• Title/Summary/Keyword: static data access analysis

Search Result 16, Processing Time 0.03 seconds

Design and Implementation of Software Vulnerability Analysis Algorithm through Static Data Access Analysis

  • Lim, Hyun-il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.69-75
    • /
    • 2015
  • Nowadays, software plays various roles in applications in wide areas. However, the security problems caused by software vulnerabilities increase. So, it is necessary to improve software security and safety in software execution. In this paper, we propose an approach to improve the safety of software execution by managing information used in software through static data access analysis. The approach can detect the exposures of secure data in software execution by analyzing information property and flows through static data access analysis. In this paper, we implemented and experimented the proposed approach with a base language, and verify that the proposed approach can effectively detect the exposures of secure information. The proposed approach can be applied in several areas for improving software safety by analysing vulnerabilities from information flows in software execution.

Algorithmic GPGPU Memory Optimization

  • Jang, Byunghyun;Choi, Minsu;Kim, Kyung Ki
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.14 no.4
    • /
    • pp.391-406
    • /
    • 2014
  • The performance of General-Purpose computation on Graphics Processing Units (GPGPU) is heavily dependent on the memory access behavior. This sensitivity is due to a combination of the underlying Massively Parallel Processing (MPP) execution model present on GPUs and the lack of architectural support to handle irregular memory access patterns. Application performance can be significantly improved by applying memory-access-pattern-aware optimizations that can exploit knowledge of the characteristics of each access pattern. In this paper, we present an algorithmic methodology to semi-automatically find the best mapping of memory accesses present in serial loop nest to underlying data-parallel architectures based on a comprehensive static memory access pattern analysis. To that end we present a simple, yet powerful, mathematical model that captures all memory access pattern information present in serial data-parallel loop nests. We then show how this model is used in practice to select the most appropriate memory space for data and to search for an appropriate thread mapping and work group size from a large design space. To evaluate the effectiveness of our methodology, we report on execution speedup using selected benchmark kernels that cover a wide range of memory access patterns commonly found in GPGPU workloads. Our experimental results are reported using the industry standard heterogeneous programming language, OpenCL, targeting the NVIDIA GT200 architecture.

Reliability Analysis of Privacy Policies Using Android Static Analysis (안드로이드 정적 분석을 활용한 개인정보 처리방침의 신뢰성 분석)

  • Yoonkyo, Jung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.1
    • /
    • pp.17-24
    • /
    • 2023
  • Mobile apps frequently request permission to access sensitive data for user convenience. However, while using mobile applications, sensitive and personal data has been leaked even if users do not allow it. To deal with this problem, Google App Store has required developers to disclose how the mobile app handles user data in a privacy policy. However, users are not certain that the privacy policy describes all the app's behavior. They have no choice but to rely on the privacy policy to confirm how the app uses data. This study designed a system that checks the reliability of privacy policies by analyzing the privacy policy texts and mobile apps. First, the system extracts and analyzes the privacy policy texts to check which personal data the privacy policy discloses that the mobile apps can collect. After analyzing which data apps can access using android static analysis, we compare both results to analyze the reliability of privacy policies. For the experiment, we collected the APK files and metadata of about 13K android apps registered in the Google Play Store and preprocessed the apps by four conditions. According to the comparison between privacy policies and mobile app behavior, many apps can access more personal data than disclosed in the privacy policy.

Efficient Accessing and Searching in a Sequence of Numbers

  • Seo, Jungjoo;Han, Myoungji;Park, Kunsoo
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.1
    • /
    • pp.1-8
    • /
    • 2015
  • Accessing and searching in a sequence of numbers are fundamental operations in computing that are encountered in a wide range of applications. One of the applications of the problem is cryptanalytic time-memory tradeoff which is aimed at a one-way function. A rainbow table, which is a common method for the time-memory tradeoff, contains elements from an input domain of a hash function that are normally sorted integers. In this paper, we present a practical indexing method for a monotonically increasing static sequence of numbers where the access and search queries can be addressed efficiently in terms of both time and space complexity. For a sequence of n numbers from a universe $U=\{0,{\ldots},m-1\}$, our data structure requires n lg(m/n) + O(n) bits with constant average running time for both access and search queries. We also give an analysis of the time and space complexities of the data structure, supported by experiments with rainbow tables.

