• Title/Summary/Keyword: Source Code

Search Result 1,246, Processing Time 0.031 seconds

A Study on the Security of Web Application by Source Code Analysis (소스코드를 이용한 웹 응용 취약점 분석에 관한 연구)

  • 김성열;정수은;박중길;김상천;한광택
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.458-462
    • /
    • 2003
  • 기존의 고정적 웹 페이지에, 실시간적으로 변화하는 내용의 제공을 가능하게 하기 위해, 추가적으로 코드를 첨가할 수 있도록 만든 것이 웹 응용 프로그램이다. 그 예로는 cgi, php, jsp, java, python 등이 있다. 많은 수의 언어와 다수의 프로그램들이 빠른 속도로 개발됨에 따라 많은 수의 보안 문제점들이 발생하였고 실제로 대단히 많은 서버들이 침입의 대상이 되었다. 웹 응용 프로그램의 보안에 많은 문제점이 발생한 이유는 첫번째, 기존의 서버 응용 프로그램들에 비하여 웹 응용 프로그램은 휠씬 많은 수가 아주 빠르게 개발되었다는 점이다. 두 번째는 웹 응용 프로그램에서 발생한 새로운 종류의 보안 위험성을 들 수 있다. 기존의 서버 응용 프로그램에서 발생하는 위험성들은 서버프로그램의 버그를 이용한 것이었고, 이들은 외부 입력의 내용보다는 그 크기 등의 간단히 검사 가능한 특징에 의존하는 경우가 많았다. 하지만, 웹 응용 프로그램이 외부 입력의 내용을 코드의 일부로 사용하는 경우가 많음으로 인해서, 웹 응용 프로그램에서는 간단히 검사하기 어려운 특징인 입력의 내용에 의존하는 위험성들이 많이 발생한다. 본 논문에서는 이러한 새로운 방식의 위험성을 소스코드를 이용해서 어떻게 자동적으로 검사할 수 있을 지에 관해서 새로운 아이디어를 제시한다. 이 아이디어는 현재 구현 중에 있으며, 초기 실험 결과 기존의 검사 프로그램들이 찾아내지 못하는 취약점들을 찾아낼 수 있음이 확인되었다.

  • PDF

A Study on SW Development Process for Increasing Computational Thinking (컴퓨팅 사고력 신장을 위한 SW 개발 프로세스 탐구)

  • Yoo, In Hwan
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.2
    • /
    • pp.51-58
    • /
    • 2016
  • The importance of SW education is being stressed recent days, and the App Inventor is getting attention as a tool of SW education. In this study, I have developed an app Inventor instruction model, which is based on the Design Based Learning and integrated with elements of computational thinking. And I taught the student to apply this model. and then analyzed the app production process and the changes of student. In developing the app, students defined the problem and made a plan to resolve them. And this student had have a sense of accomplishment and self-confidence through practical experience to implement it in their own source code.

A lumped parameter method of characteristics approach and multigroup kernels applied to the subgroup self-shielding calculation in MPACT

  • Stimpson, Shane;Liu, Yuxuan;Collins, Benjamin;Clarno, Kevin
    • Nuclear Engineering and Technology
    • /
    • v.49 no.6
    • /
    • pp.1240-1249
    • /
    • 2017
  • An essential component of the neutron transport solver is the resonance self-shielding calculation used to determine equivalence cross sections. The neutron transport code, MPACT, is currently using the subgroup self-shielding method, in which the method of characteristics (MOC) is used to solve purely absorbing fixed-source problems. Recent efforts incorporating multigroup kernels to the MOC solvers in MPACT have reduced runtime by roughly $2{\times}$. Applying the same concepts for self-shielding and developing a novel lumped parameter approach to MOC, substantial improvements have also been made to the self-shielding computational efficiency without sacrificing any accuracy. These new multigroup and lumped parameter capabilities have been demonstrated on two test cases: (1) a single lattice with quarter symmetry known as VERA (Virtual Environment for Reactor Applications) Progression Problem 2a and (2) a two-dimensional quarter-core slice known as Problem 5a-2D. From these cases, self-shielding computational time was reduced by roughly $3-4{\times}$, with a corresponding 15-20% increase in overall memory burden. An azimuthal angle sensitivity study also shows that only half as many angles are needed, yielding an additional speedup of $2{\times}$. In total, the improvements yield roughly a $7-8{\times}$ speedup. Given these performance benefits, these approaches have been adopted as the default in MPACT.

