• Title/Summary/Keyword: 실행가능성 검사

Search Result 47, Processing Time 0.027 seconds

Detection of Potential Memory Access Errors based on Assembly Codes (어셈블리어 코드 기반의 메모리 오류 가능성 검출)

  • Kim, Hyun-Soo;Kim, Byeong-Man;Bae, Hyun-Seop;Chung, In-Sang
    • The KIPS Transactions:PartD
    • /
    • v.18D no.1
    • /
    • pp.35-44
    • /
    • 2011
  • Memory errors can cause not only program malfunctions but also even unexpected system halt. Though a programmer checks memory errors, some memory errors with low occurrence frequency are missed to detect. In this paper, we propose a method for effectively detecting such memory errors using instruction transition diagrams through analyzing assembly codes obtained by disassembling an executable file. Out of various memory errors, local memory return errors, null pointer access errors and uninitialized pointer access errors are targeted for detection. When applying the proposed method to various programs including well-known open source programs such as Apache web server and PHP script interpreter, some potential memory errors are detected.

HW/SW Partitioning Techniques for Multi-Mode Multi-Task Embedded Applications (멀티모드 멀티태스크 임베디드 어플리케이션을 위한 HW/SW 분할 기법)

  • Kim, Young-Jun;Kim, Tae-Whan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.8
    • /
    • pp.337-347
    • /
    • 2007
  • An embedded system is called a multi-mode embedded system if it performs multiple applications by dynamically reconfiguring the system functionality. Further, the embedded system is called a multi-mode multi-task embedded system if it additionally supports multiple tasks to be executed in a mode. In this Paper, we address a HW/SW partitioning problem, that is, HW/SW partitioning of multi-mode multi-task embedded applications with timing constraints of tasks. The objective of the optimization problem is to find a minimal total system cost of allocation/mapping of processing resources to functional modules in tasks together with a schedule that satisfies the timing constraints. The key success of solving the problem is closely related to the degree of the amount of utilization of the potential parallelism among the executions of modules. However, due to an inherently excessively large search space of the parallelism, and to make the task of schedulabilty analysis easy, the prior HW/SW partitioning methods have not been able to fully exploit the potential parallel execution of modules. To overcome the limitation, we propose a set of comprehensive HW/SW partitioning techniques which solve the three subproblems of the partitioning problem simultaneously: (1) allocation of processing resources, (2) mapping the processing resources to the modules in tasks, and (3) determining an execution schedule of modules. Specifically, based on a precise measurement on the parallel execution and schedulability of modules, we develop a stepwise refinement partitioning technique for single-mode multi-task applications. The proposed techniques is then extended to solve the HW/SW partitioning problem of multi-mode multi-task applications. From experiments with a set of real-life applications, it is shown that the proposed techniques are able to reduce the implementation cost by 19.0% and 17.0% for single- and multi-mode multi-task applications over that by the conventional method, respectively.

Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment (안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법)

  • Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.73-81
    • /
    • 2021
  • When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functions and services. This means that the application will have direct access to the download folder where the numerous files downloaded. In this paper, to prove our feasibility of attack using the security vulnerabilities mentioned above, we developed a file hacking function disguised as an encryption function in the file management application. The file that encrypted will be sent to hackers via E-mail simultaneously on the background. The developed application was evaluated from VirusTotal, a malicious analysis engine, was not detected as a malicious application in all 74 engines. Finally, in this paper, we propose a defense technique and an algorithm based on the Trusted Execution Environment (TEE) to supplement these storage vulnerabilities.

An Improved Online Algorithm to Minimize Total Error of the Imprecise Tasks with 0/1 Constraint (0/1 제약조건을 갖는 부정확한 태스크들의 총오류를 최소화시키기 위한 개선된 온라인 알고리즘)

  • Song, Gi-Hyeon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.10
    • /
    • pp.493-501
    • /
    • 2007
  • The imprecise real-time system provides flexibility in scheduling time-critical tasks. Most scheduling problems of satisfying both 0/1 constraint and timing constraints, while the total error is minimized, are NP-complete when the optional tasks have arbitrary processing times. Liu suggested a reasonable strategy of scheduling tasks with the 0/1 constraint on uniprocessors for minimizing the total error. Song et at suggested a reasonable strategy of scheduling tasks with the 0/1 constraint on multiprocessors for minimizing the total error. But, these algorithms are all off-line algorithms. In the online scheduling, the NORA algorithm can find a schedule with the minimum total error for the imprecise online task system. In NORA algorithm, EDF strategy is adopted in the optional scheduling. On the other hand, for the task system with 0/1 constraint, EDF_Scheduling may not be optimal in the sense that the total error is minimized. Furthermore, when the optional tasks are scheduled in the ascending order of their required processing times, NORA algorithm which EDF strategy is adopted may not produce minimum total error. Therefore, in this paper, an online algorithm is proposed to minimize total error for the imprecise task system with 0/1 constraint. Then, to compare the performance between the proposed algorithm and NORA algorithm, a series of experiments are performed. As a conseqence of the performance comparison between two algorithms, it has been concluded that the proposed algorithm can produce similar total error to NORA algorithm when the optional tasks are scheduled in the random order of their required processing times but, the proposed algorithm can produce less total error than NORA algorithm especially when the optional tasks are scheduled in the ascending order of their required processing times.

