• Title/Summary/Keyword: C/A 코드

Search Result 686, Processing Time 0.03 seconds

Design and Implementation of Birthmark Technique for Unity Application

  • Heewan Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.85-93
    • /
    • 2023
  • Software birthmark refers to a unique feature inherent in software that can be extracted from program binaries even in the absence of the original source code of the program. Like human genetic information, the similarity between programs can be calculated numerically, so it can be used to determine whether software is stolen or copied. In this paper, we propose a new birthmark technique for Android applications developed using Unity. The source codes of Unity-based Android applications use C# language, and since the core logic of the program is included in the DLL module, it must be approached in a different way from normal Android applications. In this paper, a Unity birthmark extraction and comparison system was implemented, and reliability and resilience were evaluated. The use of the Unity birthmark technique proposed in this paper is expected to be effective in preventing illegal copy or code theft of the Unity-based Android applications.

A Study of Command & Control Server through Analysis - DNS query log (명령제어서버 탐색 방법 - DNS 분석 중심으로)

  • Cheon, Yang-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1849-1856
    • /
    • 2013
  • DOS attack, the short of Denial of Service attack is an internet intrusion technique which harasses service availability of legitimate users. To respond the DDoS attack, a lot of methods focusing attack source, target and intermediate network, have been proposed, but there have not been a clear solution. In this paper, we purpose the prevention of malicious activity and early detection of DDoS attack by detecting and removing the activity of botnets, or other malicious codes. For the purpose, the proposed method monitors the network traffic, especially DSN traffic, which is originated from botnets or malicious codes.

Dose-Rates Evaluation on a Reinforced Hot Cell facility (핫셀시설의 방사선 안전성 평가)

  • 조일제;국동학;구정회;정원명;유길성;이은표;박성원
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2003.11a
    • /
    • pp.584-589
    • /
    • 2003
  • The hot cell facility which is designed to permit safe handling of source materials with radioactivity levels up to 1,385 TBq, is planned to be built. To meet this goal, the facility is designed to keep gamma and neutron radiation lower than the recommended dose-rate in normally occupied areas. The calculations performed with QAD-CGGP and MCNP-4C are used to evaluate the proposed engineering design concepts that would provide acceptable dose-rates during a normal operation in hot cell facility. The maximum effective gamma dose-rates on the surfaces of the facility at operation area and at service area calculated by QAD-CGGP are estimated to be $2.10{\times}10^{-3}$, $2.97{\times}10^{-2}$ and $1.01{\times}10^{-1}$ mSv/h, respectively. And those calculated by MCNP-4C are $1.60{\times}10^{-3}$, $2.99{\times}10^{-3}$ and $7.88{\times}10^{-2}$ mSv/h, respectively The dose-rates contributed by neutrons are one order of magnitude less than that of gamma sources, and penetration and toboggan will be partly reinforced by lead shield.

  • PDF

Optimization of coding and PRML detection scheme for perpendicular magnetic recording systems (수직 자기기록 시스템을 위한 코딩 및 PRML 검출 방법의 최적화)

  • Lee Joo hyun;Lee Jae jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3C
    • /
    • pp.59-63
    • /
    • 2005
  • We propose non-DC-free generalized PRML (GPRML) that are suppressed DC contents for matching to the response of perpendicular magnetic recording channel with a ring-head. In addition, DC-free encoding is considered to prevent low-frequency disturbances. The SNR performance is obtained by combining the various PRML channels with DC-free and non-DC-free codes during the normalized recording density increases from 2.5 to 3.5. The GPRML detections without using DC-free code get SNR gains more than 1dB compared to the conventional PRML systems at 10/sup -5/BER. We confirmed that the rate 127/136 DC-free coded GPRML systems show good performances compared with the 16/17 non-DC-free coded GPRML systems. In results, DC-free coded GPRML detections get gains about 1.4dB and 2.0dB at the density of 3.3 and 3.5, respectively.

Enhanced Codebook Index Search Scheme for Quantized Equal Gain Transmission over LTE Down Link Systems (LTE 하향 링크 시스템에서 양자화된 동 이득 전송 기법의 개선된 코드북 인덱스 탐색 기법)

  • Park, Noe-Yoon;Li, Xun;Kim, Young-Ju
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.1
    • /
    • pp.62-69
    • /
    • 2011
  • A novel QEGT codebook index searching algorithm for long tenn evolution (LTE) system is proposed. The proposed algorithm divides the Q precoding vectors into M groups, and selects the optimal precoding vector from the selected group at the receiver. This algorithm reduced the calculation for searching the optimal precoding vector index compared to the previous algorithms. The index searching algorithm is implemented for TI's TMS320C6713 DSP board. When the number of transmit antenna is 4, the number of clock cycles is reduced to 25%.

ASN.1 Source Code Auto-Generator (ASN.1 원시 코드 자동 생성기)

  • 정진영;김영철
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.28-34
    • /
    • 2003
  • ASN.1 is the most fundamental technology in network management. The develoment of ASN.1 environment requires three steps : compiler work to parse ASN.1 languages, updating database with the parsing results, and pretty-printing work for data in the database. This paper presents the design and implementation of the translator which automatically translates the specification of ASN.1 to the object-oriented language C++. This system provides a total environment including for various graphic user interface, DB interface, browser to develop ASN.1 for development environment of ASN.1 For the implementation, Objectivity DB is used for database, flex and yacc for compiling, and Tcl/Tk for user interface.

