• Title/Summary/Keyword: API

Search Result 2,743, Processing Time 0.034 seconds

Java API Pattern Extraction and Recommendation using Collocation Analysis (연어 관계 분석을 통한 Java API 패턴 추출 및 추천 방법)

  • Kwon, Chanwoo;Hwang, Sangwon;Nam, Youngkwang
    • Journal of KIISE
    • /
    • v.44 no.11
    • /
    • pp.1165-1177
    • /
    • 2017
  • Many developers utilize specific APIs to develop software, and to identify the use of a particular API, a developer can refer to a website that provides the API or can retrieve the API from the web. However, the site that provides the API does not necessarily provide guidance on how to use it while it can be partially provided in many other cases. In this paper, we propose a novel system JACE (Java AST collocation-pattern extractor) as a method to reuse commonly-used code as a supplement. The JACE extracts the API call nodes, collocation patterns and analyzes the relations between the collocations to extract significant API patterns from the source code. The following experiment was performed to verify the accuracy of a defined pattern: 794 open source projects were analyzed to extract about 15M API call nodes. Then, the Eclipse plug-in test program was utilized to retrieve the pattern using the top 10 classes of API call nodes. Finally, the code search results from reference pages of the API classes and the Searchcode [1] were compared with the test program results.

Exploring the Possibilities of Operation Data Use for Data-Driven Management in National R&D API Management System (데이터 기반 경영을 위한 국가R&D API관리시스템의 운영 데이터 활용 가능성 탐색)

  • Na, Hye-In;Lee, Jun-Young;Lee, Byeong-Hee;Choi, Kwang-Nam
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.14-24
    • /
    • 2020
  • This paper aims to establish an efficient national R&D Application Programming Interface (API) management system for national R&D data-driven management and explore the possibility of using operational data according to the recent global data openness and sharing policy. In accordance with the trend of opening and sharing of national R&D data, we plan to improve management efficiency by analyzing operational data of the national R&D API service. For this purpose, we standardized the parameters for the national R&D APIs that were distributed separately by integrating the individual APIs to build a national R&D API management system. The results of this study revealed that the service call traffic of the national R&D API has shown 554.5% growth in the year as compared to the year 2015 when the measurement started. In addition, this paper also evaluations the possibility of using operational data through data preparation, analysis, and prediction based on service operations management data in the actual operation of national R&D integrated API management system.

Software Similarity Detection Using Highly Credible Dynamic API Sequences (신뢰성 높은 동적 API 시퀀스를 이용한 소프트웨어 유사성 검사)

  • Park, Seongsoo;Han, Hwansoo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1067-1072
    • /
    • 2016
  • Software birthmarks, which are unique characteristics of the software, are used to detect software plagiarism or software similarity. Generally, software birthmarks are divided into static birthmarks or dynamic birthmarks, which have evident pros and cons depending on the extraction method. In this paper, we propose a method for extracting the API sequence birthmarks using a dynamic analysis and similarity detection between the executable codes. Dynamic birthmarks based on API sequences extract API functions during the execution of programs. The extracted API sequences often include all the API functions called from the start to the end of the program. Meanwhile, our dynamic birthmark scheme extracts the API functions only called directly from the executable code. Then, it uses a sequence alignment algorithm to calculate the similarity metric effectively. We evaluate the birthmark with several open source software programs to verify its reliability and credibility. Our dynamic birthmark scheme based on the extracted API sequence can be utilized in a similarity test of executable codes.

A Study for Implementation of Cryptographic Service Provider(CSP) (CryptoAPI 지원 암호 모듈(CSP) 구현에 관한 연구)

  • Hong, Soon-Jwa;Park, Joong-Gil;Kim, Young-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.797-800
    • /
    • 2000
  • 최근 정보 보안에 대한 연구 및 개발이 활발하게 이루어지고 있으며, 그 중 보안 API 는 보안 서비스를 제공하는 인터페이스 규격으로서 중요성이 증대되고 있다. 대표적인 보안 API 로는 MS의 CryptoAPI, Intel 보안 구조인 CDSA 의 CSSM API, IETF의 GSS-API/IDUP-GSS-API, X/Open 그룹의 GCS-API 등이 있다. 보안 API 는 응용 개발자와 보안 장비 개발자의 편리성 및 독립성을 최대한 보장할 수 있어야 하지만, 실제 구현 환경에서 부딪치는 문제는 OS 플랫폼이 기반이 되지 못한 경우 시스템 보안 구조의 계층화가 어렵고, 실제 구현 환경에서 호환성을 보장할 수 없다는 것이다. 이러한 관점에서 MS의 CryptoAPI는 응용 및 보안 장비의 개발 규격 및 절차를 제안하고 있으며, 두 분야의 개발자 사이의 연동은 시스템 OS인 Windows가 담당하고 있다.

  • PDF

The influence of V, Cu on the Bauschinger effect in API steel (고강도 API 강의 바우싱거 효과에 미치는 V, Cu의 영향)

  • Park J. S.;Kim D. W.;Chang Y. W.
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 2005.10a
    • /
    • pp.336-339
    • /
    • 2005
  • API steel is used for line-pipe to transport the oil and natural gas. As the recent trends in the development of API steel are towards the use of larger diameter and thicker plate, many researches have been studied to achieve higher strength, higher toughness and lower yield ratio in API steel. However, the strength of API steel after pipe forming is changed depend on the competition of the Bauschinger effect and work hardening. So, the purpose of this study is to investigate the influence on the Bauschinger effect for API steel by addition of V and Cu which are formed the precipitations for higher strength in API steel. The results are that the addition of V considered as a ferrite stabilizer and Cu considered as a austenite stabilizer decreases and increases the Bauschinger effect for API steel respectively.

