• Title/Summary/Keyword: 소스 공개 코드

Search Result 104, Processing Time 0.027 seconds

A Study on the Protection against Linux Kernel Module Backdooring (리눅스 커널 모듈 백도어 방지에 대한 연구)

  • 김성수;김기창
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.634-636
    • /
    • 2001
  • 최근 국내에 공개 운영 체제인 리눅스 시스템의 증가함에 따라서 보안에 중요성이 커지고 있는데 LKM 백도어는 커널 소스를 변경 하기 때문에 강력한 기능을 가지고 있어, 악의적인 코드로 인해 시스템에 근피해를 입힐 수 있다. LKM백도어 방지에 대한 여러 가지 방법이 소개가 되었지만, 대부분의 경우 커널을 수정해야 하기 때문에 설치가 쉽지 않으며, 사용의 제약이 많다. 따라서 본 논문에서는 커널에 의존하지 않고 insmod안에 LKM을 탐지를 할 수 있는 시스템을 설계를 하며, 일반적인 모듈과 LKM 백도어 모듈을 구분하여 일반적인 모듈은 정상적인 진행을 하고, LKM 백도어에 대해서는 로딩을 할 수 없는 안정적인 사용을 할 수 있는 시스템을 제안 한다.

  • PDF

Plug-in Diverse Parsers Within Code Visualization System with Redefining the Coupling and Cohesion in the Object-Oriented Paradigm (객체지향 관점의 결합도 & 응집도 재정의와 코드 가시화 시스템내 파서 플러그인화 구현)

  • Lee, Jin Hyub;Park, Ji Hun;Byun, Eun Young;Son, Hyun Seung;Seo, Chae Yun;Kim, R. Young Chul
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.5
    • /
    • pp.229-234
    • /
    • 2017
  • Because of the invisible nature of software and the bad coding habits (bad smell) of the existing developers, there are many redundant codes and unnecessary codes, which increases the complexity and makes it difficult to upgrade software. Therefore, it is required a code visualization so that developers can easily and automatically identify the complexity of the source code. To do this, it is necessary to construct SW visualization tool based on open source software and redefine the coupling and cohesion according to the object oriented viewpoint. Specially to identify a bad smell code pattern, we suggest how to plug-in diverse parsers within our tool. In this paper, through redefining coupling and cohesion from an object oriented perspective, we will extract bad smell code patterns within source code from inputting any pattern into the tool.

Development of Numerical Tank Using Open Source Libraries and Its Application (오픈 소스 라이브러리를 이용한 수치수조 구현 및 적용)

  • Park, Sunho;Rhee, Shin Hyung
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.6
    • /
    • pp.746-751
    • /
    • 2014
  • In this paper, ship performance prediction solver was developed using open source computational fluid dynamics (CFD) libraries. The mass- and momentum-conservation equations and turbulent model with a wall function for the turbulent closer were considered. The volume fraction transport equation with a high-resolution interface capturing scheme were selected for free-surface simulation. The predicted wave pattern around KRISO container ship (KCS) using developed program showed good agreement against existing experimental data. For the revolution of a propeller in the propulsive test, general grid interface (GGI) library was used. The predicted propulsive performance showed 7 % difference against experimental data. Two-phase mixture model was developed to simulate a cavitation and applied to a propeller. The sheet cavitation on the propeller was predicted well. From results, the potential of the numerical tank developed by open source libraries was verified by applying it to KCS.

CFD CODE DEVELOPMENT FOR THE PREDICTION OF THE SHIP RESISTANCE USING OPEN SOURCE LIBRARIES (소스공개 라이브러리를 활용한 선박 저항계산 CFD 코드 개발)

  • Park, Sun-Ho;Park, Se-Wan;Rhee, Shin-Hyung;Lee, Sang-Bong;Choi, Jung-Eun;Kang, Seon-Hyung
    • Journal of computational fluids engineering
    • /
    • v.17 no.2
    • /
    • pp.21-27
    • /
    • 2012
  • Reynolds-averaged Navier-Stokes equations solver based on a pressure-based cell-centered finite volume method was developed using OpenFOAM libraries, which was an open source and providing computational continuum mechanics libraries. For the reasonable development of the turbulent boundary layer on the bow of the ship, specified library was developed. Grid sensitivities, such as skewness and aspect ratio of a cell, were tested for the solution convergence. Pressure, turbulent kinetic energy, turbulent dissipation rate contours on the ship surface computed by the developed CFD code were compared with those computed by the commercial CFD code, Fluent.

Applying SeqGAN Algorithm to Software Bug Repair (소프트웨어 버그 정정에 SeqGAN 알고리즘을 적용)

  • Yang, Geunseok;Lee, Byungjeong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.5
    • /
    • pp.129-137
    • /
    • 2020
  • Recently, software size and program code complexity have increased due to application to various fields of software. Accordingly, the existence of program bugs inevitably occurs, and the cost of software maintenance is increasing. In open source projects, developers spend a lot of debugging time when solving a bug report assigned. To solve this problem, in this paper, we apply SeqGAN algorithm to software bug repair. In detail, the SeqGAN model is trained based on the source code. Open similar source codes during the learning process are also used. To evaluate the suitability for the generated candidate patch, a fitness function is applied, and if all test cases are passed, software bug correction is considered successful. To evaluate the efficiency of the proposed model, it was compared with the baseline, and the proposed model showed better repair.