  • PDF

Security-sensitive Data Analysis for Trusted Execution Environment Program Development (신뢰실행환경 프로그램 작성을 위한 민감 정보 처리 분석)

  • Shin, Jang-Seop;Park, Jae-Sung;Bang, In-Young;Ahn, Sun-Woo;Paek, Yun-Heung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.279-280
    • /
    • 2017
  • 최근 ARM, Intel 등의 주요 CPU 제조사에서는 운영체제 등 상위 레벨 소프트웨어에 대한 공격으로부터 어플리케이션의 보안상 민감한 부분을 보호하려는 목적으로 신뢰실행환경(Trusted Execution Environment, TEE)이라는 격리된 실행 환경을 자사의 칩에 제공하고 있다. TEE를 활용하기 위해서는 일반 실행 환경에서 수행될 코드와 TEE에서 수행될 코드를 각각 작성하여야 한다. 본 논문에서는 TEE 프로그램 개발의 편의를 위해, 기존에 작성된 C 프로그램을 분석하여 보안상 민감한 정보를 처리하는 부분을 분석하는 도구를 제시한다. 개발자가 기존 C 프로그램에서 보안상 민감한 정보가 유입되는 부분을 표시하면 본 도구는 민감한 정보가 처리되는 함수 목록을 분석하고, 개발자는 이를 바탕으로 일반 실행 환경과 TEE에서 수행될 코드를 작성할 수 있다.

Efficiency Enhancement of CFDS Code (CFDS 코드의 효율성 개선)

  • Kim J. G.;Lee J.;Kim C.;Hong S. K.;Lee K. S.;Ahn C. S.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2005.04a
    • /
    • pp.123-127
    • /
    • 2005
  • The numerical analyses of the complicated flows are widely attempted in these days. Because of the enormous demanding memory and calculation time, parallel processing is used for these problems. In order to obtain calculation efficiency, it is important to choose proper domain decomposition technique and numerical algorithm. In this research we enhanced the efficiency of the CFDS code developed by ADD, using parallel computation and newly developed numerical algorithms. For the huge amount of data transfer between blocks non-blocking method is used, and newly developed data transfer algorithm is used for non-aligned block interface. Recently developed RoeM scheme is adpoted as a spatial difference method, and AF-ADI and LU-SGS methods are used as a time integration method to enhance the convergence of the code. Analyses of the flows around the ONERA M6 wing and the high angle of attack missile configuration are performed to show the efficiency improvement.

  • PDF

A Study of common behavior detection technology using endpoint's network connection record (엔드포인트의 네트워크 접속 기록을 활용한 공통 행위 탐지 기술 연구)

  • Seo, Jeonghoon;Yeom, Cheolmin;Yeon, Seonghwa;Park, Jongsang;Won, Yoojae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.272-275
    • /
    • 2018
  • 금전적 이득을 극대화하기 위해 특정 기업, 기관을 대상으로 하는 공격이 증가하고 있다. 공격에 사용되는 일반적인 악성코드의 특징은 기존 시그니처 탐지 방법으로는 탐지하기 어렵다는 것과 공격자의 C&C 서버와의 통신이 일어난다는 점이다. 기업, 기관을 대상으로 이러한 악성코드를 이용한 공격이 시도된다면 감염된 모든 PC로부터 공통적인 네트워크 접속 기록이 발견될 수 있다. 따라서 본 논문에서는 이러한 특징에 중점을 두고 라이브 포렌식 오픈 소스를 활용하여 엔드포인트의 네트워크 접속 기록을 활용해 공통 행위를 탐지하는 기법을 제시하고자 한다.

A Study on Development Tools for WebCL (WebCL을 지원하기 위한 개발도구에 관한 연구)

  • Yoon, Seok-Jin;Kim, Do-Hyung;Lee, Jae-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1662-1663
    • /
    • 2015
  • 1989년 웹 기술이 등장한 이래 지속적인 발전을 거듭하여 현재 HTML5 까지 정의되었다. 웹 기술만을 사용하여 네이티브 응용을 대체하여 개발하려는 경향이 생겨났으며 이에 실행 속도를 높이기 위하여 GPGPU를 활용하는 방법이 모색되어왔다. WebCL은 자바스크립트에서 OpenCL을 활용하기 위한 표준이며 크로노스 그룹에서 최근 표준화 되었다. 고속화 웹 응용을 개발하기 위해서는 C 기반의 커널코드를 작성해야 하며 개발시에 이를 지원하기 위한 도구가 필요하다. 본 연구에서는 커널 코드 작성을 위한 C 편집기를 기존의 도구에 통합시키고 개발 시점에서 온라인 컴파일을 통하여 사전 검증할 수 있게 지원하려고 한다. 또한 웹 응용을 타켓 디바이스에서 실행시켜 볼 수 있는 웹 응용 실행 관리를 지원한다. 향후 WebCL 개발을 지원하는 도구의 등장으로 웹 고속화 응용이 많이 등장할 것으로 기대된다.