• Title/Summary/Keyword: binary number

Search Result 775, Processing Time 0.026 seconds

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

An Analysis of the Transformation of Over-depopulated Rural Villages (농촌 과소화마을의 변화 분석)

  • Park, Jen-Woo;Lee, Taeho;An, Donghwan
    • Journal of Korean Society of Rural Planning
    • /
    • v.24 no.2
    • /
    • pp.79-89
    • /
    • 2018
  • The main purpose of this study is to explore the factors that affect the transformation of over-depopulated rural villages. Specifically, we investigated the reasons of the rapid decrease in the number of over-populated rural villages shown by recent census data in spite of the continuing decrease of population in rural area. We used a binary-logit model and the Census of Agriculture, Forestry and Fisheries data(2010, 2015). The main results are summarized as followed: First, the over-depopulated rural villages with strong agronomic base are more likely to exit from over-depopulation. Second, returners from urban to rural have a positive impacts on the revival of over-depopulated rural areas. Thirds, improving the basic services accessibility of rural residents is also critical for keeping rural community more sustainable. These findings can be used to make effective strategies to revive the depopulated rural villages.

Comparison of Bias Correction Methods for the Rare Event Logistic Regression (희귀 사건 로지스틱 회귀분석을 위한 편의 수정 방법 비교 연구)

  • Kim, Hyungwoo;Ko, Taeseok;Park, No-Wook;Lee, Woojoo
    • The Korean Journal of Applied Statistics
    • /
    • v.27 no.2
    • /
    • pp.277-290
    • /
    • 2014
  • We analyzed binary landslide data from the Boeun area with logistic regression. Since the number of landslide occurrences is only 9 out of 5000 observations, this can be regarded as a rare event data. The main issue of logistic regression with the rare event data is a serious bias problem in regression coefficient estimates. Two bias correction methods were proposed before and we quantitatively compared them via simulation. Firth (1993)'s approach outperformed and provided the most stable results for analyzing the rare-event binary data.

Error Detection of Phase Offsets for Binary Sequences (이원부호의 위상오프셋 오류 검출)

  • Song, Young-Joon;Han, Young-Yearl
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.9
    • /
    • pp.27-35
    • /
    • 1999
  • In this paper, we propose an error detection scheme of phase offsets for binary sequences including PN (Pseudo Noise) sequences based on the number theoretical approach. It is important to know phase offsets of spreading sequences in the CDMA (Code Division Multiple Access) mobile communication systems because phase offsets of the same spreading sequence are used to achieve the acquisition and are used to distinguish each base station. When the period of the sequence is not very long, the relative phase offset between the sequence and its shifted replica can be found by comparing them, but as the period of the sequence increases it becomes difficult to find the phase offset. The error detection failure probability of the proposed method is derived, and it is confirmed by the simulation results. We also discuss the circuit realization of the proposed method and show it can be easily implemented.

  • PDF

Korean Character processing: Part II. Terminal Design and History (한글문자의 컴퓨터 처리: II. 터미날 설계와 역사)

  • 정원량
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.16 no.4
    • /
    • pp.1-12
    • /
    • 1979
  • This article is a sequel to " Korean Character Processing: Part I. Theoretical Foundation " and deals with the practical and historical aspects of the same subject. We discuss , in the first half, the functional design of Korean I/O terminals, Korean character generators based on the conversion algorithm and dot matrix fonts, input keyboard configuration ( trade -offs between a key set and the number of key -strokes ), and the conditions to be considered for binary code design. The second half of the article is devoted to the history of Korean Character processing which is seen from the personal viewpoints. The recorded works are classified into 4 groups according to their maj or contents. Then we bring up each problematic issue to give a critical review of articles . Issues related to output (conversion process) and input ( character recognition) are separated. The bibliography is given in a chronological order.cal order.

  • PDF

Analysis of Intersymbol Interference due to Overlap m Overlap-Based DM-BPSK CSS Systems (오버랩 기반 DM-BPSK CSS 시스템에서 오버랩 횟수에 따른 심볼 간 간섭 분석)

  • Kim, Jun-Hwan;Lee, Young-Po;Song, Iick-Ho;Yoon, Seok-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2C
    • /
    • pp.99-104
    • /
    • 2011
  • The chirp spread spectrum (CSS) technique spreads the data signal over a frequency bandwidth wider than minimum required bandwidth. By using time overlapping, the bit rate in CSS can be increased. However, for reliable transmission of data signal, the intersymbol interference (ISI) due to overlap should be analyzed. In this paper, the relation between the degree of overlap and ISI is analyzed in direct modulation binary phase shift keying CSS systems. In some cases, the overlap does not incur ISI at all and the ISI fluctuates or monotonically increases as the number of overlaps changes. It is also shown that the simulation results closely agree with the analytic results.

