• Title/Summary/Keyword: Buffer Overflow

Search Result 141, Processing Time 0.032 seconds

Analysis of Traffic Control System for Supporting MCS Multicasting on ATM Subnetworks (ATM 서브망에서 MCS 멀티캐스트 구현을 위한 전송 제어 시스템의 성능 평가)

  • Park, Sang-Joon;Lee, Hyo-Jun;Kim, Kwan-Joong;Kim, Young-Han;Kim, Byung-Gi
    • The Journal of the Acoustical Society of Korea
    • /
    • v.16 no.6
    • /
    • pp.48-53
    • /
    • 1997
  • The multicasting of MCS(Multicast Server) requires a effective traffic control scheme to prevent buffer overflow on ATM subnetworks. This paper considers MCS multicasting to TCP packets, and propose EPD + SPD scheme(Early Packet Discard-same Source Packet Discard) using common buffer. When the threshold of output buffer is reached, MCS drops an entire packet prior to buffer overflow, so that corrupted packets will not be transmitted by the server. And SPD scheme show that the EPD + SPD results in higher TCP throughput than that of tail drop and EPD + DFF.

  • PDF

Development of New GAIM Process for Faster Cooling and Material Reduction (빠른 냉각과 재료절감을 위한 새로운 가스성형 프로세스 개발)

  • 한성렬;박태원;곽진관;김철주;하만영;정영득
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.852-855
    • /
    • 2003
  • Gas-Assisted Injection Molding(GAIM) process, that can be used to provide a hollow shape in a molding, is a variant of the conventional injection molding process. GAIM has many advantages such as reduction of material, sink mark. warpage. and lower injection pressure. Thus, GAIM has been widely applied in the industry to make moldings with a hollow channel such as handles, TV frames and so on. On the other hand, GAIM has some disadvantages such as slow cooling time and flow marks. In the disadvantages, hot gas core causes slow cooling of a molding and the overflow. which is to prevent flow mark. is waste of materials. To solve these problems, we developed a new GAIM system that we called RGIM(Reverse Gas Injection Molding). The RGIM has two special units; one is the overflow buffer, which is used for reduction of a material, and the other tile air unit, which is used for faster cooling of a molding. We conducted an experiment and simulation to verify the efficiency of the RGIM system. Through experiments and simulation, we confirmed the effectively operating of the RGIM system and extracted the optimum process conditions.

  • PDF

Video Replay by Frame Receive Order Relocation Method in the Wire and Wireless Network (유무선 네트워크에서 프레임 수신 순서 재할당 방법을 사용한 동영상 재생)

  • Kang, Dong-Jin;Kim, Dong-Hoi
    • Journal of Digital Contents Society
    • /
    • v.17 no.3
    • /
    • pp.135-142
    • /
    • 2016
  • When video service is performed in simulation using NS-2(Network Simulation-2), the video replay is performed as the received frame order. In the existing video replay method based on the received frame order, as the frame orders of receiver and transmitter are different, the receiver buffer does not have the effect that the packets between the frames of transmitter buffer holds a regular size and packet dense and sparsity phenomenon in the receiver buffer is made by the irregular packet size due to the unpredictable reversed order of received partial frames. The above dense and sparsity phenomenon increases the probability of buffer overflow and underflow generation. To prevent these problems, the proposed frame receive order relocation method adds an extra replay buffer which rearranges the order of receive frame as the order of transmit frame, so it has the effect that the packets between the transmit frames keeps a regular size. Through the simulation using NS-2 and JSVM(Joint Scalable Video Model), the generation number of buffer overflow and underflow, and PSNR(Required Peak Signal to Noise Ratio) performance between the existing method and proposed method were compared. As a result, it was found that the proposed method would have better performance than the existing method.

Processing of Congestion Problem in the Interworking Node (연동 노드에서 집중 문제 처리)

  • 김평중
    • Journal of the Korean Professional Engineers Association
    • /
    • v.29 no.3
    • /
    • pp.94-104
    • /
    • 1996
  • When Broadband Integrated Services Digital Network(BISDN) becomes commercially available In public network, conventional Local Area Network(LAN)s will still be in use. The first wide spread application for B-ISDN will be the interconnection of LANs. The equipment providing the connection between the LAN and the BISDN will be given the general name Inter Working Unit(IWU). We addresses the congestion problem of many interworking issues. In this paper, Our study is concentrated on applying connectionless network protocol for interworking. We suggest a rate control method in the network layer to prevent a buffer overflow in the IWU. Since this rate control method can be applied to prevent buffer overflow in a congested IWU, We investigate the use of rate control to solve congestion problems of IWU and parallize network layer with rate control to lessen the congestion problem in IWU.

  • PDF

BinaryReviser: A Study of Detecting Buffer Overflow Vulnerabilities Using Binary Code Patching (바이너리 파일의 코드 패칭을 통한 버퍼 오버플로우 탐지 기법)

  • Lee, Jeong-Min;Kim, Hyun-Wook;Ahn, Woo-Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.122-125
    • /
    • 2011
  • 버퍼 오버플로우(buffer overflow) 취약점은 1988년 모리스 웜(Morris worm)을 통하여 널리 알려진 이후 이를 해결하기 위한 많은 연구들이 진행되었으며, 동시에 이를 이용한 공격 역시 끊임없이 이루어지고 있다. 기존의 버퍼 오버플로우 취약점에 대한 연구는 크게 컴파일러 및 라이브러리, 커널, 하드웨어 단계로 나눌 수 있다. 하지만 이러한 방법들은 다양한 한계를 가진다. 본 논문은 이러한 문제들을 해결하기 위하여 버퍼 오버플로우 취약점을 발생시키는 코드를 바이너리에서 직접 검색하고, 이를 패치하여 버퍼 오버플로우 취약점을 제거하는 BinaryReviser를 구현하였다.

