• Title/Summary/Keyword: 메서드

Search Result 26, Processing Time 0.026 seconds

Design and Implementation of GUI in CVM on Real-Time Operating System, iRTOS (실시간 운영체제에서 iRTOS에서의 CVM GUI 설계 및 구현)

  • Choi, chan-woo;Lee, cheol-hoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.551-554
    • /
    • 2008
  • JVM(Java Virtual Machine) has GUI(Graphical User Interface) facility and Platform Independance and is used on the embedded device such as set-top box and smart phone. This needs JVM to execute Java application in the embedded device. CVM(Classic Virtual Machine) which is the kind of JVM is designed for embedded device to have limited resources. To support GUI facility of JAVA uses PBP(Personal Basis Profile) which is included on CVM. The PBP defines the GUI Stardard API to support GUI facility. When the GUI Stardard API is implemented, JNI(Java Native Interface) is used to connect between Java Native Method and Native function in Operating System. In this pater, PBP which is defined by CVM has designed and implemented on the Real-Time Operating System, iRTOS.

  • PDF

Security Model and Application of Persistent Object using Type Information in Integrated Environment of Distributed System (통합 분산환경에서 타입 정보를 이용한 지속성 객체의 보안 모델 및 응용)

  • 김영수;최흥식
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.661-669
    • /
    • 2004
  • As a large number of distributed systems becoming more popular, interoperability, portability and security are becoming major concerns of modern computing. CORBA and object-oriented database which provide transparency of network and database are increasingly being used as the basis for distributed system to solve these problems. The two methods can help accomplish assurance of security by using a method-based access control technique or an attribute-based access control technique. These methods also enhance the unavailability or inefficiency caused by the delay of access process and bottleneck of the network due to the complex instance-based access control. We propose a security model on the type information based access control system that can enhance both security and availability by separating the functions delivered from CORBA and object-oriented databases. We apply the access control model specifically to enhancement of security system and also perform a test to verify the security and availability of our model.

A Design of Context-Aware Middleware based on Web Services in Ubiquitous Environment (유비쿼터스 환경에서 웹 서비스에 기반한 상황 인식 미들웨어의 설계)

  • Song, Young-Rok;Woo, Yo-Seob
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.4
    • /
    • pp.225-232
    • /
    • 2009
  • Context-aware technologies for ubiquitous computing are necessary to study the representation of gathered context-information appropriately, the understanding of user's intention using context-information, and the offer of pertinent services for users. In this paper, we propose the WS-CAM(Web Services based Context-Aware Middleware) framework for context-aware computing. WS-CAM provides ample power of expression and inference mechanisms to various context-information using an ontology-based context model. We also consider that WS-CAM is the middleware-independent structure to adopt web services with characteristic of loosely coupling as a matter of communication of context-information. In this paper, we describe a scenario for lecture services based on the ubiquitous computing e e e e e e to verify the utilization of WS-CAM We also show an example of middleware-independent system expansion to display the merits of web-based services. WS-CAM for lecture services represented context-information itodomaits as OWL-based ontology model effectively, and we confirmed the information is inferred to high level context-information by user-defined rules. We also confirmed the context-information is transferred to application services middleware-independently using various web methods provided by web services.

  • PDF

Study On Receiving and Processing Method about Utilization of Near Real-time Satellite Data (준실시간 활용을 위한 위성자료 수신, 가공 방안 연구)

