• Title/Summary/Keyword: pointer analysis

Search Result 46, Processing Time 0.021 seconds

Security Analysis of ARM64 Hardware-Based Security (ARM64 아키텍처 기반 하드웨어 보안기술 분석 및 보안성 진단)

  • Myung-Kyu Sim;Hojoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.437-447
    • /
    • 2023
  • Memory protection has been researched for decades for program execution protection. ARM recently developed a newhardware security feature to protect memory that was applied to real hardware. However, there are not many hardware withhardware memory protection feature and research has not been actively conducted yet. We perform diagnostics on howandhow it works on real hardware, and on security, with a new hardware memory protection feature, named 'Pointer Authentication Code'. Through this research, it will be possible to find out the direction, use, and security of future hardware security technologies and apply to the program.

CEM-PF: Cost-Effective Mobility Management Scheme Based on Pointer Forwarding in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 포인터 포워딩에 기반한 비용효과적인 이동성관리 기법)

  • Park, Seung-Yoon;Jeong, Jong-Pil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.81-93
    • /
    • 2012
  • We propose efficient mobility management schemes based on pointer forwarding for Proxy Mobile IPv6 Networks(PMIPv6) with the objective to reduce the overall network traffic incurred by mobility management and packet delivery. The proposed schemes are per-user-based, i.e., the optimal threshold of the forwarding chain length that minimizes the overall network traffic is dynamically determined for each individual mobile user, based on the user's specific mobility and service patterns. We demonstrate that there exists an optimal threshold of the forwarding chain length, given a set of parameters characterizing the specific mobility and service patterns of a mobile user. We also demonstrate that our schemes yield significantly better performance than schemes that apply a static threshold to all mobile users. A comparative analysis shows that our pointer forwarding schemes outperform routing-based mobility management protocols for PMIPv6.

A New Mobility Management Scheme Using Pointer Forwarding in Proxy Mobile IPv6 Networks (Proxy Mobile IPv6 네트워크에서 포인터 포워딩을 이용한 이동성 관리기법)

  • Yi, Myung-Kyu;Kim, Hyung-Heon;Park, Seok-Cheon;Yang, Young-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.109-118
    • /
    • 2010
  • Proxy mobile IPv6 (PMIPv6) protocol is a network-based mobility management protocol to support mobility for IPv6 nodes without host involvement. In PMIPv6, the Mobile Access Gateway (MAG) incurs a high signaling cost to update the location of a mobile node to the remote Local Mobility Anchor (LMA) if it moves frequently. This increases network overhead on the LMA, wastes network resources, and lengthens the delay time. Therefore, we propose a new mobility management scheme for minimizing signaling cost using the pointer forwarding. Our proposal can reduce signaling costs by registration with the neighbor MAG instead of the remote LMA using the pointer forwarding. The cost analysis using imbedded Markov chain presented in this paper shows that our proposal can achieve performance superior that of PMIPv6 scheme.

A Method of Detecting Pointer Access Error based on Disassembled Codes (역어셈블에 기반한 포인터 참조 오류 검출 방법)

  • Kim, Hyunsoo;Kim, Byeong Man;Huh, Nam Chul;Shin, Yoon Sik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.5
    • /
    • pp.13-23
    • /
    • 2015
  • This thesis proposes a method for effectively detecting memory errors with low occurrence frequency that may occur depending on runtime situation by analyzing assembly codes obtained by disassembling an executable file. When applying the proposed method to various programs having no compilation error, a total of about 750 potential errors taken about 90 seconds are detected among 1 million lines of assembly codes corresponding to a total of about 10 thousand functions.

