• Title/Summary/Keyword: 그레이박스

Search Result 13, Processing Time 0.026 seconds

Automated Applying Greybox Fuzzing to C/C++ Library Using Unit Test (유닛테스트를 활용한 c/c++ 라이브러리 그레이박스 퍼징 적용 자동화)

  • Jang, Joon Un;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.807-819
    • /
    • 2019
  • Greybox fuzzing is known as an effective method to discover unknown security flaws reside in software and has been actively researched today. However, most of greybox fuzzing tools require an executable file. Because of this, a library, which cannot be executed by itself requires an additional executable file for greybox fuzzing. Generating such an executable file is challengeable because it requires both understanding of the library and fuzzing. In this research, we suggest the approach to generate an executable file automatically for a library and implement this approach as a tool based on the LLVM framework. This tool shows that executable files and seed files can be generated automatically by static/dynamic analysis of a unit test in the target project. A generated executable file is compatible with various greybox fuzzers like AFL because it has a common interface for greybox fuzzers. We show the performance of this tool as code coverage and discovered unknown security bugs using generated executable files and seed files from open source projects through this tool.

Modeling Framework for Continuous Dynamic Systems Using Machine Learning of Hypothetical Model (가설적 모델의 기계학습을 이용한 연속시간 동적시스템 모델링 프레임워크)

  • Hae Sang Song;Tag Gon Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.1
    • /
    • pp.13-21
    • /
    • 2023
  • This paper proposes a method of automatically generating a model through a machine learning technique by setting a hypothetical model in the form of a gray box or black box with unknown parameters, when the big data of the actual system is given. We implements the proposed framework and conducts experiments to find an appropriate model among various hypothesis models and compares the cost and fitness of them. As a result we find that the proposed framework works well with continuous systems that could be modeled with ordinary differential equation. This technique is expected to be used well for the purpose of automatically updating the consistency of the digital twin model or predicting the output for new inputs using recently generated big data.

A Study on Optimal Web Site Selection and Quality Evaluation Using AHP (AHP기법을 이용한 최적의 웹사이트 선정 및 품질 평가에 관한 연구)

  • Oh, Kie-Sung
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.381-386
    • /
    • 2004
  • Because of rapid increase of internet user, numerous popular web sites have been made on the internet but it is hard to find out a systematic technique for the selection of qualified web site in consumer position. Generally, there are black box, white box and gray box viewpoint for evaluating web site. In this paper present evaluation criteria based on AHP(Analysis Hierarchy Process) technique of black box viewpoint for optimal web site selection in consumer position. We considered usability, efficiency, compatibility based on ISO/IEC 9126 for quality measurement of web site and executed practical analysis about web site in internet. This paper show that the proposed selection technique is applicable to optimal web site selection.

A Study on Smart Fuzzing System Based on Grey Box Test (그레이 박스 테스트를 활용한 스마트 퍼징 시스템 연구)

  • Kim, Mansik;Kim, Minjin;Yeom, Yun-Ho;Jun, Moon-Soeg
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.812-814
    • /
    • 2015
  • 유비쿼터스 시대가 ICT 산업의 발달과 함께 도래함에 따라 이용자들의 요구를 충족시켜 주는 다양한 서비스들이 소프트웨어 형태로 등장하고 있다. 이제는 단순 컴퓨터 뿐만이 아니라 모바일, 웨어러블 디바이스, 자동차, 로봇, 의료 산업 등 까지 소프웨어는 현대 사람들의 삶에 깊이 연계되어 있으며 아직도 그 영역은 팽창하고 있다. 이러한 소프트웨어의 풍부한 발달과 비례로 소프트웨어의 취약점을 공략하여 서비스에 치명적인 위협을 가해 이익을 얻으려는 단체도 증가하게 되었다. 본 논문에서는 소프트웨어를 출시하기 전에 취약점을 미리 탐지 식별 할 수 있는 그레이 박스를 활용한 스마트 퍼징 시스템을 제안한다.

