• Title/Summary/Keyword: 역공학 분석

Search Result 130, Processing Time 0.03 seconds

Finite Element Analysis of Dynamic Deformation of Refrigerator's Lower Hinge during Drop Test (냉장고 낙하시 하힌지 동적변형 해석)

  • Hong, Seokmoo;Choi, Yong Chan;Eom, Seong-Uk;Kim, Hong Lae;Hyun, Hong Chul
    • Transactions of the KSME C: Technology and Education
    • /
    • v.3 no.1
    • /
    • pp.37-44
    • /
    • 2015
  • In this paper dynamic deformation of lower hinge of refrigerator is simulated using dynamic finite element analysis while refrigerator is being dropped. The flow stress curves considering velocity dependency of hinge and lower packing material are determined through bending test and compression test at several dropping speeds. The determined material properties and flow stress from reverse engineering were used as input data for refrigerator's drop test using a dynamic finite element analysis software LS-DYNA. Additionally the result between CAE and 3D deformation measurement from real refrigerator drop test are compared and the result shows that the proposed analysis model is very useful to design lower hinge and lower packing endurable to the impulsive drop impact.

Power Consumption Analysis of High-Level Obfuscation for Mobile Software (모바일 소프트웨어를 위한 고급수준 난독처리 기법의 전력 소모량 분석)

  • Lee, Jin-Young;Chang, Hye-Young;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.1008-1012
    • /
    • 2009
  • Obfuscation is known as one of the most effective methods to protect software against malicious reverse engineering transforming the software into more complicated one with still preserving the original semantic. However, obfuscating a program can increase both code size of the program and execution time compared to the original program. In mobile devices, the increases of code size and execution time incur the waste of resources including the increase of power consumption. This paper has analyzed the effectiveness of some high-level obfuscation algorithms as well as their power consumption with implementing them under an embedded board equipped with ARM processor. The analysis results show that there is (are) an efficient obfuscation method(s) in terms of execution time or power consumption according to characteristics of a given program.

Anti-Reverse Engineering of Drone Firmware through Obfuscation Technique (드론 펌웨어 역공학 방지를 위한 난독화 연구)

  • Dong-Hyeon Yeon;Dae-Hee Jang
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.205-206
    • /
    • 2024
  • 드론 산업의 급속한 성장과 함께, 드론 펌웨어에 대한 보안이 중요한 이슈로 대두되고 있다. 본 연구는 드론 펌웨어를 보호하기 위한 효과적인 방법 중 하나로 소프트웨어 난독화 기술을 제안한다. 난독화 기법은 소스 코드나 바이너리를 의도적으로 복잡하게 변형시켜, 외부의 불법적인 분석 및 변조를 어렵게 만드는 방법이다. 이 연구는 드론 펌웨어에 대해 난독화 기법을 적용하고, 그 효과를 평가함으로써 드론 시스템의 보안 강화에 기여하고자 한다.

A study on the Prevention of Malware Anti-VM Technique (악성코드의 Anti-VM 기법 방지를 위한 방안 연구)

  • Choi, Suk-June;Kim, Deuk-Hun;Kwak, Jin
    • Annual Conference of KIPS
    • /
    • 2017.04a
    • /
    • pp.246-249
    • /
    • 2017
  • 악성코드 분석을 실제머신에서 진행하는 도중 시스템이 손상될 경우 복원에 어려움이 있다. 이에 따라 역공학 분석가들은 일반적으로 가상환경에서 분석을 진행한다. 가상환경의 경우 실제머신 호스트 운영체제와는 독립되어 있고 악성코드를 발현하여 시스템이 손상이 되더라도 이전 스냅 샷으로 복원하는 것이 용이하기 때문에 가상환경에서 악성행위 동작을 분석한다. 하지만, 최근 들어 악성코드가 점점 지능화되고 있으며 이에 따라 악성코드가 VM(Virtual Machine)환경에서는 동작하지 않는 Anti-VM 기술이 적용된 악성코드가 증가하고 있다. 따라서, 본 논문에서는 가상환경에서 Anti-VM 기술이 적용된 악성코드를 분석할 수 있는 위한 환경 연구를 진행한다. 이에 따라, 악성코드가 가상환경을 탐지하는 기법을 분석하고 각 탐지기법을 방지할 수 있는 방안을 제안한다. 이를 통해 동적분석을 하지 못하도록 하는 분석 방해 지연 기술 중 하나인 Anti-VM 기술이 적용된 악성코드의 분석 결과를 향상 시키는 것을 목표로 한다.

An Implementation of Data Obfuscation Tool for C++ Language (C++ 언어를 위한 데이터 obfuscation 도구 구현 및 테스트)

  • Cho Byoung-Min;Noh Jin-Uk;Oh Hyun-Soo;Chang Hye-Young;Jung Min-Gyu;Lee Seung-Won;Park Yong-Soo;Woo Je-Hak;Cho Seong-Je
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.292-294
    • /
    • 2006
  • 상용 응용 소프트웨어들은 주요 정보 및 알고리즘들을 내포하고 있어, 악의적인 역공학자들에 의해 특정 소프트웨어를 decompile하여 자료구조 및 제어 흐름을 분석하려는 공격이 이루어 지고 있다. 본 논문에서는 MS 윈도우 XP 상의 Visual C++ (MFC 포함) 프로그램을 역공학 공격으로부터 보호하기 위한 데이터 obfuscator를 구현하고 그 성능을 평가한다. 구현한 obfuscator는 C++ 소스코드를 입력 받아 3가지의 데이터 obfuscation 알고리즘을 적용한 후, 이를 다시 소스코드로 재생성하는 도구로 큰 성능저하 없이 구현 가능함을 알 수 있다.

