• Title/Summary/Keyword: Code coverage

Search Result 103, Processing Time 0.027 seconds

An Enhancement Scheme of Dynamic Analysis for Evasive Android Malware (분석 회피 기능을 갖는 안드로이드 악성코드 동적 분석 기능 향상 기법)

  • Ahn, Jinung;Yoon, Hongsun;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.519-529
    • /
    • 2019
  • Nowadays, intelligent Android malware applies anti-analysis techniques to hide malicious behaviors and make it difficult for anti-virus vendors to detect its presence. Malware can use background components to hide harmful operations, use activity-alias to get around with automation script, or wipe the logcat to avoid forensics. During our study, several static analysis tools can not extract these hidden components like main activity, and dynamic analysis tools also have problem with code coverage due to partial execution of android malware. In this paper, we design and implement a system to analyze intelligent malware that uses anti-analysis techniques to improve detection rate of evasive malware. It extracts the hidden components of malware, runs background components like service, and generates all the intent events defined in the app. We also implemented a real-time logging system that uses modified logcat to block deleting logs from malware. As a result, we improve detection rate from 70.9% to 89.6% comparing other container based dynamic analysis platform with proposed system.

A Study on Hybrid Fuzzing using Dynamic Analysis for Automatic Binary Vulnerability Detection (바이너리 취약점의 자동 탐색을 위한 동적분석 정보 기반 하이브리드 퍼징 연구)

  • Kim, Taeeun;Jurn, Jeesoo;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.541-547
    • /
    • 2019
  • Recent developments in hacking technology are continuing to increase the number of new security vulnerabilities. Approximately 80,000 new vulnerabilities have been registered in the Common Vulnerability Enumeration (CVE) database, which is a representative vulnerability database, from 2010 to 2015, and the trend is gradually increasing in recent years. While security vulnerabilities are growing at a rapid pace, responses to security vulnerabilities are slow to respond because they rely on manual analysis. To solve this problem, there is a need for a technology that can automatically detect and patch security vulnerabilities and respond to security vulnerabilities in advance. In this paper, we propose the technology to extract the features of the vulnerability-discovery target binary through complexity analysis, and select a vulnerability-discovery strategy suitable for the feature and automatically explore the vulnerability. The proposed technology was compared to the AFL, ANGR, and Driller tools, with about 6% improvement in code coverage, about 2.4 times increase in crash count, and about 11% improvement in crash incidence.

A Study on Advertising Review of Daily Newspaper Section (Special Edition) and Suggestions for Improvement (기사형 섹션(특집)광고 심의현황과 개선방안 연구)

  • Yu, HyunJoong;Ji, WonBae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.235-241
    • /
    • 2019
  • The purpose of this study is to investigate the characteristics of advertising section of the daily newspaper through content analysis. From April 2015 to March 2017, a total of 1,927 advertisements were analyzed by the newspaper ethics committee, and the following results were obtained. Firstly, most types of features (advertising) received more attention than warnings. Secondly, we can confirm that the amount of advertisement in section (featured) of major daily newspapers is gradually increasing, and section advertisement is appeared in major business districts. Third, there were many violations in the practice guidelines of the newspaper code of ethics as the media's responsibility and press coverage. Finally, in the case of certain companies and products, if you do not follow the principles of publication for profit and publicity, you may need to make your own efforts to protect the credibility and fairness of newspapers, and more autonomous guidelines.

The Impact of Coin Changers on the Business Development of Chinese Commercial Banks (동전교환기가 중국 상업은행의 업무발전에 미치는 영향)

  • Yongjie, Zhu
    • Journal of Digital Policy
    • /
    • v.1 no.2
    • /
    • pp.17-24
    • /
    • 2022
  • In China, the continuous promotion and coverage of scanning code payment has caused an imbalance in the coin market. Coin changers can not only alleviate this problem, but also affect the business development of commercial banks. Therefore, it is meaningful to study the coin changer. The purpose of this paper is to study the impact of coin changers on the business of commercial banks in China. Through on-the-spot visits and based on the manually collected customer data of Chinese commercial banks as the object, combined with the calculation method of financial indicators to conduct case analysis. The results of the study show that the coin changer has a positive impact on the business development of Chinese commercial banks. This paper provides feasible suggestions and new ideas for business development to Chinese commercial banks. At present, there are few related studies on coin exchange machines. This study combines the calculation of financial indicators to verify the policy results, which is the innovation of this study.