Separation of Concerns Security Model of Component using Grey Box (그레이박스를 사용한 컴포넌트의 관심사 분리 보안 모델)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.163-170
    • /
    • 2008
  • As the degree of dependency and application of component increases, the need to strengthen security of component is also increased as well. The component gives an advantage to improve development productivity through its reusable software. Even with this advantage, vulnerability of component security limits its reuse. When the security level of a component is raised in order to improve this problem, the most problematic issue will be that it may extend its limitation on reusability. Therefore, a component model concerning its reusability and security at the same time should be supplied. We suggest a Separation of Concerns Security Model for Extension of Component Reuse which is integrated with a wrapper model and an aspect model and combined with a reuse model in order to extend its security and reusability by supplying information hiding and easy modification, and an appropriate application system to verify the model's compatibility is even constructed. This application model gives the extension of component function and easy modification through the separation of conceits, and it raise its security as doll as extends its reusability.

  • PDF

A Survey on Dynamical Modeling for Active Control of Thermo-Acoustic Instabilities (열-음향학적 불안정 현상의 능동제어를 위한 동역학적 모델링에 관한 현황 분석)

  • Na, Seon-Hwa;Ko, Sang-Ho
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.15 no.6
    • /
    • pp.78-90
    • /
    • 2011
  • This paper surveys the recent research activities regarding dynamical modeling of thermo-acoustic instabilities which are fundamental to actively control such phenomena in gas-turbine engines, rockets, and etc. For this, we introduce reduced-order modeling approaches, mainly conducted after 1990s. Particularly, we survey grey-box approaches, which determine the structure of the model based on physical rules and use system's input-output data for estimating parameters of the model. We also introduce black-box approaches using model structures without physics-based interpretation. Finally, we briefly discuss future directions and feasibilities of the research in this field.

Dynamical modeling and system identification for active control of thermo-acoustic instabilities: survey (열-음향학적 불안정 현상의 능동제어를 위한 동역학적 모델링 및 시스템 식별기법 현황)

  • Na, Seon-Hwa;Ko, Sang-Ho
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2010.05a
    • /
    • pp.279-287
    • /
    • 2010
  • This paper surveys the recent research activities regarding dynamical modeling of high amplitude - high frequency thermo-acoustic instabilities occurring in gas-turbine engines, rockets, and etc, which are fundamental to actively control of such phenomena. For this, we introduces the reduced-order system modeling approaches, conducted after 1990s. Particularly, we deal with the grey-box approach, which determines the structure of the model based on physical rules and uses system's input-output data for estimating parameters of the model, and the black-box approach, which uses model structure without physics-based interpretation. At the end of the paper, we briefly discuss future directions and feasibilities of the research in this field.

  • PDF

Model Type Inference Attack Using Output of Black-Box AI Model (블랙 박스 모델의 출력값을 이용한 AI 모델 종류 추론 공격)

  • An, Yoonsoo;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.817-826
    • /
    • 2022
  • AI technology is being successfully introduced in many fields, and models deployed as a service are deployed with black box environment that does not expose the model's information to protect intellectual property rights and data. In a black box environment, attackers try to steal data or parameters used during training by using model output. This paper proposes a method of inferring the type of model to directly find out the composition of layer of the target model, based on the fact that there is no attack to infer the information about the type of model from the deep learning model. With ResNet, VGGNet, AlexNet, and simple convolutional neural network models trained with MNIST datasets, we show that the types of models can be inferred using the output values in the gray box and black box environments of the each model. In addition, we inferred the type of model with approximately 83% accuracy in the black box environment if we train the big and small relationship feature that proposed in this paper together, the results show that the model type can be infrerred even in situations where only partial information is given to attackers, not raw probability vectors.

