• Title/Summary/Keyword: binary program

Search Result 221, Processing Time 0.018 seconds

Effect of Al Content on Phase Transformation of Rapidly Solidified Binary Ti-Al Alloys

  • Oh, Chang-Sup;Kim, Sang-Wook;Han, Chang-Suk
    • Korean Journal of Materials Research
    • /
    • v.27 no.1
    • /
    • pp.8-11
    • /
    • 2017
  • Binary Ti-Al alloys containing 50 to 60 atomic percent aluminum are rapidly solidified by hammer anvil method under an argon atmosphere. Constituent phases in each alloy are identified by X-ray diffractometry and microstructures of the alloys are investigated using a transmission electron microscope. In alloys with aluminum content between 50 and 54 percent, a second phase exists besides TiAl(${\gamma}$); this second phase is identified as $Ti_3Al$(${\alpha}2$). The ${\alpha}2$ phase is observed in two types of morphology. One is as fine lamellar alternating with ${\gamma}$ and the other is as a particle. It is concluded that the existence of a metastable phase with the morphologies stated above should arise from a higher quenching rate attained by the hammer anvil method as compared to the conventional roll or splat-quench method. Implications of the above observation are discussed with respect to the phase relations in the Ti-Al binary system; these implications are still controversial in many respects.

Detection of an Open-Source Software Module based on Function-level Features (함수 수준 특징정보 기반의 오픈소스 소프트웨어 모듈 탐지)

  • Kim, Dongjin;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.713-722
    • /
    • 2015
  • As open-source software (OSS) becomes more widely used, many users breach the terms in the license agreement of OSS, or reuse a vulnerable OSS module. Therefore, a technique needs to be developed for investigating if a binary program includes an OSS module. In this paper, we propose an efficient technique to detect a particular OSS module in an executable program using its function-level features. The conventional methods are inappropriate for determining whether a module is contained in a specific program because they usually measure the similarity between whole programs. Our technique determines whether an executable program contains a certain OSS module by extracting features such as its function-level instructions, control flow graph, and the structural attributes of a function from both the program and the module, and comparing the similarity of features. In order to demonstrate the efficiency of the proposed technique, we evaluate it in terms of the size of features, detection accuracy, execution overhead, and resilience to compiler optimizations.

A Program Complexity Measure using the Slice-based Information Flow Graph(SIFG) (SIFG를 이용한 프로그램 복잡도 척도)

  • Choi, Wan-Kyoo;Chung, Il-Yong;Lee, Sung-Joo
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.12
    • /
    • pp.910-920
    • /
    • 2001
  • We developed a SIFC(Slice-based Information Flow Graph) For modeling the information flow on program on the basis of the information flow of a data tokens on program slices. Then we defined a SCM(Slice-based Complexity Measure) for measuring the program complexity by measuring the complexity of information flow on SIFG, We showed that, according to Zuse's approach, it assumed ordinal scale based on atomic modifications on SIFG and that it was additive to binary operation MBSEQ and that it was not additive to binary operation MBALT but satisfied Weyuker's 9th axiom. Also based on comparison with the existing measures, we showed that SCM could measure not only the control and data flow in program but also the physical size of program.

  • PDF

LOW MASS RATIO CONTACT BINARY V410 Aur AND V776 Cas-II (질량비가 작은 접촉쌍성 V410 Aur과 V776 Cas-II)

  • Oh, Kyu-Dong;Kim, Chun-Hwey;Kim, Ho-il
    • Journal of Astronomy and Space Sciences
    • /
    • v.22 no.3
    • /
    • pp.223-232
    • /
    • 2005
  • New BVR CCD light curves of the low mass ratio contact binaries, V410 Aur and V776 Cas, were observed with the 61 cm reflector and a 2K CCD camera at the Sobaeksan Astronomical Observatory. The absolute dimensions of the low mass ratio contact binaries, V410 Aur and V776 Cas, were obtained using WD program from the published spectroscopic and newly observed photometric data. The evolutionary status of this type of binary system including V410 Aur and V776 Cas has been considered. We reconfirmed that the primary stars of the low mass contact binary system were located on the TAMS and secondary stars were located under the ZAMS in H-R diagram.

LOW MASS RATIO CONTACT BINARY SYSTEMS HN UMa AND II UMa - III (질량비가 작은 접촉쌍성 HN UMa와 II UMa - III)

  • Lee Woo-Baik;Kim Ho-Il;Kang Young-Woon;Oh Kyu-Dong
    • Journal of Astronomy and Space Sciences
    • /
    • v.23 no.3
    • /
    • pp.189-198
    • /
    • 2006
  • We present newly observed BVRI CCD light curves for low mass ratio contact binaries, HN UMa and II UMa. The absolute dimensions of these objects were obtained by applying the Wilson-Devinney program to previously published spectroscopic analysis and to our observed photometric data. The evolutionary status of all 21 low mass ratio contact binary system including HN UMa and II UMa was then considered. The secondaries of all low mass ratio contact binaries are located below the zero age main sequence in HR diagram. This phenomenon could be explained by mass loss from the secondary component in the low mass contact binary system because even small mass loss affects luminosity decrease in the low mass stars.

