• Title/Summary/Keyword: execution analysis

Search Result 1,239, Processing Time 0.045 seconds

Methods for improving Database Performance through SQL Analysis in the Course Registration System (수강신청 시스템에서의 SQL 분석을 통한 데이터베이스 성능 향상 방안)

  • Kim, Hee Wan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.693-701
    • /
    • 2020
  • In this paper, SQL statements are analyzed to improve database performance in the current course registration system. The performance of the current database was measured through the execution plan of the SQL statements used in the transactions related to the course registration. Through the SQL analysis, the complemented SQL statements confirmed the improved performance. Overall, the performance of the course registration database system was improved through the analysis of the execution plan, and some improvement methods of the course registration SQL were shown as test results. The improved method is to reorganize the tables and index tables related to the course registration through database tuning, and utilize the SQL function to implement an optimized system that has evolved into a course database system with improved performance. The enrollment system re-adjusted by the proposed method showed excellent results in terms of performance compared to the previous enrollment system, and the integrated performance test result reduced the response time by 1.8 to 18 times.

Efficient Null Pointer Dereference Vulnerability Detection by Data Dependency Analysis on Binary (효율적 데이터 의존성 분석을 이용한 바이너리 기반 Null Pointer Dereference 취약점 탐지 도구)

  • Wenhui Jin;Heekuck Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.253-266
    • /
    • 2023
  • The Null Pointer Dereference vulnerability is a significant vulnerability that can cause severe attacks such as denial-of-service. Previous research has proposed methods for detecting vulnerabilities, but large and complex programs pose a challenge to their efficiency. In this paper, we present a lightweight tool for detecting specific functions in large binaryprograms through symbolizing variables and emulating program execution. The tool detects vulnerabilities through data dependency analysis and heuristics in each execution path. While our tool had an 8% higher false positive rate than the bap_toolkit, it detected all existing vulnerabilities in our dataset.

Design of Retrieval API to Analyze Web based Simulation Execution Data (웹기반 시뮬레이션 수행 데이터 검색 API 설계)

  • Jung, Young Jin;Seo, Jerry Hyeon;Yu, Jung-Lok;Jin, Du-Seok;Lee, Jun-Hyung;Lee, JongSuk Ruth;Cho, Kumwon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.708-710
    • /
    • 2013
  • Web based simulation service is utilized to computationally analyze various phenomena in real world according to the progress of network and computing technology. To provide suitable simulation service, web based simulation service will be improved by analyzing execution data. Especially, an API for data retrieval is designed, because every analyst needs different data. In this paper, we design the retrieval API for a user to analyze the web based simulation execution data, which is used on CFD (Cumputational Fluid Dynamics) and Chemistry. The designed retrieval API provides an simulation execution data depending on an user requirement such as a user type, an execution period, and an affiliation, which is based on the core information such as an user, a simulation program, and a cyberlab. Besides, a developer can provides a suitable information for a user to execute a simulation well such as a simulation statistics, an execution trend, and a frequent error.

  • PDF

An Analysis of Action Learning Process in Education Programs for Senior Officials, Engineers, Chief Executive Officers (고위공직 후보자-엔지니어-최고경영자 교육 프로그램의 액션러닝 프로세스 분석)

  • Jung, Hyun-Kon;Moon, Sung-Han
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.87-104
    • /
    • 2012
  • The purpose of this study was to analyze and present of action learning process in education programs for senior officials, engineers, chief executive officers. The main contents of this study is focused on analysis of orientation activities for each step of action learning process, project selection, analysis of problem clarification, review of data research and analysis, analysis of process for seeking of alternative and selecting execution item, comparison and analysis for the results of execution.

Bounding Worst-Case Data Cache Performance by Using Stack Distance

  • Liu, Yu;Zhang, Wei
    • Journal of Computing Science and Engineering
    • /
    • v.3 no.4
    • /
    • pp.195-215
    • /
    • 2009
  • Worst-case execution time (WCET) analysis is critical for hard real-time systems to ensure that different tasks can meet their respective deadlines. While significant progress has been made for WCET analysis of instruction caches, the data cache timing analysis, especially for set-associative data caches, is rather limited. This paper proposes an approach to safely and tightly bounding data cache performance by computing the worst-case stack distance of data cache accesses. Our approach can not only be applied to direct-mapped caches, but also be used for set-associative or even fully-associative caches without increasing the complexity of analysis. Moreover, the proposed approach can statically categorize worst-case data cache misses into cold, conflict, and capacity misses, which can provide useful insights for designers to enhance the worst-case data cache performance. Our evaluation shows that the proposed data cache timing analysis technique can safely and accurately estimate the worst-case data cache performance, and the overestimation as compared to the observed worst-case data cache misses is within 1% on average.

