• Title/Summary/Keyword: execution analysis

Search Result 1,232, Processing Time 0.026 seconds

Design and Implementation of Preprocessing Part for Dynamic Code Analysis (동적 코드 분석을 위한 전처리부 설계 및 구현)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.37-41
    • /
    • 2019
  • Recently, due to the appearance of various types of malware, the existing static analysis exposes many limitations. Static analysis means analyzing the structure of a code or program with source code or object code without actually executing the (malicious) code. On the other hand, dynamic analysis in the field of information security generally refers to a form that directly executes and analyzes (malware) code, and compares and examines and analyzes the state before and after execution of (malware) code to grasp the execution flow of the program. However, dynamic analysis required analyzing huge amounts of data and logs, and it was difficult to actually store all execution flows. In this paper, we propose and implement a preprocessor architecture of a system that performs malware detection and real-time multi-dynamic analysis based on 2nd generation PT in Windows environment (Windows 10 R5 and above).

Static Control Flow Analysis of Binary Codes (이진 코드의 정적 제어 흐름 분석)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.70-79
    • /
    • 2010
  • We perform static program analysis for the binary code. The reason you want to analyze at the level of binary code, installed on your local computer, run the executable file without source code. And the reason we want to perform static analysis, static program analysis is to understand what actions to perform on your local computer. In this paper, execution flow graph representing information such as the execution order among functions and the flow of control is generated. Using graph, User can find execution flow of binary file and calls of insecure functions at the same time, and the graph should facilitate the analysis of binary files. In addition, program to be run is ensured the safety by providing an automated way to search the flow of execution, and program to be downloaded and installed from outside is determined whether safe before running.

Evaluation of fault coverage of digital circutis using initializability of flipflops (플립플롭의 초기화 가능성을 고려한 디지탈 회로에 대한 고장 검출율의 평가 기법)

  • 민형복;김신택;이재훈
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.4
    • /
    • pp.11-20
    • /
    • 1998
  • Fault simulatior has been used to compute exact fault coverages of test vectors for digial circuits. But it is time consuming because execution time is proportional to square of circuit size. Recently, several algorithms for testability analysis have been published to cope with these problems. COP is very fast and accurate but cannot be used for sequential circuits, while STAFAN can be used for sequential circuits but needs vast amount of execution time due to good circuit simulation. We proposed EXTASEC which gave fast and accurate fault coverage. But it shows noticeable errors for a few sequential circuits. In this paper, it is shown that the inaccuracy is due to uninitializble flipflops, and we propose ITEM to improve the EXTASEC algorithm. ITEM is an improved evaluation method of fault coverage by analysis of backward lines and uninitializable flipflops. It is expected to perform efficiently for very large circuits where execution time is critical.

  • PDF

Implementation technique of execution time predictable real-time mechanism control language (실행시간 예측가능한 실시간 메카니즘 제어언어의 구현기법)

  • 백정현;원유헌
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.6
    • /
    • pp.1365-1376
    • /
    • 1997
  • In this paper, we designed real time mechanism control language and proposed execution time analysis technique. It was impossible to handle real-time mechanism control programs like programmable controller, numerical controller, distributed control system and robot controller with general purpose programming languages and operating systems because they have to process electric signals generated by thousands of sensors at the same at the same time and in real time. So we made it possible to predict plausibility of time constraint constructs of tiem constraint construct of a real time application program at compilation time by adding time constraint constructs and mechanism synchronization structure to conditional statement and iteration statement of a programming language and developing execution time analysis technique.

  • PDF

Analysis of Apartment Building Service System Flaw (공동주택 건축설비 시공개선 유형 분석)

  • Park, Jin-Kwan;Park, Jong-Il
    • Proceedings of the SAREK Conference
    • /
    • 2006.06a
    • /
    • pp.1250-1254
    • /
    • 2006
  • The aim of this paper is to analysis mechanical system flaw in apartment building service system. From this paper, most mechanical flaws are from design mistake, materials flaw, other engineering construction's negligence of construction execution and careless system operation management. Through this study, the author suggested the way to reduce mechanical flaw, during construction process from drawing survey before execution start to completion of construction.

