• Title/Summary/Keyword: Binary Code Analysis

Search Result 126, Processing Time 0.023 seconds

A Process Algebra-Based Detection Model for Multithreaded Programs in Communication System

  • Wang, Tao;Shen, Limin;Ma, Chuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.965-983
    • /
    • 2014
  • Concurrent behaviors of multithreaded programs cannot be described effectively by automata-based models. Thus, concurrent program intrusion attempts cannot be detected. To address this problem, we proposed the process algebra-based detection model for multithreaded programs (PADMP). We generate process expressions by static binary code analysis. We then add concurrency operators to process expressions and propose a model construction algorithm based on process algebra. We also present a definition of process equivalence and behavior detection rules. Experiments demonstrate that the proposed method can accurately detect errors in multithreaded programs and has linear space-time complexity. The proposed method provides effective support for concurrent behavior modeling and detection.

LIGHT CURVE ANALYSIS OF CONTACT BINARY SYSTEM V523 CASSIOPEIAE (접촉쌍성 V523 CAS의 광도곡선 분석)

  • 김진희;정장해
    • Journal of Astronomy and Space Sciences
    • /
    • v.19 no.4
    • /
    • pp.263-272
    • /
    • 2002
  • A total of 616 observations (308 in B, 308 in V) to. V523 Cas was made on three nights from October 19 to 21 in 1999 using the 1.8m telescope with 2K CCD camera of the Bohyunsan Optical Astronomy Observatory of KAO. With our data we constructed the BV light curves and determined 4 times of minimum light. We also obtained physical parameters of the system by combined analysis of both light and radial velocity curves using the Wilson-Devinney code.

A Functional Unit Dynamic API Birthmark for Windows Programs Code Theft Detection (Windows 프로그램 도용 탐지를 위한 기능 단위 동적 API 버스마크)

  • Choi, Seok-Woo;Cho, Woo-Young;Han, Tai-Sook
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.9
    • /
    • pp.767-776
    • /
    • 2009
  • A software birthmark is a set of characteristics that are extracted from a program itself to detect code theft. A dynamic API birthmark is extracted from the run-time API call sequences of a program. The dynamic Windows API birthmarks of Tamada et al. are extracted from API call sequences during the startup period of a program. Therefore. the dynamic birthmarks cannot reflect characteristics of main functions of the program. In this paper. we propose a functional unit birthmark(FDAPI) that is defined as API call sequences recorded during the execution of essential functions of a program. To find out that some functional units of a program are copied from an original program. two FDAPIs are extracted by executing the programs with the same input. The FDAPIs are compared using the semi-global alignment algorithm to compute a similarity between two programs. Programs with the same functionality are compared to show credibility of our birthmark. Binary executables that are compiled differently from the same source code are compared to prove resilience of our birthmark. The experimental result shows that our birthmark can detect module theft of software. to which the existing birthmarks of Tamada et al. cannot be applied.

The Performance Analysis of Transmission Line Codes for the Very-High Speed Optical Transmission System. (초고속 광전송 시스템용 전송로 부호의 성능 분석)

  • Yu, Bong-Seon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.4
    • /
    • pp.479-489
    • /
    • 1994
  • At the present time, it is an important problem that we are to select a transmission line code for the very-high speed optical transmission system which can confidentially transfer the original information signal sequence efficiently, as it is to be the large capacity and the economization for the optical digital transmission system to transfer the information signal sequence at the very-high speed. Therefore, this paper is to select first the proper transmission line codes for the high speed(more than Mb/s) optical transmission system of the proposed two-level unipolar transmission line codes up to date, and to decide a mBIZ (m Binary with One Zero insertion) code as an optimal transmission line code for the very-high speed optical transmission system, resulting from analyzing the performance at the requirements of the transmission line code, such as the maximum consecutive identical digits, the transmission delay time, the increasing rate of clock, the mark rate, the circuit complexity, the supervision of transmission line error, and power spectrum among the selected transmission line codes.

  • PDF

Analysis of Linear Span of Non-linear Binary Sequences with Decimation d=2m-2(2m+3) (데시메이션이 d=2m-2(2m+3)인 비선형 이진수열의 선형스팬 분석)

  • Yim, Ji-Mi;Cho, Sung-Jin;Kim, Han-Doo;Kim, Seok-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.609-616
    • /
    • 2014
  • Large linear span makes difficult to predict, so this study is important to the security and code system. It has been studied about the non-linear binary sequences having low correlation values and large linear span. In this paper we analyze the linear span of $S^r_a(t)=Tr^m_1\{[Tr^n_m(a{\alpha}^t+{\alpha}^{dt})]^r\}$ ($a{\in}GF(2^m)$, $0{\leq}t{\leq}2^m-2$) where n=2m and $d=2^{m-2}(2^m+3)$.

