• 제목/요약/키워드: 코드 최적화

검색결과 480건 처리시간 0.026초

Development of a thermal-hydraulic analysis code for once-through steam generators using straight tubes for SMRs (일체형 원자로용 관류식 직관형 증기발생기 열수력 해석 코드 개발)

  • Park, Youngjae;Kim, Iljin;Kang, Kyungjun;Kang, Hanok;Kim, Youngin;Kim, Hyungdae
    • Journal of Energy Engineering
    • /
    • 제24권2호
    • /
    • pp.91-102
    • /
    • 2015
  • A thermal-hydraulic design and performance analysis computer code for a once-through steam generator using straight tubes is developed. To benchmark the developed physical models and computer code, an once-through steam generator developed by other designer is simulated and the calculated results are compared with the design data. Also, the same steam generator is analyzed with the best-estimate thermal-hydraulic system code, MARS, for the code-to-code validation. The overall characteristics of heat transfer area, pressure and temperature distributions calculated by the developed code show general agreements with the published design data as well as the analysis results of MARS. It is demonstrated that the developed code can be utilized for diverse purposes, such as, sensitivity analyses and optimum thermal design of a once-through steam generator.

Image-Based Machine Learning Model for Malware Detection on LLVM IR (LLVM IR 대상 악성코드 탐지를 위한 이미지 기반 머신러닝 모델)

  • Kyung-bin Park;Yo-seob Yoon;Baasantogtokh Duulga;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제34권1호
    • /
    • pp.31-40
    • /
    • 2024
  • Recently, static analysis-based signature and pattern detection technologies have limitations due to the advanced IT technologies. Moreover, It is a compatibility problem of multiple architectures and an inherent problem of signature and pattern detection. Malicious codes use obfuscation and packing techniques to hide their identity, and they also avoid existing static analysis-based signature and pattern detection techniques such as code rearrangement, register modification, and branching statement addition. In this paper, We propose an LLVM IR image-based automated static analysis of malicious code technology using machine learning to solve the problems mentioned above. Whether binary is obfuscated or packed, it's decompiled into LLVM IR, which is an intermediate representation dedicated to static analysis and optimization. "Therefore, the LLVM IR code is converted into an image before being fed to the CNN-based transfer learning algorithm ResNet50v2 supported by Keras". As a result, we present a model for image-based detection of malicious code.

A High-Interaction Client Honeypot on Android Platform (안드로이드 플랫폼에서의 High-Interaction 클라이언트 허니팟 적용방안 연구)

  • Jung, Hyun-Mi;Son, Seung-Wan;Kim, Kwang-Seok;Lee, Gang-Soo
    • Journal of Digital Convergence
    • /
    • 제11권12호
    • /
    • pp.381-386
    • /
    • 2013
  • As the new variation malicious codes of android platform are drastically increasing, the preparation plan and response is needed. We proposed a high-interaction client honeypot that applied to the android platform. We designed flow for the system. Application plan and the function was analyze. Each detail module was optimized in the Android platform. The system is equipped with the advantage of the high-interaction client honeypot of PC environment. Because the management and storage server was separated it is more flexible and expanded.

Efficient method for finding patched vulnerability with code filtering in Apple iOS (코드 필터링 기법을 이용한 iOS 환경에서의 패치 분석 방법론)

  • Jo, Je-gyeong;Ryou, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제25권5호
    • /
    • pp.1021-1026
    • /
    • 2015
  • Increasing of damage by phishing, government and organization response more rapidly. So phishing use malware and vulnerability for attack. Recently attack that use patch analysis is increased when Microsoft announce patches. Cause of that, researcher for security on defense need technology of patch analysis. But most patch analysis are develop for Microsoft's product. Increasing of mobile environment, necessary of patch analysis on mobile is increased. But ordinary patch analysis can not use mobile environment that there is many file and small size. So we suggest this research that use code filtering instead of Control Flow Graph and Abstract Syntax Tree.

