• Title/Summary/Keyword: Code Checking system

Search Result 71, Processing Time 0.024 seconds

A Design of Inter-Working System between Secure Coding Tools and Web Shell Detection Tools for Secure Web Server Environments (안전한 웹 서버 환경을 위한 시큐어코딩 도구, 웹쉘 탐지도구 간의 상호연동 시스템 설계)

  • Kim, Bumryong;Choi, Keunchang;Kim, Joonho;Suk, Sangkee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.81-87
    • /
    • 2015
  • Recently, with the development of the ICT environment, the use of the software is growing rapidly. And the number of the web server software used with a variety of users is also growing. However, There are also various damage cases increased due to a software security vulnerability as software usage is increasing. Especially web shell hacking which abuses software vulnerabilities accounts for a very high percentage. These web server environment damage can induce primary damage such like homepage modification for malware spreading and secondary damage such like privacy. Source code weaknesses checking system is needed during software development stage and operation stage in real-time to prevent software vulnerabilities. Also the system which can detect and determine web shell from checked code in real time is needed. Therefore, in this paper, we propose the system improving security for web server by detecting web shell attacks which are invisible to existing detection method such as Firewall, IDS/IPS, Web Firewall, Anti-Virus, etc. while satisfying existing secure coding guidelines from development stage to operation stage.

Fatigue Characteristics of Precast Concrete Bridge Decks under Wheel Load Condition (윤하중조건에서의 프리캐스트 콘크리트 바닥판 피로특성)

  • Joo, Bong-Chul;Park, Hung-Seok;Kim, Young-Jin;Song, Jae-Joon
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2006.05a
    • /
    • pp.394-397
    • /
    • 2006
  • For checking fatigue safety and endurance of precast concrete deck and loop joint system in the steel plate girder composite bridge, the test composite bridge model was made for the fatigue experiment by the wheel load machine. The fatigue tests of 1,000,000 cycles were implemented according to wheel load condition of DB24 rear axle of Korea Highway Design Code. From the test results, the loop joint system for the precast deck has a sufficient flexural capacity. Although a little lower longitudinal continuity capacity is evaluated than general sound cast-in-place RC bridge deck, there is no problem about the safety. The overall fatigue level of safety defined by the code is satisfied.

  • PDF

Quality Management Model for Process Performance Level and Development Technology (프로세스 이행 수준과 개발 기술 품질 관리 모델)

  • Park, J.H.;Park, Y.S.;Jung, H.T.;Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.6
    • /
    • pp.105-115
    • /
    • 2017
  • This paper describes a project - based quality management model that identifies development technologies and codes while at the same time verifying the ability to implement processes that are essential in R & D projects. In order to verify the process implemented in the R & D project implementation, there are review, checking points, and evaluating methods the process performance levels for five processes such as defining requirements which is the beginning stage of system development, testing process which is the completion stage of system development, and project management and peer review process for project management and support in the proposed project-based quality management model. For development technology and code validation, the model included the documented test cases for each requirement by the developer in the requirements definition stage, debugging and testing in the design and implementation stages, static analysis and open source licence verification procedure, and system environment. After applying the model in SW development R&D project for evaluating the process performance, and verifying the development technology and the code, the developers responded that the improvement in the development technique and the code, and upgrade of process performance level for project are more than 10%.

Interference Check for Reactor In-Core Instrumentation Guide Tube Routing (원자로 노내계측기 안내관의 배열을 위한 간섭검증)

  • Cho, Duk-Sang
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.3 no.3
    • /
    • pp.201-207
    • /
    • 2000
  • In this study, methodologies for checking the interference between in-core instrumentation (ICI) guide tubes for routing of ICI guide tubes in the reactor coolant system of typical Pressurized Water Reactor under cold and normal operation (NOP) conditions are presented. The closest points of ICI guide tubes under cold condition are calculated by using minimize technique and are used as data for NOP analysis. Movements of ICI guide tubes under NOP condition are performed by the commercial computer code, SUPERPIPE.

  • PDF

A Cell Phone-based ECG, Blood Pressure Monitoring System for Personal Healthcare Applications using Wireless Sensor Network Technology

  • Toh, Sing-Hui;Lee, Seung-Chul;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.505-508
    • /
    • 2008
  • Electrocardiogram (ECG) and blood pressure (BP) are main vital signs which are the standards in most medical settings in assessing the most basic body functions. Multi parameters are desired in providing more information for health professionals in order to detect or monitor medical problems of patients more precisely. This study urges us to develop a robust wireless healthcare monitoring system which has multiple physiological signs measurements on real time that applicable to various environments which integrates wireless sensor network technology and code division multiple access (CDMA) network with extended feature of locally standalone diagnosis algorithms that implemented in tell phone. ECG signal and BP parameter of the patients are routinely be monitored, processed and analyzed in details at cell phone locally to produce useful medical information to ease patients for tracking and future reference purposes. Any suspected or unknown patterns of signals will be immediately forwarded to hospital server using cell phone for doctors' evaluation. This feature enables the patients always recognize the importance of self-health checking so that the preventive actions can be taken earlier through this analytic information provided by this monitoring system because "Prevention is better than Cure".

