• Title/Summary/Keyword: 역공학 분석

Search Result 130, Processing Time 0.024 seconds

Object-oriented Concept Learning using Reverse-engineering Method Based on XNA Game Development Environment (XNA기반 게임 개발 환경에서 역공학 방법을 이용한 객체지향 개념 학습)

  • Choi, Young-Mee;Choo, Moon-Won;Yoon, Tae-Bok
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.45-54
    • /
    • 2009
  • This paper proposes object-oriented learning method of using reverse-engineering based on game development environment. The game has advantages such as interest and enjoyment. Also, the reverse analysis of game help us understand the technique to be used in game. Through this process, we introduce learning method enabling us to actively understand object-oriented concept. Thus, the proposed method describes case learning based on XNA game development environment, and presents a scenario according to role of teacher and learner.

  • PDF

A Design and Implementation of Documentation System for Adams-H (Adams-H를 위한 문서화 시스템 설계 및 구현)

  • Lee, Seung-Hun;Cho, Hyun-Hoon;Rhew, Sung-Yul
    • Annual Conference of KIPS
    • /
    • 2002.04a
    • /
    • pp.427-430
    • /
    • 2002
  • 기존의 2 Tier나 3 Tier형태의 소프트웨어 개발 시 생산성과 효율성을 향상시키기 위하여 RAD Tool을 많이 사용하였다. 이러한 RAD Tool의 사용은 생산성과 효율성을 향상 시켰지만 소프트웨어의 유지보수나 성능 개선을 위한 작업 시 코드의 중복이나 복잡성 등의 증가 등 많은 문제점들을 발생되었으며, 이는 소프트웨어의 유지보수에 많은 문제점을 가져왔다. 이러한 문제점들은 역공학 기법을 통해서 해결이 가능하다. 역공학 기법을 이용하여 소프트웨어의 구조를 이해할 수 있는 정보를 추출하고 추출된 정보를 체계적으로 관리할 수 있는 시스템을 구축하여 문서화하는 것이다. 이에 본 논문에서는 소프트웨어의 소스코드를 분석하여 시스템 변경 등의 작업 시 문서화를 지원하여 생산성과 효율성을 증가시킬 수 있는 시스템을 설계 구현하였다.

  • PDF

Analysis of Anti-Reversing Functionalities of VMProtect and Bypass Method Using Pin (VMProtect의 역공학 방해 기능 분석 및 Pin을 이용한 우회 방안)

  • Park, Seongwoo;Park, Yongsu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.11
    • /
    • pp.297-304
    • /
    • 2021
  • Commercial obfuscation tools (protectors) aim to create difficulties in analyzing the operation process of software by applying obfuscation techniques and Anti-reversing techniques that delay and interrupt the analysis of programs in software reverse engineering process. In particular, in case of virtualization detection and anti-debugging functions, the analysis tool exits the normal execution flow and terminates the program. In this paper, we analyze Anti-reversing techniques of executables with Debugger Detection and Viralization Tools Detection options through VMProtect 3.5.0, one of the commercial obfuscation tools (protector), and address bypass methods using Pin. In addition, we predicted the location of the applied obfuscation technique by finding out a specific program termination routine through API analysis since there is a problem that the program is terminated by the Anti-VM technology and the Anti-DBI technology and drew up the algorithm flowchart for bypassing the Anti-reversing techniques. Considering compatibility problems and changes in techniques from differences in versions of the software used in experiment, it was confirmed that the bypass was successful by writing the pin automation bypass code in the latest version of the software (VMProtect, Windows, Pin) and conducting the experiment. By improving the proposed analysis method, it is possible to analyze the Anti-reversing method of the obfuscation tool for which the method is not presented so far and find a bypass method.

An Evaluation of the Proguard, Obfuscation Tool for Android (안드로이드를 위한 난독화 도구 프로가드(Proguard) 성능 평가)

  • Park, Heewan;Park, Heekwang;Ko, Kwangman;Choi, Kwanghoon;Youn, Jonghee
    • Annual Conference of KIPS
    • /
    • 2012.04a
    • /
    • pp.730-733
    • /
    • 2012
  • 소프트웨어는 대부분 바이너리 형태로 배포되기 때문에 역공학 분석이 쉽지 않다. 그러나 안드로이드는 자바를 기반으로 한다. 즉, 자바 언어로 프로그래밍하고 생성된 클래스 파일을 dx라는 도구를 사용하여 안드로이드용 달빅(Dalvik) 코드로 변환한다. 따라서 안드로이드 역시 자바의 취약점을 가지고 있고, 자바용으로 개발된 역공학 도구에 의해서 쉽게 분석될 수 있다. 한편으로 자바 프로그램의 저작권을 보호하고 핵심 알고리즘이 노출되지 않도록 다양한 난독화 도구들이 개발되었다. 그 중에서 안드로이드 SDK에 포함되어 함께 배포되고 있기 때문에 널리 사용되고 있는 프로가드(Proguard)에 대해서 대표적인 기능 및 사용법, 프로가드로 난독화된 코드가 원본과 비교하여 어떻게 변경되었는지 평가한다. 그리고 프로가드가 가지고 있는 한계를 알아보고, 이것을 극복할 수 있는 방법을 모색한다.

