• Title/Summary/Keyword: Source Code

Search Result 1,246, Processing Time 0.027 seconds

A study on security threats to drones using open source and military drone attack scenarios using telemetry hijacking (오픈소스 활용 드론에 대한 보안 위협과 Telemetry Hijacking을 이용한 군용 드론 공격 시나리오 연구)

  • Lee, Woojin;Seo, Kyungdeok;Chae, Byeongmin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.103-112
    • /
    • 2020
  • Recently, the interest in hobby/leisure drones is increasing in the private sector, and the military also uses drones in various countries such as North Korea, the United States, and Iran for military purposes such as reconnaissance and destruction. A variety of drone related research is underway, such as establishing and operating drone units within the Korean military. Inparticular, recently, as the size of drone flight control source code increases and the number of functions increases, drone developers are getting accustomed to using open sources and using them without checking for separate security vulnerabilities. However, since these open sources are actually accessible to attackers, they are inevitably exposed to various vulnerabilities. In this paper, we propose an attack scenario for military drones using open sources in connection with these vulnerabilities using Telemetry Hijacking techniques.

Segmentation of underwater images using morphology for deep learning (딥러닝을 위한 모폴로지를 이용한 수중 영상의 세그먼테이션)

  • Ji-Eun Lee;Chul-Won Lee;Seok-Joon Park;Jea-Beom Shin;Hyun-Gi Jung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.42 no.4
    • /
    • pp.370-376
    • /
    • 2023
  • In the underwater image, it is not clear to distinguish the shape of the target due to underwater noise and low resolution. In addition, as an input of deep learning, underwater images require pre-processing and segmentation must be preceded. Even after pre-processing, the target is not clear, and the performance of detection and identification by deep learning may not be high. Therefore, it is necessary to distinguish and clarify the target. In this study, the importance of target shadows is confirmed in underwater images, object detection and target area acquisition by shadows, and data containing only the shape of targets and shadows without underwater background are generated. We present the process of converting the shadow image into a 3-mode image in which the target is white, the shadow is black, and the background is gray. Through this, it is possible to provide an image that is clearly pre-processed and easily discriminated as an input of deep learning. In addition, if the image processing code using Open Source Computer Vision (OpenCV)Library was used for processing, the processing speed was also suitable for real-time processing.

A Study on Similarity Analysis of SNMP MIB File (SNMP MIB 파일의 유사도 분석에 관한 연구)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.37-42
    • /
    • 2019
  • Many similarity analysis methods, one of the dispute resolution methods for computer programs, have been studied. This paper is about quantitative similarity analysis of MIB (Management Information Base) file. Quantitative similarity means that the source codes of two computers are analyzed and the results are compared with a certain standard. The source code to analyze is a program that provides network device management functions such as configuration management, fault management, and performance management using SNMP protocol for WiMAX CPE devices. Here, WiMAX refers to the IEEE 802.16 wireless network standard protocol and can be classified into fixed WiMAX and mobile WiMAX. WiMAX CPE is a wireless Internet terminal that is fixedly used in a customer's home or office. In this paper, we analyze the similarity between MIB file of company A and company B. We will analyze whether the MIB file leaked from the damaged company is not just a list to describe the product specifications, but whether the property value can be recognized.

Model-based Integrated Development Tool for the Development of Applications in Ubiquitous Sensor Network (유비쿼터스 센서 네트워크에서 응용 프로그램 개발을 위한 모델 기반 통합 개발 도구)

  • Chong, Ki-Won;Kim, Ju-Il;Lee, Woo-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.442-453
    • /
    • 2007
  • A model-based integrated development tool for the development of USN application programs is proposed in this paper. The proposed tool has been implemented as a plug-in for Eclipse platform. The tool consists of Graphical User Interface, Modeler, Configuration Information Generator, Validity Checker, Source Code Generator and Templates Storage. Developers can implement USN applications from models of sensor networks using the tool. The developer can implement USN applications by automatic generation of execution code of each node in the sensor network after he/she designs a model of the sensor network. The configuration information of each node is automatically generated from the validated USN model. Then, the execution code is automatically generated using the configuration information and the predefined templates. Through the tool of this paper, developers can easily implement valid USN applications even if they do not know the details of low-level information. Also, a large number of application programs can be generated at once because application programs are generated from sensor network model instead of models of applications. Accordingly, the development effort of USN applications will be decreased and developers can consistently construct USN applications from USN models using the proposed tool.