Evaluation of Defects of Thermal Barrier Coatings by Thermal Shock Test Using Eddy Current Testing (열차폐 코팅층의 고온 열충격 시험후 ECT를 이용한 결함 평가)

  • Heo, Tae-Hoon;Cho, Youn-Ho;Lee, Joon-Hyun;Oh, Jeong-Seok;Lee, Koo-Hyun
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.29 no.5
    • /
    • pp.450-457
    • /
    • 2009
  • Periodical thermal shock can introduce defects in thermal barrier coating made by layers of CoNiCrAlY bond coating(BC) and $ZrO_2-8wt%Y_2O_3$ ceramic top coating(TC) on Inconel-738 substrate using plasma spraying. Thermal shock test is performed by severe condition that is to heat until $1000^{\circ}C$ and cool until $20^{\circ}C$. As the number of cycle is increased, the fatigue by thermal shock is also increased. After test, the micro-structures and mechanical characteristics of thermal barrier coating were investigated by SEM, XRD. The TGO layer of $Al_2O_3$ is formed between BC and TC by periodical thermal shock test, and its change in thickness is inspected by eddy current test(ECT). By ECT test, it is shown that TGO and micro-crack can be detected and it is possible to predict the life of thermal barrier coating.

The Effect of Classes Using the Scratch for Quasi-Microscopic Representation Approaches in Dynamic Equilibrium Learning (동적 평형 학습에서 준미시적 표상 접근을 위한 스크래치 활용 수업의 효과)

  • Seongjae Lee;Sungki Kim;Seoung-Hey Paik
    • Journal of the Korean Chemical Society
    • /
    • v.67 no.4
    • /
    • pp.241-252
    • /
    • 2023
  • This study aims to increase students' understanding of equilibrium, one of the many concepts in chemistry that students find difficult. Dynamic equilibrium must be dealt with at the sub-microscopic level where the real and the representation overlap in order to microscopically understand the constant motion and interaction of particles and to understand the macroscopic characteristics expressed through this. However, as a result of analyzing 9 Chemistry I textbooks, the expression approach for equilibrium had some limitations. As a strategy to understand equilibrium at a sub-microscopic approach, the classes using scratch were consisted of a total of 4 hours, and it was implemented with 56 students. The classes were composed of 6 steps, and it was designed to understand equilibrium step by step. As a result of comparing the pretest and post- test, the number of students who got both the microscopic and macroscopic explanations of chemical equilibrium correct increased largely. Through this, it was possible to get a glimpse of the applicability of classes using scratch as the approach strategy of the sub-microscopic representation.

Effects of Home-based Virtual Reality on Upper Extremity Motor Function for Stroke - An Experimenter Blind Case Study (가정-중심 가상현실이 만성뇌졸중환자의 팔 운동기능에 미치는 영향 - 실험자 맹검 단일실험연구)

  • Lee, Jung-Ah;Hwang, Su-Jin;Song, Chiang-Soon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.7
    • /
    • pp.3023-3029
    • /
    • 2012
  • The purpose of this study was to investigate the effect of the home-based virtual reality (VR) on upper extremity motor function in hemiparetic stroke patients. Two matched subjects with left hemiplegia were volunteered to participate in this study. One subject received the home-based VR whereas the other subject recovered a modified home-based constraint-induced movement therapy (CIMT). Both interventions were given for 4 hours x 5 times a week for 4 weeks. Outcome measures included Fugl-Meyer Assessment (FMA), Motor Activity Log (MAL), and Wolf Motor Function Test (WMFT). The VR-trained subject showed considerable improvement in all the tested motor functions when compared with the home-based CIMT. Specifically, the FMA measure demonstrated that the VR subject showed 17% enhancement whereas the CIMT subject showed 5% increase. Similarly, Amount of Use (AOU) and Quality of Movement (QOM) of the MAL scores of the VR subject showed 40% and 20% increase whereas the CIMT subject showed 0% and 20% increase, respectively. The WMFT scores of the VR subject and CIMT subject showed 20% increase. Our home-based VR was effective in upper extremity motor recovery of chronic hemiparetic patients even when compared with the well-established CIMT approach in stroke victims.