Finger-Pointing Gesture Analysis for Slide Presentation

  • Harika, Maisevli;Setijadi P, Ary;Hindersah, Hilwadi;Sin, Bong-Kee
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1225-1235
    • /
    • 2016
  • This paper presents a method for computer-assisted slide presentation using vision-based gesture recognition. The proposed method consists of a sequence of steps, first detecting a hand in the scene of projector beam, then estimating the smooth trajectory of a hand or a pointing finger using Kalman Filter, and finally interfacing to an application system. Additional slide navigation control includes moving back and forth the pages of the presentation. The proposed method is to help speakers for an effective presentation with natural improved interaction with the computer. In particular, the proposed method of using finger pointing is believed to be more effective than using a laser pointer since the hand, the pointing or finger are more visible and thus can better grab the attention of the audience.

A Study on the Group Routing Algorithm in DHT-based Peer-to-Peer System (DHT 기반 P2P 시스템을 위한 그룹 라우팅 알고리즘에 관한 연구)

  • Park, Yong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.111-120
    • /
    • 2012
  • As the P2P System is a distributed system that shares resources of nodes that participate in the system, all the nodes serve as a role of server and client. Currently, although systematic, structured P2P systems such as Chord, Pastry, and Tapestry were suggested based on the distributed hash table, these systems are limited to $log_2N$ for performance efficiency. For this enhanced performance efficiency limited, the article herein suggests group routing algorithm. The suggested algorithm is a node-to-group routing algorithm which divides circular address space into groups and uses a concept of pointer representing each group, which is an algorithm where routing is performed based on pointer. To evaluate algorithm performance, a comparative analysis was conducted on average hops, routing table size, and delayed transmission for chord and routing, a signature algorithm in P2P systems. Therefore, enhanced performance is verified for comparative items from the simulation results.

Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering

  • Peng, Jianshan;Zhang, Mi;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4933-4956
    • /
    • 2016
  • Use-After-Free (UAF) is a common lethal form of software vulnerability. By using tools such as Web Browser Fuzzing, a large amount of samples containing UAF vulnerabilities can be generated. To evaluate the threat level of vulnerability or to patch the vulnerabilities, automatic deduplication and exploitability determination should be carried out for these samples. There are some problems existing in current methods, including inadequate pertinence, lack of depth and precision of analysis, high time cost, and low accuracy. In this paper, in terms of key dangling pointer and crash context, we analyze four properties of similar samples of UAF vulnerability, explore the method of extracting and calculate clustering eigenvalues from these samples, perform clustering by fast search and find of density peaks on a large number of vulnerability samples. Samples were divided into different UAF vulnerability categories according to the clustering results, and the exploitability of these UAF vulnerabilities was determined by observing the shape of class cluster. Experimental results showed that the approach was applicable to the deduplication and exploitability determination of a large amount of UAF vulnerability samples, with high accuracy and low performance cost.

The Effects of Trunk Movement and Ground Reaction Force during Sit to Stand Using Visual Feedback (시각 되먹임을 이용한 앉은 자세에서 일어서기 시 몸통의 동작과 지면 반발력에 미치는 영향)

  • Yeong-Geon Koh;Tae-Young Oh;Jae-Ho Lee
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.11 no.2
    • /
    • pp.207-219
    • /
    • 2023
  • Purpose : This study was conducted to investigate the changes in trunk movement and ground reaction during sit to stand motion using visual feedback. Methods : Fifteen adults (average age: 23.53±1.77 years) participated in this study. An infrared reflective marker was attached to the body each participant for motion analysis, and the participants performed sit to stand motion while wearing a hat attached with a laser pointer, which provided visual feedback. First, the sit to stand action was repeated thrice without obtaining any visual feedback, followed by a three minute break. Next, the laser pointers attached to hats were irradiated on a whiteboard, located at a distance of 5 m in front of the chairs, on which the participants sat; a baseline was set, and the participants performed stand up movements three times under this condition. A visual feedback was provided to the participants to prevent the laser pointers from crossing the set baseline. During each stand-up movement, the position of the reflective marker attached to the subject's body was recorded in real time using an infrared camera for motion analysis. The trunk movement and ground reaction force were extracted through recorded data and analyzed according to the presence or absence of visual feedback. Results : The results indicated that in the presence of a visual feedback during the sit-to-stand movements, the range of motion of the trunk and hip joints decreased, whereas that of the knee and ankle joints increased in the sagittal plane. The rotation angle of the trunk in the horizontal plane decreased. The left and right movement speed of the center of pressure increased, the pressing force decreased, and the forward and backward movement speed of the trunk decreased. Conclusion : The results suggest that the efficiency and stability of the stand up movement of a body increase when a visual feedback is provided.

