• Title/Summary/Keyword: 목적 코드 비교

Search Result 154, Processing Time 0.026 seconds

Similarity Detection in Object Codes and Design of Its Tool (목적 코드에서 유사도 검출과 그 도구의 설계)

  • Yoo, Jang-Hee
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • The similarity detection to plagiarism or duplication of computer programs requires a different type of analysis methods and tools according to the programming language used in the implementation and the sort of code to be analyzed. In recent years, the similarity appraisal for the object code in the embedded system, which requires a considerable resource along with a more complicated procedure and advanced skill compared to the source code, is increasing. In this study, we described a method for analyzing the similarity of functional units in the assembly language through the conversion of object code using the reverse engineering approach, such as the reverse assembly technique to the object code. The instruction and operand table for comparing the similarity is generated by using the syntax analysis of the code in assembly language, and a tool for detecting the similarity is designed.

Study on the comparison result of Machine code Program (실행코드 비교 감정에서 주변장치 분석의 유효성)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.37-44
    • /
    • 2020
  • The similarity of the software is extracted by the verification of comparing with the source code. The source code is the intellectual copyright of the developer written in the programming language. And the source code written in text format contains the contents of the developer's expertise and ideas. The verification for judging the illegal use of software copyright is performed by comparing the structure and contents of files with the source code of the original and the illegal copy. However, there is hard to do the one-to-one comparison in practice. Cause the suspected source code do not submitted Intentionally or unconsciously. It is now increasing practically. In this case, the comparative evaluation with execution code should be performed, and indirect methods such as reverse assembling method, reverse engineering technique, and sequence analysis of function execution are applied. In this paper, we analyzed the effectiveness of indirect comparison results by practical evaluation . It also proposes a method to utilize to the system and executable code files as a verification results.

Comparison procedure in evaluation analysis of source code comparison on Embedded system (정보기기 소스코드 유사성 분석에서 목적물 검증)

  • Nam, SangYep;Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.31-38
    • /
    • 2021
  • In order to analyze the similarity of the source code object material, the source code on both sides must be able to be compiled and executed. In particular, in the case of hardware-integrated software, it is necessary to check whether the hardware interface matches. However, currently, the source code is provided in an incomplete state which is not original of source code used in developing steps. The complainant confirms that the executing characteristics are similar to their own in the expression and function of the output, and request an evaluation. When a source code compilation error occurs during the evaluation process, the experts draw a flowchart of the source code and applies the method of tracing the code flow for each function as indirect method. However, this method is indirect and the subjective judgment is applied, so there is concern about the contention of objectivity in the similarity evaluation result. In this paper, the problems of unverified source code similarity analysis and improvement directions are dealt with, through the analysis cases of source code disputes applied to embedded systems.

ARM Code Generation System using Syntax-Directed Translation Technique (문법-지시적 변환 기법을 이용한 ARM 코드 생성 시스템)

  • Ko, Kwang-Man
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.82-88
    • /
    • 2008
  • ARM processors are being utilized in a variety of embedded systems. It is also that most ARM processor accepts C application, and then generates ARM assembly code using GNU gcc Cross-compiler. For the purpose of improving the quality of code generated and the efficient code generation, the various researches are underway. In this paper, we generates the ARM assembly code from the ANSI C programs using Syntax-directed Translation Techniques, and then the performance evaluation results for our research experimental compare to GNU gcc Cross-compiler are described. The techniques are presented in this research compared to GNU gcc cross-compiler very simple and convenient in extension of the production rules.

Development of a Computer Code for Analyzing Time-dependent Nuclides Concentrations in the Multi-stage Continuous HLW Processing System (I) - Equilibrium Steady State - (다단계 연속후처리를 포함하는 핵주기공정의 핵종농도 동적분포 해석코드 계발(I) -정상 평형상태 해석모델-)

  • Oh, Se-Kee
    • Proceedings of the KIEE Conference
    • /
    • 2000.11a
    • /
    • pp.262-264
    • /
    • 2000
  • 원자로 내에서 연소 중인 핵연료나 저장 또는 재처리 중인 사용후핵연료의 성분으로서 시설의 공정설계, 안전성분석 및 차폐설계에 중요한 입력자료가 되는 핵분열생성물질, 방사화생성물 및 악티나이드의 핵종 농도와 이에 대응하는 방사능 강도의 기기 별 시간변 화율을 해석할 수 있는 코드 개발할 목적으로 MULTISAMS 정상 평형상태 모델을 구현하였다. MULTISAMS 코드의 반응공정 모델은 서로 연결되어 있으며 내부에 방사성물질의 혼합유체가 순환하는 세 종류의 반응기(원자로, 열교환기 및 화학반응기) 계통에서 자연적 또는 설계에 의해 일어나는 현상으로서; 반응기 간의 물질 흐름; 각 반응기 내에서 방사성 붕괴, 변환, 이동과 중성자 흡수 및 핵분열; 외부로부터 특정 핵종의 유입혹은 유출을 고려한 시간종속 핵종농도보존방정식 이론에 근거한다. 코드의 유용성 및 신뢰성을 검증하기 위해 현재 개념설계가 진행 중인 AMBIDEXTER원자력 에너지시스템을 대상으로 ORIGEN2 계산과 비교하였다. 두 코드 간의 입력조건과 배경이론차이점 때문에 절대적 비교가 불가능하므로 단순이론의 중간매개코드로서 SAMS를 이용한 2단계 비교방법을 따랐다. 결론은 MULTISAMS는 ORIGEN2 계산의 수렴치와 근사하게 일치하면서 ORIGEN2 가 다룰 수 없는 핵주기 연속후처리공정의 정상가동 시 핵종 평형농도를 기기 별로 계산할 수 있다는 장점을 확인하였다.