  • Kim, Soon Yeon;Jung, Young Sim;An, Joo Young;Park, Sang Hoon;Won, Young Jin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.467-467
    • /
    • 2017
  • 토양수분 및 황사발생 연구에 있어 효율적인 광역 분석을 위하여 위성자료가 활용되고 있다. 활용 시나리오에 따라서는 준실시간 자료 수신, 처리가 필요하며 본 연구에서는 이에 대한 방안을 연구하기 위하여 유럽 EUMETSAT(European Organisation for the Exploitation of Meteorological Satellites)의 ASCAT(Advanced Scatterometer) Metop-A 자료에 대하여 파악하였다. 자료 수신 프로토콜에 있어서 FTP, HTTP 등 전통적 방법에 대한 현황과 함께 비교적 최근 기법인 OGC(Open Geospatial Consortium)  WMS(Web Map Service), WCS(Web Coverage Service) 방식의 지원 현황에 대하여 확인하였다. 제공되는 자료 Format부분은 EPS Native와 BUFR(Binary Universal Form for the Representation of meteorological data)을 살펴보되 데이터 프로바이더 측에서 대부분 채택되고 있는 NetCDF(network Common Data Form)를 중심으로 파악하였다. 수신된 자료의 처리 자동화를 위한 소프트웨어는 OSGeo(The Open Source Geospatial Foundation)의 GDAL(Geospatial Data Abstraction Library), 미국 NCAR(National Center for Atmospheric Research)의 NCL(NCAR Command Language)을 중심으로 확인하였다. 자료 가공기법은 격자(Raster) 자료에 대한 기본 메타정보 확인, 좌표참조체계 변환, 해상도 및 Format 변환을 중심으로 확인하였다. 한편 OGC WMS, WCS는 자료의 전송 프로토콜 기법이면서 동시에 서버 사이드에서의 자료 변환 기능을 구비하고 있다. 예를 들어 Http Request에서 영역(Extent), Format 형식, 좌표참조체계를 지정할 수 있다. OGC WMS에 대한 EUMETSAT 파일럿 서비스에서 반환 자료의 공간적 영역, 복수 시점 제공 현황, 반환 포맷 지원 상황은 실제 메서드를 사용하여 파악하였고, 향후 발전 방향을 전망하였다.

  • PDF

Android App Birthmarking Technique Resilient to Code Obfuscation (난독화에 강인한 안드로이드 앱 버스마킹 기법)

  • Kim, Dongjin;Cho, Seong-Je;Chung, Youngki;Woo, Jinwoon;Ko, Jeonguk;Yang, Soo-Mi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.700-708
    • /
    • 2015
  • A software birthmark is the set of characteristics of a program which can be used to identify the program. Many researchers have studied on detecting theft of java programs using some birthmarks. In case of Android apps, code obfuscation techniques are used to protect the apps against reverse-engineering and tampering. However, attackers can also use the obfuscation techniques in order to conceal a stolen program. A birthmark (feature) of an app can be alterable by code obfuscations. Therefore, it is necessary to detect Android app theft based on the birthmark which is resilient to code obfuscation. In this paper, we propose an effective Android app birthmark and app theft detection through the proposed birthmark. By analyzing some obfuscation tools, we have first selected parameter and the return types of methods as an adequate birthmark. Then, we have measured similarity of target apps using the birthmarks extracted from the apps, where some target apps are not obfuscated and the others obfuscated. The measurement results show that our proposed birthmark is effective for detecting Android app theft even though the apps are obfuscated.

ICFGO : UI Concealing and Dummy Flow Insertion Method for Inter-Procedural Control Flow Graph Obfuscation (ICFGO : Inter-Procedural Control Flow Graph 난독화를 위한 UI 은닉 및 Dummy Flow 삽입 기법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.493-501
    • /
    • 2020
  • For the obfuscation of Flow Analysis on the Android operating system, the size of the Flow Graph can be large enough to make analysis difficult. To this end, a library in the form of aar was implemented so that it could be inserted into the application in the form of an external library. The library is designed to have up to five child nodes from the entry point in the dummy code, and for each depth has 2n+1 numbers of methods from 100 to 900 for each node, so it consists of a total of 2,500 entry points. In addition, entry points consist of a total of 150 views in XML, each of which is connected via asynchronous interface. Thus, the process of creating a Inter-procedural Control Flow Graph has a maximum of 14,175E+11 additional cases. As a result of applying this to application, the Inter Procedure Control Flow Analysis too generates an average of 10,931 edges and 3,015 nodes with an average graph size increase of 36.64%. In addition, in the APK analyzing process showed that up to average 76.33MB of overhead, but only 0.88MB of execution overhead in the user's ART environment.