A Study on the Assessment of Source-term for PWR Primary System Using MonteCarlo Code (MonteCarlo 코드를 이용한 PWR 일차 계통 선원항 평가에 관한 연구)

  • Song, Jong Soon;Lee, Sang Heon;Shin, Seung Su
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.16 no.3
    • /
    • pp.331-337
    • /
    • 2018
  • The decommissioning of nuclear power plants is generally executed in five steps, including preparation, decontamination, cutting/demolition, waste disposal and environmental restoration. So, for efficient decommissioning of nuclear power plants, worker safety, effects compared to cost, minimization of waste, possibility of reuse, etc., shall be considered. Worker safety and measurement technology shall be secured to exert optimal efficiency of nuclear power plant decommissioning work, for which accurate measurement technology for systems and devices is necessary. Typical In-Situ methods for decommissioning of nuclear plants are CZT, Gamma Camera and ISOCS. This study used ISOCS, which can be applied during the decommissioning of a nuclear power plant site without collecting representative samples, to take measurements of the S/G Water Chamber. To validate the measurement values, Microshield and the GEANT4 code was used as the actual method were used for modeling, respectively. The comparison showed a difference of $1.0{\times}10^1Bq$, which indicates that it will be possible to reduce errors due to the influence of radiation in the natural environment and the precision of modeling. Based on the research results of this paper, accuracy and reliability of measurement values will be analyzed and the applicability of the direct measurement method during the decommissioning of NPPs will be assessed.

A Study on the Usefulness of Backend Development Tools for Web-based ERP Customization (Web기반 ERP 커스터마이징을 위한 백엔드 개발도구의 유용성 연구)

  • Jung, Hoon;Lee, KangSu
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.53-61
    • /
    • 2019
  • The risk of project failure has increased recently as ERP systems have been transformed into Web environments and task complexity has increased. Although low-code platform development tools are being used as a way to solve this problem, limitations exist as they are centered on UI. To overcome this, back-end development tools are required that can be developed quickly and easily, not only from the front development but also from a variety of development sources produced from the ERP development process, including back-end business services. In addition, the development tools included within existing ERP products require a lot of learning time from the perspective of beginner and intermediate developers due to high entry barriers. To address these shortcomings, this paper seeks to study ways to overcome the limitations of existing development tools within the ERP by providing customized development tool functions by enhancing the usability of ERP development tools suitable for each developer's skills and roles based on the requirements required by ERP development tools, such as reducing the time required for querying, automatic binding of data for testing for service-based units, and checking of source code quality.

The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification (공격자 그룹 특징 추출 프레임워크 : 악성코드 저자 그룹 식별을 위한 유전 알고리즘 기반 저자 클러스터링)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • Recently, the number of APT(Advanced Persistent Threats) attack using malware has been increasing, and research is underway to prevent and detect them. While it is important to detect and block attacks before they occur, it is also important to make an effective response through an accurate analysis for attack case and attack type, these respond which can be determined by analyzing the attack group of such attacks. Therefore, this paper propose a framework based on genetic algorithm for analyzing malware and understanding attacker group's features. The framework uses decompiler and disassembler to extract related code in collected malware, and analyzes information related to author through code analysis. Malware has unique characteristics that only it has, which can be said to be features that can identify the author or attacker groups of that malware. So, we select specific features only having attack group among the various features extracted from binary and source code through the authorship clustering method, and apply genetic algorithm to accurate clustering to infer specific features. Also, we find features which based on characteristics each group of malware authors has that can express each group, and create profiles to verify that the group of authors is correctly clustered. In this paper, we do experiment about author classification using genetic algorithm and finding specific features to express author characteristic. In experiment result, we identified an author classification accuracy of 86% and selected features to be used for authorship analysis among the information extracted through genetic algorithm.