Detecting Spectre Malware Binary through Function Level N-gram Comparison (함수 단위 N-gram 비교를 통한 Spectre 공격 바이너리 식별 방법)

  • Kim, Moon-Sun;Yang, Hee-Dong;Kim, Kwang-Jun;Lee, Man-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1043-1052
    • /
    • 2020
  • Signature-based malicious code detection methods share a common limitation; it is very hard to detect modified malicious codes or new malware utilizing zero-day vulnerabilities. To overcome this limitation, many studies are actively carried out to classify malicious codes using N-gram. Although they can detect malicious codes with high accuracy, it is difficult to identify malicious codes that uses very short codes such as Spectre. We propose a function level N-gram comparison algorithm to effectively identify the Spectre binary. To test the validity of this algorithm, we built N-gram data sets from 165 normal binaries and 25 malignant binaries. When we used Random Forest models, the model performance experiments identified Spectre malicious functions with 99.99% accuracy and its f1-score was 92%.

Phenomenological Modeling of Newly Discovered Eclipsing Binary 2MASS J18024395 + 4003309 = VSX J180243.9+400331

  • Andronov, Ivan L.;Kim, Yonggi;Kim, Young-Hee;Yoon, Joh-Na;Chinarova, Lidia L.;Tkachenko, Mariia G.
    • Journal of Astronomy and Space Sciences
    • /
    • v.32 no.2
    • /
    • pp.127-136
    • /
    • 2015
  • We present a by-product of our long term photometric monitoring of cataclysmic variables. 2MASS J18024395 +4003309 = VSX J180243.9 +400331 was discovered in the field of the intermediate polar V1323 Her observed using the Korean 1-m telescope located at Mt. Lemmon, USA. An analysis of the two-color VR CCD observations of this variable covers all the phase intervals for the first time. The light curves show this object can be classified as an Algol-type variable with tidally distorted components, and an asymmetry of the maxima (the O'Connell effect). The periodogram analysis confirms the cycle numbering of Andronov et al. (2012) and for the initial approximation, the ephemeris is used as follows: Min I. BJD = 2456074.4904+0.3348837E. For phenomenological modeling, we used the trigonometric polynomial approximation of statistically optimal degree, and a recent method "NAV" ("New Algol Variable") using local specific shapes for the eclipse. Methodological aspects and estimates of the physical parameters based on analysis of phenomenological parameters are presented. As results of our phenomenological model, we obtained for the inclination $i=90^{\circ}$, $M_1=0.745M_{\odot}$, $M_2=0.854M_{\odot}$, $M=M_1+M_2=1.599M_{\odot}$, the orbital separation $a=1.65{\cdot}10^9m=2.37R_{\odot}$ and relative radii $r_1=R_1/a=0.314$ and $r_2=R_2/a=0.360$. These estimates may be used as preliminary starting values for further modeling using extended physical models based on the Wilson & Devinney (1971) code and it's extensions

Performance Analysis of the (16, 7) MB-ECLC According to Decoding Algorithms

  • Kim, Jeong-Goo
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1998.10a
    • /
    • pp.421-431
    • /
    • 1998
  • Error control performance of the (16, 7) minimum-bandwidth binary error cotrol line code (MB-ECLC) according to decoding algorithms is analyzed and compared in this paper. As a result , when retransmission is not allowed or meaningless. to reduce performance degradation ad computational burden. the modified soft decision decoding algorithm using the structure of (16,7) MB-ELEC is proposed. The error cotnrol capability of this modified algorithm is far better than that of a hard decision decoding algorithm, and almost same as that of a full soft decision decoding algorithm. In additino, the number of comparisons for the modified algorithm is decreased more than 5 times as compared with a full soft decision decoding algorithm.

Photometric Observations of the Contact Binary System V523 Cassiopeiae

  • Jeong, Jang-Hae;Kim, Chun-Hwey;Lee, Yong-Sam
    • Journal of Astronomy and Space Sciences
    • /
    • v.27 no.2
    • /
    • pp.81-88
    • /
    • 2010
  • A total of 583 observations (193 in ${\Delta}b$, 190 in ${\Delta}v$, 200 in ${\Delta}r$) for V523 Cas was made on 9 nights from September to December in 2008 using the 100 cm telescope with 2K CCD camera of the Chungbuk National University Observatory. With our data BVR light curves were constructed and 9 times of minimum light were determined. We also obtained physical parameters of the V523 Cas system by analysis of the BVR light curves using the Wilson-Devinney code.

Performance analysis of asynchronous DS-CDMA system with MRC diversity in fading channels

  • Seo, Seok;Lee, Chan-kil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11A
    • /
    • pp.1237-1243
    • /
    • 2004
  • This paper presents and analyses the closed-form expression of the average bit error rate (BER) for an asynchronous direct-sequence code division multiple access (DS-CDMA) system with coherent binary phase shift keying (BPSK) modulation scheme using a maximal ratio combining (MRC) diversity over a Rician fading channel. In addition to the average BER, outage probability, and user capacity of system are estimated as performance measures. The results are general enough so that it includes Rayleigh fading and nonfading channel with zero and infinite Rician factor, respectively, as special cases. The effects of various channel models, processing gains, and diversity orders on the system performances are also considered for the typical multipath delay profiles characterized by Rician fading channel.