Reverse engineering technique on the evaluation of impression accuracy in angulated implants (경사진 임플란트에서 임플란트 인상의 정확도 평가를 위한 역공학 기법)

  • Jung, Hong-Taek;Lee, Ki-Sun;Song, So-Yeon;Park, Jin-Hong;Lee, Jeong-Yol
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.59 no.3
    • /
    • pp.261-270
    • /
    • 2021
  • Purpose. The aim of this study was (1) to compare the reverse engineering technique with other existing measurement methods and (2) to analyze the effect of implant angulations and impression coping types on implant impression accuracy with reverse engineering technique. Materials and methods. Three different master models were fabricated and the distance between the two implant center points in parallel master model was measured with different three methods; digital caliper measurement (Group DC), optical measuring (Group OM), and reverse engineering technique (Group RE). The 90 experimental models were fabricated with three types of impression copings for the three different implant angulation and the angular and distance error rate were calculated. One-way ANOVA was used for comparison among the evaluation methods (P < .05). The error rates of experimental groups were analyzed by two-way ANOVA (P < .05). Results. While there was significant difference between Group DC and RE (P < .05), Group OM had no significant difference compared with other groups (P > .05). The standard deviations in reverse engineering were much lower than those of digital caliper and optical measurement. Hybrid groups had no significant difference from the pick-up groups in distance error rates (P > .05). Conclusion. The reverse engineering technique demonstrated its potential as an evaluation technique of 3D accuracy of impression techniques.

Facebook Protocol Inference using Reverse Engineering (역공학을 이용한 페이스북 프로토콜 추론)

  • Jung, In-Sik;Ju, Hong-Taek
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.837-840
    • /
    • 2012
  • 본 논문에서는, 패킷 모니터링을 이용하여 모바일 환경에서 페이스북 서버와 클라이언트의 어플리케이션간의 동작을 분석하고 페이스북 Graph API 를 사용하여 프로토콜을 분석하였다. 페이스북 프로토콜의 분석결과는 향후 다양한 플랫폼에서 페이스북 사용과 게이트웨이 서버와 페이스북 서버간의 통신 기능을 수행하는데 활용하고자 한다.

A Study on the BIL Bitstream Reverse-Engineering Tool-Chain Improvement (BIL 비트스트림 역공학 도구 개선 연구)

  • Yoon, Junghwan;Seo, Yezee;Jang, Jaedong;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1225-1231
    • /
    • 2018
  • FPGA-based system development is being developed as a form of outsourcing that shortens the development time and reduces the cost. Through the process, the risk of letting the hardware Trojan, which causes malfunctions, seep into the system also increases. Various detection methods are proposed for the issue; however, such type of hardware Trojans is inserted by modifying a bitstream directly and therefore, it is hard to detect with the suggested methods. To detect the type of hardware Trojans, it is essential to reverse-engineer the electric circuit implemented by bitstream to a distinguishable level. Specifically, it is important to reverse-engineer the routing information of the circuit that can identify the input-output flow of the signal. In this paper, we analyze the BIL bitstream reverse-engineering tool-chain that uses the algorithm, which retrieves the routing information from FPGA bitstream, and suggest the method to improve the tool-chain.

Reengineering Legacy systems into Design Patterns of Component Base Design (CBD) (기존 시스템에서 CBD 지원을 위한 설계 패턴 재공학)

  • Kim Cuk-Boh
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.1-13
    • /
    • 2004
  • The effect of Application system with class units is not sufficient because of independency and reuse of Component elements due to component abstraction based on only source code. Therefore We need to apply design pattern approach to represent not only the problem abstraction but also information and relationship between system elements for generic solutions of specific domain, Also, it is essential to software reverse engineering acquiring the correct understandings of the system through examining the existing systems and utilizing the acquired knowledges as reusable resources. In this paper, the extraction algorithm with JAVA and the validity of applying reverse engineering with extracting design patterns from source codes of the existing object-oriented system; are devised. The architecture of automatic tool is designed and implemented for 1) automatic extraction of design patterns and 2) reuse tool for retrieving, editing and rebuilding of design patterns.

  • PDF

Case Study of Software Reverse Engineering using McCabe and BP/Win Tools (McCabe 및 BP/Win도구를 이용한 소프트웨어 역공학 사례연구)

  • Jo, Hyeon-Hun;Choe, Yong-Rak;Rhew, Sung-Yul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.5
    • /
    • pp.528-535
    • /
    • 2000
  • This paper aims at providing guidelines enabling productive software construction by offering reusable modules which is used not only for effective maintenance for each step, but also for a re-engineering process after analyzing developed source code. There are four processing steps. The first is to analyze source code. The second is module slicing and clustering using McCabe and BP/Win Tools, The third is to transform the outputs extracted from the business model to reusable modules. The final step is to design repository and to construct a system. In this paper, we applied the fourth step to our case study, which was specified from the first step to the fourth. The specified fourth step contains various things for constructing repository. And the fourth step reanalyzes informal and unstructured information by using reverse engineering tools, in order to provide effective guidelines for productive software maintenance and re-engineering.

  • PDF

Modeling of functional surface using Polynomial Regression (다항식회귀분석을 이용한 기능성곡면의 모델링)

  • 윤상환;황종대;정윤교
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2002.10a
    • /
    • pp.376-380
    • /
    • 2002
  • This research presents modeling of a functional surface which is a constructed free-formed surface. The modeling introduced in this paper adopts polynomial regression that is utilizing approximating technique. The measured data are obtained from measuring with Coordinate Measuring Machine. This paper introduces efficient methods of Reverse Engineering using Polynomial Regression.

  • PDF