• Title/Summary/Keyword: 소스코드 분석

Search Result 341, Processing Time 0.03 seconds

An Android API Obfuscation Tool using Reflection and String Encryption (리플렉션과 문자열 암호화를 이용한 안드로이드 API 난독화 도구)

  • Lee, Joohyuk;Park, Heewan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.1
    • /
    • pp.23-30
    • /
    • 2015
  • Reflection is a feature of the Java programming language that can examine and manipulate components of program itself. If you use the reflection, you can get an obfuscation effect of Java source because it converts sources into complicated structures. However, when using it, strings of components name of program are exposed. Therefore, it cannot prevent static analysis. In this paper, we presents a method and a tool of interfere with static analysis using reflection. And in this case, exposed strings are encoded using Vigen$\acute{e}$re cipher. Experimental results show that this tool is effective in increasing the overall complexity of the source code. Also the tool provides two types decryption method based on server and local. It can be selected based on the importance of the API because it affects the execution speed of the application.

Design a Platform for Balancing Mutual Values between Objects (객체들 간의 상호 가치 균형을 위한 플랫폼 설계)

  • Kim, Bong-Han
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.241-248
    • /
    • 2017
  • There are various problems in the process of developing the game. Especially, there is a lot of problems in testing the balance of the value of each object. This causes problems such as an increase in development cost and a delay in development time. Therefore, if there is a tool or simulator that can test the mutual value balance of each object in advance, this problem can be solved. However, currently there are few simulators, tools, and platforms that can analyze and evaluate the mutual value balance between these objects. In this paper, I designed a platform to evaluate and test the mutual value balance between these objects based on mock battle. The designed platform tests and evaluates the abilities of each object according to their attack and defense strengths. So, this reduces development costs and shortens development time.

Design and Implementation of a Web-based Programming Class Support System (웹기반 프로그래밍 언어 강의 지원 시스템의 설계 및 구현)

  • Park, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2775-2782
    • /
    • 2010
  • In this paper, we propose a web-based programming class support system to help a lecturer to teach a programming language to students effectively. The proposed system is composed of a error analysis step and a verification step. The error analysis step checks whether there are compile time errors or run time errors in each student's submitted program. Given some errors, the system provides helpful feedback for the student to fix the errors. On the contrary, the system provides quick feedback after checking the source code style, comments, and plagiarism in the submitted program. As soon as the student submits the program, the student can see the check results. According to the result of utilizing the proposed system in a C programming language class, students tend to submit program assignments actively.

Testing Android Applications Considering Various Contexts Inferred from Permissions (안드로이드 어플리케이션 개발에서 퍼미션 분석을 사용한 다양한 테스트 환경 조건 생성 기법)

  • Song, Kwangsik;Han, Ah-Rim;Jeong, Sehun;Cha, Sungdeok
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1022-1030
    • /
    • 2015
  • The context-awareness of mobile applications yields several issues for testing, since mobile applications should be able to be tested in any environment and under any contextual input. In previous studies of testing for Android applications as an event-driven system, many researchers have focused on using generated test cases considering only Graphical User Interface (GUI) events. However, it is difficult to find failures that could be detected when considering the changes in the context in which applications run. It is even more important to consider various contexts since the mobile applications adapt and use the new features and sensors of mobile devices. In this paper, we provide a method of systematically generating various executing contexts from permissions. By referring to the lists of permissions, the resources used by the applications for running Android applications can be easily inferred. To evaluate the efficiency of our testing method, we applied the method on two open source projects and showed that it contributes to improve the statement code coverage.

A Study on game engine properties for Art college education (예술 대학 교육을 위한 게임엔진 특성 연구 (Unity와 Unreal engine을 중심으로))

  • Cho, Hyung-ik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.227-229
    • /
    • 2019
  • Currently, people use game engines which is consist of essential elements(Graphic engine, Physics engine, Audio engine, UI system, Gameplay frameworks, etc) to develop video. This game engine is used for its own development, but usually it is used by renting a commercial engine. To be able to use such a game engine requires a lot of theoretical and functional education, but in a limited period of university education, it is impossible to deal with various game engines in game art colleges, not general engineering universities. This paper will compare and analyze the characteristics, and merits and demerits of these two kinds of Game engines (Unity and Unreal engine), and showed the result of analyses about the fact that educating which of the above 2 Game engines are helpful and beneficial for the students for the efficient education in the Art college where should teach much in the limited time.

  • PDF

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

An Optimized V&V Methodology to Improve Quality for Safety-Critical Software of Nuclear Power Plant (원전 안전-필수 소프트웨어의 품질향상을 위한 최적화된 확인 및 검증 방안)

  • Koo, Seo-Ryong;Yoo, Yeong-Jae
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.1-9
    • /
    • 2015
  • As the use of software is more wider in the safety-critical nuclear fields, so study to improve safety and quality of the software has been actively carried out for more than the past decade. In the nuclear power plant, nuclear man-machine interface systems (MMIS) performs the function of the brain and neural networks of human and consists of fully digitalized equipments. Therefore, errors in the software for nuclear MMIS may occur an abnormal operation of nuclear power plant, can result in economic loss due to the consequential trip of the nuclear power plant. Verification and validation (V&V) is a software-engineering discipline that helps to build quality into software, and the nuclear industry has been defined by laws and regulations to implement and adhere to a through verification and validation activities along the software lifecycle. V&V is a collection of analysis and testing activities across the full lifecycle and complements the efforts of other quality-engineering functions. This study propose a methodology based on V&V activities and related tool-chain to improve quality for software in the nuclear power plant. The optimized methodology consists of a document evaluation, requirement traceability, source code review, and software testing. The proposed methodology has been applied and approved to the real MMIS project for Shin-Hanul units 1&2.

