• Title/Summary/Keyword: 크래시

Search Result 22, Processing Time 0.025 seconds

Memory Leak Detection in C (C언어 기반 프로그램의 메모리 누수 검출기법)

  • Bae, Gi-Gon;Lee, Suk-Hee;Kwon, Yong-Rae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06c
    • /
    • pp.510-515
    • /
    • 2007
  • 더 이상 사용되지 않는 메모리가 계속해서 유지되는 것을 메모리 누수라고 한다. 메모리 누수가 발생하면 메모리 낭비가 누적되기 때문에 시스템의 성능이 저하되고 궁극적으로 시스템 크래시(crash)가 발생 할 수 있다. 본 논문에서는 이러한 메모리 누수를 검출하기 위하여 참조 계수 기법을 이용한다. 참조계수 기법을 이용하면 메모리 누수의 발생 여부뿐만 아니라 메모리 누수 발생시점에 대한 정보까지 제공할 수 있어 디버깅이 용이해진다. 그리고 본 논문에서 제안한 기법을 구현한 도구를 이용하여 사례연구를 수행한다. 사례 연구 분석을 통하여 본 연구에서 제안한 기법이 정확하게 메모리 누수를 검출하고 디버깅에 유용한 정보를 제공할 수 있다는 것을 보인다.

  • PDF

Journaling FAT File System for NAND Flash Memory (NAND 플래시 메모리를 위한 저널링 FAT 파일시스템)

  • Chang-Ho Kang;Dong-Hoon Yook;Sang-Young Cho
    • Annual Conference of KIPS
    • /
    • 2008.11a
    • /
    • pp.835-838
    • /
    • 2008
  • FAT 파일시스템은 거의 모든 운영체제에서 지원하기 때문에 임베디드 환경과 이동식 저장장치에서 NAND 플래시 메모리의 파일시스템으로 널리 사용되고 있다. 그러나 FAT 파일시스템은 하드디스크 특성에 맞게 설계되어 NAND 메모리의 특성에 맞지 않는 부분들이 있다. 이로 인한 파일 시스템의 신뢰성 문제를 해결하기 위하여 새로운 FAT 파일시스템 저널링 기능을 제안한다. 제안된 기능은 WindowsCE 환경에서 구현되었으며 동작을 다양한 크래시 환경에서 검사하였다.

Proof that the Election Problem belongs to NF-completeness Problems in Asynchronous Distributed Systems (비동기적 분산 시스템에서 선출 문제는 NF-completeness 문제임을 증명)

  • Park, Sung-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.3
    • /
    • pp.169-175
    • /
    • 2002
  • This paper is about the hardness of the Election problem in asynchronous distributed systems in which processes can crash but links are reliable. The hardness of the problem is defined with respect to the difficulty to solve it despite failures. It is shown that problems encountered in the system are classified as three classes of problems: F (fault-tolerant), NF (Not fault-tolerant) and NFC(NF-completeness). Among those, the class NFC is the hardest problems to solve. In this paper, we prove that the Election problem is the most difficult problem which belongs to the class NFC.

A Mutual Exclusion Algorithm in Asynchronous Distributed System with Failure Detectors (비동기적 분산시스템에서 고장 추적 장치를 이용한 상호배제 알고리즘 설계)

  • Park, Sung-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.5
    • /
    • pp.2457-2464
    • /
    • 2013
  • In this paper, we design and analyze a mutual exclusion algorithm, based on the Token and Failure detector, in asynchronous distributed systems. A Failure Detector is an independent module that detects and reports crashes of other processes. There are some of advantages in rewriting the Token-based ME algorithm using a Failure Detector. We show that the Token-based ME algorithm, when using Failure Detector, is more effectively implemented than the classic Token-based ME algorithm for synchronous distributed systems.

RFJ: A Reliable and Fast Journaling Mechanism (RFJ: 신뢰적 고성능 데이터 버퍼 저널링 기법)

  • Park, Sejin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.45-51
    • /
    • 2019
  • Modern file systems have journaling mechanism to maintain their stored state consistently even under unexpected system crashes or disasters. However, the journaling makes I/O throughput lower. This performance degradation comes from the ordering mechanism between the data buffer and metadata buffer and two-staged buffer writing. Especially, if the data buffer and metadata buffer are journalled at the same time, then it incurs significant performance degradation due to the two-staged writing. That shows the trade-off relation-ship between I/O performance and system reliability. In this paper, we propose RFJ: a reliable and fast jour-naling mechanism to deal with this trade-off relationship. We propose an ordering enforced writeback journaling mode and selective journaling mechanism. The Ordering enforced writeback journaling mode achieves low I/O latency and the selective journaling mechanism achieves high reliability. The experimental result shows that the performance of RFJ is almost 5x faster than the journal mode of Ext3 file system but it still supports the same reliability with the journal mode.

