• Title/Summary/Keyword: binary translation

Search Result 48, Processing Time 0.023 seconds

Intermediate-Representation Translation Techniques to Improve Vulnerability Analysis Efficiency for Binary Files in Embedded Devices (임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술)

  • Jeoung, Byeoung Ho;Kim, Yong Hyuk;Bae, Sung il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2018
  • Utilizing sequence control and numerical computing, embedded devices are used in a variety of automated systems, including those at industrial sites, in accordance with their control program. Since embedded devices are used as a control system in corporate industrial complexes, nuclear power plants and public transport infrastructure nowadays, deliberate attacks on them can cause significant economic and social damages. Most attacks aimed at embedded devices are data-coded, code-modulated, and control-programmed. The control programs for industry-automated embedded devices are designed to represent circuit structures, unlike common programming languages, and most industrial automation control programs are designed with a graphical language, LAD, which is difficult to process static analysis. Because of these characteristics, the vulnerability analysis and security related studies for industry automation control programs have only progressed up to the formal verification, real-time monitoring levels. Furthermore, the static analysis of industrial automation control programs, which can detect vulnerabilities in advance and prepare for attacks, stays poorly researched. Therefore, this study suggests a method to present a discussion on an industry automation control program designed to represent the circuit structure to increase the efficiency of static analysis of embedded industrial automation programs. It also proposes a medium term translation technology exploiting LLVM IR to comprehensively analyze the industrial automation control programs of various manufacturers. By using LLVM IR, it is possible to perform integrated analysis on dynamic analysis. In this study, a prototype program that converts to a logical expression type of medium language was developed with regards to the S company's control program in order to verify our method.

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.

Interaction Between Acid-Labile Subunit and Insulin-like Growth Factor Binding Protein 3 Expressed in Xenopus oocytes

  • Park, Kyung-Yi;Lee, Dong-Hee
    • Proceedings of the Korean Society of Applied Pharmacology
    • /
    • 2001.11a
    • /
    • pp.99-99
    • /
    • 2001
  • The acid-labile subunit (ALS) associates with insulin-like growth factor (IGF)-I or -II and IGF binding protein-3 (IGFBP-3) to form a 150-kD complex in the circulation. This complex is thought to regulate the serum IGFs by restricting them in the vascular system and promotes their endocrine actions. Little is known about how ALS binds to IGFBP3, which connects the IGFs to ALS. Xenopus oocyte was utilized to study the function of ALS in assembling IGFs into the ternary complexes. Xenopus oocyte was shown to correctly translate in vitro transcribed mRNAs of ALS and IGFBP3. IGFBP3 and ALS mRNAs were injected in mixture and their products were immunoprecipitated by antisera against ALS and IGFBP3. Contrary to the traditional reports that ALS interacts only with IGF-bound IGFBP3, this study shows that ALS is capable of forming a binary complex with IGFBP3 in the absence of IGF. When cross-linked by disuccinimidyl substrate, band representing ALS-IGFBP3 complex was evident on the PAGE. IGFBP3 movement was monitored according to the distribution between the hemispheres. Following a localized translation in the vegetal hemisphere, IGFBP3 was shown to remain in the vegetal half in the presence of ALS. Different from wild type IGFBP3, however, mutant IGFBP3 freely diffused into the animal half despite the presence of ALS. Taken together, this study suggests that ALS may play an important role in sequestering IGFBP3 polypeptides via the intermolecular aggregation. Studies using this heterologous model will lead to a better understanding of the IGFBP3 and ALS assembling into the ternary structure and circulating IGF system.

  • PDF

Interaction Between Acid-Labile Subunit and Insulin-like Growth Factor Binding Protein 3 Expressed in Xenopus Oocytes

  • Choi, Kyung-Yi;Lee, Dong-Hee
    • BMB Reports
    • /
    • v.35 no.2
    • /
    • pp.186-193
    • /
    • 2002
  • The acid-bible subunit (ALS) associates with the insulinlike growth factor (IGF)-I or II, and the IGF binding protein-3 (IGFBP-3) in order to form a 150-kD complex in the circulation. This complex may regulate the serum IGFs by restricting them in the vascular system and promoting their endocrine actions. Little is known about how ALS binds to IGFBP3, which connects the IGFs to ALS. Xenopus oocyte was utilized to study the function of ALS in assembling IGFs into the ternary complexes. Xenopus oocyte was shown to correctly translate in vitro transcribed mRNAs of ALS and IGFBP3. IGFBP3 and ALS mRNAs were injected in a mixture, and their products were immunoprecipitated by antisera against ALS and IGFBP3. Contrary to traditional reports that ALS interacts only with IGF-bound IGFBP3, this study shows that ALS is capable of forming a binary complex with IGFBP3 in the absence of IGF When cross-linked by disuccinimidyl suberate, the band that represents the ALS-IGFBP3 complex was evident on the PAGE. IGFBP3 movement was monitored according to the distribution between the hemispheres. Following a localized translation in the vegetal hemisphere, IGFBP3 remained in the vegetal half in the presence of ALS. However, the mutant IGFBP3 freely diffused into the animal half, despite the presence of ALS, which is different from the wild type IGFBP3. This study, therefore, suggests that ALS may play an important role in sequestering IGFBP3 polypeptides via the intermolecular aggregation. Studies using this heterologous model will lead to a better understanding of the IGFBP3 and ALS that assemble into the ternary structure and circulate the IGF system.