  • PDF

Maximum Stack Memory Usage Estimation Through Target Binary File Analysis in Microcontroller Environment (마이크로컨트롤러 환경에서 타깃 바이너리 파일 분석을 통한 최대 스택 메모리 사용량 예측 기법)

  • Choi, Kiho;Kim, Seongseop;Park, Daejin;Cho, Jeonghun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.3
    • /
    • pp.159-167
    • /
    • 2017
  • Software safety is a key issue in embedded system of automotive and aviation industries. Various software testing approaches have been proposed to achieve software safety like ISO26262 Part 6 in automotive environment. In spite of one of the classic and basic approaches, stack memory is hard to estimating exactly because of uncertainty of target code generated by compiler and complex nested interrupt. In this paper, we propose an approach of analyzing the maximum stack usage statically from target binary code rather than the source code that also allows nested interrupts for determining the exact stack memory size. In our approach, determining maximum stack usage is divided into three steps: data extraction from ELF file, construction of call graph, and consideration of nested interrupt configurations for determining required stack size from the ISR (Interrupt Service Routine). Experimental results of the estimation of the maximum stack usage shows proposed approach is helpful for optimizing stack memory size and checking the stability of the program in the embedded system that especially supports nested interrupts.

SINGLE ERROR CORRECTING CODE USING PBCA

  • Cho, Sung-Jin;Kim, Han-Doo;Pyo, Yong-Soo;Park, Yong-Bum;Hwang, Yoon-Hee;Choi, Un-Sook;Heo, Seong-Hun
    • Journal of applied mathematics & informatics
    • /
    • v.14 no.1_2
    • /
    • pp.461-471
    • /
    • 2004
  • In recent years, large volumes of data are transferred between a computer system and various subsystems through digital logic circuits and interconnected wires. And there always exist potential errors when data are transferred due to electrical noise, device malfunction, or even timing errors. In general, parity checking circuits are usually employed for detection of single-bit errors. However, it is not sufficient to enhance system reliability and availability for efficient error detection. It is necessary to detect and further correct errors up to a certain level within the affordable cost. In this paper, we report a generation of 3-distance code using the characteristic matrix of a PBCA.

CodeAnt : Code Slicing Tool for Effective Software Verification (CodeAnt : 소프트웨어 검증 효율 향상을 위한 코드 슬라이싱 도구)

  • Park, Mingyu;Kim, Dongwoo;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • Safety critical systems require exhaustive verification of safety properties, because even a single corner-case fault can cause a critical safety failure. However, existing verification approaches are too costly in terms of time and computational resource required, making it hard to be applied in practice. In this paper, we implemented a tool for minimizing the size of the verification target w.r.t. verification properties to check, based on program slicing technique[1]. The efficacy of program slicing using our tool is demonstrated in a case study with a verification target Trampoline[3], which is an open source automotive operating system compliant with OSEK/VDX[2]. Experiments have shown enhanced performance in verification, with a 71% reduction in the size of the code.

DEVELOPMENT OF LEGALITY SYSTEM FOR BUILDING ADMINISTRATION PERMISSION SERVICE BASED ON BIM

  • Inhan Kim;Jungsik Choi
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.593-600
    • /
    • 2009
  • In Korea, the government has developed SEUMTER, an administration system for building related public service, to facilitate and promote the electronic submission and permission activities. SEUMTER is progressing legality system based on 2D drawing for building administration permission service. However, there are a lot of problems related to legality system owing to complexity of Korea regulation relation and structure, inefficiency of legality system based on 2D drawing, duplication examination of document (soliciting forms for civil affairs) and drawing. Therefore, the purpose of this study is to develop legality system for building administration permission service based on BIM in Korea. To achieve this purpose, the authors have investigated permission procedure and regulation structure that is used in current building administration permission and suggested permission procedure and regulation structure for legality system based on BIM. In addition, the authors have investigated element technologies (for examples, method of structured regulation, BIM model checker, Viewer, etc) for legality system based on BIM. Finally, the authors have suggested strategy and hereafter direction for application of legality system based on BIM.

  • PDF

Detection of invalidated sanity checks caused by undefined behaviors (정의되지 않은 행동에 의한 안전성 검사 무효화 탐지 기법)

  • Lee, JongHyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.215-219
    • /
    • 2014
  • C programming language has undefined behaviors, which cause unintended execution of a program. When a programmer adds sanity checks without caring about undefined behaviors, compilers may misunderstand and invalidate the sanity checks. Thus, we propose an automated system to detect invalidated sanity checks by marking sanity checks in source code and checking the marks in binary code.