Constructing the Switching Function using Decision Diagram (결정다이아그램을 사용한 스위칭함수 구성)

  • Park, Chun-Myoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.687-688
    • /
    • 2011
  • This paper presents a design method for combinational digital logic systems using time domain based multiplexing(TDBM) and common multi-terminal extension decision diagrams(CMTEDD). The proposed method can reduce the 1)hardware, 2)logic levels and 3)pins. In the logic system design, we use two types of decision diagrams(DDs), that is the common binary decision diagrams(CBDDs) and CMTEDDs. Also, we propose an algorithms to derive common multiple-terminal binary decision diagrams(CMTBDD) from CBDDs, and CMTEDDs from CMTBDDs. The CMTEDDs over CBDDs is more compactness in terms of number of non-terminal nodes, where the nodes for output selection variables are not included in the non-terminal nodes. In the logic design, each non-terminal nodes of an CBDDs and an CMTEDDs is realized by a multiplexer(MUX). In addition, we compare the proposed TDBM realization with the conventional one.

  • PDF

Efficient Buffer-Overflow Prevention Technique Using Binary Rewriting (이진 코드 변환을 이용한 효과적인 버퍼 오버플로우 방지기법)

  • Kim Yun-Sam;Cho Eun-Sun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.323-330
    • /
    • 2005
  • Buffer overflow is one of the most prevalent and critical internet security vulnerabilities. Recently, various methods to prevent buffer overflow attacks have been investigated, but they are still difficult to apply to real applications due to their run-time overhead. This paper suggests an efficient rewrite method to prevent buffer-overflow attacks only with lower costs by generating a redundant copy of the return address in stack frame and comparing return address to copied return address. Not to be overwritten by the attack data the new copy will have the lower address number than local buffers have. In addition, for a safer execution environment, every vulnerable function call is transformed during the rewriting procedure.

Separation of Text and Non-text in Document Layout Analysis using a Recursive Filter

  • Tran, Tuan-Anh;Na, In-Seop;Kim, Soo-Hyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4072-4091
    • /
    • 2015
  • A separation of text and non-text elements plays an important role in document layout analysis. A number of approaches have been proposed but the quality of separation result is still limited due to the complex of the document layout. In this paper, we present an efficient method for the classification of text and non-text components in document image. It is the combination of whitespace analysis with multi-layer homogeneous regions which called recursive filter. Firstly, the input binary document is analyzed by connected components analysis and whitespace extraction. Secondly, a heuristic filter is applied to identify non-text components. After that, using statistical method, we implement the recursive filter on multi-layer homogeneous regions to identify all text and non-text elements of the binary image. Finally, all regions will be reshaped and remove noise to get the text document and non-text document. Experimental results on the ICDAR2009 page segmentation competition dataset and other datasets prove the effectiveness and superiority of proposed method.

Evaluation of the relationship between sleep bruxism and pulpal calcifications in young women: A clinico-radiological study

  • Tassoker, Melek
    • Imaging Science in Dentistry
    • /
    • v.48 no.4
    • /
    • pp.277-281
    • /
    • 2018
  • Purpose: This study was performed to investigate the relationship between sleep bruxism(SB) and pulpal calcifications in young women. Materials and Methods: A total of 100 female participants between 20 and 31 years of age who were referred to our radiology clinic for a dental check-up, including 59 SB and 41 non-SB patients, were sampled for the analysis. SB was diagnosed based on the American Academy of Sleep Medicine criteria. All teeth were evaluated on digital panoramic radiographs to detect pulpal calcifications, except third molars, teeth with root canal treatment, and teeth with root resorption. Binary logistic regression analysis was used to determine the risk factors for pulpal calcifications. The Spearman correlation coefficient was applied and the Pearson chi-square test was used for categorical variables. To test intra-examiner reproducibility, Cohen kappa analysis was applied. P values <.05 were considered to indicate statistical significance. Results: A total of 2800 teeth were evaluated (1652 teeth from SB patients and 1148 from non-SB patients), and 61% of patients had at least 1 dental pulpal calcification. No statistically significant relationship was found between SB and pulpal calcifications (P>0.05). In SB patients, the total number of pulpal calcifications was 129, while in non-SB patients, it was 84. Binary logistic analysis showed that SB was not a risk factor for the presence of pulpal calcifications(odds ratio, 1.19; 95% CI, 0.52-2.69, P>.05). Conclusion: No relationship was found between SB and pulpal calcifications.