  • PDF

Definition of Open API Metadata for Media Convergence Service Platform (방송통신 융합서비스 플랫폼 구축을 위한 Open API 메타데이터 정의)

  • Kim, Sang-il;Kim, Hwa-sung
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2014.11a
    • /
    • pp.72-73
    • /
    • 2014
  • 최근 통신 분야에서는 새로운 수익을 창출하기 위해 다양한 융합 서비스 개발이 이루어지고 있다. 이와 같은 융합서비스 개발은 통신 망이 갖고 있는 다양한 기능을 API 형태로 개방한 Open API 기술을 기반으로 이루어지고 있으며, API의 특징상 통신망의 프로토콜을 모르더라도 인터넷을 기반으로 다양한 융합 서비스를 쉽고 빠르게 제작할 수 있다. 최근에는 통신 뿐만 아니라, 통신과 방송이 융합된 서비스 개발을 위해 통신 분야의 Open API와, 방송 분야의 Open API를 융합하는 추세를 보이고 있다. 하지만, 국내에서는 이러한 Open API를 체계적으로 지원 해주는 플랫폼이 존재 하지 않기 때문에, 개발자들이 손쉽게 Open API를 사용하기 힘든 실정이다. 따라서 본 논문에서는 방송통신 융합서비스 플랫폼을 구축하기 위한 사전 연구로써, 현재 제공되고 있는 Open API들의 정보들을 공통적으로 정의하기 위해 메타데이터를 이용하여 정의하는 방법을 연구하였다.

  • PDF

Open API Similarity Searcing Method for Mashups (매쉬업을 위한 Open API 유사성 탐색 방법)

  • Lee, Yong-Ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.1279-1282
    • /
    • 2012
  • 매쉬업은 공개된 Open API들을 이용하여 두 가지 이상의 서로 다른 자원을 섞어서 완전히 새로운 가치의 서비스를 만드는 것이다. 그렇지만, Open API 포털 사이트들은 매쉬업에서 사용 가능한 수많은 API들을 제공하고 있는데 이들에 대한 조합 가능한 API 들을 탐색하고 발견하는 것은 매우 힘들고 많은 시간이 소비되는 작업이다. 본 논문에서는 다양한 Open API 타입들에 대한 API 유사성 탐색 방법을 지원하기 위해 계층적 결합 클러스터링 알고리즘과 계층관계 형태소 분석 기법을 제안한다. 본 논문에서 제안된 방법은 programmableWeb과 xmethods.net 사이트로부터 168개의 REST API와 50개의 SOAP API를 다운로드 받아 실험 분석을 수행하였으며 우리의 접근방법이 기존의 키워드 검색 방법과 Woogle 방법 보다 성능이 우수함을 보인다.

Design and Implementation of HAL and Java API for Embedded System (임베디드 시스템을 위한 HAL과 JAVA API 설계 및 구현)

  • Lee, Jin-Kwan;Lee, Dae-Hyung;Jung, Kyu-Cheol;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.57-65
    • /
    • 2008
  • The implement of JAVA API for supporting the embedded system is capable of developing the object oriented system with code reuse because the developer is able to use JAVA in the embedded system. The system dependant parts for implementing JAVA API are realized from a native function. In this paper, we devide JAVA API into the platform-independent JAVA part and platform-dependent native part for the implementation of JAVA API to manage the linux based embedded system devices, and focus on the control of the embedded system devices using JAVA API.

  • PDF

Study on the API Hooking Method Based on the Windows (윈도우 API 후킹 탐지 방법에 대한 연구)

  • Kim, Wan-Kyung;Soh, Woo-Young;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.884-893
    • /
    • 2009
  • Recently, malicious attacks for Windows operate through Window API hooking in the Windows Kernel. This paper presents the API hooking attack and protection techniques based on Windows kernel. Also this paper develops a detection tool for Windows API hooking that enables to detect dll files which are operated in the kernel. Proposed tool can detect behaviors that imports from dll files or exports to dll files such as kernel32.dll, snmpapi.dll, ntdll.dll and advapidll.dll, etc.. Test results show that the tool can check name, location, and behavior of API in testing system.

  • PDF

A Functional Unit Dynamic API Birthmark for Windows Programs Code Theft Detection (Windows 프로그램 도용 탐지를 위한 기능 단위 동적 API 버스마크)

  • Choi, Seok-Woo;Cho, Woo-Young;Han, Tai-Sook
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.767-776
    • /
    • 2009
  • A software birthmark is a set of characteristics that are extracted from a program itself to detect code theft. A dynamic API birthmark is extracted from the run-time API call sequences of a program. The dynamic Windows API birthmarks of Tamada et al. are extracted from API call sequences during the startup period of a program. Therefore. the dynamic birthmarks cannot reflect characteristics of main functions of the program. In this paper. we propose a functional unit birthmark(FDAPI) that is defined as API call sequences recorded during the execution of essential functions of a program. To find out that some functional units of a program are copied from an original program. two FDAPIs are extracted by executing the programs with the same input. The FDAPIs are compared using the semi-global alignment algorithm to compute a similarity between two programs. Programs with the same functionality are compared to show credibility of our birthmark. Binary executables that are compiled differently from the same source code are compared to prove resilience of our birthmark. The experimental result shows that our birthmark can detect module theft of software. to which the existing birthmarks of Tamada et al. cannot be applied.