• Title/Summary/Keyword: Secure Programming

Search Result 70, Processing Time 0.024 seconds

Automation Review of Road Design Standard using Visual Programming (비주얼 프로그래밍 기법을 활용한 도로설계기준 자동검토 방안)

  • Hyoun-seok Moon;Hyeoun-seung Kim
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.4
    • /
    • pp.891-898
    • /
    • 2022
  • Purpose: There is not much time left for mandatory BIM implementation for all sectors and stages of the construction industry. Therefore, it is necessary to find a way to secure technology to substantially improve the productivity of BIM work. In the research, we proposed a method to automatically verify related construction standards for major objects produced by BIM modeling procedures so that engineers can verify construction standards in the BIM-based design process. Method: We defined a modeling work procedure for BIM-based road design work and prepared a method for constructing related design standards in a database. In addition, a process map for developing a BIM-based design basis review automation system was also presented. Result: A BIM-based design standard review automation module was developed using Civil3D and Dynamo. And it was confirmed by the test application that it is possible to quickly judge whether the BIM object manufactured in the design process conforms to the construction design standard. Conclusion: BIM-based design standard review automation technology can improve the productivity of BIM model production work and secure the quality of the BIM model.

R&D Status of Quantum Computing Technology (양자컴퓨팅 기술 연구개발 동향)

  • Baek, C.H.;Hwang, Y.S.;Kim, T.W.;Choi, B.S.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.1
    • /
    • pp.20-33
    • /
    • 2018
  • The calculation speed of quantum computing is expected to outperform that of existing supercomputers with regard to certain problems such as secure computing, optimization problems, searching, and quantum chemistry. Many companies such as Google and IBM have been trying to make 50 superconducting qubits, which is expected to demonstrate quantum supremacy and those quantum computers are more advantageous in computing power than classical computers. However, quantum computers are expected to be applicable to solving real-world problems with superior computing power. This will require large scale quantum computing with many more qubits than the current 50 qubits available. To realize this, first, quantum error correction codes are required to be capable of computing within a sufficient amount of time with tolerable accuracy. Next, a compiler is required for the qubits encoded by quantum error correction codes to perform quantum operations. A large-scale quantum computer is therefore predicted to be composed of three essential components: a programming environment, layout mapping of qubits, and quantum processors. These components analyze how many numbers of qubits are needed, how accurate the qubit operations are, and where they are placed and operated. In this paper, recent progress on large-scale quantum computing and the relation of their components will be introduced.

An Analysis of Agility of the Cryptography API Next Generation in Microsoft: Based on Implementation Example of Applying Cryptography Algorithm HAS-160 in South Korea (마이크로소프트 차세대 암호 라이브러리의 확장성 분석: 국산 암호화 알고리즘 HAS-160 연동 구현사례를 중심으로)

  • Lee, Kyungroul;You, Ilsun;Yim, Kangbin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1327-1339
    • /
    • 2015
  • This paper surveys structures, features and programming techniques of CNG that is substitution of CAPI in Microsoft, and implements hash provider for support HAS-160 that is one of the Korean hash algorithm. After that, we analysis agility from different perspective based on implemented results, and propose customizing stratagem. Analyzed results of basic concepts and implemented HAS-160 hash provider are expected applying measure for Korean cryptography algorithm in Vista environment. Consequently, we will research secure distribution way due to it is not apply on CNG.

A Study on the Effect of Processor Stack Frame Mechanism on Secure Programming in C Language (C 언어에서 프로세서의 스택관리 형태가 프로그램 보안에 미치는 영향)

  • 이형봉;차홍준;노희영;이상민
    • The KIPS Transactions:PartC
    • /
    • v.8C no.1
    • /
    • pp.1-11
    • /
    • 2001
  • There are several traditional factors of software quality. Some of them are such as correctness, reliability, efficiency, compatibility, portability, etc. In addition to them, security is required as another factor of software quality nowadays because some application programs are used as a way to attack information systems by stack frame manipulation. Each processor has its own peculiar stack frame mechanism and C language uses the characteristics of them. This paper explains the concept of security problem caused by stack frame manipulation, and the stack frame mechanism of Pentium, Alpha and SP ARC processor in detail. And then it examines the effect of stack frame mechanism on the security of programs in C language.