Application of K-BASINRR developed for Continuous Rainfall Runoff Analysis to Yongdam Dam Test Bed (장기유출해석을 위하여 개발된 K-BASINRR의 용담댐 시험유역 적용)

  • Kim, Yeonsu;Jung, Ji Young;Noh, Joonwoo;Kim, Sung Hoon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.211-211
    • /
    • 2017
  • 장기유출해석 모델은 수자원의 안정적인 확보와 이용, 유역단위 기초자료 조사관리 등을 위하여 수자원 장기종합계획 및 전국유역조사사업 등에 활용되고 있다. 주로 국외에서 개발된 모형이 활용되고 있어, 국내의 여건에 맞추어 편의성이 개선된 모형을 찾는 것은 매우 어려운 일이다. 또한, 유출해석을 수행하기에 앞서 지속적으로 업데이트된 모델에 대한 객관적인 평가를 수행한 사례는 드물다. 따라서, 본 연구에서는 국내에서 주로 활용되고 있는 장기유출해석모델(TANK, SWAT, SSARR, PRMS 등)에 대한 비교검토를 토대로 각종 사업과의 연계성, 계산의 효율성, 정확도 등을 고려하여 USGS에서 개발한 PRMS v.4.0.2를 기반으로 국내유역에 활용이 가능하도록 개선한 $K-BASIN^{RR}$ 및 입력자료 전처리기를 개발하였다. PRMS 모형은 융설 및 지하수 흐름 등 다양한 기능을 포함하여 강우유출 분석에 활용성 높은 모형으로 평가받고 있으나, 국내 OS환경 및 활용 단위계에서 활용성이 떨어지는 단점이 있다. 본 연구에서는 소스코드 개선 및 GUI구축을 통하여 PC 환경에서 구동이 쉽도록 재구성하였고, 사용자 편의성 확보를 위한 입력자료 전처리기를 개발함으로써 수자원단위지도 3.0, 임상도 재분류 테이블, 토양도 재분류 테이블의 DB화 및 모형의 구동을 위한 HRU분할, 입력자료 생성이 가능하도록 하였다. 매개변수 최적화를 위하여 하천 유량뿐만 아니라 기저유출량을 대상으로 Monte-Carlo 시뮬레이션 기반의 매개변수를 최적화 기능을 탑재하였다. 개발된 모형의 적용성 평가를 위하여 용담댐 시험유역을 대상으로 11년 간(2005-2015)의 강우 및 온도자료를 입력자료로 활용하여 모의한 결과 샘플의 개수에 따라 NSE(Nash-Sutcliffe Efficiency)를 0.9까지 추정이 가능함을 파악하였다. 또한, 유출량과 기저유출에 대하여 동시에 최적화를 수행하는 경우 NSE를 유출량에 대하여 0.8, 기저유출량에 대하여 0.6까지 추정이 가능하였다. 최적화된 모의 결과에 대한 검토를 위하여 계산증발산량을 측정증발산량과 비교한 결과, 유사한 패턴을 나타내는 것을 확인할 수 있었다. 본 연구에서 개발한 $K-BASIN^{RR}$을 활용하는 경우 장기유출해석 업무에 효율성 및 정확도를 향상할 수 있을 것으로 판단된다.

  • PDF

CNVDAT: A Copy Number Variation Detection and Analysis Tool for Next-generation Sequencing Data (CNVDAT : 차세대 시퀀싱 데이터를 위한 유전체 단위 반복 변이 검출 및 분석 도구)

  • Kang, Inho;Kong, Jinhwa;Shin, JaeMoon;Lee, UnJoo;Yoon, Jeehee
    • Journal of KIISE:Databases
    • /
    • v.41 no.4
    • /
    • pp.249-255
    • /
    • 2014
  • Copy number variations(CNVs) are a recently recognized class of human structural variations and are associated with a variety of human diseases, including cancer. To find important cancer genes, researchers identify novel CNVs in patients with a particular cancer and analyze large amounts of genomic and clinical data. We present a tool called CNVDAT which is able to detect CNVs from NGS data and systematically analyze the genomic and clinical data associated with variations. CNVDAT consists of two modules, CNV Detection Engine and Sequence Analyser. CNV Detection Engine extracts CNVs by using the multi-resolution system of scale-space filtering, enabling the detection of the types and the exact locations of CNVs of all sizes even when the coverage level of read data is low. Sequence Analyser is a user-friendly program to view and compare variation regions between tumor and matched normal samples. It also provides a complete analysis function of refGene and OMIM data and makes it possible to discover CNV-gene-phenotype relationships. CNVDAT source code is freely available from http://dblab.hallym.ac.kr/CNVDAT/.

An Efficient Network System Call Interface supporting minimum memory copy (메모리 복사를 최소화화는 효율적인 네트워크 시스템 호출 인터패이스)

  • 송창용;김은기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4B
    • /
    • pp.397-402
    • /
    • 2004
  • In this paper, we have designed and simulated a new file transmission method. This method restricts memory copy and context switching happened in traditional file transmission. This method shows an improved performance than traditional method in network environment. When the UNIX/LINUX system that uses the existing file transfer technique transmits a packet to the remote system, a memory copy between the user and kernel space occurs over twice at least. Memory copy between the user and kernel space increase a file transmission time and the number of context switching. As a result, the existing file transfer technique has a problem of deteriorating the performance of file transmission. We propose a new algorithm for solving these problems. It doesn't perform memory copy between the user and kernel space. Hence, the number of memory copy and context switching is limited to the minimum. We have modified the network related source code of LINUX kernel 2.6.0 to analyzing the performance of proposed algorithm and implement new network system calls.