Development of Integrated System for Virtual Design and Performance Testing of Automobile Seat (자동차 시트 가상설계와 성능평가를 위한 통합시스템 개발)

  • Im, O-Gang;Yu, Wan-Seok;Jeong, Yung-Ho;Kim, Gwang-Seok;Lee, Jin-Sik;No, Hyo-Cheol
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.24 no.7 s.178
    • /
    • pp.1779-1786
    • /
    • 2000
  • Most of traditional design processes of mechanical parts are regarded as sequential and discrete, since different kinds of softwas should be introduced. In this paper, we develop an integrated fram ework for virtual design and performance testing of an automobile seat. The system is composed of four modules, i.e. CAD, static analysis, dynamic analysis, and draft drawing module. In the CAD module, PRO/ENGINEER 3D seat model is created using parameters to be modified with the result of static and dynamic analysis. In the static analysis, headrest tere used in each design stage make it difficult to feedback their results to upstream process. These discrete processes may result in time loss and cost rise. In recent years, life cycle of product is reduced. To have competence with others, new concept design processt is simulated using ANSYS. In the dynamic analysis module, FMVSS201 test is simulated using DADS. Overall data flow is controlled by Motif. The advantage of the system is that even a novice can perform and review the whole design process, without a good hand at professional design/analysis S/W in each stage. The system also provides a virtual design space, where engineers in different development stage can access common data of design models. The concept could be applied to other fields and it could reduce time and money required in design process.

An Energy-Efficient Mobility-Supporting MAC Protocol in Wireless Sensor Networks

  • Peng, Fei;Cui, Meng
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.203-209
    • /
    • 2015
  • Although mobile applications are an essential characteristic of wireless sensor networks, most existing media access control (MAC) protocols focus primarily on static networks. In these protocols, fixed periodic neighbor discovery and schedule updating are used to connect and synchronize neighbors to provide successful data transmission; however, they cannot adapt to mobile speed variation and degrade the network performance dramatically. In this paper, we propose a mobile-supporting mechanism for MAC protocols, in which the decision to update the neighbors of a mobile node is made adaptively according to the mobile speed. Analysis and simulation results demonstrate that the mechanism efficiently avoids the disconnection of amobile node from its neighbors and achieves a better performance as compared with fixed periodic neighbor discovery.

Connection of PDM System and Web-Based CAE Supporting System for Small and Medium Enterprises (중소기업을 위한 제품정보관리 시스템과 웹기반 CAE 지원 시스템의 연동)

  • Bang, Je-Sung;Lee, Jai-Kyung;Han, Seung-Ho;Park, Seong-Whan;Lee, Tae-Hee
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.6
    • /
    • pp.459-468
    • /
    • 2008
  • A web-based Computer-Aided Engineering (CAE) supporting system is connected with a Product Data Management (PDM) system for Small and Medium Enterprises (SMEs) suffering from the lack of building hardware, software and related experts. An analysis of current business models and worksite requirements provides an improved process model and data to be shared between the PDM system and the CAE supporting system. Since all engineering tasks such as geometric modeling, mesh generation, static stress and modal analysis, and fatigue durability analysis are automated in the CAE supporting system, the user in charge of the CAE have only to configure the concerned values of design variables and result data through the web page. The existing Change Management module of the PDM system is modified for seamless data exchange, i.e. sending the Engineering Change Order (ECO) data to the CAE supporting system and receiving the CAE result data bark. The hi-directional data transfers between the PDM system and the CAE supporting system is made possible by adaptors bused on the Simple Object Access Protocol (SOAP). The current approach will be very helpful for SMEs that only have the PDM system and have no adequate infrastructure for CAE.