Non-Reporting, Media Ethics and Ideological Conflicts in South Korea: Focus on Media Coverage Relating to Surveillance of Civilians by the National Intelligence Service and the Defense Security Command (무(無)보도 현상과 언론윤리 그리고 한국사회의 이념갈등: 국정원, 기무사 민간사찰 관련 보도 사례를 중심으로)

  • Kim, Su-Jeong;Cheong, Yeon-Goo
    • Korean journal of communication and information
    • /
    • v.53
    • /
    • pp.5-28
    • /
    • 2011
  • This research examines the recent increasingly intensified non-reporting phenomenon by the press in South Korea and its legitimacy and validity. Non-reporting denotes cases in which the press does not report on significant issues in society. Although journalism scholars have raised this question, it remains unaddressed through case studies and formal criticism. This research compares the reporting and non-reporting by major media groups of cases related to the surveillance of civilians by the National Intelligence Service and the Defense Security Command under the Ministry of National Defense. This research specifies that the non-reporting phenomenon relates not to the ability to report, but to willingness to report, due to intervention by political factionalism of media groups. The non-reporting phenomenon results from the press ignoring their basic responsibility stemming from journalistic ethics and their social responsibility to fulfill their readers' right to know. Accordingly, this research revealed that the non-reporting phenomenon cannot be justified through diverse theoretical discussions and the journalistic code of ethics. Through the logical framework of public opinions and diverse empirical data to support it, this research demonstrates that the non-reporting phenomenon produces not unhelpful, but harmful effects to resolutions to ideological dissent in South Korean society.

  • PDF

A study on the Methodology of Extracting the Poor Deprived Districts by Using Geospatial Information (국토정보를 활용한 빈곤·취약지구 추출 방법에 관한 연구)

  • Lee, Hee-Yeon;An, Eun-Kyung
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.5-25
    • /
    • 2016
  • The purpose of this study develops the methodology to extract the poor deprived districts using the data from the national spatial data infrastructure portal. Particularly this study tries to select more acute indicators and to test the operability of such indicators. Also this study is focused on the versatile methodology that can be adjusted to incorporate alternative indicators that might be appropriate according to the hierarchy of the spatial unit. The indicator sets are composed of three dimensions: the poor class, the poor old housing, and poor residential neighborhood environment. Each representative indicator is selected based on the characteristics of the poor deprived districts. As a result, at the level of administrative Dong, key indicators for extracting the poor deprived districts are number of recipients of national basic living security per thousand persons and ratio of households living at old detached house. At the level of the national based zip code district, the ratio of buildings built on parcels located at roads below 4m in width, the ratio of small parcels below $60m^2$ and the ratio of poor old buildings are very important indicators. The result of grid analysis by overlaying the coverage of multiple indicators shows that relatively more vulnerable and deprived districts can be extracted at the small sub-district level. This study suggests the possibility to create the high value-added information, using the data from the national spatial data infrastructure portal. This methodology enables policymakers to select the priority target districts of poor deprived district more effectively.

Study on the procedure to obtain an attainable speed in pack ice

  • Kim, Hyun Soo;Jeong, Seong-Yeob;Woo, Sun-Hong;Han, Donghwa
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.10 no.4
    • /
    • pp.491-498
    • /
    • 2018
  • The cost evaluation for voyage route planning in an ice-covered sea is one of the major topics among ship owners. Information of the ice properties, such as ice type, concentration of ice, ice thickness, strength of ice, and speed-power relation under ice conditions are important for determining the optimal route in ice and low operational cost perspective. To determine achievable speed at any designated pack ice condition, a model test of resistance, self-propulsion, and overload test in ice and ice-free water were carried out in a KRISO ice tank and towing tank. The available net thrust for ice and an estimation of the ice resistance under any pack ice condition were also performed by I-RES. The in-house code called 'I-RES', which is an ice resistance estimation tool that applies an empirical formula, was modified for the pack ice module in this study. Careful observations of underwater videos of the ice model test made it possible to understand the physical phenomena of underneath of the hull bottom surface and determine the coverage of buoyancy. The clearing resistance of ice can be calculated by subtracting the buoyance and open water resistance form the pre-sawn ice resistance. The model test results in pack ice were compared with the calculation results to obtain a correlation factor among the pack ice resistance, ice concentration, and ship speed. The resulting correlation factors were applied to the calculation results to determine the pack ice resistance under any pack ice condition. The pack ice resistance under the arbitrary pack ice condition could be estimated because software I-RES could control all the ice properties. The available net thrust in ice, which is the over thrust that overcomes the pack ice resistance, will change the speed of a ship according to the bollard pull test results and thruster characteristics (engine & propulsion combination). The attainable speed at a certain ice concentration of pack ice was determined using the interpolation method. This paper reports a procedure to determine the attainable speed in pack ice and the sample calculation using the Araon vessel was performed to confirm the entire process. A more detailed description of the determination of the attainable speed is described. The attainable speed in 1.0 m, 90% pack ice and 540 kPa strength was 13.3 knots.

