

Image Watermarking using PN Coding Operation where Frequency Band (주파수 대역별 형태소 PN부호화 연산을 통한 이미지 워티마킹)

  • 하진일;주동현;김두영
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.311-314
    • /
    • 2002
  • This paper has been studied a Image watermarking using PN coding operation where frequency band. By using wavelet transformation, This gets high frequency place HH2 where image watermark puts. Also this places that PN code and binary image are operated. And then, this paper has designed image watermarking index process and extract process, watermarked image which are to add noise is able to extract watermark.

  • PDF