Cost Reduction of Location Registration Using the LiEy UBdate Strategy in Hierarchical Mobile IPv6 (계층적 이동 Ipv6환경에서 지연갱신전략을 이용한 위치등록 비용 감소)

  • Yi Myung-Kyu;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.370-381
    • /
    • 2005
  • Mobile IP provides an efficient and scalable mechanism for host mobility within the Internet. Using Mobile If, mobile nodes may change their point of attachment to the Internet without changing their If address. However, it would result in a high signaling cost. To reduce the signaling cost, we factor in the fact that mobile users will not be actively communicating much of the time. In fact, there Is no necessity to send a binding update message to the home agent when an mobile node does not communicates with others while moving. From this point of view, we propose a lazy update strategy for minimizing signaling cost using the forwarding pointer in hierarchical Mobile IPv6. In our proposal, binding updates are sent only when a mobile node is in a busy mode. If an mobile node is in a dormant mode, binding update messages are delayed until busy mode using the forwarding pointer. As a result, our proposal can reduce the total signaling cost by eliminating unnecessary binding update messages when a mobile node Is in a dormant mode. In addition to, our proposal reduces unnecessary location update cost resulting from ping-pong effect under mobile node's dormant mode. Analysis results using the discrete analytic model presented in this paper shows that our proposal can has superior performance than hierarchical Mobile nv6 when the call-to-mobility ratio is low and the length of the forwarding pointer chain K is low.

Validity and Reliability of the Knee Joint Proprioceptive Sensory Measurements using a Smartphone (스마트폰을 이용한 무릎관절 고유수용성 감각 측정의 타당도와 신뢰도 검증)

  • Kim, Myung-Chul;Kim, Nam-Jae;Lee, Min-Soo;Moon, So-Ra
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.10 no.4
    • /
    • pp.15-23
    • /
    • 2015
  • PURPOSE: We aims to promote the development of proprioception measurement using smartphones, goniometers, and laser pointers as compared to the conventional use of electrogoniometer measurement. METHODS: Measurements using an electrogoniometer were previously proved to be reliabile and valid. Among E-university students, 20 who had no fracture, operation history, or inflammatory arthritis were examined. These subjects had not performed regular exercise in the past 3 months. Proprioception measurements were performed using four different measurement tools, three times per day, for test-retest analysis. RESULTS: No notable test-retest differences were noted for any of the measurement methods (P>0.05). With regard to the test-retest reliability for each measurement method, we observed that the readings from both the electrogoniometer and smartphone have high reliability (ICC>0.80), whereas the readings from the laser pointer have moderate reliability (ICC>0.60). When assessing the concurrent validity between electrogoniometers with individual measurements, we did not observe any notable difference between the smartphone and electrogoniometer (P>0.05) and these tools in fact showed high correlation (r>0.60, P<0.05) and a moderate reliability (ICC>0.60). Moreover, there was no notable difference in between electrogoniometers and laser pointers (P<0.05). CONCLUSION: CONCLUSION: The findings of this suggested that proprioception can be measured by using smart-phones, and proved that this method has sufficient credibility. Moreover, we noted that the concurrent validity with smartphones was high in comparison with the conventional electrogoniometer, which also indicates the validity and credibility. Based on these findings, we conclude that the measurement of proprioception by using a smartphone can be widely adopted.