CNVDAT: A Copy Number Variation Detection and Analysis Tool for Next-generation Sequencing Data (CNVDAT : 차세대 시퀀싱 데이터를 위한 유전체 단위 반복 변이 검출 및 분석 도구)

  • Kang, Inho;Kong, Jinhwa;Shin, JaeMoon;Lee, UnJoo;Yoon, Jeehee
    • Journal of KIISE:Databases
    • /
    • v.41 no.4
    • /
    • pp.249-255
    • /
    • 2014
  • Copy number variations(CNVs) are a recently recognized class of human structural variations and are associated with a variety of human diseases, including cancer. To find important cancer genes, researchers identify novel CNVs in patients with a particular cancer and analyze large amounts of genomic and clinical data. We present a tool called CNVDAT which is able to detect CNVs from NGS data and systematically analyze the genomic and clinical data associated with variations. CNVDAT consists of two modules, CNV Detection Engine and Sequence Analyser. CNV Detection Engine extracts CNVs by using the multi-resolution system of scale-space filtering, enabling the detection of the types and the exact locations of CNVs of all sizes even when the coverage level of read data is low. Sequence Analyser is a user-friendly program to view and compare variation regions between tumor and matched normal samples. It also provides a complete analysis function of refGene and OMIM data and makes it possible to discover CNV-gene-phenotype relationships. CNVDAT source code is freely available from http://dblab.hallym.ac.kr/CNVDAT/.

Real-Time Implementation of Acoustic Echo Canceller for Mobile Handset Using TeakLite DSP Core (Teaklite DSP Core 를 이용한 이동통신 단말기용 음향반향제거기의 실시간 구현)

  • Gwon, Hong-Seok;Kim, Si-Ho;Jang, Byeong-Uk;Bae, Geon-Seong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.2
    • /
    • pp.128-136
    • /
    • 2002
  • In this paper, we developed an acoustic echo canceller in real-time using TeakLite DSP Core, which will be placed in the vocoder chip of a mobile handset. Considering the limited computational capacity given to the acoustic echo canceller in a vocoder chip, we employed a FIR-type adaptive filter using a conventional NLMS algorithm. To begin with, we designed and implemented an acoustic echo canceller with floating-point format C-source code, and then converted it into fixed-point format through integer simulation. Then we programmed and optimized it in the assembler level to make it run ill real-time. After optimization procedure, the implemented echo canceller has approximately 624 words of program memory and 811 words of data memory. With 8 KHz sampling rate and 256 filter taps in the echo canceller that corresponds to 32 msec of echo delay, it requires 14.12 MIPS of computational capacity. For coverage of 16 msec echo delay, i.e., 128 filter taps, 9 MIPS is requited.

Development of Pre-Service and In-Service Information Management System (iSIMS) (원전 가동전/중 검사정보관리 시스템 개발)

  • Yoo, H.J.;Choi, S.N.;Kim, H.N.;Kim, Y.H.;Yang, S.H.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.24 no.4
    • /
    • pp.390-395
    • /
    • 2004
  • The iSTMS is a web-based integrated information system supporting Pre-Service and In-Service Inspection(PSI/ISI) processes for the nuclear power plants of KHNP(Korea Hydro & Nuclear Power Co. Ltd.). The system provides a full spectrum coverage of the inspection processes from the planning stage to the final report of examination in accordance with applicable codes, standards, and regulatory requirements. The major functions of the system includes the inspection planning, examination, reporting, project control and status reporting, resource management as well as objects search and navigation. The system also provides two dimensional or three dimensional visualization interface to identify the location and geometry of components and weld areas subject to examination in collaboration with database applications. The iSIMS is implemented with commercial software packages such as database management system, 2-D and 3-D visualization tool, etc., which provide open, updated and verified foundations. This paper describes the key functions and the technologies for the implementation of the iSIMS.