Development of Neutron Skyshine Evaluation Method for High Energy Electron Accelerator Using Monte Carlo Code (몬테카를로 코드를 이용한 고에너지 전자가속기의 중성자 skyshine 평가방법 개발)

  • Oh, Joo-Hee;Jung, Nam-Suk;Lee, Hee-Seock;Ko, Seung-Kook
    • Journal of Radiation Protection and Research
    • /
    • v.38 no.1
    • /
    • pp.22-28
    • /
    • 2013
  • The skyshine effect is an essential and important phenomenon in the shielding design of the high energy accelerator. In this study, a new estimation method of neutron skyshine was proposed and was verified by comparison with existing methods. The effective dose of secondary neutrons and photons at the locations that was far away from high-energy electron accelerator was calculated using FLUKA and PHITS Monte Carlo code. The transport paths of secondary radiations to reach a long distance were classified as skyshine, direct, groundshine and multiple-shine. The contribution of each classified component to the total effective dose was evaluated. The neutrons produced from the thick copper target irradiated by 10 GeV electron beam was applied as a source term of this transport. In order to evaluate a groundshine effect, the composition of soil on the PAL-XFEL site was considered. At a relatively short distance less than 50 m from the accelerator tunnel, the direct and groundshine components mostly contributed to the total effective dose. The skyshine component was important at a long distance. The evaluated dose of neutron skyshine agreed better with the results using Rindi's formula, which was based on the experimental results at high energy electron accelerator. That also agreed with the estimated dose using the simple evaluation code, SHINE3, within about 20%. The total effective dose, including all components, was 10 times larger than the estimated doses using other methods for this comparison. The influence of multiple-shine path in this evaluation of the estimation method was investigated to be bigger than one of pure skyshine path.

A XML Based Framework for Automatically Generating Control and Monitoring Software (제어 및 모니터링 소프트웨어 자동 생성을 위한 XML 기반 프레임웍)

  • Yoo Dae-Seung;Kim Jong-Hwan;Yi Myeong-Jae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.1
    • /
    • pp.43-55
    • /
    • 2006
  • In this paper, we present a framework which is used to develop, modify, maintain and extend a control and monitoring software easily for any kind of automatic instruments. The proposed framework is composed of three XML documents (IID, MAP, CMIML) and two tools (Virtual Instrument Wizard, Generator). Interface information of behaviors and states of instrument is written on IID. Mapping information between the interface information in IID and API of a real instrument driver is written on MAP Final information of the control and monitoring software is written on CMIML, IID, MAP and CMIML are written by XML format to provide a common usage and platform independence of the proposed framework. Vl Wizard generates CMIML intermediate platform independent document using IID and existing CMIML, and Generator generates the source code of a control and monitoring software platform dependent code automatically using CMIML and MAP. The suggested framework provides an easy development and maintenance because it automatically generates a control and monitoring software in GUI environment and it also provides common usage and platform independence in virtue of using description document of XML format. Also, reusability can be increased by reusing platform independent software description document and not reusing platform dependent software code.

Numerical Study on Towing Stability of LNG Bunkering Barge in Calm Water (LNG 벙커링 바지의 정수 중 예인안정성에 관한 수치연구)

  • Oh, Seunghoon;Jung, Dongho;Jung, Jae-Hwan;Hwang, Sung-Chul;Cho, Seok-kyu;Sung, Hong Gun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.185-188
    • /
    • 2019
  • In this paper, the towing stability of the LNG bunker barge is estimated. Currently, LNG bunkering barge is being developed as an infrastructure for the bunkering of LNG (Liquefied Natural Gas), an eco-friendly energy source. Since the LNG bunker barge are in the form of towed ship connected to the tow line, the towing stability of the LNG bunker barge is very important for the safety of not only the LNG bunker barge but also the surrounding sailing vessels. The numerical code for towing simulation was developed to estimate the towing stability of the LNG bunker barge at the initial design stage. The MMG(Manoeuvring Mathematical Group) model was applied to the equations of motion and the empirical formula was applied to the maneuvering coefficients so that they could be used in the initial design stage. To validity of the developed numerical code, it was compared with published calculation and model test results. Towing simulations were carried out according to with and without stern skeg of the LNG bunker barge using the developed numerical code. Through the results of the simulations, the appropriateness of the stern skeg area designed was confirmed.

  • PDF