• Title/Summary/Keyword: Code Coverage Improvement

Search Result 11, Processing Time 0.03 seconds

Improving Code Coverage for the FPGA Based Nuclear Power Plant Controller (FPGA기반 원전용 제어기 코드커버리지 개선)

  • Heo, Hyung-Suk;Oh, Seungrohk;Kim, Kyuchull
    • Journal of IKEEE
    • /
    • v.18 no.3
    • /
    • pp.305-312
    • /
    • 2014
  • IIt takes a lot of time and needs the workloads to verify the RTL code used in complex system like a nuclear control system which is required high level reliability using simple testbench. UVM has a layered testbench architecture and it is easy to modify the testbench to improve the code coverage. A test vector can be easily constructed in the UVM, since a constrained random test vector can be used even though the construction of testbench using UVM. We showed that the UVM testbench is easier than the verilog testbench for the analysis and improvement of code coverage.

A Study of Coverage Improvement for Library Fuzzing (라이브러리 퍼징의 커버리지 향상 방법 연구)

  • Kim, Seoyoung;Cho, Mingi;Kim, Jongshin;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1079-1085
    • /
    • 2020
  • Fuzzing is used to find vulnerabilities for a library. Because library fuzzing only tests the implemented functions, in order to achieve higher code coverage, additional functions that are not implemented should be implemented. However, if a function is added without regard to the calling relationship of the functions in the library, a problem may arise that the function that has already been tested is added. We propose a novel method to improve the code coverage of library fuzzing. First, we analyze the function call graph of the library to efficiently add the functions for library fuzzing, and additionally implement a library function that has not been implemented. Then, we apply a hybrid fuzzing to explore for branches with complex constraints. As a result of our experiment, we observe that the proposed method is effective in terms of increasing code coverage on OpenSSL, mbedTLS, and Crypto++.

Code Coverage Improvement through Symbolic Execution (Symbolic Execution을 통한 Code Coverage의 향상)

  • Kim, Jin-Hyun;Park, Sun-Woo;Park, Yongsu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.648-651
    • /
    • 2017
  • 프로그램의 코드에 있어서 실행되지 않은 영역은 미지의 영역으로써 각종 에러와 오류의 잠재적 가능성을 지니고 있다. 개발자는 이러한 영역을 모두 검증, 테스팅 해봐야 이후 프로그램의 실행에서 예상치 못한 치명적 오류들에 대응할 수 있을 것이다. 우리는 본 논문에서 소프트웨어 테스팅의 두 가지 기법에 대하여 소개를 하고 이 두 가지를 이용하여 미실행된 영역을 실행시킬 수 있는 방법론을 제안하고자 한다. 실험에서 JaCoCo와 SPF를 사용하여 방법론을 적용하였고 이를 통하여 미실행 영역이 커버되는 테스트 케이스를 자동으로 얻어 낼 수 있었다.

Using Finite Element Analysis for Mechanical Properties of Coronary Stents (유한요소법을 이용한 스텐트의 기계적 성능 비교 및 평가)

  • 조승관;김한성;이상헌;탁계래;탁승제
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.1306-1309
    • /
    • 2003
  • In the present paper, finite element analyses were carried out to evaluate the most important feature of a stent, that is. high radial strength and flexibility. Palmaz-Schatz 154 stent and two new models(stent A, stent B) were selected because they are the most representatives of tubular stents. Finite element analyses for the stent system were performed using ABAQUS/Explicit code. As a result, Palmaz-Schatz 154 stent shows sufficient radial strength but it needs some improvement in general properties such as high flexibility, low elastic recoil, low longitudinal contraction and low metal coverage area. Other two models show that sufficient flexibility, foreshortening and longitudinal recoil.

  • PDF

Graph based Binary Code Execution Path Exploration Platform for Dynamic Symbolic Execution (동적 기호 실행을 이용한 그래프 기반 바이너리 코드 실행 경로 탐색 플랫폼)

  • Kang, Byeongho;Im, Eul Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.437-444
    • /
    • 2014
  • In this paper, we introduce a Graph based Binary Code Execution Path Exploration Platform. In the graph, a node is defined as a conditional branch instruction, and an edge is defined as the other instructions. We implemented prototype of the proposed method and works well on real binary code. Experimental results show proposed method correctly explores execution path of target binary code. We expect our method can help Software Assurance, Secure Programming, and Malware Analysis more correct and efficient.

A cooperative virtual MIMO system for moving networks (이동 네트워크를 위한 협력 가상 MIMO 시스템)

  • Kim, Jung-Hyun;Kim, Il-Hwan;You, Cheol-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3C
    • /
    • pp.127-132
    • /
    • 2011
  • In this paper, we propose a cooperative communication scheme for high transmission efficiency and coverage extension under multipath fading environment of moving networks. The proposed scheme uses a Space-Time Block Code (STBC) for improvement of receiving performance by using virtual Multiple-Input Multiple-Output(MIMO) transmit diversity. It can also achieve faster transmission time than a conventional scheme by using virtual MIMO configurations. Simulation results have shown that the proposed scheme provides SNR improvement and has faster transmission time compared to the conventional scheme, since it can utilize the good properties of spatial diversity and coding gain by using virtual MIMO configuration. In this paper, we propose simulations of UWB communication system to show validity by using the MATLAB.

