• Title/Summary/Keyword: JAVA program

Search Result 339, Processing Time 0.023 seconds

Design of an Algorithmic Debugging Technique for Java Language (자바 언어를 위한 알고리즈믹 디버깅 기술의 설계)

  • Kouh, Hoon-Joon;Yoo, Weon-Hee
    • The KIPS Transactions:PartA
    • /
    • v.11A no.1
    • /
    • pp.97-108
    • /
    • 2004
  • This paper proposes to use an algorithmic debugging technique for locating logical errors in Java programs. The algorithmic debugging is a semi-automated debugging technique that builds an execution tree from a source program and locates logical errors, if any, included in the program from the execution tree with top-down method. So, it is very important to build a suitable execution tree from the various programming languages. In this paper we propose the method for building an execution tree iron Java programs and walk through an example. This approach could reduce the number of interactions between a user and a debugging system than the traditional step-wise debugging technique.

Implementation and Analysis of Multi-precision Multiplication for Public Key Cryptography Based on NDK (NDK 기반 공개키 암호를 위한 곱셈기 구현 및 분석)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2347-2354
    • /
    • 2012
  • On Android environment, program development is conducted with JAVA SDK. However, using JAVA, it is operated over virtual machine which shows lower performance in terms of speed than traditional C language programming. The method writes program in C language, which conducts operation efficiently. In the paper, we implement multiplication using NDK and SDK to analyze the public key cryptography over Android environment. In case of SDK, we used BigInteger package and in case of NDK, we used Comb method. Moreover, execution time of arithmetic, branch and call operations over Android environment is compared to understand performance enhancement using NDK package.

Analysis of the simpleRTJ Class File Format (simpleRTJ 클래스 파일의 형식 분석)

  • 양희재
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.373-377
    • /
    • 2002
  • Unlike desktop systems, embedded systems usually meet a strict restriction on using memory. It is required to allocate several class files on memory to run a Java program. A Java class file contains such data including a constant pool, class overview, fields information, and methods information. Some of them are used merely for a debugging purpose, others for a program execution. This paper analyzes the internal structure, or format of the class files used for embedded Java systems. We also investigate how much memory will be necessary for each part of the class files when the files are allocated in memory. The experiment was performed on the simpleRTJ, an open-source commercial embedded Java system.

  • PDF

Applet Control using Java Bytecode Modification on the Internet Communication (인터넷 통신상에서 자바 바이트 코드 수정을 이용한 애플릿 제어)

  • 김광준;나상동;배용근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.90-99
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients' browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, and annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

An Education Method of Computational Thinking using Microbit in a Java-based SW Lecture for Non-major Undergraduates (비전공자 대상 Java SW교육 강좌에서 마이크로비트를 이용한 컴퓨팅적 사고과정 교육 방법)

  • Hur, Kyeong
    • Journal of Practical Engineering Education
    • /
    • v.11 no.2
    • /
    • pp.167-174
    • /
    • 2019
  • In the case of Java programming education for non-major undergraduates, there are no examples of applying the physical computing education method. The advantage of physical computing education is that you can directly check the SW processing output result according to the input value of digital and analog sensor, so that you can quickly correct programming errors and improve learner's learning interest and satisfaction. In this paper, we use the microbits to combine physical computing education with basic Java programming education. In addition, according to the computational thinking process, we proposed an educational method for creating Java programs using microbits. Through block programming to control the microbits, we designed an algorithm and applied a training method to convert it into a Java program. In addition, the results of students' evaluations were analyzed in the course applying the education method, and the effectiveness of the education method using the microbit was analyzed.

A Study on Applet Control on the Internet Communication using Java Bytecode (자바 바이트 코드를 이용한 인터넷 통신의 애플릿 제어)

  • 김문환;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.523-531
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients'browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, or annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

Generating Verification Conditions from BIRS Code using Basic Paths for Java Bytecode Verification (자바 바이트코드 검증을 위해 기본경로를 통한 BIRS 코드로부터 검증조건 생성)

  • Kim, Je-Min;Kim, Seon-Tae;Park, Joon-Seok;Yoo, Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.61-69
    • /
    • 2012
  • BIRS is an intermediate representation for verifying Java program. Java program in the form of bytecode could be translated into BIRS code. Verification conditions are generated from the BIRS code to verify the program. We propose a method generating verification conditions for BIRS code. Generating verification conditions is composed of constructing control flow graph for BIRS code, depth first searching for the control flow graph to generate basic paths, and calculating weakest preconditions of the basic paths.

JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking

  • Kim, Hyoung-Chun;Choi, Young-Han;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.766-783
    • /
    • 2012
  • Recently, many malicious users have attacked web browsers using JavaScript code that can execute dynamic actions within the browsers. By forcing the browser to execute malicious JavaScript code, the attackers can steal personal information stored in the system, allow malware program downloads in the client's system, and so on. In order to reduce damage, malicious web pages must be located prior to general users accessing the infected pages. In this paper, a novel framework (JsSandbox) that can monitor and analyze the behavior of malicious JavaScript code using internal function hooking (IFH) is proposed. IFH is defined as the hooking of all functions in the modules using the debug information and extracting the parameter values. The use of IFH enables the monitoring of functions that API hooking cannot. JsSandbox was implemented based on a debugger engine, and some features were applied to detect and analyze malicious JavaScript code: detection of obfuscation, deobfuscation of the obfuscated string, detection of URLs related to redirection, and detection of exploit codes. Then, the proposed framework was analyzed for specific features, and the results demonstrate that JsSandbox can be applied to the analysis of the behavior of malicious web pages.

A Study on Object-Oriented Programming Education for Improving Logical Thinking Ability of Elementary School Students (초등학생의 논리적 사고력 향상을 위한 객체지향 프로그래밍 교육 연구)

  • Park, Kyeong-Mo;Hong, Tae-Jin
    • Journal of Digital Contents Society
    • /
    • v.10 no.2
    • /
    • pp.367-373
    • /
    • 2009
  • Computer programming education helps students understand abstract concepts better and solve given problems independently. Many previous studies on programming education have focused on procedural programming languages such as BASIC and C, but studies on objected-oriented program ming language like JAVA is rare. This paper examines how an architectural neural, objected-oriented JAVA programming study system can improve logical thinking ability and encourage self-led study and stimulate interests in computers among elementary school students. The system has been developed and is suitable for distributed Internet environment. The experiment results demonstrated that the objected-oriented programming education enhances logical thinking ability, exerts a positive impact on student achievement in math and science, and stimulate interests in computers.

  • PDF

Development of a 3-D Racing Game Using Java (Java를 이용한 3차원 레이싱 게임 개발)

  • Jeong, Gab-Joong;Jang, Jae-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.627-630
    • /
    • 2005
  • This paper describes the development of a racing game with three-dimensional computer graphics as one of web-based game contents. Client user using web can access and run java applet program with download of Java Bytecode with the independence of hardware system. It consists of graphic user interface module, initial space generation module, event handler module, and thread control module. It uses 2-D linked list data structure for the 3-D graphic objects that are located in three-dimensional space for high-speed object searching and sorting. It enhances the dynamic object moving and viewing in three-dimensional space. We can use the developed racing game to inform game users of information for an advertisement like tourism information, and can apply the proposed 3-D drawing technology to 3-D game graphic engine core.

  • PDF