A Volume Grid Deformation Code for Computational fluid Dynamics of Moving Boundary Problems (이동경계문제의 전산유체역학을 위한 체적격자변형코드)

  • Ko, Jin-Hwan;Kim, Jee-Woong;Byun, Do-Young;Park, Soo-Hyung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • 제36권11호
    • /
    • pp.1049-1055
    • /
    • 2008
  • Modern multidisciplinary computational fluid dynamics often incorporates moving boundaries, as would be required in the applications such as design optimization, aeroelasticity, or forced boundary motion. It is challenging to develop robust, efficient grid deformation algorithms when large displacement of the moving boundaries is required. In this paper, a volume grid deformation code is developed based on the finite macro-element and the transfinite Interpolation, and then interfaces to a structured multi-block Navier-Stokes in-house code. As demonstrated by an airfoil with pitching motion, the hysteresis loops of lift, drag and moment coefficients of the developed method are shown to be in good agreement with those of experimental data.

Side-Channel Attack Trends of Code-based PQC Algorithm for Hardware Acceleration of MEDS (코드 기반 양자 내성 암호 MEDS 알고리즘의 하드웨어 가속을 위한 부채널 공격 연구 동향 분석)

  • Yunji Lee;Yongseok Lee;Yunheung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2024년도 춘계학술발표대회
    • /
    • pp.367-370
    • /
    • 2024
  • 양자컴퓨터 시대가 눈앞에 도래한 지금 차세대 암호로 주목받고 있는 양자 내성 암호는 다양한 수학적 알고리즘에 안전성을 기반하고 있으나 이 안전성을 위협하는 대표적인 공격 기법 중 하나인 부채널 분석 공격에 대응하기 위한 노력들이 계속되어 왔다. 이 논문에서는 코드 기반 양자 내성 암호를 중심으로 알고리즘에 위협적인 부채널 분석 공격에 대한 연구 동향을 분석하였다. 그리고 NIST 에서 PQC 표준화를 위해 Round 를 진행 중인 후보 중 하나인 코드 기반 알고리즘 MEDS 에 대해 소개하고, MEDS 알고리즘의 최적화를 위해 기존에 연구되었던 코드 기반 암호에 대한 부채널 분석 공격 대응 측면에서의 알고리즘의 안전성 확보라는 보안 비용과 하드웨어 가속 등을 통한 성능 향상이 적절한 조화를 이룰 수 있도록 설계하기 위한 방안에 대해 알아보았다.

MPI-OpenMP Hybrid Parallelization for Multibody Peridynamic Simulations (다물체 페리다이나믹 해석을 위한 MPI-OpenMP 혼합 병렬화)

  • Lee, Seungwoo;Ha, Youn Doh
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • 제33권3호
    • /
    • pp.171-178
    • /
    • 2020
  • In this study, we develop MPI-OpenMP hybrid parallelization for multibody peridynamic simulations. Peridynamics is suitable for analyzing complicated dynamic fractures and various discontinuities. However, compared with a conventional finite element method, nonlocal interactions in peridynamics cost more time and memory. In multibody peridynamic analysis, the costs increase due to the additional interactions that occur when computing the nonlocal contact and ghost interlayer models between adjacent bodies. The costs become excessive when further refinement and smaller time steps are required in cases of high-velocity impact fracturing or similar instances. Thus, high computational efficiency and performance can be achieved by parallelization and optimization of multibody peridynamic simulations. The analytical code is developed using an Intel Fortran MPI compiler and OpenMP in NURION of the KISTI HPC center and parallelized through MPI-OpenMP hybrid parallelization. Further parallelization is conducted by hybridizing with OpenMP threads in each MPI process. We also try to minimize communication operations by model-based decomposition of MPI processes. The numerical results for the impact fracturing of multiple bodies show that the computing performance improves significantly with MPI-OpenMP hybrid parallelization.