Manifestation of Cognitive Function in Geriatric Patient with Subjective Memory Complaint (주관적 기억력 저하를 호소하는 노인 환자의 인지기능 양상)

  • Park, Han-Kyul;Kim, Jin-Sung;Lee, Jong-Bum;Seo, Wan-Seok;Koo, Bon-Hoon;Bai, Dai-Seg
    • Journal of Yeungnam Medical Science
    • /
    • v.27 no.1
    • /
    • pp.27-36
    • /
    • 2010
  • Purpose : The purpose of this study was to find out cognitive function of the patients with subjective memory complaint. Material and Methods : From March 1st 2005 to May 31st 2009, 155 normal individuals without any medical illness who visited Yeungnam University Hospital to undergo medical checkup with neurocognitive test was enrolled, and checked by using Cognitive Assessment & Reference Diagnostic System. Results : 107 of the patients had normal cognitive function, 21 patients (about 15%) were diagnosed with dementia, and 10 patients (about 7%) were diagnosed with considerable psychiatric illness, such as depression, anxiety disorder, adjustment disorder. In amnesia, agnosia, aphasia, attention, calculation, dysexecution, Dementia group and Psychiatric illness group has worse score than Normal individuals group. But, in apraxia, Dementia group has worse score than Psychiatric illness group and Normal individual group. Conclusion : Because the patients with subjective memory complaint can be diagnosed as any psychiatric illness as well as dementia, sensitive screening test and early psychiatric approach is needed.

  • PDF

OBSTETRICIAN'S VIEW OF TEENAGE PREGNANCY:PRESENT STATUS, PREVENTION AND PSYCHIATRIC CONSULTATION (산과 의사가 인지한 10대 임신의 현황, 예방, 정신과 자문)

  • Kim, Eun-Young;Kim, Boong-Nyun;Hong, Kang-E;Lee, Young-Sik
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.13 no.1
    • /
    • pp.117-128
    • /
    • 2002
  • Objectives:For the purpose of obtaining the more vivid present status and prevention program of teenage pregnancy, this survey was done by Obstetricians, as study subject, who manage the pregnant teenager in real clinical situation. Methods:Structured survey form about teenage pregnancy was sent to 2,800 obstetricians. That form contained frequency, characteristics, decision making processes, and psychiatric aspects of the teenage pregnancy. 349 obstetricians replied that survey form and we analysed these datas. Results:(1) The trend of teenage pregnancy was mildly increased. (2) The most common cases were unwanted pregnancy by continuing sexual relationship with boyfriends rather than by forced, accidental sexual relationship with multiple partners. (3) The most common reason of labor was loss the time of artificial abotion. (4) Problems of pregnant girls' were conduct behaviors and poor informations about contraception rather than sexual abuse or mental retardation. (5) Most obstetricians percepted the necessity of psychiatric consultation, however psychiatric consultation was rare due to parents refusal and abscense of available psychiatric facility. (6) For the prevention of teenage pregnancy, the most important thing was practical education about contraception. Conclusions:Based on the result of this study, further study using structured interview schedule with pregnant girl is needed for the detecting risk factor of teenage pregnancy and effective systematic approach to pregnant girl.

  • PDF

A Case Study on School Library Educational Services to Reduce the Information Literacy Gap Due to the Education Gap (교육격차에 따른 정보활용능력 격차 완화를 위한 학교도서관 교육 서비스 사례 연구 - 『도서관과 정보생활』 교과의 I·II영역을 중심으로 -)

  • Kang, Bong-Suk
    • Journal of Korean Library and Information Science Society
    • /
    • v.49 no.3
    • /
    • pp.307-329
    • /
    • 2018
  • This study aims to verify the effect of school library education service on the information literacy ability of high school students in the poor economic environment. For this purpose, we narrowed down to 215 high school first graders with substandard educational conditions, and then implemented information literacy education. The results of the information literacy test were compared, before and after the information literacy service. The preliminary tests of 15 schools including the targeted school were conducted, and we found that the results of the self-evaluation in those 15 schools exceed those with other generally good educational conditions. We considered in all aspects to find out how to overcome the information literacy gap through information literacy programs. Reflecting on the previous research verifying that the difference in educational environment affects the information literacy, we can confirm that the information literacy education service, which is the core service of the school library, can narrow the information literacy gap. We hope that this study will be a basis for the systematic establishment of information literacy education in public education.