  • PDF

On the Implementation of Route Planning Algorithms on the Electronic Chart System (전자해도 상의 항해계획 알고리듬 구현에 관한 연구)

  • 위승민;김시화;장일동
    • Journal of the Korean Institute of Navigation
    • /
    • v.24 no.3
    • /
    • pp.167-176
    • /
    • 2000
  • The -advent of electronic navigation equipment and trustworthy computer which provides people with convenience made the management system by one-man bridge operation or the least people who are needed possible through the integration of communication network with various navigation equipment and related institution. One of the most needed ultra-modem navigation device for a mate, ECDIS is a core equipment for navigation in ENS that notifies peril to mate as well as supervises all tasks in hydrographical chart, voyage planning, course monitoring and voyage recording. We should make coast and ocean voyage planning first, for the secure navigation which is considering the course circumstances and next, for the reduction of voyage dates in economical aspect. There needs a thoughtful consideration about the feature of the ship itself and the course with weather condition in taking up the course and also we have to take into accounts about appropriate distance between ships. Considering the essential conditions of ECDIS the indispensable device in the future, it was developed the basic principle for voyage planning algorithm for officer and programmed to real implementation available. In this paper including most of the requirements in ECDIS performance standard I mentioned about such a basic and a core Principle with real application by using the Visual C++ programming language. The voyage plan includes the function that indicate and modifies all the way points in the course from department port to arrival port with erasing the wrong way points. Also, it provides in a document form that shows ETA at glance in average speed sailing.

  • PDF

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

A Study on the Development of the Integration Management System for the Standardized High-tech Marine Transportation Infrastructure (표준화된 첨단해양교통시설의 통합관리시스템 구축에 관한 연구)

  • Jeon, Joong-Sung;Lee, Seo-Jeong;Oh, Jin-Seok
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.4
    • /
    • pp.532-539
    • /
    • 2010
  • The high tech marine transportation infrastructure is an innovative transportation infrastructure that may be able to secure a safe transportation environment as well as efficient operation by connecting up-to-date skills including a broad range of wire and wireless communication-based information, control and electronics technologies. When integrated into the marine transportation infrastructure by the standard requirements, these standard technologies help monitor and manage navigational aids. After investigated on current status of marine transportation system, verified on integrating marine transportation systems, the standard requirements have to suggest a appropriate way of integrating marine traffic systems and proper way of using old marine traffic infrastructure.

A Study on the Building of Open Operational System for the Integration Management System of the Maritime Traffic Facilities (해양교통시설 통합관리시스템을 위한 개방형 운영시스템 구축 방안에 관한 연구)

  • Jeon, Joong-Sung;Lee, Seo-Jeong
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.8
    • /
    • pp.1135-1144
    • /
    • 2010
  • The high tech marine transportation infrastructure is an innovative transportation infrastructure that may be able to secure a safe transportation environment as well as efficient operation by connecting up-to-date skills including a broad range of wire and wireless communication-based information, control and electronics technologies. When integrated into the marine transportation infrastructure by the standard requirements, these standard technologies help monitoring and managing navigational aids. This paper defined a concept of middleware in the marine traffic management systems which gives characteristics of system independency, scalability, extensibility, and researches a functionality of the middleware and a software block of the middleware.

Comparative analysis on potential error-possibility and security vulnerability in software (소프트웨어의 잠재적 오류가능성 및 보안취약점 비교분석 연구)

  • Lee, Seoung-Min;Oh, Joon-Seok;Choi, Jin-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06d
    • /
    • pp.106-109
    • /
    • 2010
  • 컴퓨터의 대중화와 네트워크의 발달로 인해 우리 사회는 컴퓨터와 통신이 없이는 생각조차 할 수 없는 시대에 살고 있으며, 또한 많은 정보시스템들을 일상생활 속에서 접하고 살고 있다. 하지만 소프트웨어들의 보안 취약점으로 인해 개인뿐만 아니라 기업은 물론이고 국가에 이르기까지 그 위험성은 모두 열거할 수 없을 정도이며 그에 따른 정보보호의 중요성이 더욱 강조가 되고 있으며, 어느 시스템도 이러한 정보보호에서 자유로울 수 없다. 이러한 보안적 및 오류의 위험은 현재 개발되고 있는 소프트웨어 뿐만 아니라, 정상적으로 운영되고 있는 시스템도 예외가 될 수 없다. 이러한 보안취약점 및 오류의 위험은 소프트웨어 개발시 방어적 프로그램(Defensive Programming)을 포함하는 시큐어 코딩(Secure Coding)기법을 적용하여 보다 안정적인 프로그램을 개발 할 수 있다. 본 논문에서는 소프트웨어의 잠재적인 오류를 발생할 수 있는 요소와 보안 취약점으로 인하여 생길 수 있는 요소들을 살펴보고 실제 java로 개발되어 운영되고 있는 시스템들의 보안 취약점을 분석하였다.

  • PDF

Graph based Binary Code Execution Path Exploration Platform for Dynamic Symbolic Execution (동적 기호 실행을 이용한 그래프 기반 바이너리 코드 실행 경로 탐색 플랫폼)

  • Kang, Byeongho;Im, Eul Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.437-444
    • /
    • 2014
  • In this paper, we introduce a Graph based Binary Code Execution Path Exploration Platform. In the graph, a node is defined as a conditional branch instruction, and an edge is defined as the other instructions. We implemented prototype of the proposed method and works well on real binary code. Experimental results show proposed method correctly explores execution path of target binary code. We expect our method can help Software Assurance, Secure Programming, and Malware Analysis more correct and efficient.