• Title/Summary/Keyword: Memory Manipulation

Search Result 46, Processing Time 0.035 seconds

Manipulation of Memory Data Using SQL (SQL을 이용한 메모리 데이터 조작)

  • Ra, Young-Gook;Woo, Won-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.597-610
    • /
    • 2011
  • In database application developments, data coexists in memory and disk spaces. To manipulate the memory data, the general programing languages are used and to manipulate the disk data, SQL is used. In particular, the procedural languages for the memory manipulation are difficult to create and manage than declarative languages such as SQL. Thus, this paper shows that a particular structure of memory data, tree structured, can be manipulated by SQL. Most of all, the model data of the user interfaces can be represented by a tree structure and thus, it can be processed by SQL except non set computations. The non set computations could be done by helper classes. The SQL memory data manipulation is more suited to the database application developments which have few complex computations.

Preventing Mobile Game Client Memory Manipulation Based on Event Sourcing Patterns and Blockchain (이벤트 소싱 패턴과 블록 체인을 활용한 모바일 게임 클라이언트 메모리 조작 방지 방안)

  • Park, Jihun;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.477-486
    • /
    • 2022
  • This study aims to present a method using event sourcing patterns and blockchain as a way to cope with vulnerabilities in memory manipulation at the client level. To verify the plan, the method of running the memory operation application was analyzed, and the performance was compared and analyzed when the memory operation prevention plan was applied by fabricating a test application. As a result of the analysis, the usage of memory increased compared to the method of XOR operation by storing major data in one memory, but it was possible to prevent the operation of the memory operation program without significantly affecting the performance of the game.

Performance Comparison of Symbolic Manipulation Programs using a Validation Method for Numerical Solution (수치해 검증방법을 이용한 기호 연산 프로그램 성능 비교)

  • Yang, Sung-Wook;Lee, Sang-Chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.23 no.2
    • /
    • pp.69-74
    • /
    • 2015
  • We propose a rigorous and practical methodology to evaluate the performance of symbolic manipulation program such as Mathematica, Maple, and Maxima. First, we demonstrate an inverse method to construct the benchmark problems of an initial value problems. The benchmark problems associated with the discrete version of the Chebyshev polynomials provide a rigorous and objective measure to evaluate the performance of symbolic manipulation programs. We compare three symbolic manipulation programs, which are Mathematica, Maple and Maxima, using this methodology. The computation time, the used memory and the perturbation terms are chosen for comparison parameters.

The Study on Software Tamper Resistance for Securing Game Services (게임 서비스 보호를 위한 소프트웨어 위변조 방지기술 연구)

  • Chang, Hang-Bae;Kang, Jong-Gu;Joe, Tae-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1120-1127
    • /
    • 2009
  • The commensurate number of the attacks and infringement targeting a vulnerability of the game service has been increasing constantly, due to the dramatic growth and expansion of the impact of the game industry. However, there exist no subsequent researches for the differentiated technology, which is to prevent the reverse function of the game service. Therefore, in this study, we examined the current status of infringement toward online game services which are provided in the market currently and designed the proper technical measures for a manipulation of the game service which is the most vulnerable part. We have encrypted an execution file and decrypted it in real time process. Furthermore, we conducted debugging, disassemble, and prevented a its own memory dump, also concealed the information to overcome the module dependency to preclude a manipulation.

  • PDF

A Study on Countermeasures for Personal Data Breach and Security Threats of Social Network Game (소셜 네트워크 게임(SNG) 서비스의 개인정보 유출 및 보안위협 대응방안에 관한 연구)

  • Lee, Sang Won;Kim, Huy Kang;Kim, Eun Jin
    • Journal of Korea Game Society
    • /
    • v.15 no.1
    • /
    • pp.77-88
    • /
    • 2015
  • As the smart phone market is drastically expanding, there is a steady growth of recent vicious activities such as data manipulation, billing fraud, identity theft, and leakage of personal information that are security threats to Social Network Games(SNG). Due to the threats, Strong development standard is required for security enhancement of SNG. Nonetheless, short life-spans, additional expenses, and the necessities to provide a sound game service hinders developers from reaching their security goals. Therefore, this research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services. In addition, the research presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.