A DOM-Based Fuzzing Method for Analyzing Seogwang Document Processing System in North Korea (북한 서광문서처리체계 분석을 위한 Document Object Model(DOM) 기반 퍼징 기법)

  • Park, Chanju;Kang, Dongsu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.5
    • /
    • pp.119-126
    • /
    • 2019
  • Typical software developed and used by North Korea is Red Star and internal application software. However, most of the existing research on the North Korean software is the software installation method and general execution screen analysis. One of the ways to identify software vulnerabilities is file fuzzing, which is a typical method for identifying security vulnerabilities. In this paper, we use file fuzzing to analyze the security vulnerability of the software used in North Korea's Seogwang Document Processing System. At this time, we propose the analysis of open document text (ODT) file produced by Seogwang Document Processing System, extraction of node based on Document Object Mode (DOM) to determine test target, and generation of mutation file through insertion and substitution, this increases the number of crash detections at the same testing time.

A Study on the Development of Practical and Adaptive Progressive Die for Very Thick Sheet Metals (후판재료에 대한 실 적응성 프로그레시브 금형 개발에 관한 연구)

  • Sim, Sung-Bo;Lee, Sung-Taeg;Song, Young-Seok
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.1 no.1
    • /
    • pp.63-70
    • /
    • 2002
  • In the field of design and making tool for press working, the progressive die for very thick sheet metal(SS41, 4mm) is a specific division. In order to prevent the defects, the optimum design of the production part, Strip layout, die design, die making and tryout etc. are necessary. They require analysis of many kinds of important factors, i.e. theory and practice of metal working process and its phenomena, die structure, machining condition for die making, die materials, heat treatment of die component, know-how and so on. In this study, we designed and constructed a progressive die of multi stage and tried out through the I-DEAS, DEFORM, and CAD/CAM application. Out of these processes, the die development could be taken advanced technology. Especially the result of try out and its analysis become to the characteristic of this study.

  • PDF

A Study on the Improvement of a Damageability and Repairability by Improving Mounting Structure of a Bumper for Passenger Cars (범퍼체결구조 개선을 통한 손상성.수리성 향상방안에 관한 연구)

  • Kim, Ji-Won;Park, In-Song;Lee, Chang-Sik
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.1
    • /
    • pp.1-9
    • /
    • 2010
  • The purpose of this study is to analyze the bumper mounting structure of passenger vehicles at low speed collision. In order to improve the repairability and damageability of the vehicle, the low speed crash tests of RCAR(Research Council for Automobile Repairs) standard(front & rear 15km/h 40% offset crash test) were carried out for analysis of 3 different types of bumper mounting structures. The results of experiments show that the impact energy absorbing ability of bumper stay with rectangular crash box type vehicle which is inserted into the bumper rail was superior to another two different bumper mounting structures that are applied to many passenger vehicles. In this thesis, well designed bumper mounting structure such as rectangular crash box type can enhance the safety of occupants as well as contribute to reduce repair cost at low collision accident by improving repairability and damageability of vehicle.

An experimental study on the open channel flow with plane wall jet inlet boundary condition and effects of a baffle (평면벽면분류의 유입경계조건을 가지는 개수로 유동 및 배플의 영향에 관한 실험적 연구)

  • 방병렬;설광원;이상용
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.12 no.6
    • /
    • pp.1399-1406
    • /
    • 1988
  • Flow behaviors of the open channel type flow with its geometric boundary conditions being similar to that of the Multi-Stage-Flash evaporator were studied qualitatively by measuring the velocity distribution. Without a baffle, the flow was in the shape of a simple submerged plane wall jet. At the downstream of this flow, the jet boundary made sharp curve toward the free surface ; this is because the entrainment of the ambient liquid is restricted by the free surface boundary, similar to the Coanda effect. According to the experimental results the level of the free surface appeared to be the most important parameter. The flow with a baffle was in much complicated shape ; especially the recirculating region at the downstream free surface was detected according to the experimental conditions imposed. Inlet liquid velocity, heights of the liquid level and the baffle, and the opening heights of sluice gate of the entrance were the most important parameters in the baffle flow.

Automated Method for Detecting OOB Vulnerability of Heap Memory Using Dynamic Symbolic Execution (동적 기호 실행을 이용한 힙 메모리 OOB 취약점 자동 탐지 방법)

  • Kang, Sangyong;Park, Sunghyun;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.919-928
    • /
    • 2018
  • Out-Of-Bounds (OOB) is one of the most powerful vulnerabilities in heap memory. The OOB vulnerability allows an attacker to exploit unauthorized access to confidential information by tricking the length of the array and reading or writing memory of that length. In this paper, we propose a method to automatically detect OOB vulnerabilities in heap memory using dynamic symbol execution and shadow memory table. First, a shadow memory table is constructed by hooking heap memory allocation and release function. Then, when a memory access occurs, it is judged whether OOB can occur by referencing the shadow memory, and a test case for causing a crash is automatically generated if there is a possibility of occurrence. Using the proposed method, if a weak block search is successful, it is possible to generate a test case that induces an OOB. In addition, unlike traditional dynamic symbol execution, exploitation of vulnerabilities is possible without setting clear target points.