• Title/Summary/Keyword: Weaknesses

Search Result 1,154, Processing Time 0.03 seconds

Classification of Diagnostic Information and Analysis Methods for Weaknesses in C/C++ Programs

  • Han, Kyungsook;Lee, Damho;Pyo, Changwoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.81-88
    • /
    • 2017
  • In this paper, we classified the weaknesses of C/C++ programs listed in CWE based on the diagnostic information produced at each stage of program compilation. Our classification identifies which stages should be responsible for analyzing the weaknesses. We also present algorithmic frameworks for detecting typical weaknesses belonging to the classes to demonstrate validness of our scheme. For the weaknesses that cannot be analyzed by using the diagnostic information, we separated them as a group that are often detectable by the analyses that simulate program execution, for instance, symbolic execution and abstract interpretation. We expect that classification of weaknesses, and diagnostic information accordingly, would contribute to systematic development of static analyzers that minimizes false positives and negatives.

Analysis of the Characteristics, Strengths, and Weaknesses of Innovation Diffusion Type in Rural Area (혁신전파 유형별 특징 및 강약점 분석)

  • Choi, Sang-Ho;Lee, Seong-Woo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.16 no.1
    • /
    • pp.201-235
    • /
    • 2009
  • This study analyzed the demographic characteristics, strengths and weaknesses related to information acquisition of local innovation diffusion types. This study use ordered probit model to find strengths and weaknesses of innovation diffusion type in rural area. The individual characteristics of 'formal extension type', 'situational reaction diffusion type', 'agriculturist connection type', and 'systematic approach type', all differentiated according to innovation diffusion type, were analyzed. Following Choi & Choe(2008), immediacy, accessibility, referability, applicability, and satisfaction were the highest in the situational reaction diffusion type, systematic approach type, formal extension type, and farmers connection type, in the order. And there existed organic contexts among individual characteristics. So this study tried to analyze strengths and weaknesses of innovation diffusion type with a focus on immediacy, which emerged as the most important variable in the process of interpreting innovation diffusion. And the strengths and weaknesses of each innovation diffusion type were presented.

  • PDF

Research on Major Weakness Rules for Secure Software Development (소프트웨어 개발 보안성 강화를 위한 주요 보안약점 진단규칙 연구)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.831-840
    • /
    • 2013
  • Recently, to enhance the security of software, static analysis tools for removing weaknesses, the cause of vulnerability, have been used a lot in the software development stage. Therefore, the tools need to have the rules being able to diagnose various weaknesses. Top 5 weaknesses found in the software developed by major domestic information projects from 2011 to 2012 is 76% of top 10 weaknesses per year. Software security can be improved a lot if top 5 weaknesses just are removed properly in software development. In this paper, we propose the PMD's rules for diagnosing the major weaknesses and present the results of its performance test.

The Effects of the ARCS Model for Learners' Achivement and Motivation in Highschool Earth Science (동기유발을 위한 ARCS 이론을 적용한 수업이 지구과학 학업성취도와 태도에 미치는 영향)

  • Park, Soo-Kyong;Kim, Young-Han;Kim, Sang-Dal
    • Journal of The Korean Association For Science Education
    • /
    • v.16 no.4
    • /
    • pp.429-440
    • /
    • 1996
  • This study examined the effects of the ARCS model for science education and found a way of improving ARCS while finding any weaknesses. More specific research questions were as follows: 1) Does the ARCS model enhance the learners' achivement in highschool Earth Science significantly?; 2) Does the ARCS model enhance the learners' motivation in highschool Earth Science significantly?; 3) What are the weaknesses of the prescriptions of the ARCS model for designing a lesson, if any?; 4) How can the weaknesses of the prescriptions of the ARCS modeI be overcome? In order to fulfill the purpose of this study, the two major research methodologies were implemented: pretest-posttest control group design and formarive research. This study was conducted in two distinct phases: 1) designing a set of instructions for 4 weeks with the principles of the ARCS model (to find the weaknesses of the ARCS model) and 2) teaching the instructions and checking the effectiveness of the ARCS model by pretest and posttest with control and experimental groups(to find weaknesses of the underlying theory of the ARCS). After the experiment, each group took an achievement test and an attitude test on the given instruction and gathered data were analyzed with t-tests. Also, from each four classes 7$\sim$8 students were randomly sampled and individually interviewed about the instructional effectiveness and their preference on the instructions. The results of this study are summarized as follows: Significant differences between the control group and experimental group are seen in three components; Attention, relevance, and satisfaction. No significant differences are seen in the attitude of confidence. The weakness of the prescriptions of the ARCS model, are insufficient of strategy for 'confidence'. For overcoming the weaknesses of the prescriptions of the ARCS model, developmental type research is needed.

