• Title/Summary/Keyword: Verification tools

Search Result 292, Processing Time 0.025 seconds

A Security Software Development Methodology Using Formal Verification Tools (정형 검증 도구를 이용한 보안 소프트웨어 개발 방안)

  • Jang, Seung-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.2
    • /
    • pp.141-148
    • /
    • 2006
  • This paper suggests method of safe security S/W by verifying and its result of formal verification tool. We will survey many formal verification tools and compare features of these tools. And we will suggest what tool is appropriate and methodogoly of developing safe security S/W. The Z/EVES is the most appropriate tool. This paper proposes formal verification of ACS by using RoZ tool which is formal verification tool to create UML model. The specification and verification are executed using Z/EVES tool. These procedures can find weak or wrong point of developed S/W.

Reliability Verification of Evidence Analysis Tools for Digital Forensics (디지털 포렌식을 위한 증거 분석 도구의 신뢰성 검증)

  • Lee, Tae-Rim;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.165-176
    • /
    • 2011
  • In this paper, we examine the reliability verification procedure of evidence analysis tools for computer forensics and test the famous tools for their functional requirements using the verification items proposed by standard document, TIAK.KO-12.0112. Also, we carry out performance evaluation based on test results and suggest the way of performance improvement for evidence analysis tools. To achieve this, we first investigate functions that test subjects can perform, and then we set up a specific test plan and create evidence image files which contain the contents of a verification items. We finally verify and analyze the test results. In this process, we can discover some weaknesses of most of analysis tools, such as the restoration for deleted & fragmented files, the identification of the file format which is widely used in the country and the processing of the strings composed of Korean alphabet.

Development of System Requirement Management Database System from User-centered Scenario (사용자 편의를 고려한 시스템 요구사항 관리 데이터베이스 구축)

  • Jin, Moon-Sub;Park, Chan-Young;Choi, Chunho;Chung, Kyung-Ryul
    • Transactions of the KSME C: Technology and Education
    • /
    • v.1 no.2
    • /
    • pp.199-204
    • /
    • 2013
  • In this paper, a new system requirement management tool and its application on the Urban Transit Maglev Project were introduced. In most R&D projects on complexity system such as transportation system, Systems Engineering(SE) activities are included on each project, and SE teams are using commercial computer-based tools to perform the SE activities. Even though SE tools help to manage huge data and documents on engineering efficiently, but well-designed functions of SE tools which support SE activities are not sufficiently used on the whole process of system engineering. In order to computer-based SE tools are to be effectively used on project management, most engineers who takes engineering and coordination roles, at least sub-project managers should be familiar to the tool and could be easily use it, but usability of commercial SE tools are very difficult for normal engineers with no experience on SE activities and SE tools. To overcome this difficulty, we developed a new system requirement management tool considering each user's scenario on using engineering tools. The developed tool could not cover whole SE processes, but designed to perform requirement engineering such as system requirements(SRs) management, specification management, traceability management, SRs' verification activity management and so on. All the entities on SR database are inter-connected by pre-recognized traceabilities, so even non-specialists on SE can easily browse the database and find entities concern, and linked information such as interacted entities, legal or engineering constraints, coordination documents, status of development and verification and so on. Also functions for SR verification tools, TPM(Technical Performance Measure) tools, DB searching tools with traceability, and report generation tools are included on the system.

A Study on Development and Analysis of Accident Influence Factor Verification Tools for the Elderly People in the Welfare Facilities for the Aged (노인주거 복지시설 거주 노인의 안전사고 영향변수 검증도구 개발 및 분석에 관한 연구)

  • You, Jong-Ok;Park, Jae-Seung
    • Korean Institute of Interior Design Journal
    • /
    • v.20 no.3
    • /
    • pp.242-248
    • /
    • 2011
  • According to a study on the accident patterns of older people in 2006 by Korea Consumer Agency (CISS), the number of accidents of the elderly at home reached 486, and the figure has increased every year. As Korea is about to enter into the aged society, it is important to investigate the factors that cause an accident in the welfare facilities for the aged and establish the barrier-free construction standards. The accident influence factors include facility environmental, physical functional, socio demographic and socio psychological factors. In terms of the verification tools, there are Facility Evaluation Index, FIM, MMSE-K and General Feature. In terms of analysis method, in addition, there are real number, percentage, t-test, ANOVA and logistic regression. In conclusion, this paper attempts to reveal correlations among the accident influence factors using the Facility Evaluation Standards (115 items in total) for facility environmental factor, FIM (3 items) for physical functional factor, MMSE-K (6 items) for socio psychological factor and questionnaire (5 items) for socio demographic factor.

A Study on the Verification Tool for the Security Level in Development Environment (개발 환경 보안수준 점검도구 연구)

  • Ko, Il-Seok
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.133-140
    • /
    • 2006
  • For the verification of the security level against a IT product development environment, we should analyze the vulnerability and the various threatening factors which exists in the IT product development environment. Also we need the evaluation criteria and tools for the evaluation and improvement of the level of information security. For that, we need evaluation indices and the standard it will be able to improve the evaluation methodology in the actual IT product development environment which will reach it will be able to apply must be researched. In this study, our aims are the development of verification tools for the security level of IT product development environment.