Expression of Dengue virus EIII domain-coding gene in maize as an edible vaccine candidate

  • Kim, Hyun A;Kwon, Suk Yoon;Yang, Moon Sik;Choi, Pil Son
    • Journal of Plant Biotechnology
    • /
    • v.41 no.1
    • /
    • pp.50-55
    • /
    • 2014
  • Plant-based vaccines possess some advantages over other types of vaccine biotechnology such as safety, low cost of mass vaccination programs, and wider use of vaccines for medicine. This study was undertaken to develop the transgenic maize as edible vaccine candidates for humans. The immature embryos of HiII genotype were inoculated with A. tumefaciens strain C58C1 containing the binary vectors (V662 or V663). The vectors carrying nptII gene as selection marker and scEDIII (V662) or wCTB-scEDIII (V663) target gene, which code EIII proteins inhibite viral adsorption by cells. In total, 721 maize immature embryos were transformed and twenty-two putative transgenic plants were regenerated after 12 weeks selection regime. Of them, two- and six-plants were proved to be integrated with scEDIII and wCTB-scEDIII genes, respectively, by Southern blot analysis. However, only one plant (V662-29-3864) can express the gene of interest confirmed by Northern blot analysis. These results demonstrated that this plant could be used as a candidated source of the vaccine production.

Effect of Prompt Fission Neutron Spectral Formulae on Nuclear Criticality (핵분열(核分裂) 중성자(中性子)스펙트럼이 핵임계도(核臨界度)에 미치는 효과(效果))

  • Ro, Seung-Gy;Min, Duck-Kee;Youk, Geun-Uck;Oh, Hi-Peel
    • Journal of Radiation Protection and Research
    • /
    • v.7 no.1
    • /
    • pp.56-60
    • /
    • 1982
  • A calculation of the effective multiplication factor has been made for GODIVA and JEZEBEL critical assemblies by using a computer code, ANISN, with having the Watt's, Cranberg's and Maxwellian formulae for the prompt fission neutron spectrum as a fission source. Then the calculated values have been compared with experimental data obtained by others. The Maxwellian formula seems to be the best one for representing the prompt fission neutron spectrum since the effective multiplication factor based on it shows a better agreement with the experimental value compared to the rest formulae.

  • PDF

FPGA Implementation of Reed-Solomon Encoder for image transmission (영상 전송을 위한 Reed-Solomon Encoder의 FPGA 구현)

  • Kim, Dong-Nyeon;Cai, Yu Qing;Byon, Kun-sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.907-910
    • /
    • 2009
  • This paper is the FPGA Implementation of Reed-Solomon Encoder that is one of Error control Codes. Reed-Solomon codes are block-based error control codes with a wide range of applications in digital communications. RS codes are strong on burst errors because it process signals as symbol. We simulate this system using Matlab from Mathworks and design it using System Generator from Xilinx. We refer Matlab source in Implementation of Reed-Solomon Error Control Coding for Compressed Images by Simon Anthony Raspa.

  • PDF

Applicability of the Krško nuclear power plant core Monte Carlo model for the determination of the neutron source term

