• Title/Summary/Keyword: Automated Program

Search Result 452, Processing Time 0.024 seconds

A Development of Analysis Tool and the Analysis of Vulnerabilities on the Program Source Code (프로그램 소스코드 취약성 분석 및 분석도구의 개발)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.27-34
    • /
    • 2004
  • The recent explosive use of the Internet and the development of computer communication technologies reveal serious computer security problem. Inspite of many studies on secure access to the system, generally, the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the Program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

A Study on the Analysis of Vulnerabilities in the Program Source Code (프로그램 소스코드 취약성 분석에 관한 연구)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.3-8
    • /
    • 2004
  • The majority of recent intrusions reveal that the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

Static Control Flow Analysis of Binary Codes (이진 코드의 정적 제어 흐름 분석)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.70-79
    • /
    • 2010
  • We perform static program analysis for the binary code. The reason you want to analyze at the level of binary code, installed on your local computer, run the executable file without source code. And the reason we want to perform static analysis, static program analysis is to understand what actions to perform on your local computer. In this paper, execution flow graph representing information such as the execution order among functions and the flow of control is generated. Using graph, User can find execution flow of binary file and calls of insecure functions at the same time, and the graph should facilitate the analysis of binary files. In addition, program to be run is ensured the safety by providing an automated way to search the flow of execution, and program to be downloaded and installed from outside is determined whether safe before running.

Delayed Mode Quality Control of Argo Data and Its Verification in the Pacific Ocean (태평양 Argo 자료의 지연모드 품질관리 및 검증연구)

  • Yang, Joon-Yong;Kang, Seong-Yun;Go, Woo-Jin;Suh, Young-Sang;Seo, Jang-Won;Suk, Moon-Sik
    • Journal of Environmental Science International
    • /
    • v.17 no.12
    • /
    • pp.1353-1361
    • /
    • 2008
  • Quality control of Argo(Array for Real-time Geostrophic Oceanography) data is crucial by reason that salinity measurements are liable to experience some drift and offset due to biofouling, contamination of sensor and wash-out of biocide. The automated Argo real-time quality control has a limit of sorting data quality, so that WJO program is adopted as standardized method of Argo delayed mode quality control (DMQc) in the world that is a precise quality control method. We conducted DMQC on pressure, temperature and salinity measured by Argo floats in the Pacific Ocean including expert evaluation. Particularly, salinity data were corrected using WJO program. 4 salinity profiles of Argo delayed mode were compared with nearby in situ CTD data and other Argo data in deep layer where oceanographic conditions are stable in time and space. The differences of both salinities were lower than target accuracy of Argo. As compared with the difference of salinities before DMQC, those after DMQC decreased by 60-80 percent. Quality of delayed mode salinity data seemed to be improved correcting salinity data suggested by WJO program.

A Case Study on BIM-enabled Evaluation of Design Alternatives for an Actual Remodeling Project in Korea - Focusing on the Spatial Program Review in Early Phase of Design -

  • Kim, Hyunjung;Lee, Jin-Kook
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.5
    • /
    • pp.117-127
    • /
    • 2015
  • This paper depicts a case study of the BIM (Building Information Modeling)-enabled evaluation of design alternatives for an actual remodeling project in Yeongwol, Korea. The increase of urban population and income followed by the growth of economy has derived massive supply of grand scale housing project in Korea since 1970s. Consequently, building remodeling became one of the feasible resolutions for renovating such old housings in these days. This paper aims to introduce a technical approach to such remodeling projects based on BIM-enabled applications focusing on quantitative analysis of design alternatives. Among the technical issues of such building remodeling projects, this paper focuses on the BIM-enabled area analysis and comparison between design alternatives to support decision-making even in early phase of remodeling design process. BIM and its variety of applications have broadly influenced the domain of AEC-FM (Architecture, Engineering, Construction, and Facility Management) within the lifecycle of buildings. As one of the applications facilitated by BIM, the automated area calculation and scenario-based comparison between alternatives can play an important role in the early phase of remodeling project. We modeled three design alternatives (buildings) and three housing modules (units) based on the actual case in Yeongwol city, Korea using a BIM design authoring tool. Nine combinatorial BIM models were demonstrated for the BIM-enabled review process described in this paper. To determine the most optimal design scenario among nine alternatives, this paper demonstrates a result of the conducted spatial program review. The main subject includes specific spatial program issues on; 1) the number of unit spaces; and 2) area of individual/grouped and private/shared spaces.