  • PDF

Design and Implementation of Simulator for Link-16 Network Operational Performance Analysis (Link-16 네트워크 운용성능분석을 위한 시뮬레이터 설계 및 구현)

  • Lee, Sangtae;Wi, Sounghyouk;Kim, Youngseung;Lee, Jungsik;Jee, Seungbae;Lee, Seungchan
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.4
    • /
    • pp.33-43
    • /
    • 2019
  • Link-16 is a data link that provides joint interoperability to the US Navy, Air Force and NATO. Currently, the military relies entirely on foreign SW and tools for test environment, tactical simulation training and interoperability verification test for Link-16 operation. Therefore, it is necessary to develop Link-16 based operation environment test tool. In this paper, Link-16 network operational performance analysis simulator was developed by analyzing the function of Link-16 foreign tools. It also implements the SIMPLE standard interface for interworking with foreign SW and tools. The functional model for Link-16 network operation performance analysis consists of pre-analysis, real-time operational analysis, and post-analysis functional model. Each functional model test was performed through SIMPLE interworking with foreign SW and tools. Link-16 network operation performance analysis If we replace foreign SW through simulator, we can perform tactical training, network design verification and operation (scenario) verification for our military.

A Knowledge - Base Verification of NPP Expert systems using Extended Petri Nets

  • Kwon, Il-Won;Seong, Poong-Hyun
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1995.10a
    • /
    • pp.173-178
    • /
    • 1995
  • The verification phase of knowledge base is an important part for developing reliable expert systems, especially in nuclear industry. Although several strategies or tools have been developed to perform potential ewer checking, they often neglect the reliability of verification methods. Because a Petri net provides a uniform mathematical formalization of knowledge base, it has been employed for knowledge base verification. In this work, we devise and suggest an automated tool, called COKEP (Checker Of Knowledge base using Extended Petri net), for detecting incorrectness, inconsistency, and incompleteness in a knowledge base. The scope of the verification problem is expanded to chained errors, unlike previous studies that assumed error incidence to be limited to rule pairs only. In addition, we consider certainty factor in checking, because most of knowledge bases have certainty factors.

  • PDF

Simulation-based Design Verification for High-performance Computing System

  • Jeong Taikyeong T.
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.12
    • /
    • pp.1605-1612
    • /
    • 2005
  • This paper presents the knowledge and experience we obtained by employing multiprocessor systems as a computer simulation design verification to study high-performance computing system. This paper also describes a case study of symmetric multiprocessors (SMP) kernel on a 32 CPUs CC-NUMA architecture using an actual architecture. A small group of CPUs of CC-NUMA, high-performance computer system, is clustered into a processing node or cluster. By simulating the system design verification tools; we discussed SMP OS kernel on a CC-NUMA multiprocessor architecture performance which is $32\%$ of the total execution time and remote memory access latency is occupied $43\%$ of the OS time. In this paper, we demonstrated our simulation results for multiprocessor, high-performance computing system performance, using simulation-based design verification.

  • PDF

The Analysis of Formal Methods for Applying to Vital S/W in Train Control Systems (열차제어시스템 바이탈 소프트웨어를 위한 정형기법 적용 방안 분석)

  • Jo, Hyun-Jeong;Hwang, Jong-Gyu;Yoon, Yong-Ki
    • Proceedings of the KSR Conference
    • /
    • 2007.05a
    • /
    • pp.1000-1007
    • /
    • 2007
  • Recently, many critical control systems are developed using formal methods. When software applied to such systems is developed, the employment of formal methods in the software requirements specification and verification will provide increased assurance for such applications. Earlier error of overlooked requirement specification can be detected using formal specification method. Also the testing and full verification to examine all reachable states using model checking to undertake formal verification are able to be completed. In the comparison of other formal specification methods, we choose the Z formal language for applying to the train control system. Using Z is able to realize higher correctness in the requirement specification, and we propose the Statemate of the best solution in formal verification tools for the system modeling and verification. The Statemate makes it possible to prove thoroughly the system execution from the simple graphical modeling of the complicated train control system. Then we can expect that the model-based formal method combining Z with Statemate will be utilized widely for the railway systems due to various strong points.

  • PDF

A Method of Knowledge Base Verification for Nuclear Power Plant Expert Systems Using Extended Petri Nets

  • Kwon, I.W.;Seong, P.H.
    • Nuclear Engineering and Technology
    • /
    • v.28 no.6
    • /
    • pp.522-531
    • /
    • 1996
  • The adoption of expert systems mainly as operator supporting systems is becoming increasingly popular as the control algorithms of system become more and more sophisticated and complicated. The verification phase of knowledge base is an important part for developing reliable expert systems, especially in nuclear industry. Although several strategies or tools have been developed to perform potential error checking, they often neglect the reliability of verification methods. Because a Petri net provides a uniform mathematical formalization of knowledge base, it has been employed for knowledge base verification. In this work, we devise and suggest an automated tool, called COKEP(Checker Of Knowledge base using Extended Petri net), for detecting incorrectness, inconsistency, and incompletensess in a knowledge base. The scope of the verification problem is expanded to chained errors, unlike previous studies that assume error incidence to be limited to rule pairs only. In addition, we consider certainty factor in checking, because most of knowledge bases have certainty factors.

  • PDF