• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.029 seconds

Detecting Common Weakness Enumeration(CWE) Based on the Transfer Learning of CodeBERT Model (CodeBERT 모델의 전이 학습 기반 코드 공통 취약점 탐색)

  • Chansol Park;So Young Moon;R. Young Chul Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.10
    • /
    • pp.431-436
    • /
    • 2023
  • Recently the incorporation of artificial intelligence approaches in the field of software engineering has been one of the big topics. In the world, there are actively studying in two directions: 1) software engineering for artificial intelligence and 2) artificial intelligence for software engineering. We attempt to apply artificial intelligence to software engineering to identify and refactor bad code module areas. To learn the patterns of bad code elements well, we must have many datasets with bad code elements labeled correctly for artificial intelligence in this task. The current problems have insufficient datasets for learning and can not guarantee the accuracy of the datasets that we collected. To solve this problem, when collecting code data, bad code data is collected only for code module areas with high-complexity, not the entire code. We propose a method for exploring common weakness enumeration by learning the collected dataset based on transfer learning of the CodeBERT model. The CodeBERT model learns the corresponding dataset more about common weakness patterns in code. With this approach, we expect to identify common weakness patterns more accurately better than one in traditional software engineering.

How to Combine Secure Software Development Lifecycle into Common Criteria (CC에서의 소프트웨어 개발보안 활용에 대한 연구)

  • Park, Jinseok;Kang, Heesoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.171-182
    • /
    • 2014
  • Common Criteria is a scheme that minimize IT products's vulnerabilities in accordance with the evaluation assurance level. SSDLC(Secure Software Development Lifecycle) is a methodology that reduce the weakness that can be used to generate vulnerabilities of software development life cycle. However, Common Criteria does not consider certificated IT products's vulnerabilities after certificated it. So, it can make a problem the safety and reliability of IT products. In addition, the developer and the evaluator have the burden of duplicating evaluations of IT products that introduce into the government business due to satisfy both Common Criteria and SSDLC. Thus, we researched the relationship among the Common Criteria, the static code analysis tools, and the SSDLC. And then, we proposed how to combine SSDLC into Common Criteria.

Analysis of Detection Ability Impact of Clang Static Analysis Tool by Source Code Obfuscation Technique (소스 코드 난독화 기법에 의한 Clang 정적 분석 도구의 성능 영향 분석)

  • Jin, Hongjoo;Park, Moon Chan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.605-615
    • /
    • 2018
  • Due to the rapid growth of the Internet of Things market, the use of the C/C++ language, which is the most widely used language in embedded systems, is also increasing. To improve the quality of code in the C/C++ language and reduce development costs, it is better to use static analysis, a software verification technique that can be performed in the first half of the software development life cycle. Many programs use static analysis to verify software safety and many static analysis tools are being used and studied. In this paper, we use Clang static analysis tool to check security weakness detection performance of verified test code. In addition, we compared the static analysis results of the test codes applied with the source obfuscation techniques, layout obfuscation, data obfuscation, and control flow obfuscation techniques, and the static analysis results of the original test codes, Analyze the detection ability impact of the Clang static analysis tool.

Design of Evaluation Index System for Information Experience based on B2C e-Commerce Bigdata and Artificial Intelligence

  • KANG, Jangmook;HU, Haibo;CHEN, Yinghui;LEE, Sangwon
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.1-8
    • /
    • 2019
  • The online retail market continues to grow, especially in China, as e-commerce has developed rapidly in recent years in many countries. Meanwhile, the development and use of new network information technology provides consumers with various contact and experience environments for online shopping. Based on the theory of media weakness, the study began to focus consumer experience on the nature of commercial transactions. The study proposed and designed an initial measure of the consumer information evaluation index, which combines previous findings with implications. Finally, the five-dimensional B2C system was established to evaluate consumers' information experience providing information display, information interaction, information support and information personalization. We researched on evaluation index system for information experience of B2C e-commerce consumers based on samples of Chinese consumers.

Communication Support System for Person with Language Disabilities (중증 언어장애인을 위한 의사소통 시스템)

  • Hong Seung-Wook;Park Su-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.324-327
    • /
    • 2006
  • The person who gets a ALS(Amyotrophic Lateral Sclerosis) has language disability and physical disability together. A common first symptom is a painless weakness in a hand, foot, arm or leg, which occurs in more than half of all cases. Other early symptoms include muscle weakness of speech. In the early stage of this disease they can communicate with other persons, but it will become increasingly difficult. In our research we have designed and implemented communication tools for them. We have implemented Chunjiin(the Korean computer keyboard) at PDA(personal digital assistant). And we have also implemented software which is consisted of frequently used words.