  • PDF

Analysis of Building Service System Construction Flow (건축설비 공사 하자 사례 유형 분석 및 대책)

  • Park, Jin-Kwan;Park, Jong-Il
    • Proceedings of the SAREK Conference
    • /
    • 2006.06a
    • /
    • pp.548-553
    • /
    • 2006
  • The aim of this paper is to analysis mechanical system flaw in building service system construction. From this paper, most mechanical flaws are from design mistakes, material flaws, other engineering construction's negligence of construction execution and careless system operation managements. Through this study, the author suggested the way to reduce mechanical flaw, during construction process from drawing survey before execution start to completion of construction.

  • PDF

The Effect Analysis of Missile Warning Radar Using Probability Model (확률 모델을 이용한 미사일 경고 레이다의 효과도 분석)

  • Park, Gyu-Churl;Hong, Sung-Yong
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.6
    • /
    • pp.544-550
    • /
    • 2009
  • To analyze the threat decision performance of MWR(Missile Warning Radar) give analysis on condition that we decide the effective threat using the POC(Probability of Over Countermeasure)/PUC(Probability of Under Countermeasure). Thus, we execute the simulation using the Monte-Carlo method to analyze effect, but the execution time of simulation took longer than we expected. In this paper, the effect analysis is proposed using the probability model to reduce the execution time of simulation. We present the setting method of parameter for probability model and the effect analysis result of MWR using the simulation. Also, we present the comparison result of simulation execution time for Monte-Carlo and probability model.

A Termination Analyzer Including Execution Semantics of Active Rules (능동 규칙의 실행의미를 반영한 종료 분석기)

  • Sin, Ye-Ho;Hwang, Jeong-Hui;Ryu, Geun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.513-522
    • /
    • 2001
  • Active database execute an action of active rule defined in advance which is triggered automatically, whenever an event with the matching event specifications occurs, its condition is evaluated. Because these rules may in turn trigger other rules, the set of rules may be triggered each other indefinitely, Therefore, we propose a termination analysis method to guarantee termination. This proposed method considers composite event as well as rule execution time. Above all, the method not only uses deactivation graph combined to trigger graph for exact analysis, but also improves the complexity of analysis. Also the proposed method enhances accuracy of analysis result.

  • PDF

The Effect of Algorithm Execution Time Analysis using Unplugged Program on the Computational Thinking of Third Grade Students (언플러그드 방식을 활용한 알고리즘 수행시간 분석이 초등학교 3학년 학생의 컴퓨팅 사고력에 미치는 효과)

  • Kim, Jungah;Oh, Minwoo;Yang, Younghun;Kim, Taehun;Kim, Jonghoon
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.1
    • /
    • pp.19-27
    • /
    • 2019
  • This study analyzed the effect of an unplugged educational program which focuses on the algorithm execution time analysis on enhancing the computational thinking of the third grade students. An unplugged educational program was developed by following the procedures of the ADDIE model based on the result of the demand analysis conducted with 70 incumbent elementary school teachers and 120 third grade students. The developed program was applied to 24 third grade students for 36 classes in six days and a comparison was made through pre-post comparison tests with 24 students who were taught with a board game program for the same period of time. As a result, the unplugged education program which focuses on the algorithm execution time analysis is deemed to have positive effect on the computational thinking of the third grade students.

A Load Balancing and Security Scheme of Mobile Agents based on the mobile Trust Model (신뢰모델을 기반으로 한 이동 에이전트의 로드밸런싱과 에이전트 보호 기법)

  • Jung, Chang-Ryul;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2337-2344
    • /
    • 2013
  • Mobile Agent is an autonomous mobility technology is being applied in various fields. In particular, mobile agents execution in the Internet environment through the safe execution of the security must be guaranteed. Also, agent to run the agent, the agent's workload should be distributed. In this paper, a trust model based on the security mechanism of the agent execution is proposed. Proposed mechanism to ensure safe execution of the agent was not considered in existing relative researches for rational agent workload distribution and load balancing to improve throughput was. The proposed trust-based security mechanisms for agents to go through security analysis proved safe execution of the agent.