• Title/Summary/Keyword: Path detection software

Search Result 30, Processing Time 0.022 seconds

Deep Learning based Dynamic Taint Detection Technique for Binary Code Vulnerability Detection (바이너리 코드 취약점 탐지를 위한 딥러닝 기반 동적 오염 탐지 기술)

  • Kwang-Man Ko
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.3
    • /
    • pp.161-166
    • /
    • 2023
  • In recent years, new and variant hacking of binary codes has increased, and the limitations of techniques for detecting malicious codes in source programs and defending against attacks are often exposed. Advanced software security vulnerability detection technology using machine learning and deep learning technology for binary code and defense and response capabilities against attacks are required. In this paper, we propose a malware clustering method that groups malware based on the characteristics of the taint information after entering dynamic taint information by tracing the execution path of binary code. Malware vulnerability detection was applied to a three-layered Few-shot learning model, and F1-scores were calculated for each layer's CPU and GPU. We obtained 97~98% performance in the learning process and 80~81% detection performance in the test process.

Structural Change Detection Technique for RDF Data in MapReduce (맵리듀스에서의 구조적 RDF 데이터 변경 탐지 기법)

  • Lee, Taewhi;Im, Dong-Hyuk
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.8
    • /
    • pp.293-298
    • /
    • 2014
  • Detecting and understanding the changes between RDF data is crucial in the evolutionary process, synchronization system, and versioning system on the web of data. However, current researches on detecting changes still remain unsatisfactory in that they did neither consider the large scale of RDF data nor accurately produce the RDF deltas. In this paper, we propose a scalable and effective change detection using a MapReduce framework which has been used in many fields to process and analyze large volumes of data. In particular, we focus on the structure-based change detection that adopts a strategy for the comparison of blank nodes in RDF data. To achieve this, we employ a method which is composed of two MapReduce jobs. First job partitions the triples with blank nodes by grouping each triple with the same blank node ID and then computes the incoming path to the blank node. Second job partitions the triples with the same path and matchs blank nodes with the Hungarian method. In experiments, we show that our approach is more accurate and effective than the previous approach.

Comparison of Deep-Learning Algorithms for the Detection of Railroad Pedestrians

  • Fang, Ziyu;Kim, Pyeoungkee
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.28-32
    • /
    • 2020
  • Railway transportation is the main land-based transportation in most countries. Accordingly, railway-transportation safety has always been a key issue for many researchers. Railway pedestrian accidents are the main reasons of railway-transportation casualties. In this study, we conduct experiments to determine which of the latest convolutional neural network models and algorithms are appropriate to build pedestrian railroad accident prevention systems. When a drone cruises over a pre-specified path and altitude, the real-time status around the rail is recorded, following which the image information is transmitted back to the server in time. Subsequently, the images are analyzed to determine whether pedestrians are present around the railroads, and a speed-deceleration order is immediately sent to the train driver, resulting in a reduction of the instances of pedestrian railroad accidents. This is the first part of an envisioned drone-based intelligent security system. This system can effectively address the problem of insufficient manual police force.

Measure of Effectiveness Analysis for Tracking in SONAR System (소나시스템에서의 추적효과도 분석)

  • Cho, Jung-Hong;Kim, Hyoung Rok;Kim, Seongil;Kim, Jea Soo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.1
    • /
    • pp.5-26
    • /
    • 2013
  • Since the optimized use of sonar systems for target tracking is a practical problem for naval operations, the measure of mission achievability is needed for preparing efficient sonar-maneuver tactic. In order to quantify the mission achievability or Measure Of Effectiveness(MOE) for given sonar-maneuver tactics, we developed and tested a simulation algorithm. The proposed algorithm for tracking is based on Measure Of Performance(MOP) for localization and tracking system of sonar against target. Probability of Detection(PD) using steering beam patterns referenced to the aspect angle of sonar is presented to consider the tracking-performance of sonar. Also, the integrated software package, named as Optimal Acoustic Search Path Planning(OASPP) is used for generating sonar-maneuver patterns and vulnerability analysis for a given scenario. Through simulation of a simple case for which the intuitive solution is known, the proposed algorithm is verified.