  • PDF

A Study on the Design Guide of Fee Charging Residential Facility for the Elderly reflected in Color Perception Characteristic (노인의 색지각적 특성을 고려한 유료 노인주거 실내공간의 설계지침에 관한 연구)

  • Song, Choon-Eui;Kim, Moon-Duck
    • Archives of design research
    • /
    • v.20 no.3 s.71
    • /
    • pp.247-256
    • /
    • 2007
  • Aging brings color-weakness to the eye due to yellowed eye sight. The 87% of information required for human behavioral decisions are visually perceived. Therefore, the color-weakness will affect behavior in many ways. Most of previous research regarding color planning for the aged focuses on discovering their preferred colors and reflecting the colors on facility color planning. But such research failed to identify the confused range of color cognitions due to the color weakness of the aged. The purpose of this study is to propose a design guide for fee-charging residential facilities for the elderly, reflecting upon color perception characteristics. An experimental simulation on aged vision using the UV filter and Y-2 filter, YA-3 filter alternating for general eyesight, 70 year-old and late 80 year-old was conducted. The results of this study are as follow : color perception is changed by crystalline lens aging process and yellowed eye sight. The recognition arrangement of colors was preferred to contrast harmony rather than similarity harmony and the dominant color is a warm color rather than a cool color.

  • PDF

Classification of Diagnostic Information and Analysis Methods for Weaknesses in C/C++ Programs

  • Han, Kyungsook;Lee, Damho;Pyo, Changwoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.81-88
    • /
    • 2017
  • In this paper, we classified the weaknesses of C/C++ programs listed in CWE based on the diagnostic information produced at each stage of program compilation. Our classification identifies which stages should be responsible for analyzing the weaknesses. We also present algorithmic frameworks for detecting typical weaknesses belonging to the classes to demonstrate validness of our scheme. For the weaknesses that cannot be analyzed by using the diagnostic information, we separated them as a group that are often detectable by the analyses that simulate program execution, for instance, symbolic execution and abstract interpretation. We expect that classification of weaknesses, and diagnostic information accordingly, would contribute to systematic development of static analyzers that minimizes false positives and negatives.

A PDL′s System Specifications Based on the Users′ Information Seeking Behavior (이용자의 정보추구행태에 기반한 PDL의 시스템 요구사항)

  • Kim, Kyung-Gon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.36 no.4
    • /
    • pp.227-244
    • /
    • 2002
  • The purpose of this study lies in analyzing the limitations and weakness of the existing PDL and proposing the principles for the development of a user-oriented PDL. The user group of PDL that we want to develop is university students. To this end, we investigate the information seeking behavior of the sampled user group, especially, their information needs, information use patterns, and information management patterns. Based on the results, we conceptually propose the systems specifications which the university students wish to be included in the PDL.

A Survey on Deep Convolutional Neural Networks for Image Steganography and Steganalysis

  • Hussain, Israr;Zeng, Jishen;Qin, Xinhong;Tan, Shunquan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1228-1248
    • /
    • 2020
  • Steganalysis & steganography have witnessed immense progress over the past few years by the advancement of deep convolutional neural networks (DCNN). In this paper, we analyzed current research states from the latest image steganography and steganalysis frameworks based on deep learning. Our objective is to provide for future researchers the work being done on deep learning-based image steganography & steganalysis and highlights the strengths and weakness of existing up-to-date techniques. The result of this study opens new approaches for upcoming research and may serve as source of hypothesis for further significant research on deep learning-based image steganography and steganalysis. Finally, technical challenges of current methods and several promising directions on deep learning steganography and steganalysis are suggested to illustrate how these challenges can be transferred into prolific future research avenues.

Development for Web Weakness Application (웹 취약점 점검 어플리케이션 개발)

  • Lee, Seung-Chan;Jang, Won-June;Jo, Nam-Hyun;Jo, Hyeon-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.217-219
    • /
    • 2017
  • 이 어플리케이션은 서버의 취약점을 보고하는 것을 목적으로 한다. 웹 취약점 점검을 위해서 Nikto와 Nmap을 이용했고, 취약점 분석 보고서를 시간 순으로 보기 위해 보고서에 순번을 정해 피드백을 생성하도록 하였다. 또한 웹 취약점 번호를 생성함으로써 사용자가 좀 더 효율적으로 웹 서버의 취약점을 확인할 수 있도록 개발하였다.