  • PDF

The Study of Modeling in Web GIS-System using UML - The special reference of Chungbuk National University - (Web GIS 구축시 UML을 이용한 모델링에 관한 연구 - 충북대학교를 중심으로 -)

  • Son, Young-Gi;Shin, Young-Chul
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.4 no.2
    • /
    • pp.46-60
    • /
    • 2001
  • This study proposes the Web-based GIS system based on distributed object management and conceptualise system architecture and its methods specifications through UML(unified modeling language). By using class diagram and creating prototype based on UML and reverse engineering, our conceptual shape file model is proposed to illustrate an integrated architecture. Through system analysis and software configuration management, this study enables to not only improve pliable capabilities for problematic domains and increase abilities for analytical domains when user requirements are dynamic, but also assist effective and consistent maintenances of large software systems.

  • PDF

A Study on Construction of Reverse Engineering Environment in Forth Generation Language (4세대 언어에서의 역공학 환경 구성)

  • Jin, Yeong-Bae;Wang, Chang-Jong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.4
    • /
    • pp.509-523
    • /
    • 1995
  • With the diversified and enlarged softwares, the issue of software maintenance became more complex and difficult consequently, the cost of software maintenance took up the highest portion in the software life cycle. At the same time, in order to develop or use software for general computers the development environment will be changed to incorporate user-friendly 4GL (Fourth generation Language). Therefore, it is required to take a closer look at the languages such as COBOL, C, FORTRAN, PASCAL which have source code comprised of 4GL and investigate the method of analysis and reuse for program understanding since a lot of research has been done with these languages in program maintenance. The purpose of this paper is to propose reverse engineering tool in 4GL and find an effective way of understanding and maintaining the program by transforming source code comprised of 4GL to meta language and designing and implementing Document Generator, Report Generator, Module Generator, Code Translator for program understanding.

  • PDF

A Study on the Problem Analysis and Quality Improvement in Fabricating Free-Form Buildings Facade Panels through Mock-up Panels Production (Mock-up 부재제작을 통한 비정형 건축 외장부재의 제작 문제점 분석 및 개선방안에 관한 연구)

  • Kwen, Soon-Ho;Shim, Hyoun-Woo;Ock, Jong-Ho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.3
    • /
    • pp.11-21
    • /
    • 2011
  • The most critical issue in free-form buildings is how to construct the free-formed exterior facade panels. Their geometric complexity delivers many cons and problems in fabricating and constructing their shapes. To construct a free-form building, first of all, its skin has to be chopped into small pieces, which is called panelization. After panelization, the panels go through an optimization process to construct them economically. The panel's geometries are modified or regenerated through this optimization process. In this study, the panel optimization process of free-form buildings are performed through a case study. The panel shapes of the case study are modeled with Digital Project. To test the constructability of the various panels, 8 mock-up panels are made and laser scanning technology is applied to measure the preciseness of the panels manufactured in comparison with their original design.

Method for Inferring Format Information of Data Field from CAN Trace (CAN 트레이스 분석을 통한 데이터 필드 형식 추론 방법 연구)

  • Ji, Cheongmin;Kim, Jimin;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.167-177
    • /
    • 2018
  • As the number of attacks on vehicles has increased, studies on CAN-based security technologies are actively being carried out. However, since the upper layer protocol of CAN differs for each vehicle manufacturer and model, there is a great difficulty in researches such as developing anomaly detection for CAN or finding vulnerabilities of ECUs. In this paper, we propose a method to infer the detailed structure of the data field of CAN frame by analyzing CAN trace to mitigate this problem. In the existing Internet environment, many researches for reverse engineering proprietary protocols have already been carried out. However, CAN bus has a structure difficult to apply the existing protocol reverse engineering technology as it is. In this paper, we propose new field classification methods with low computation-cost based on the characteristics of data in CAN frame and existing field classification method. The proposed methods are verified through implementation that analyze CAN traces generated by simulations of CAN communication and actual vehicles. They show higher accuracy of field classification with lower computational cost compared to the existing method.

Design of a Supporting Tool for Simplifying Static Program Analysis Process (정적 프로그램 분석 과정을 단순화하기 위한 지원 툴 설계)

  • 윤준호;이병정;우치수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04c
    • /
    • pp.19-21
    • /
    • 2003
  • 정적 프로그램 분석기는 프로그램의 결점을 찾아내는 초기 목적에서 진화하여, 역공학. 재공학. 메트릭 검증 등 도구의 front-End 모듈로 많이 쓰이고 있다. 이에 대한 다양한 연구가 진행되고 있고. 또 많은 관련 도구들이 소개되었지만, 사용자가 생각을 직접 코드형태로 구현하고, 결과를 모델형태로 표현하여, 시험하고 검증할 수 있도록 도와주는 프레임웍 수준 도구들은 거의 나와있지 않다. 본 논문에서는 정적 프로그램 분석을 쉽게 할 수 있도록 지원하는 기반도구의 설계를 제안한다. 본 연구에서는 언어의 파싱과 시각화 과정의 반복되는 작업들을 추상화하고, 분석 코드를 파싱 코드와 분리함으로써 사용자로 하여금 분석 과정에 집중할 수 있도록 도와준다.

  • PDF