Introduction to Autonomous Vehicle PHAROS (자율주행자동차 PHAROS)

  • Ryu, Jee-Hwan;Park, Jang-Sik;Ogay, Dmitriy;Bulavintsev, Segey;Kim, Hyuk;Song, Young-wook;Yoon, Moon-Young;Kim, Jea-Seok;Kang, Jeon-Jin
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.8
    • /
    • pp.787-793
    • /
    • 2012
  • This paper introduces the autonomous vehicle Pharos, which participated in the 2010 Autonomous Vehicle Competition organized by Hyundai-Kia motors. PHAROS was developed for high-speed on/off-road unmanned driving avoiding diverse patterns of obstacles. For the high speed traveling up to 60 km/h, long range terrain perception, real-time path planning and high speed vehicle motion control algorithms are developed. This paper describes the major hardware and software components of our vehicle.

Detecting Software Similarity Using API Sequences on Static Major Paths (정적 주요 경로 API 시퀀스를 이용한 소프트웨어 유사성 검사)

  • Park, Seongsoo;Han, Hwansoo
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1007-1012
    • /
    • 2014
  • Software birthmarks are used to detect software plagiarism. For binaries, however, only a few birthmarks have been developed. In this paper, we propose a static approach to generate API sequences along major paths, which are analyzed from control flow graphs of the binaries. Since our API sequences are extracted along the most plausible paths of the binary codes, they can represent actual API sequences produced from binary executions, but in a more concise form. Our similarity measures use the Smith-Waterman algorithm that is one of the popular sequence alignment algorithms for DNA sequence analysis. We evaluate our static path-based API sequence with multiple versions of five applications. Our experiment indicates that our proposed method provides a quite reliable similarity birthmark for binaries.

Efficiency and Productivity on ICT Industry (ICT 제조업과 서비스업의 효율성과 생산성)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.16 no.4
    • /
    • pp.55-75
    • /
    • 2014
  • Non-parametric method such as technology efficiency, DEA/Window model and Malmquist Productivity Index (MPI) are used to measure efficiency and productivity of ICT (Information and Communication Technology) manufacturing industry and service industry over the period 2007-2011. The results of this paper indicate following: (1) Technology efficiency of the ICT manufacturing industry were found as the range of 0.34 and 0.39 over the sample period. Technology efficiency of the ICT service industry were found as the range of 0.16 and 0.20 over the sample period. (2) The geometric average of the Malmquist TFP indexes on ICT manufacturing industry indicated the productivity improvement an average of 8.3 percent. The geometric average of the Malmquist TFP indexes on ICT service industry indicated the productivity improvement an average of 1.6 percent. (3) TIER analysis result on ICT manufacturing industry showed that optimal bench marking made by storage devices${\rightarrow}$wireless communication equipment${\rightarrow}$broadcasting equipment${\rightarrow}$radio, recording and playback devices${\rightarrow}$computers, printers, video and audio-visual equipment path. TIER analysis result on ICT service industry indicated that optimal bench marking made by computers and packaged software${\rightarrow}$wired communication${\rightarrow}$communication, information, detection equipment${\rightarrow}$consulting and construction for computer systems integration${\rightarrow}$industrial machinery and equipment rental${\rightarrow}$telecommunications reseller${\rightarrow}$system software development and delivery${\rightarrow}$hosting path.

