• Title/Summary/Keyword: Information flow control

Search Result 1,185, Processing Time 0.023 seconds

Design and Implementation of a Mail Browser that can control Data-Flow on the Web (Web에서 데이터 흐름제어가 가능한 Mail Browser의 설계 및 구현)

  • Park, Gyu-Seok;Kim, Seong-Hu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2752-2763
    • /
    • 1999
  • On account of the text based mail system has it's limit to support multimedia applications, GUI based mail system platform was developed to control document flow and automatize information process. The existing mail systems's to transmit data must need additional functions to automate document flow control. The platform of document flow control is deeply related to EDMAS(Electronic document Management System), workflow, Electronic Banking, DMS(Document Management System) automation, so it needs an ability to control proper data and document correctly. To resolve this problems, we are need of browser and engine to design work flow and to control documents flow. In this paper, we develope a mail browser to design document flow by follow user's requirements. This system can generate executive script code for document flow, and we add the function of workflow and process management to automatize the document flow in this system, and then we implement this Data flow engine.

  • PDF

An Information Flow Security Based on Protected Area in eCommerce (전자 거래에서 보호 영역을 기반으로 하는 정보 흐름 보안 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.1
    • /
    • pp.1-16
    • /
    • 2010
  • Confidentiality is one of the most important requirements of information protection systems. The access control technique has been used to provide confidentiality, but it has fundamental problems in that it cannot prevent violations of confidentiality committed by authorized users. Information flow control is a technique introduced to resolve such problems, and many approaches based on programming languages have been proposed. However, it is not easy for a programmer to implement the technique at the source code level. Furthermore, the practicality of information flow control is difficult to demonstrate because it does not provide control over programs that have already been developed. This paper proposes a method that enables a practical information flow control through using a protected area, a separate part of computer system storage. Case studies are given to show its usefulness.

Precise control flow protection based on source code (소스코드 기반의 정밀도 높은 실행 흐름 보호 기법)

  • Lee, JongHyup;Kim, Yong Seung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1159-1168
    • /
    • 2012
  • Control Flow Integrity(CFI) and Control Flow Locking(CFL) prevent unintended execution of software and provide integrity in control flow. Attackers, however, can still hijack program controls since CFI and CFL does not support fine-granularity, context-sensitive protection. In this paper, we propose a new CFI scheme, Source-code CFI(SCFI), to overcome the problems. SCFI provides context-sensitive locking for control flow. Thus, the proposed approach protects software against the attacks on the previous CFI and CFL schemes and improves safety.

Anomaly Removal for Efficient Conformance Test (효율적인 프로토콜 적합성 시험을 위한 변칙성 제거)

  • Lee, Hyeon-Cheol;Heo, Gi-Taek
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.3
    • /
    • pp.750-757
    • /
    • 1999
  • The protocol conformance testing is to check whether an implementation of a protocol conforms to its specification. And it is important to improve the interoperability of protocol and the efficiency of cost. In general, protocol is composed of the control flow representing observable behaviors and the data flow representing internally used variables. Until now, research for generation of test suite has been realized only consideration the control flow of protocol or separation control flow from data flow. Case of considering control flow, contents of test was simple and definite. Length of test was short. But it was of little application, and it didn't manage each kind errors in data flow. Therefore, we must generate test case that can manage control and data flow. So, anomaly of variable must be removed for efficient conformance testing. Therefore in this dissertation, we proposed algorithm which can remove anomaly of variable for efficient conformance testing. And it showed that anomaly of variable was got rid of applying this algorithm to real protocol.

  • PDF

A Study on the Optimized Representation for Data and Control Flow Information (자료 및 제어 흐름 정보의 최적화 표현에 관한 연구)

  • 정성옥;고광만;이성주
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.4 no.3
    • /
    • pp.681-687
    • /
    • 2000
  • Ideograph is a truly unifies data and procedural dependencies, Ideograph can be used to assist various program optimization, such as common expression elimination, code motion, constant folding etc. In this paper, we design and implementation of the optimized abstract syntax tree using Ideograph. Ideograph has control flow information and data flow information for source program. So we use a Ideograph in order to produce a optimized Ideograph with control flow information and data flow information.