A Watermarking Scheme of CAD Design Drawing Based on Line, Arc, and Polygon Face Components for Copyright Protection (저작권 보호를 위한 선, 호 및 다각형면 성분 기반의 CAD 설계도면의 워터마킹 기법)

  • Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.594-603
    • /
    • 2007
  • This paper proposes a watermarking scheme for 3D CAD design drawing. In the proposed scheme, we embed binary watermarks into line, arc, and polygon face components that are the basic component of 3D CAD design drawing. The embedding target component can be selected randomly among three components or by the component distribution in drawing. In line components, a watermark bit is embedded into the ratio of the length of a target line and an average length of lines that are connected into a target line. Furthermore, a watermark bit is embedded into a curvature radius on the basis of a center point in a arc component and also is embedded into a ratio of two sides in a polygonal face component. Experimental results verified that the proposed watermarking has the robustness against Format conversion, rotation translation, scaling, cropping, and layer cutting and also SNR of watermarked component is about 39.89-42.50 dB.

  • PDF

Global Utopia and Local Anxiety on the Stage of the Korean Musical

  • Choi, Sung Hee
    • Cross-Cultural Studies
    • /
    • v.36
    • /
    • pp.123-147
    • /
    • 2014
  • The purpose of this essay is three-fold: to trace the genealogy of the Korean musical, which ever since its inception in the 1960s has been seeking to modernize Korean theater with Broadway as a constant role model; to investigate how the national and the global conflict and are conflated in the form of the Korean musical in the process of its (dis)identification with Broadway; and to examine how its intercultural translations reveal and reflect the dilemma and ambivalence posed by globalization in our era. Drawing on Richard Dyer's signature article Entertainment and Utopia, I analyze how the Korean musical manifests and conduits competing utopian impulses of Korean/Global audiences. I also attempt to problematize the formulaic notion of Broadway musicalsthe Superior Other!which implies a global hegemony that does not, in fact, exist because the boundary between the global and the local as well as the power dynamics of global culture are not fixed but constantly moving and changing. Today's musical scene in Korea shows interesting reversals from the 1990s, when Korean producers were eager to debut on Broadway and impress American audiences. Korean producers no longer look up to Broadway as a final destination; instead they want to make Seoul a new Broadway. They import Broadway musicals and turn them into Korean shows. The glamor of Broadway is no longer the main attraction of musicals in Korea. What young audiences look for most is the glamor of K-pop idols and utopian feelings of abundance, energy, intensity, transparency and community, which they can experience live in the musical with their favorite stars right in front of their eyes. In conclusion, I delve into the complex dynamics of recent Korean musicals with Thomas Friedman's theory of Globalization 3.0 as reference. The binary formula of Global/America versus Local/Korea cannot be applied to the dynamic and intercultural musical scene of today. Globalization is not a uniform phenomenon but rather a twofold (multifold) process of global domination and dissemination, in which the global and the local conflict and are conflated constantly. As this study tries to illuminate, the Korean musical has evolved in a huge net of interdependences between the global and the local with a range of sources, powers and influences.

Performance Improvement of Virtualization Sensitive Instruction Emulation by Instruction Decoding at Compile Time (컴파일 시간 명령어 디코딩을 통한 가상화 민감 명령어 에뮬레이션 성능 개선)

  • Shin, Dong-Ha;Yun, Kyung-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.1-11
    • /
    • 2012
  • Recently, we have seen several implementations that virtualize the ARM architecture. Since the current ARM architecture is not possible to be virtualized using the traditional technique called "trap-and-emulation", we usually detect all virtualization sensitive instructions during the run-time of a guest kernel and emulate them virtually rather than executing them directly. The emulation for virtualization is usually implemented either by binary translation or interpretation. Our research is about how to improve the performance of emulation for virtualization based on interpretation. The interpretation usually requires a few steps: instruction fetching, instruction decoding and instruction executing. In this paper, we propose a method that decodes all virtualization sensitive instructions during the compilation time of a guest kernel and reduces the time required for interpretation during the run time of the guest kernel. Our method provides both implementation simplicity and performance improvement of emulation for virtualization based on interpretation.

Information Hiding Technique in Smart Phone for the Implementation of GIS Web-Map Service (GIS 웹 맵 서비스 구현을 위한 스마트 폰에서의 정보은닉 기법)

  • Kim, Jin-Ho;Seo, Yong-Su;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.710-721
    • /
    • 2010
  • Recently, for the advancement of embedded technology about mobile device, a new kind of service, mash-up is appeared. It is service or application combining multimedia content making tool or device and web-GIS(geographic information system) service in the mobile environment. This service can be ease to use for casual user and can apply in various ways. So, It is served in web 2.0 environment actively. But, in the mashup service, because generated multimedia contents linked with web map are new type of multimedia contents which include user's migration routes in the space such as GPS coordinates. Thus, there are no protection ways for intellectual property created by GIS web-map service users and user's privacy. In this paper, we proposed a location and user information hiding scheme for GIS web-map service. This scheme embeds location and user information into a picture that is taken by camera module on the mobile phone. It is not only protecting way for user's privacy but is also tracing way against illegal photographer who is peeping person through hidden camera. And than, we also realized proposed scheme on the mobile smart phone. For minimizing margin of error about location coordinate value against contents manipulating attacks, GPS information is embedded into chrominance signal of contents considering weight of each digit about binary type of GPS coordinate value. And for tracing illegal photographer, user information such as serial number of mobile phone, phone number and photographing date is embedded into frequency spectrum of contents luminance signal. In the experimental results, we confirmed that the error of extracted information against various image processing attacks is within reliable tolerance. And after file format translation attack, we extracted embedded information from the attacked contents without no damage. Using similarity between extracted one and original templete, we also extracted whole information from damaged chrominance signal of contents by various image processing attacks.