Web Services-based Multidisciplinary Design Optimization System (웹 서비스 기반 MDO 시스템)

  • Lee, Ho-Jun;Lee, Jae-Woo;Lee, Jeong-Oog
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • 제35권12호
    • /
    • pp.1121-1128
    • /
    • 2007
  • MDO(Multidisciplinary Design and Optimization) can be applied for design of complex systems such as aircraft and SLV(Space Launch Vehicle). MDO System can be an integrated environment or a system, which is for synthetic and instantaneous analysis and design optimization in various design fields. MDO System has to efficiently use and integrate distributed resources such as various analysis codes, optimization codes, CAD, DBMS, GUI, and etc. in heterogeneous environments. In this paper, we present Web Services-based MDO System that integrates resources for MDO using Globus Toolkit and provides organic autonomous execution using automation technique such as Workflow system and agent. And also, it provides collaborative design environment through web user interfaces.

Embedded Monitoring System using Bit-masking Technique (비트마스킹 기법을 이용한 임베디드 모니터링 시스템)

  • Shin Won;Kim Tae-Wan;Chang Chun-Hyon
    • The KIPS Transactions:PartD
    • /
    • 제13D권4호
    • /
    • pp.613-618
    • /
    • 2006
  • As the embedded software spreads in various areas, many development tools have been made to minimize the developing time. But these tools cannot be applicable to all the environment because they have been created for the specific platform. As such, this paper proposes an Embedded Monitoring System, which supports the various communication environment and removes the limitation of adaptability to the various platforms. Using the Code Inline technique, this system can perform the monitoring process. However, we should consider the optimization for the monitoring process and monitoring sensors because the technique has the monitoring sensor overhead. As such, this paper proposes an approach for initializing the monitoring process and a bit-masking technique for optimizing the monitoring sensor. The Embedded Monitoring System will be applicable to all the areas using embedded systems.

Virtual Machine for Program Testing on the Virtual Network Processor Environment (가상의 네트워크 프로세서 환경에서 프로그램 테스트를 위한 가상머신)

  • Hong, Soonho;Kwak, Donggyu;Ko, BangWon;Yoo, Chae-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2012년도 춘계학술발표대회
    • /
    • pp.514-517
    • /
    • 2012
  • 최근 인터넷 사용자 증가와 네트워크를 기반의 응용 프로그램이 다양하게 개발되고 있다. 또한 스마트 폰과 매블릿 PC 의 대중화로 누구나 쉽게 인터넷을 통해 정보검색 서비스를 이용할 수 있다. 따라서 갈수록 증가하는 패킷에 대한 제]어와 이동, 삭제 등과 같은 처리를 빠르게 하기 위해 네트워크 프로세서 (Network Processor)가 개발되었다. 네트워크 프로세서는 패킷 제어와 이동, 삭제를 수행하는데 최적화되어 있다. 하지만 네트워크 프로세서를 개발한 회사마다 교차개발환경 툴과 개발언어가 서로 다르기 때문에 소스코드 재사용 및 확장이 어렵다. 또한 네트워크 프로세서에서 동작하는 프로그램을 매스트 하기 위해 하드웨어 장비가 필요하고 네트워크 프로세서에 종속적인 개발환경과 언어를 배우는 것은 프로그래머에게 큰 부담을 준다. 본 논문에서는 네트워크 프로세서에 최적화된 기능을 언어 레벨에서 정의한 eFlowC 언어를 사용하고 범용 컴퓨터에서 매스트 및 실행을 할 수 있는 가상머신을 제안한다. 그리고 가상머신 중간언어를 사용하여 가상머신이 설치된 범용 컴퓨터에서 소스코드 재사용 및 확장을 가능하게 한다. 따라서 범용 컴퓨터에서 프로그램 테스트를 통해 신뢰성 높은 프로그램을 작성할 수 있다.