Railway Software Analysis Tool using Symbolic Execution Method (심볼릭 수행 방법을 이용한 철도 소프트웨어 코드분석 도구제안)

  • Jo, Hyun-Jeong;Hwang, Jong-Gyu;Shin, Duck-Ho
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.4
    • /
    • pp.242-249
    • /
    • 2016
  • The railway system is being converted to the computer system from the existing mechanical device, and the dependency on software is being increased rapidly. Though the size and degree of complexity of software for railway system are slower than the development speed of hardware, it is expected that the size will be grown bigger gradually and the degree of complexity will be increased also. Accordingly, the validation of reliability and safety of embedded software for railway system was started to become influential as the important issue. Accordingly, various software test and validation activities are highly recommended in the international standards related railway software. In this paper, we presented a software coding analysis tool using symbolic execution for railway system, and presented its result of implementation.

A Prototype of Robotic External Fixation System for Surgery of Bone Deformity Correction

  • Kim, Yoon-Hyuk;Joo, Sang-Min;Lee, Soon-Geul
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2448-2450
    • /
    • 2005
  • A robotic external fixation system for the surgery of bone deformity correction was developed to simulate the execution process of mal-unioned femur by the adjustment of the joints of the fixation system. An inverse kinematics analysis algorithm was developed to calculate the necessary rotations and translations at each joint of the robotic system. The computer graphic model was developed for validation of the analysis result and visualization of the surgical process. For given rotational and angular deformity case, the surgical execution process using the robotic system was well matched with the pre-operative planning. The final residual rotational deformities were within $1.0^{\circ}{\sim}1.6^{\circ}$ after surgical correction process. The presented robotic system with computer-aided planning can be useful for knowledge-based fracture treatment and bone deformity correction under external fixation.

  • PDF

Fine-Grain Real-Time Code Scheduling for VLIW Architecture

  • Chung, Tai M.;Hwang, Dae J.
    • Journal of Electrical Engineering and information Science
    • /
    • v.1 no.1
    • /
    • pp.118-128
    • /
    • 1996
  • In safety critical hard real-time systems, a timing fault may yield catastrophic results. In order to eliminate the timing faults from the fast responsive real-time control systems, it is necessary to schedule a code based on high precision timing analysis. Further, the schedulability enhancement by having multiple processors is of wide spread interest. However, although an instruction level parallel processing is quite effective to improve the schedulability of such a system, none of the real-time applications employ instruction level parallel scheduling techniques because most of the real-time scheduling models have not been designed for fine-grain execution. In this paper, we present a timing constraint model specifying high precision timing constraints, and a practical approach for constructing static schedules for a VLIW execution model. The new model and analysis can guarantee timing accuracy to within a single machine clock cycle.

  • PDF

The Generation of the Function Calls Graph of an Obfuscated Execution Program Using Dynamic (동적 분석을 이용한 난독화 된 실행 프로그램의 함수 호출 그래프 생성 연구)

  • Se-Beom Cheon;DaeYoub Kim
    • Journal of IKEEE
    • /
    • v.27 no.1
    • /
    • pp.93-102
    • /
    • 2023
  • As one of the techniques for analyzing malicious code, techniques creating a sequence or a graph of function call relationships in an executable program and then analyzing the result are proposed. Such methods generally study function calling in the executable program code through static analysis and organize function call relationships into a sequence or a graph. However, in the case of an obfuscated executable program, it is difficult to analyze the function call relationship only with static analysis because the structure/content of the executable program file is different from the standard structure/content. In this paper, we propose a dynamic analysis method to analyze the function call relationship of an obfuscated execution program. We suggest constructing a function call relationship as a graph using the proposed technique.

Automatic Binary Execution Environment based on Real-machines for Intelligent Malware Analysis (지능형 악성코드 분석을 위한 리얼머신 기반의 바이너리 자동실행 환경)

  • Cho, Homook;Yoon, KwanSik;Choi, Sangyong;Kim, Yong-Min
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.3
    • /
    • pp.139-144
    • /
    • 2016
  • There exist many threats in cyber space, however current anti-virus software and other existing solutions do not effectively respond to malware that has become more complex and sophisticated. It was shown experimentally that it is possible for the proposed approach to provide an automatic execution environment for the detection of malicious behavior of active malware, comparing the virtual-machine environment with the real-machine environment based on user interaction. Moreover, the results show that it is possible to provide a dynamic analysis environment in order to analyze the intelligent malware effectively, through the comparison of malicious behavior activity in an automatic binary execution environment based on real-machines and the malicious behavior activity in a virtual-machine environment.