  • PDF

Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity (Khan 인증기법의 취약점 분석과 개선된 사용자 익명성 제공 인증기법)

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.87-94
    • /
    • 2013
  • In this paper, we analyse the weaknesses of authentication scheme preserving user anonymity proposed by Khan et al in 2011 and we propose a new authentication schemes preserving user anonymity that improved these weaknesses. Khan et al's authentication scheme is vulnerable to insider attack and doesn't provide user anonymity to the server. Also, this scheme is still a weakness of wrong password input by mistake in spite of proposing the password change phase. In this paper, we will show that Khan et al's scheme is vulnerable to the stolen smart card attack and the strong server/user masquerade attack. The proposed authentication scheme propose the improved user anonymity, which can provide more secure privacy to user by improving these weaknesses.

Quantitative Scoring Criteria on the Importance of Software Weaknesses (소프트웨어 보안약점의 중요도에 대한 정량 평가 기준 연구)

  • Ahn, Joonseon;Bang, Ji-Ho;Lee, Eunyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1407-1417
    • /
    • 2012
  • In order to protect a software system from security attacks, it is important to remove the software security weaknesses through the entire life cycle of software development. To remove the software weaknesses more effectively, software weaknesses are prioritized and sorted continuously. In this paper, we introduce the existing scoring systems for software weakness and software vulnerability, and propose a new quantitative standard for the scoring system, which helps evaluate the importance of software weakness objectively. We also demonstrate the practicability of the proposed standard by scoring 2011 CWE/SANS Top 25 list with the proposed standard and comparing it to the original score of MITRE.

SWOT Analysis for Iran's National Innovation System based on Norwegian and Korean Experiences

  • Haghi, Seyedreza
    • The Journal of Industrial Distribution & Business
    • /
    • v.4 no.2
    • /
    • pp.21-30
    • /
    • 2013
  • Purpose - The objectives of this study are to find the strengths, weaknesses, opportunities, and threats related to the national innovation system of Iran (using a SWOT analysis) and to extract some strategic recommendations to modify the innovation policies of Iran. Research design, data, and methodology - This study used a literature review and field study. In the first phase, the author studied library resources and articles, and browsed through Internet information about the subject. The second phase was a field research investigation through designed questionnaires and interviews with more than 100 policymakers, officials, executives, and others related to the national innovation system in 2011. Results - In this research study, strategic recommendations were extracted through a SWOT model for improvements to the innovation policies of Iran. Conclusions - The findings of this study show the role of strengths, weaknesses, opportunities, and threats in the national innovation system of Iran and suggest strategic recommendations for its modification.

The Tendency and Implementation of Six Sigma (식스 시그마 동향과 수행에 관한 연구)

  • Lee Do Kyung
    • Proceedings of the Society of Korea Industrial and System Engineering Conference
    • /
    • 2002.05a
    • /
    • pp.397-402
    • /
    • 2002
  • Six Sigma is one of the most active subjects in quality management. This study deals with some existing weaknesses that may arise in implementing Six Sigma in real world situations. The main weaknesses discussed here include the lack of understanding of cultural aspects on the nations and industries, the poor linkage between quality, finance and accounting from the bottom line point of view, and the difficult development process of metrics for all improvement results to validate the effect of Six Sigma. Finally, the key success characteristics for a good Six Sigma project are presented.

  • PDF

The Tendency and Implementation of Six Sigma (식스 시그마 동향과 수행에 관한 연구)

  • 이도경
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.25 no.1
    • /
    • pp.29-34
    • /
    • 2002
  • Six Sigma is one of the most active subjects in quality management. This studs deals with some existing weaknesses that may wise in implementing Six Sigma in real world situations. The main weaknesses discussed here include the lack of understanding of cultural aspects on the nations and industries, the poor linkage between quality, finance and accounting from the bottom line point of view, and the difficult development process of metrics for all improvement results to validate the effect of Six Sigma. Finally, the key success characteristics for a good Six Sigma project are presented.