A Study on Memory Hacking Prevention System in Windows Environment (윈도우 환경에서의 메모리 해킹 방지 시스템 연구)

  • Kim, Yo-Sik;Yun, Young-Tae;Park, Sang-Seo
    • Convergence Security Journal
    • /
    • v.5 no.3
    • /
    • pp.75-86
    • /
    • 2005
  • Recently, illegal manipulation and forgery threats on computer softwares are increasing due to the advances in reverse engineering techniques. Furthermore someone who has concerns about these area can crack the software by using the open-to-public simple tools on the internet. The software companies are struggling to defend their own softwares against threats, while the crackers are continuing to crack the softwares. In this paper, we first establish the generic software threat model and, analyze and experiment on the software cracks, before suggest a memory hacking prevention system in Microsoft Windows environment.

  • PDF

Comparison of Image Duplication Detection Using the Polar Coordinates System and Histogram of Oriented Gradients Methods

  • Gunadi, Kartika;Adipranata, Rudy;Suryajaya, Ivan
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.1
    • /
    • pp.67-73
    • /
    • 2019
  • In the current era of digital technology, and with the help of existing software, digital photo manipulation is becoming easier and faster. One example of this is the development of powerful image processing software that makes it easy for a digital image to be manipulated and edited. It is therefore very important to protect and maintain public trust in digital images. Several methods have been developed to detect image manipulation. In this paper, we compare two methods for detecting image duplication due to copy-move actions, namely the polar coordinate system and the histogram of oriented gradients methods. The former is a method based on the transfer of a Cartesian image to a polar form, making it easy to tell whether there are objects that have undergone a copy/move in an image, while the latter is a method for retrieving information related to the distribution, which uses a target in the local area as a tool to represent the shape of the target. We compare the accuracy, speed and memory usage of these two methods.

An Efficient Cache Management Scheme of Flash Translation Layer for Large Size Flash Memory Drives

  • Choi, Hwan-Pil;Kim, Yong-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.11
    • /
    • pp.31-38
    • /
    • 2015
  • Nowadays, large size flash memory drives with more than a couple of hundreds of gigabytes are common. This paper presents an efficient cache management scheme of flash translation layer, called TPC-FTL, for large size flash memory drives. Since flash drives of large size usually contain large size RAM, we can enhance the performance of page mapping cache by using more RAM for the cache. But if the size exceeds a threshold, the existing schemes are impractical for real devices, because the time for cache manipulation becomes too long. TPC-FTL manages the cache in translation page unit, not in logical page number unit used in existing schemes. Since a translation page covers a large number of logical page numbers (for example, 512 for 2KB size page), the number of cache elements can be reduced up to a practical level. A performance evaluation shows that average response time, an important performance measure, is better than existing schemes via the effect of utilizing spacial locality in addition to temporal locality.

Understanding the Experience of Visual Change Detection Based on the Experience of a Sensory Conflict Evoked by a Binocular Rivalry (양안경합의 감각적 상충 경험에 기초한 시각적 변화탐지 경험에 대한 이해)

  • Shin, Youngseon;Hyun, Joo-Seok
    • Science of Emotion and Sensibility
    • /
    • v.16 no.3
    • /
    • pp.341-350
    • /
    • 2013
  • The present study aimed to understand the sensory characteristic of change detection by comparing the experience of detecting a salient visual change against the experience of detecting a sensory conflict evoked by a binocular mismatch. In Experiment 1, we used the change detection task where 2, 4, or 6 items were short-term remembered in visual working memory and were compared with following test items. The half of change-present trials were manipulated to elicit a binocular rivalry on the test item with the change by way of monocular inputs across the eyes. The results showed that change detection accuracy without the rivalry manipulation declined evidently as the display setsize increased whereas no such setsize effect was observed with the rivalry manipulation. Experiment 2 tested search efficiency for the search array where the target was designated as an item with the rivalry manipulation, and found the search was very efficient regardless of the rivalry manipulation. The results of Experiment 1 and 2 showed that when the given memory load varies, the experience of detecting a salient visual change become similar to the experience of detecting a sensory conflict by a binocular rivalry.

  • PDF

Fault Tolerant Display Image Data Manipulation Unit for SOP

  • You, Jae-Hee;Lee, Hyun-Goo
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.1275-1278
    • /
    • 2006
  • A display panel image data manipulator for SOP or SOG is presented. It is capable of all the shift operations for MPEG decoders, graphic processors and controllers as well as data pack, merging, bit split and reformation operations to improve speed and memory utilization. To alleviate poly-Si low yield, redundancy based fault recovery scheme is introduced utilizing regular structure.

  • PDF