DOI QR코드

DOI QR Code

Objective Material analysis to the device with IoT Framework System

  • Lee, KyuTae (Dept. of Information and communication Eng., Kongju National Univ) ;
  • Ki, Jang Geun (Dept. of Electrical & Electronic Control Eng., Kongju National Univ)
  • 투고 : 2020.04.30
  • 심사 : 2020.05.29
  • 발행 : 2020.06.30

초록

Software copyright are written in text form of documents and stored as files, so it is easy to expose on an illegal copyright. The IOT framework configuration and service environment are also evaluated in software structure and revealed to replication environments. Illegal copyright can be easily created by intelligently modifying the program code in the framework system. This paper deals with similarity comparison to determine the suspicion of illegal copying. In general, original source code should be provided for similarity comparison on both. However, recently, the suspected developer have refused to provide the source code, and comparative evaluation are performed only with executable code. This study dealt with how to analyze the similarity with the execution code and the circuit configuration and interface state of the system without the original source code. In this paper, we propose a method of analyzing the data of the object without source code and verifying the similarity comparison result through evaluation examples.

키워드

참고문헌

  1. Raj Kamal. Embedded systems Architecture Programming and Design. 2nd ed. MacGraw Hill Companies; 2015. p.5.(Book)
  2. V.J. Mooney, D.M. Blough. A hardware-software real-time operating system framework for SoCs: IEEE Design & Test of Computers. 2002 Nov; 19(6): 44-51. https://doi.org/10.1109/MDT.2002.1047743
  3. Kyu-Tae Lee, Hyun-Chang Lee, Jang-Geun Ki. Establishment of the Subtitle on Materials for Evaluating Intellectual Ownership: International Journal of Signal Processing, Image Processing and Pattern Recognition. 2017 Sep; 10(9): 79-88. https://doi.org/10.14257/ijsip.2017.10.9.08
  4. M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the Reliability of Commodity Operating Systems: ACM Trans. on Computer Systems. 2003 Sep; 23(1): 77-110. https://doi.org/10.1145/1047915.1047919
  5. M. M. Swift, M. Annamalai, B. N. Bershad, and H. M. Levy. Recovering Device Drivers: ACM Trans. on Computer Systems. 2006 Nov; 24(4): 333-360. https://doi.org/10.1145/1189256.1189257
  6. G. Heiser. The Role of Virtualization in Embedded Systems: Proc. of First Workshop on Isolation and Integration in Embedded Systems. 2008 April; 11-16.
  7. M. Rajagopalan, M. A. Hiltunen, T. Jim, and R. D. Schlichting. System Call Monitoring Using Authenticated System Calls: IEEE Trans. on Dependable and Secure Computing. 2006 July; 216-229.
  8. W. Gu, Z. Kalbarczyk, R, K. Iyer, and Z. Yang. Characterization of Linux Kernel Behavior under Errors: Proc. of the 2003 Int. Conf. on Dependable Systems and Networks. 2003 Dec; 459-468.
  9. T. Naughton, W. Bland, G. Vallee, C. Engelmann, and S. L. Scott. Fault Injection Framework for system Resilience Evaluation: Proc. of the Resilience"09. 2009 June; 23-28.
  10. Compare files and folders [Internet], 2018 [updated 2018 Oct 10; cited 2018 Oct 10]. Available from: http://www.scootersoftware.com/features.php?zz=features_focused (website)
  11. NEC code format[internet], 2018 [cited 2018 Oct 10]. Available from: https://www.vishay.com/docs/80071/dataform.pdf(website)
  12. David E. Simon. An Embedded Software Primer . 12th ed. Pearson; 2005. p.191.(Book)
  13. DoHyuen Kim, Kyutae Lee, Similarity Evaluation and Analysis of Source Code Materials for SOC System in IoT Devices, JSAV, pp.55-62, vol.15, No.1, 2019. http://dx.doi.org/10.29056/jsav.2019.06.06