  • PDF

Active Flow Control Technology for Vortex Stabilization on Backward-Facing Step (와류 안정화를 위한 후향계단 유동 능동제어기법)

  • Lee, Jin-Ik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.246-253
    • /
    • 2013
  • This paper addresses the technology of active flow control for stabilizing a flow field. In order for flow field modeling from the control point of view, the huge-data set from CFD(computational fluid dynamics) are reduced by using a POD(Proper Orthogonal Decomposition) method. And then the flow field is expressed with dynamic equation by low-order modelling approach based on the time and frequency domain analysis. A neural network flow estimator from the pressure information measured on the surface is designed for the estimation of the flow state in the space. The closed-loop system is constructed with feedback flow controller for stabilizing the vortices on the flow field.

PASSlVE SHOCK CONTROL IN TRANSONIC FLOW FIELD

  • Matsuo S;Tanaka M;Setoguchi T;Kashimura H;Yasunobu T;Kim H.D
    • Journal of computational fluids engineering
    • /
    • v.10 no.1
    • /
    • pp.80-86
    • /
    • 2005
  • In order to control the transonic flow field with a shock wave, a condensing flow was produced by an expansion of moist air on a circular bump model and shock waves were occurred in the supersonic parts of the fields. Furthermore, the additional passive technique of shock-boundary layer interaction using the porous wall with a cavity underneath was adopted in this flow field. The effects of these methods on the shock wave characteristics were investigated numerically. The result showed that the flow fields might be effectively controlled by the suitable combination between non-equilibrium condensation and the position of porous wall.

Passive Shock Control in Transonic Flow Field

  • Matsuo S.;Tanaka M.;Setoguchi T.;Kashimura H.;Yasunobu T.;Kim H. D.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.187-188
    • /
    • 2003
  • In order to control the transonic flow field with shock wave, a condensing flow was produced by an expansion of moist air on a circular bump model and shock waves were occurred in the supersonic parts of the fields. Furthermore, the additional passive technique of shock - boundary layer interaction using the porous wall with a cavity underneath was adopted in this flow field. The effects of these methods on the shock wave characteristics were investigated numerically. The result showed that the flow fields might be effectively controlled by the suitable combination between non-equilibrium condensation and the position of porous wall.

  • PDF

Control Flow Checking at Virtual Edges

  • Liu, LiPing;Ci, LinLin;Liu, Wei;Yang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.396-413
    • /
    • 2017
  • Dynamically checking the integrity of software at run-time is always a hot and difficult spot for trusted computing. Control-flow integrity is a basic and important safety property of software integrity. Many classic and emerging security attacks who introduce illegal control-flow to applications can cause unpredictable behaviors of computer-based systems. In this paper, we present a software-based approach to checking violation of control flow integrity at run-time. This paper proposes a high-performance and low-overhead software control flow checking solution, control flow checking at virtual edges (CFCVE). CFCVE assigns a unique signature to each basic block and then inserts a virtual vertex into each edge at compile time. This together with insertion of signature updating instructions and checking instructions into corresponding vertexes and virtual vertexes. Control flow faults can be detected by comparing the run-time signature with the saved one at compile time. Our experimental results show that CFCVE incurs only 10.61% performance overhead on average for several C benchmark programs and the average undetected error rate is only 9.29%. Compared with previous techniques, CFCVE has the characteristics of both high fault coverage and low memory and performance overhead.

A strategy for effectively applying a control flow obfuscation to programs (제어 흐름 난독화를 효과적으로 수행하기 위한 전략)

  • Kim, Jung-Il;Lee, Eun-Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.41-50
    • /
    • 2011
  • Code obfuscation has been proposed to protect codes in a program from malicious software reverse engineering. It converts a program into an equivalent one that is more difficult to understand the program. Code obfuscation has been classified into various obfuscation technique such as layout, data, control, by obfuscating goals. In those obfuscation techniques, control obfuscation is intended to complicate the control flow in a program to protect abstract information of control flow. For protecting control flow in a program, various control obfuscation transformation techniques have been proposed. However, strategies for effectively applying a control flow obfuscation to program have not been proposed yet. In this paper, we proposed a obfuscation strategy that effectively applies a control flow obfuscation transformation to a program. We conducted experiment to show that the proposed obfuscation strategy is useful for applying a control flow transformation to a program.