  • Goricanec, Tanja;Stancar, Ziga;Kotnik, Domen;Snoj, Luka;Kromar, Marjan
    • Nuclear Engineering and Technology
    • /
    • v.53 no.11
    • /
    • pp.3528-3542
    • /
    • 2021
  • A detailed geometrical model of a Krško reactor core was developed using a Monte Carlo neutron transport code MCNP. The main goal of developing an MCNP core model is for it to be used in future research focused on ex-core calculations. A script called McCord was developed to generate MCNP input for an arbitrary fuel cycle configuration from the diffusion based core design package CORD-2, taking advantage of already available material and temperature data obtained in the nuclear core design process. The core model was used to calculate 3D power density profile inside the core. The applicability of the calculated power density distributions was tested by comparison to the CORD-2 calculations, which is regularly used for the nuclear core design calculation verification of the Krško core. For the hot zero power and hot full power states differences between MCNP and CORD-2 in the radial power density profile were <3%. When studying axial power density profiles the differences in axial offset were less than 2.3% for hot full power condition. To further confirm the applicability of the developed model, the measurements with in-core neutron detectors were compared to the calculations, where differences of 5% were observed.

Responsibility for Dissemination of Inaccurate Information on the Internet

  • Romanova, Vera;Nikitin, Yurii;Vozniuk, Natalia;Sverdlyk, Zoriana;Boichuk, Nelia;Kunderevych, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.137-140
    • /
    • 2021
  • The article is devoted to the study of the issue of liability for the dissemination of inaccurate information on the Internet. The article emphasizes that now the public opinion of socially active segments of the population is mainly formed on the basis of not critical but subjective ("consumer") analysis of the received information. The modern realities show that the main source of its origin is the Internet: electronic media and, above all, the relevant social networks. The problem of dissemination by the mass media of inaccurate information obtained via the Internet is solved; it is seen in bringing the laws of Ukraine, which regulate public relations regarding the dissemination of information, into compliance with the Civil Code of Ukraine. The issues of development and implementation of new legislative acts aimed at regulating the status of subjects of informational relations on the Internet and establishing the grounds for their liability are also investigated.

Uncertainty quantification of PWR spent fuel due to nuclear data and modeling parameters

  • Ebiwonjumi, Bamidele;Kong, Chidong;Zhang, Peng;Cherezov, Alexey;Lee, Deokjung
    • Nuclear Engineering and Technology
    • /
    • v.53 no.3
    • /
    • pp.715-731
    • /
    • 2021
  • Uncertainties are calculated for pressurized water reactor (PWR) spent nuclear fuel (SNF) characteristics. The deterministic code STREAM is currently being used as an SNF analysis tool to obtain isotopic inventory, radioactivity, decay heat, neutron and gamma source strengths. The SNF analysis capability of STREAM was recently validated. However, the uncertainty analysis is yet to be conducted. To estimate the uncertainty due to nuclear data, STREAM is used to perturb nuclear cross section (XS) and resonance integral (RI) libraries produced by NJOY99. The perturbation of XS and RI involves the stochastic sampling of ENDF/B-VII.1 covariance data. To estimate the uncertainty due to modeling parameters (fuel design and irradiation history), surrogate models are built based on polynomial chaos expansion (PCE) and variance-based sensitivity indices (i.e., Sobol' indices) are employed to perform global sensitivity analysis (GSA). The calculation results indicate that uncertainty of SNF due to modeling parameters are also very important and as a result can contribute significantly to the difference of uncertainties due to nuclear data and modeling parameters. In addition, the surrogate model offers a computationally efficient approach with significantly reduced computation time, to accurately evaluate uncertainties of SNF integral characteristics.

Analysis of Blockchain Software Vulnerability against OS Command Injection Attack (블록체인 소프트웨어의 취약점을 이용한 OS 커맨드 인젝션 공격에 대한 연구)

  • Kim, Byoungkuk;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.309-320
    • /
    • 2019
  • Blockchain has been developed as a key technology for many cryptocurrency systems such as Bitcoin. These days, blockchain technology attracts many people to adopt it to various fields beyond cryptocurrency systems for their information sharing and processing. However, with the development and increasing adoption of the blockchain, security incidents frequently happen in the blockchain systems due to their implementation flaws. In order to solve this problem, in this paper, we analyze the software vulnerabilities of Bitcoin and Ethereum, which are the most widely used blockchain applications in real world. For that purpose, we conduct an in-depth analysis of source code of them to detect software vulnerabilities, and examine an OS command injection attack exploiting the detected ones.