Implementation of Efficient Cable Spreading Algorithm and Automation Program for Electrical Equipment in Power Plant (발전소 전기설비를 위한 효과적인 케이블 포설 알고리즘 및 자동화 프로그램 구현)

  • Park, Ki-Hong;Kang, An Na;Choi, Hyo Beom;Lee, Yang Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.9
    • /
    • pp.2229-2236
    • /
    • 2014
  • In this paper, we proposed and implemented the automated cable-spreading program which can be done effectively cabling plan for electrical equipment in power plant. Cause the process of existing cable-spreading design was written in by hand, there are grossly inefficient gain by a personal and time investment with cable omission and unfixed overfill value. Proposed automation program for cable-spreading, which is coded cable and raceway, can calculate the overfill value and raceway change. Some experiments are conducted so as to verify the proposed model, and as a result, implemented cable-spreading program is well performed.

Incorporating Machine Learning into a Data Warehouse for Real-Time Construction Projects Benchmarking

  • Yin, Zhe;DeGezelle, Deborah;Hirota, Kazuma;Choi, Jiyong
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.831-838
    • /
    • 2022
  • Machine Learning is a process of using computer algorithms to extract information from raw data to solve complex problems in a data-rich environment. It has been used in the construction industry by both academics and practitioners for multiple applications to improve the construction process. The Construction Industry Institute, a leading construction research organization has twenty-five years of experience in benchmarking capital projects in the industry. The organization is at an advantage to develop useful machine learning applications because it possesses enormous real construction data. Its benchmarking programs have been actively used by owner and contractor companies today to assess their capital projects' performance. A credible benchmarking program requires statistically valid data without subjective interference in the program administration. In developing the next-generation benchmarking program, the Data Warehouse, the organization aims to use machine learning algorithms to minimize human effort and to enable rapid data ingestion from diverse sources with data validity and reliability. This research effort uses a focus group comprised of practitioners from the construction industry and data scientists from a variety of disciplines. The group collaborated to identify the machine learning requirements and potential applications in the program. Technical and domain experts worked to select appropriate algorithms to support the business objectives. This paper presents initial steps in a chain of what is expected to be numerous learning algorithms to support high-performance computing, a fully automated performance benchmarking system.

  • PDF

A Distortion Correction Method for the Fish-Eye Lens using Photogrammetric Techniques (사진측량 기법을 사용한 어안렌즈 왜곡보정에 관한 연구)

  • Kang, Jin-A;Park, Jae-Min;Kim, Byung-Guk
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2007.04a
    • /
    • pp.161-164
    • /
    • 2007
  • The paper studies in the wide-angle lens and distortion tendency and employs the correction techniques suitable to the fish-eye lens using the existing photographic survey methods. After carrying out the calibration of the the fish-eye lens, we calculated the correction parameters, and then developed the method that convert the original image-point to new image-point correcting distortion. The objectives of suggested calibration method in this paper are to calibrate the image of the the fish-eye lens used in the computer-vision and the control-instrumentation field widely. The proposed technique expects to improve the accuracy of the image of the fish-eye lens in the indoor tracking and monitoring field. Also the referenced cross point auto-extraction program is embodied for improving efficiency of the lens correction techniques. Consequently, this calibration method would be applied to the automated distorting correction method on not only the fish-eye lens also general lens.

  • PDF

The Main Substance and Some Problems of 24 hours Advance Cargo Manifest Declaration Rule (선적 24시간전 적하목록전송규칙(24 Hours Rules)의 주요내용과 문제점)

  • Han, Sang-Hyun;Eom, Kwang-Yeol
    • The Journal of Information Technology
    • /
    • v.8 no.1
    • /
    • pp.95-112
    • /
    • 2005
  • This paper will look into the Main Substance and Some Problems of 24 hours Advance Cargo Manifest Declaration Rule, focuses on the Policy implication of Korea's and counter measures of our parties concerned about 24-hour advance vessel manifest rule. The 24-hour rule requires cargo owners to submit cargo manifest information to U.S. Customs 24 hours before vessel sailing from the final foreign port to a U.S. port. Cargo manifest information must be complete, accurate, and timely. As of February 2, 2003 manifest information can be submitted by paper or electronically. Cargo descriptions must be at a level of detail consistent with Harmonized Tariff Schedule (HTS) codes used by U.S. Customs. HTS codes are 10 digits. Electronic submissions are made via the Automated Manifest System (AMS) run by U.S. Customs.

  • PDF

Detection of invalidated sanity checks caused by undefined behaviors (정의되지 않은 행동에 의한 안전성 검사 무효화 탐지 기법)

  • Lee, JongHyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.215-219
    • /
    • 2014
  • C programming language has undefined behaviors, which cause unintended execution of a program. When a programmer adds sanity checks without caring about undefined behaviors, compilers may misunderstand and invalidate the sanity checks. Thus, we propose an automated system to detect invalidated sanity checks by marking sanity checks in source code and checking the marks in binary code.