Program Translation from Conventional Programming Source to Java Bytecode (기존 프로그래밍 원시코드에서 자바 바이트 코드로의 변환)

  • Jeon-Geun Kang;Haeng-Kon Kim
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.8
    • /
    • pp.963-980
    • /
    • 2002
  • Software reengineering is making various research for solutions against problem of maintain existing systems. Reengineering has a meaning of development of software on exizting systems through the reverse engineering auf forward engineering. Most of the important concepts used in reengineering is composition that is restructuring of the existing objects. Is there a compiler that can compile a program written in a traditional procedural language (like C or Pascal) and generate a Java bytecode, rather than an executable code that runs oかy on the machine it was compiled (such as an a.out file on a Unix machine)\ulcorner This type of compiler may be very handy for today's computing environment of heterogeneous networks. In this paper we present a software system that does this job at the binary-to-binary level. It takes the compiled binary code of a procedural language and translates it into Java bytecode. To do this, we first translate into an assembler code called Jasmin [7] that is a human-readable representation of Java bytecode. Then the Jasmin assembler converts it into real Java bytecode. The system is not a compiler because it does not start at the source level. We believe this kind of translator is even more useful than a compiler because most of the executable code that is available for sharing does not come with source programs. Of course, it works only if the format of the executable binary code is known. This translation process consists of three major stages: (1) analysis stage that identifies the language constructs in the given binary code, (2) initialization stage where variables and objects are located, classified, and initialized, and (3) mapping stage that maps the given binary code into a Jasmin assembler code that is then converted to Java bytecode.

  • PDF

A Dynamic Approach to Extract the Original Semantics and Structure of VM-based Obfuscated Binary Executables (가상 머신 기반으로 난독화된 실행파일의 구조 및 원본의미 추출 동적 방법)

  • Lee, Sungho;Han, Taisook
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.859-869
    • /
    • 2014
  • In recent years, the obfuscation techniques are commonly exploited to protect malwares, so obfuscated malwares have become a big threat. Especially, it is extremely hard to analyze virtualization-obfuscated malwares based on unusual virtual machines, because the original program is hidden by the virtual machine as well as its semantics is mixed with the semantics of the virtual machine. To confront this threat, we suggest a framework to analyze virtualization-obfuscated programs based on the dynamic analysis. First, we extract the dynamic execution trace of the virtualization-obfuscated executables. Second, we analyze the traces by translating machine instruction sequences into the intermediate representation and extract the virtual machine architecture by constructing dynamic context flow graphs. Finally, we extract abstract semantics of the original program using the extracted virtual machine architecture. In this paper, we propose a method to extract the information of the original program from a virtualization-obfuscated program by some commercial obfuscation tools. We expect that our tool can be used to understand virtualization-obfuscated programs and integrate other program analysis techniques so that it can be applied to analysis of the semantics of original programs using the abstract semantics.

Capacity Assignment and Routing for Interactive Multimedia Service Networks

  • Lim, Byung-Ha;Park, June-Sung
    • Journal of Communications and Networks
    • /
    • v.12 no.3
    • /
    • pp.246-252
    • /
    • 2010
  • A binary linear integer program is formulated for the problem of expanding the capacity of a fiber optic network and routing the traffic to deliver new interactive multimedia services. A two-phase Lagrangian dual search procedure and a Lagrangian heuristic are developed. Computational results show superior performance of the two-phase subgradient optimization compared with the conventional one-phase approach.

Design and Implementation of Efficient Mitigation against Return-oriented Programming (반환 지향 프로그래밍 공격에 대한 효율적인 방어 기법 설계 및 구현)

  • Kim, Jeehong;Kim, Inhyeok;Min, Changwoo;Eom, Young Ik
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1018-1025
    • /
    • 2014
  • An ROP attack creates gadget sequences which consist of existing code snippets in a program, and hijacks the control flow of a program by chaining and executing gadget sequences consecutively. Existing defense schemes have limitations in that they cause high execution overhead, an increase in the binary size overhead, and a low applicability. In this paper, we solve these problems by introducing zero-sum defender, which is a fast and space-efficient mitigation scheme against ROP attacks. We find a fundamental property of gadget execution in which control flow starts in the middle of a function without a call instruction and ends with a return instruction. So, we exploit this property by monitoring whether the execution is abused by ROP attacks. We achieve a very low runtime overhead with a very small increase in the binary size. In our experimental results, we verified that our defense scheme prevents real world ROP attacks, and we showed that there is only a 2% performance overhead and a 1% binary size increase overhead in several benchmarks.

Fuzzing Method for Web-Assembly Module Safety Validation (웹 어셈블리 모듈 안전성 검증을 위한 퍼징 방법)

  • Park, Sunghyun;Kang, Sangyong;Kim, Yeonsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.275-285
    • /
    • 2019
  • Web-assemblies are a new binary standard designed to improve the performance of Web browser JavaScript. Web-assemblies are becoming a new web standard that can run at near native speed with efficient execution, concise representation, and code written in multiple languages. However, current Web-assembly vulnerability verification is limited to the Web assembly interpreter language, and vulnerability verification of Web-assembly binary itself is insufficient. Therefore, it is necessary to verify the safety of the web assembly itself. In this paper, we analyze how to operate the web assembly and verify the safety of the current web-assembly. In addition, we examine vulnerability of existing web -assembly and analyze limitations according to existing safety verification method. Finally, we introduce web-assembly API based fuzzing method to overcome limitation of web-assembly safety verification method. This verifies the effectiveness of the proposed Fuzzing by detecting crashes that could not be detected by existing safety verification tools.