An Efficient Simulation of Discrete Time Queueing Systems with Markov-modulated Arrival Processes (MMAP 이산시간 큐잉 시스템의 속산 시뮬레이션)

  • Kook Kwang-Ho;Kang Sungyeol
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.3
    • /
    • pp.1-10
    • /
    • 2004
  • The cell loss probability required in the ATM network is in the range of 10$^{-9}$ ∼10$^{-12}$ . If Monte Carlo simulation is used to analyze the performance of the ATM node, an enormous amount of computer time is required. To obtain large speed-up factors, importance sampling may be used. Since the Markov-modulated processes have been used to model various high-speed network traffic sources, we consider discrete time single server queueing systems with Markov-modulated arrival processes which can be used to model an ATM node. We apply importance sampling based on the Large Deviation Theory for the performance evaluation of, MMBP/D/1/K, ∑MMBP/D/1/K, and two stage tandem queueing networks with Markov-modulated arrival processes and deterministic service times. The simulation results show that the buffer overflow probabilities obtained by the importance sampling are very close to those obtained by the Monte Carlo simulation and the computer time can be reduced drastically.

  • PDF

Buffer Overflow Vulnerability Auto Detection System (버퍼 오버플로우 취약점 자동 탐지 시스템)

  • Kim, Jae-Hwan;Kim, Han-Gyeol;Kim, Hyun-Jung;Yoo, Sang-Hyun;Won, Il-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.345-348
    • /
    • 2017
  • 버퍼 오버플로우(Buffer Overflow) 취약점은 시스템 보안에서 아주 중요하다. 본 논문은 바이너리 파일에서 버퍼 오버플로우 취약점을 자동 감지하는 시스템을 제안하였다. 다양한 버퍼 오버플로우 샘플소스를 이용하여 패턴을 만들고, 이렇게 만들어진 패턴을 이용하여 바이너리 파일에서 버퍼 오버플로우 취약점이 포함되어 있는지를 판단한다. 제안한 시스템의 유용성을 위해 실험을 하였고, 어느 정도 의미 있는 결과를 얻을 수 있었다.

Heap과 Stack 영역에서의 경계 체크를 통한 Buffer Overflow공격 방지 기법에 대한 연구

  • 손태식;서정택;은유진;장준교;이철원;김동규
    • Review of KIISC
    • /
    • v.11 no.6
    • /
    • pp.42-52
    • /
    • 2001
  • 인터넷 기술의 발전은 정보화 사회로의 촉진이라는 측면 외에 사용 인구의 증가에 따라 해킹, 바이러스·악성 코드의 유포 등 그 역기능적인 측면이 점점 심각한 사회 문제로서 대두되고 있다. 현재 공개 운영체제로 각광 받고 있는 리눅스(Linux) 운영체제의 경우 운영체제 커널은 물론이거니와 관련 프로그램들에 대한 소스가 공개되어 단순한 기술 습득의 목적이 아닌 악의의 목적을 가진 사용자들에 의한 시스템 침해 사례가 빈번한 추세이다. 특히 이러한 시스템 침해 사례 중 프로그램 작성 과정의 오류 및 설계상 실수로 인한 버퍼 오버플로우(Buffer Overflow) 취약성을 이용한 공격은 해킹에 있어 큰 범주를 차지하고 있다. 따라서 본 논문에서는 버퍼 오버플로우 공격에 있어 그 기반이 되는 스택을 이용한 버퍼 오버플로우 및 스택 외에 힙과 같은 메모리 영역을 이용하는 공격 유형에 대하여 분석한다. 그 후 이러한 버퍼 오버플로우 공격 방지를 위한 메모리에서의 경계 검사 기법을 제안하고자 한다. 추후에는 본 논문에서 제안된 기법에 대한 실제 구현과 검증이 필요하다.

  • PDF

Design of System Call Monitoring System for Command Execution Detection in Stack Memory Area (스택메모리상의 명령 수행 탐지를 위한 시스템콜 모니터링 도구 설계)

  • 최양서;서동일;이상호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.772-775
    • /
    • 2004
  • After Morris' Internet Worm in 1988, the stack buffer overflow hacking became generally known to hackers and it has been used to attack systems and servers very frequently. Recently, many researches tried to prevent it, and several solutions were developed such as Libsafe and StackGuard; however, these solutions have a few problems. In this paper we present a new stack buffer overflow attack prevention technique that uses the system call monitoring mechanism and memory address where the system call is made.

  • PDF

Performance Improvement on RED Based Gateway in TCP Communication Network

  • Prabhavat, Sumet;Varakulsiripunth, Ruttikorn
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.782-787
    • /
    • 2004
  • Internet Engineering Task Force (IETF) has been considering the deployment of the Random Early Detection (RED) in order to avoid the increasing of packet loss rates which caused by an exponential increase in network traffic and buffer overflow. Although RED mechanism can prevent buffer overflow and hence reduce an average values of packet loss rates, but this technique is ineffective in preventing the consecutive drop in the high traffic condition. Moreover, it increases a probability and average number of consecutive dropped packet in the low traffic condition (named as "uncritical condition"). RED mechanism effects to TCP congestion control that build up the consecutive of the unnecessary transmission rate reducing; lead to low utilization on the link and consequently degrade the network performance. To overcome these problems, we have proposed a new mechanism, named as Extended Drop slope RED (ExRED) mechanism, by modifying the traditional RED. The numerical and simulation results show that our proposed mechanism reduces a drop probability in the uncritical condition.

  • PDF