  • PDF

Grasping a Target Object in Clutter with an Anthropomorphic Robot Hand via RGB-D Vision Intelligence, Target Path Planning and Deep Reinforcement Learning (RGB-D 환경인식 시각 지능, 목표 사물 경로 탐색 및 심층 강화학습에 기반한 사람형 로봇손의 목표 사물 파지)

  • Ryu, Ga Hyeon;Oh, Ji-Heon;Jeong, Jin Gyun;Jung, Hwanseok;Lee, Jin Hyuk;Lopez, Patricio Rivera;Kim, Tae-Seong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.9
    • /
    • pp.363-370
    • /
    • 2022
  • Grasping a target object among clutter objects without collision requires machine intelligence. Machine intelligence includes environment recognition, target & obstacle recognition, collision-free path planning, and object grasping intelligence of robot hands. In this work, we implement such system in simulation and hardware to grasp a target object without collision. We use a RGB-D image sensor to recognize the environment and objects. Various path-finding algorithms been implemented and tested to find collision-free paths. Finally for an anthropomorphic robot hand, object grasping intelligence is learned through deep reinforcement learning. In our simulation environment, grasping a target out of five clutter objects, showed an average success rate of 78.8%and a collision rate of 34% without path planning. Whereas our system combined with path planning showed an average success rate of 94% and an average collision rate of 20%. In our hardware environment grasping a target out of three clutter objects showed an average success rate of 30% and a collision rate of 97% without path planning whereas our system combined with path planning showed an average success rate of 90% and an average collision rate of 23%. Our results show that grasping a target object in clutter is feasible with vision intelligence, path planning, and deep RL.

A Model-based Test Approach and Case Study for Weapon Control System (모델기반 테스트 기법 및 무장통제장치 적용 사례)

  • Bae, Jung Ho;Jang, Bucheol;Koo, Bongjoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.5
    • /
    • pp.688-699
    • /
    • 2017
  • Model-based test, a well-known method of the black box tests, is consisted of the following four steps : model construction using requirement, test case generation from the model, execution of a SUT (software under test) and detection failures. Among models constructed in the first step, state-based models such as UML standard State Machine are commonly used to design event-based embedded systems (e.g., weapon control systems). To generate test cases from state-based models in the next step, coverage-based techniques such as state coverage and transition coverage are used. Round-trip path coverage technique using W-Method, one of coverage-based techniques, is known as more effective method than others. However it has a limitation of low failure observability because the W-Method technique terminates a testing process when arrivals meet states already visited and it is hard to decide the current state is completely same or not with the previous in the case like the GUI environment. In other words, there can exist unrevealed faults. Therefore, this study suggests a Extended W-Method. The Extended W-Method extends the round-trip path to a final state to improve failure observability. In this paper, we compare effectiveness and efficiency with requirement-item-based technique, W-Method and our Extended W-Method. The result shows that our technique can detect five and two more faults respectively and has the performance of 28 % and 42 % higher failure detection probability than the requirement-item-based and W-Method techniques, respectively.

A new Mada-CenterNet based on Dual Block to improve accuracy of pest counting (해충 카운팅의 정확성 향상을 위한 Dual Block 기반의 새로운 Mada-CenterNet)

  • Hee-Jin Gwak;Cheol-Hee Lee;Chang-Hwan Son
    • Journal of IKEEE
    • /
    • v.28 no.3
    • /
    • pp.342-351
    • /
    • 2024
  • Effective pest control in the agricultural field is essential for improving crop productivity. To do so, information on the type and timing of pests, as well as the amount of pests generated, is required. Mada-CenterNet, a prior study on pest counting, which is a method of identifying the amount of pest occurrence, has improved the accuracy of pest counting by utilizing transformable convolution and multiscale attention fusion and is reported to be the best in the field. In this study, a new transformer structure with a dual block was applied instead of multiscale attention, which is the transformer structure of Mada-CenterNet. More sophisticated feature maps were extracted through cross-attention of pixel path and semantic path. As a result of the experiment, the proposed model has improved the accuracy of pest counting. It is better than the existing Mada-CenterNet and effectively alleviates obstruction problems, damage to pests' bodies, and detection difficulties caused by various appearances. Unlike conventional pest counting methods, it can secure the advantage of reducing manpower and time costs, and it is expected that it can be used in other agricultural fields that require counting of objects.