Location Information Hiding Way Of HD Black Box Recording process (HD 블랙박스 녹화과정에서의 위치정보 은익방법)

  • Seok, Jin-Hwan;Yoon, Jong-Chul;Hong, Jong-Sung;Han, Chan-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.1
    • /
    • pp.10-17
    • /
    • 2016
  • GPS location information storage included in the HD black box is using a unique manner for each manufacturer does not have a specific standard. In this paper, in order to overcome the limitations of the storage space and thereby the image quality according to store GPS position information deteriorate to solve the problems that cause, we propose the location information concealment method included in the HDTV video content using a essential hidden region. HDTV video content is a Border Extender of 8 lines in the frame to the bottom of the compression will be required. This was inserted into the image of a gray scale used in block form in order to space the current position information is concealed to prevent image degradation. The proposed method was confirmed using real HD black box, there are more difficult to interpret the format of the ASCII code re-edit the location information when the compression effect disappears with the existing security zones added. Therefore, the proposed method is suitable for location-based services, such as Facebook or Youtube videos.

HyGIS based on cloud computing (클라우드 기반 HyGIS)

  • Won, Young Jin;Choi, Yun Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.316-316
    • /
    • 2016
  • HyGIS는 DEM 기반의 수문지형처리를 중심으로 다양한 모형을 연계할 수 있도록 구성된 S/W 모음이다. 이는 한국건설기술연구원을 비롯한 다수의 기관 및 연구원들이 노력한 성과물이다. 본 연구는 기존 HyGIS 연구과정에서 도출된 성과물의 실용화 사업화를 위한 방안을 연구하였다. 이를 위하여 S/W 테스팅, 오픈소스 도입, 클라우드 컴퓨팅으로 나누어 접근하였다. 먼저 S/W의 테스팅에 있어서 기존 개발 소스코드는 블랙박스 테스트 방식의 동등 클래스 분할, 경계 값 분석 등 일부 모듈에 대한 단위 테스트와 제한적인 통합테스트가 수행된 바 있다. 보다 체계적인 테스트 단계로서 화이트박스 테스트 개념 중 문장/분기/조건 커버리지에 대하여 검토하였으며, 실제 소스코드 중 핵심 구간에 대한 적용 및 정량화를 통하여 현 수준을 객관적으로 진단하였고 보완 방안을 도출하였다. 오픈소스 적용을 위하여 QGIS, MapWindow 등 공간정보 분야의 최신 오픈소스 모듈을 비교 검토하였다. 적용 단계는 이를 기존 HyGIS S/W에 반영시키는 과정이며, S/W 관점에서는 컴포넌트 모듈의 대체라고 표현될 수 있다. 대규모의 전환 비용이 발생되므로 적용 후보에 대하여는 기능적 측면 뿐만 아니라 마이그레이션 비용과 중장기적인 유지보수 비용을 고려한 검토가 이루어 졌다. 한편 오픈소스 기술의 적용은 단순히 구성 요소 원가절감 측면만이 아닌, 중장기적 유지보수 체계 도모 및 지속가능한 생태계로의 전환에 더 큰 의의가 있다. 마지막으로 클라우드 컴퓨팅 기술의 적용 분야이다. HyGIS 입력 Data의 공급을 위한 인프라로서 자체 구축 인프라가 아닌 IaaS 클라우드인 Blob Storage 및 CDN을 시험 적용하였다. 클라우드를 활용함으로써 초기 비용을 최소화하고 합리적 비용으로 유연한 확장이 가능한(Scale Out, Scale Up) 구조를 취하게 되었다. 또한 입력 Data 공급 서버를 위한 Storage 측면만이 아니라 S/W의 배포에 있어서도 클라우드 컴퓨팅 기술을 활용하고자 시도하였다. 클라우드 기술을 활용하여 HyGIS S/W가 설치된 VM(Virtual Machine)자체를 임대하는 방식으로 시험 구성 되었다. VM에 대한 RDP 프로토콜 Access에 있어서 IP기반 접근 제어를 통하여 보안을 강화하는 방안을 실험하였으며, ISO 27001, ISO 27018 등 관련 보안 규정에 부합하는 서비스 제공이 가능하도록 검토하였다. 이러한 클라우드 VM방식 서비스를 통하여 Package형 S/W 뿐만 아니라 Subscription 방식의 서비스 제공 방식을 병행할 수 있다. 사용자에게는 S/W 설치 및 H/W Lock 구비 과정이 생략되는 이점이 있다.

  • PDF