  • PDF

Object Material Confirmation for Source Code Comparison on Embedded System (임베디드 시스템의 동일기능 소스코드 유사도 분석 요구사항)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.25-30
    • /
    • 2021
  • In case of evaluating the similarity of the source code analysis material in the embedded system, the provided source code must be confirmed to be executable. However, it is currently being in which compilation and interface matching with hardware are provided in an unconfirmed materials. The complainant assumes that many parts of the source code are similar because the characteristics of the operation are similar and the expression of the function is similar. As for the analysis result, the analysis result may appear different than expected due to these unidentified objects. In this study, the improvement direction is sugested through the case study by the analysis process of the source code and the similarity of the unverified source code.

A Comparison of Low-Dimensional Reactor Kinetics Analysis Methods with Modified Borresen's Coarse-Mesh Method (저차원 원자로 동특성 해법과 다차원 수정형 Borresen 소격해법의 비교)

  • Kim, Chang-Hyo;Lee, Gyu-Bok
    • Nuclear Engineering and Technology
    • /
    • v.22 no.4
    • /
    • pp.359-370
    • /
    • 1990
  • This study concerns with comparing low-dimensional reactor kinetics methods with a three-dimensional kinetics method to be used for safety analysis of light water reactors in order to suggest means of preparing input parameters required for low-dimensional methods. For this purpose a one-dimensional finite difference two-group diffusion theory code ODTRAN and a third-order Hermit polynomial-based point kinetics code POTRAN are developed and used to obtain low-dimensional solutions to the LRA-BWR kinetics benchmark problem. The results are compared with a three-dimensional modified Borresen's coarse-mesh solution of the kinetics problem by CMSNACK code. Through this comparison some simple but practical means of preparing input parameters of low-dimensional kinetics analysis methods are suggested.

  • PDF

CANDU형 발전소의 주증기관 파단사고에 대한 RELAP5 코드 모사

  • 양채용;이석호;이종인
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1997.05a
    • /
    • pp.479-483
    • /
    • 1997
  • CANDU형 발전소의 사고해석 검증을 위한 계통분석 코드는 별도로 개발되어 있지 않으며, PWR 사고해석 검증용으로 널리 사용되고 있는 RELAP5 코드를 CANDU형 발전소의 사고해석 검증용으로 개발하려는 연구가 현재 진행되고 있다. CANDU형 발전소를 묘사한 RD-14 실험장치에서의 실험결과를 RELAP5 코드로 평가한 연구는 있으나, 실제 CANDU형 발전소의 사고해석에 적용한 예는 없다. 본 연구에서는 RELAP5 코드를 이용하여 CANDU형 발전소의 주증기관 파단사고를 분석하고, 그 결과를 월성 2,3,4 FSAR의 분석결과와 비교하여, CANDU형 발전소에 대한 RELAP5 코드의 적용 타당성을 평가하는데 그 목적이 있다. 연구결과, RELAP5 코드는 CANDU형 발전소의 주증기관 파단사고를 잘 모사하고 있으며, CANDU형 발전소의 사고해석 검증용 코드로서 적절함을 보여주고 있다.

  • PDF

Function partitioning methods for malware variant similarity comparison (변종 악성코드 유사도 비교를 위한 코드영역의 함수 분할 방법)

  • Park, Chan-Kyu;Kim, Hyong-Shik;Lee, Tae Jin;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.321-330
    • /
    • 2015
  • There have been found many modified malwares which could avoid detection simply by replacing a sequence of characters or a part of code. Since the existing anti-virus program performs signature-based analysis, it is difficult to detect a malware which is slightly different from the well-known malware. This paper suggests a method of detecting modified malwares by extending a hash-value based code comparison. We generated hash values for individual functions and individual code blocks as well as the whole code, and thus use those values to find whether a pair of codes are similar in a certain degree. We also eliminated some numeric data such as constant and address before generating hash values to avoid incorrectness incurred from them. We found that the suggested method could effectively find inherent similarity between original malware and its derived ones.

Analysis of biometric information using watermarking technology (워터마크 기술을 이용한 생체정보의 비교 분석)

  • Lee, Hyeon-ji;Moon, jeong-eun;Seo, Young-ho
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.11a
    • /
    • pp.388-391
    • /
    • 2020
  • 최근 스마트폰과 어플리케이션의 기술 발전으로 일상생활에서 은행의 주거래 혹은 보안인증으로 생체정보를 이용하는 것이 급격히 확대되고 있다. 이러한 생체정보 보호를 위해 디지털 콘텐츠 내에 저작권자의 정보를 삽입하여 정보를 보호하는 기술인 워터마킹 기술을 도입하여 생체정보의 복제 혹은 도용 시에 발생할 수 있는 문제를 예방하는 것이 본 연구의 목적이다. 본 논문에서는 홍채 이미지에 DWT를 적용한후 QIM 방식을 이용해 임의의 QR코드로 워터마크를 삽입하여 홍채 코드를 추출한후 워터마크를 삽입하기 전의 홍채코드와 삽입 후의 홍채코드를 PSNR 통해 비교 분석하고 Stirmark 에서 제공하는 강인성 테스트를 이용해 강인성의 정도를 알아본다.

  • PDF