Some Characteristics of the Performance in Comparison with Indexing techniques for File Organization (화일조직을 위한 인덱싱 기법의 성능 특성 비교)

  • Lee, Gu-Nam
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.1
    • /
    • pp.49-59
    • /
    • 1997
  • In this thesis, To provide the base of effective data access methods, performance of some indexing techniques used gent-Tally are compared. They are classified as primary key and multikey. For primary key method, made a comparative analysis on Static index. Dynamic index and Hashing. For multikey indexing method K-d tree, K-d-B tree, Inverted file and Grid file of which characteristics are compared. In many applications, multikey indexings are more requested, but are not supplied enough. So, to satisfy users' request - more fast, more exact and to be applied according to the trend of being huge database systems, it is requested more study about multikey data access methods.

  • PDF

Individual Interests Tracking : Beyond Macro-level Issue Tracking (거시적 이슈 트래킹의 한계 극복을 위한 개인 관심 트래킹 방법론)

  • Liu, Chen;Kim, Namgyu
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.275-287
    • /
    • 2014
  • Recently, the volume of unstructured text data generated by various social media has been increasing rapidly; consequently, the use of text mining to support decision-making has also been growing. In particular, academia and industry are paying significant attention to topic analysis in order to discover the main issues from a large volume of text documents. Topic analysis can be regarded as static analysis because it analyzes a snapshot of the distribution of various issues. In contrast, some recent studies have attempted to perform dynamic issue tracking, which analyzes and traces issue trends during a predefined period. However, most traditional issue tracking methods have a common limitation : when a new period is included, topic analysis must be repeated for all the documents of the entire period, rather than being conducted only on the new documents of the added period. Additionally, traditional issue tracking methods do not concentrate on the transition of individuals' interests from certain issues to others, although the methods can illustrate macro-level issue trends. In this paper, we propose an individual interests tracking methodology to overcome the two limitations of traditional issue tracking methods. Our main goal is not to track macro-level issue trends but to analyze trends of individual interests flow. Further, our methodology has extensible characteristics because it analyzes only newly added documents when the period of analysis is extended. In this paper, we also analyze the results of applying our methodology to news articles and their access logs.

A Study on the Precursors of Aviation Turbulence via QAR Data Analysis (QAR 데이터 분석을 통한 항공난류 조기 인지 가능성 연구)

  • Kim, In Gyu;Chang, Jo Won
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.26 no.4
    • /
    • pp.36-42
    • /
    • 2018
  • Although continuous passenger injuries and physical damages are repeated due to the unexpected aviation turbulence encountered during operations, there is still exist the limitation for preventing recurrence of similar events because the lack of real-time information and delay in technological developments regarding various operating conditions and variable weather phenomena. The purpose of this study is to compare and analyze the meteorological data of the aviation turbulence occurred and actual flight data extracted from the Quick Access Recorder(QAR) to provide some precursors that the pilot can identify aviation turbulence early by referring thru the flight instrumentation indications. The case applied for this study was recent event, a scheduled flight from Incheon Airport, Korea to Narita Airport, Japan that suddenly encountered turbulence at an altitude of approximately 14,000 feet during approach. According to the Korea Meteorological Administration(KMA)'s Regional Data Assessment and Prediction System(RDAPS) data, it was observed that the strong amount of vorticity in the rear area of jet stream, which existed near Mount Fuji at that time. The QAR data analysis shows significant changes in the aircraft's parameters such as Pitch and Roll angle, Static Air Temperature(SAT), and wind speed and direction in tens of seconds to minutes before encounter the turbulence. If the accumulate reliability of the data in addition and verification of various parameters with continuous analysis of additional cases, it can be the precursors for the pilot's effective and pre-emptive action and conservative prevention measures against aviation turbulence to reduce subsequent passenger injuries in the aviation operations.