A Study on the Automatic Generation of Test Case Based on Source Code for Quality Improvement (소프트웨어 품질향상을 위한 소스코드 기반의 테스트 케이스 자동 생성에 관한 연구)

  • Son, Ung-Jin;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.186-192
    • /
    • 2015
  • This paper proposes an automatic generation technology of test case based on API in source code for software's quality improvement. The proposed technology is comprised of four processes which are analyzing source code by using the Doxygen open source tool, defining API specification by using analyzed results, creating test design, generating a test case by adapting Pairwise test technology. Analyzing source code by using the Doxygen open source tool is the phase in which API information in source code such as the API name, input parameter and return parameter are extracted. Defined API specification by using analyzed results is the phase where API informations, which is needed to generate test case, are defined as a form of database by SQLite database on the basis of extracted API information. Creating test design is the phase in which the scenario is designed in order to be composed as database by defining threshold of input and return parameters and setting limitations based on the defined API. Generating a test case by adapting Pairwise test technique is the phase where real test cases are created and changed into database by adapting Pairwise technique on the base of test design information. To evaluate the efficiency of proposed technology, the research was conducted by begin compared to specification based test case creation. The result shows wider test coverage which means the more cases were created in the similar duration of time. The reduction of manpower and time for developing products is expected by changing the process of quality improving in software developing from man-powered handwork system into automatic test case generation based on API of source code.

Performance Evaluation of a Pilot Interference Cancellation Scheme in a WCDMA Wireless Repeater (WCDMA 무선 중계기에서 파일럿 간섭제거 기법의 성능평가)

  • Kim, Sun-Ho;Shim, Hee-Sung;Im, Sung-Bin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.6
    • /
    • pp.111-117
    • /
    • 2009
  • In the wideband code division access (WCDMA) systems, a pilot channel is used to determine WCDMA network coverage, cell identification, synchronization, timing acquisition and tracking, user-set handoff, channel estimation, and so on. A wireless repeater, which is deployed in the urban area for the WCDMA system to meet the growing demand on wireless communication services, has the possibility to receive several pilot signals from a large number of base stations, however, cannot distinguish its service base station's signal among them. This pilot interference results in frequent handoffs in the user equipment, which degrades the radio reception, transmission efficiency, quality of service, and channel capacity and increases the unwanted power consumption. In this paper, thus, we propose a pilot pollution interference cancellation scheme using one of the adaptive estimation algorithms, normalized least mean square (NLMS), which is applicable to a wireless repeater. We carried out link-level and network-level computer simulations to evaluate the performance of the proposed scheme in a wireless repeater. The simulation results verify the bit error rate (BER) improvement in the link level and the call drop probability improvement in the network level.

A Study on Hybrid Fuzzing using Dynamic Analysis for Automatic Binary Vulnerability Detection (바이너리 취약점의 자동 탐색을 위한 동적분석 정보 기반 하이브리드 퍼징 연구)

  • Kim, Taeeun;Jurn, Jeesoo;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.541-547
    • /
    • 2019
  • Recent developments in hacking technology are continuing to increase the number of new security vulnerabilities. Approximately 80,000 new vulnerabilities have been registered in the Common Vulnerability Enumeration (CVE) database, which is a representative vulnerability database, from 2010 to 2015, and the trend is gradually increasing in recent years. While security vulnerabilities are growing at a rapid pace, responses to security vulnerabilities are slow to respond because they rely on manual analysis. To solve this problem, there is a need for a technology that can automatically detect and patch security vulnerabilities and respond to security vulnerabilities in advance. In this paper, we propose the technology to extract the features of the vulnerability-discovery target binary through complexity analysis, and select a vulnerability-discovery strategy suitable for the feature and automatically explore the vulnerability. The proposed technology was compared to the AFL, ANGR, and Driller tools, with about 6% improvement in code coverage, about 2.4 times increase in crash count, and about 11% improvement in crash incidence.

Design and Performance of Low Complexity Multiple Antenna Relay Transmission Based on STBC-OFDM (시공간 부호화 직교 주파수분할 다중화 기반 저 복잡도 다중 안테나 릴레이 전송 방식 설계 및 성능)

  • Lee, Ji-Hye;Park, Jae-Cheol;Wang, Jin-Soo;Lee, Seong-Ro;Kim, Yun-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11C
    • /
    • pp.673-681
    • /
    • 2011
  • In this paper, we design multiple antenna relay transmission schemes of low complexity to enhance the spatial diversity in orthogonal frequency division multiplexing (OFDM) systems. The relay scheme underlined, can provide space time block coding (STBC) of OFDM signals in the time domain without IFFT and FFT operations with much reduced complexity. In this paper, we modify the conventional low-complexity STBC-OFDM relaying scheme to be compatible to the existing OFDM systems. In addition, we extend the proposed scheme for multiple antenna relays and provide performance enhancement strategies according to the channel quality information available at the relay. The proposed scheme is shown to improve the diversity and thereby to reduce the outage probability and coded bit error rate. Therefore, the proposed scheme will be promising for service quality improvement or coverage extension based on OFDM like wireless LANs and maritime communications.