Privacy Amplification of Correlated Key Decryption over Public Channels (공개 채널을 통한 상관 키 분산 암호화의 프라이버시 증폭)

  • Lee, Sun-Yui;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.73-78
    • /
    • 2018
  • In this paper, we consider a system where multiple sources are encrypted in separated nodes and sent through their respective public communication channels into a joint sink node. We are interested at the problem on protecting the security of an already existing system such above, which is found out to have correlated encryption keys. In particular, we focus on finding a solution without introducing additional secret keys and with minimal modification to minimize the cost and the risk of bringing down an already running system. We propose a solution under a security model where an eavesdropper obtains all ciphertexts, i.e., encrypted sources, by accessing available public communication channels. Our main technique is to use encoders of universal function to encode the ciphertexts before sending them to public communication channels.

Construction of the Internet Three-dimensional Map Server Using Linux Operating System and VRML (Linux운영체제와 VRML을 이용한 인터넷 3차원 지도 서버 구축)

  • 임인섭;정성혁;이재기
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.21 no.4
    • /
    • pp.341-346
    • /
    • 2003
  • For tendering three-dimensional map information using Internet, firstly Web server is considered, but generally the source code of commercial application is not open to the public and approaching the source technology is difficult. So, there are many limitations of the technology development. In this study, to solve these problems, we have introduced Linux operating system with open source system and utilized VRML to be able to practice three-dimensional spatial data on Web browser, and constructed the Internet three-dimensional map server. In the result, the constructed server is economical because there is no cost except the hardware, and the active maintenance and management is accomplished by using the opened source code.

Analysis of the Efficiency for Some Selected Double-Block-Length Hash Functions Based on AES/LEA (AES/LEA 기반 이중블록길이 해쉬함수에 대한 효율성 분석)

  • Kim, Dowon;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1353-1360
    • /
    • 2016
  • We analyze the efficiency of the double-block-length hash functions, Abreast-DM, HIROSE, MDC-2, MJH, MJH-Double based on AES or LEA. We use optimized open-source code for AES, and our implemented source code for LEA. As a result, the hash functions based on LEA are generally more efficient than those, based on AES. In terms of speed, the hash function with LEA are 6%~19% faster than those with AES except for Abreast-DM. In terms of memory, the hash functions with LEA has 20~30 times more efficient than those with AES.

Numerical Investigation on Oil Spill from Damaged Riser (손상된 라이저로부터 유출된 기름 확산에 대한 수치해석)

  • Kim, Hyo Ju;Lee, Sang Chul;Park, Sunho
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.19 no.2
    • /
    • pp.99-110
    • /
    • 2016
  • When a riser is damaged, the oil spills to sea. Oil spills cause huge economic losses as well as a destruction of the marine environment. To reduce losses, it is needed to predict spilled oil volume from risers and the excursion of the oil. The present paper simulated the oil spill for a damaged riser using open source libraries, called Open-FOAM. To verify numerical methods, jet flow and Rayleigh-Taylor instability were simulated. The oil spill was simulated for various damaged leak size, spilled oil volume rates, damaged vertical locations of a riser, and current speeds. From results, the maximum excursion of the spilled oil at the certain time was predicted, and a forecasting model for various parameters was suggested.

A Study of Negative App Detection from Active Pattern Anlysis in Android Platform (안드로이드 플랫폼에서 활성 패턴 분석을 통한 부정 앱 검출에 관한 연구)

  • Lee, Chang-Soo;Hwang, Jin-Wook
    • Proceedings of the KAIS Fall Conference
    • /
    • 2012.05b
    • /
    • pp.835-838
    • /
    • 2012
  • 최근 스마트폰의 폭팔적인 증가와 함께 사용 환경개선도 이루어 지고 있다. 또한 Wi-Fi 존의 증가와 LTE같은 빠른 네트워크 환경은 사용자 중심의 수 많은 앱을 탄생시키고 있다. 안드로이드는 애플의 iOS와는 다른 오픈소스 정책으로 플랫폼 소스가 공개되어 있어 많은 개발자가 쉽게 접근이 가능하다. 그러나 안드로이드는 앱(App) 검증 체계가 미흡하기 때문에 악성코드 등으로 인한 위협요소가 존재하고 있다. 또한 파일 시스템은 임의적 접근제어방식으로 공격자가 취약점을 통해 관리자 권한을 얻어 시스템 자원을 제어할 수 있기 때문에 위협요소가 다분하다. 본 논문에서는 스마트폰 앱이 호출하는 시스템 API 및 네트워크 자원사용 패턴을 분석하여 부정 앱을 차단하는 방법을 제안하였다. 제안 방법으로 실험한 결과 API호출 빈도 및 자원 사용률이 최소 기준치 이하로 검출된 경우를 제외한 평가대상은 모두 검출하여 보안성 강화에 효과적인 것으로 실험을 통하여 검증하였다.

  • PDF