• Title/Summary/Keyword: New Address

Search Result 1,479, Processing Time 0.027 seconds

Return address stack for protecting from buffer overflow attack (버퍼오버플로우 공격 방지를 위한 리턴주소 스택)

  • Cho, Byungtae;Kim, Hyungshin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4794-4800
    • /
    • 2012
  • Many researches have been performed to resist buffer overflow attacks. However, the attack still poses one of the most important issue in system security field. It is because programmers are using library functions containing security hole and once buffer overflow vulnerability has been found, the security patches are distributed after the attacks are widely spreaded. In this paper, we propose a new cache level return address stack architecture for resisting buffer overflow attack. We implemented our hardware onto SimpleScalar simulator and verified its functionality. Our circuit can overcome the various disadvantages of previous works with small overhead.

Implementation of New MOD System Using On-demand Multicasting Technique (주문형 멀티캐스팅 기법을 사용한 새로운 MOD 시스템의 구현)

  • Kim, Young-Jung;Hwang, Tae-June;Kwon, Ki-Seop;Kim, Ik-Soo
    • The KIPS Transactions:PartB
    • /
    • v.10B no.7
    • /
    • pp.847-852
    • /
    • 2003
  • This paper implements MOD system using multicast delivery. Conventional system provide server-based system in multicast delivery but implemented system provides on-demand client-based multicast system. The scheduler aggregates clients' request and it generate multcast group addresses and port numbers according to requested video items and service request time. Then it transmits immediately multicast address to MOD server and client who request service. And then MOD server transmits requested streams with a multicast group address and the client joins the group automatically. The scheduler assigns the same multicast group address when other clients request an identical video within the same scheduling duration. The system can reduce load of server and support many clients at the same time.

Modified March Algorithm Considering NPSFs (NPSFs를 고려한 수정된 March 알고리즘)

  • Kim, Tae-Hyeong;Yun, Su-Mun;Park, Seong-Ju
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.37 no.4
    • /
    • pp.71-79
    • /
    • 2000
  • The original March algorithms cannot detect CMOS ADOFs(Address Decoder Open Faults) which requires separate deterministic test patterns. Modified March algorithm using DOF(Degree of Freedom) was suggested to detect these faults in addition to conventional stuck faults. This paper augments the modified march test to further capture NPSFs(Neighborhood Pattern Sensitive Faults). Complete CA(Cellular Automata) is used for address generation and Rl-LFSRs(Randomly Inversed LFSRs) for data generation. A new modified March algorithm can detect SAF, CF, TF, CMOS ADOFs, and part of NPSFs. Time complexity of this algorithm is still O(n).

  • PDF

IPv6 Autoconfiguration for Hierarchical MANETs with Efficient Leader Election Algorithm

  • Bouk, Safdar Hussain;Sasase, Iwao
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.248-260
    • /
    • 2009
  • To connect a mobile ad hoc network (MANET) with an IP network and to carryout communication, ad hoc network node needs to be configured with unique IP adress. Dynamic host configuration protocol (DHCP) server autoconfigure nodes in wired networks. However, this cannot be applied to ad hoc network without introducing some changes in auto configuration mechanism, due to intrinsic properties (i.e., multi-hop, dynamic, and distributed nature) of the network. In this paper, we propose a scalable autoconfiguration scheme for MANETs with hierarchical topology consisting of leader and member nodes, by considering the global Internet connectivity with minimum overhead. In our proposed scheme, a joining node selects one of the pre-configured nodes for its duplicate address detection (DAD) operation. We reduce overhead and make our scheme scalable by eliminating the broadcast of DAD messages in the network. We also propose the group leader election algorithm, which takes into account the resources, density, and position information of a node to select a new leader. Our simulation results show that our proposed scheme is effective to reduce the overhead and is scalable. Also, it is shown that the proposed scheme provides an efficient method to heal the network after partitioning and merging by enhancing the role of bordering nodes in the group.

An E2E Mobility Management and TCP Flow Control Scheme in Vertical Handover Environments (버티컬 핸드오버 환경에서 종단간 이동성 관리 및 TCP 흐름 제어기법)

  • Seo Ki-nam;Lim Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.387-395
    • /
    • 2005
  • In this paper, we propose an end-to-end mobility management and TCP flow control scheme which considers different link characteristics for vertical handover environments. The end-to-end mobility management is performed by using SIP protocol. When a mobile node moves to a new network, it informs its movement of the correspondent node by sending SIP INFO message containing a new IP address which will be used in the new network. And then the corresponding node encapsulates all packets with the new IP address and sends them to the mobile node. in general, RTT of WLAN is shorter than RTT of cdma2000. when the MN moves from WLAN network to cdma2000 network, TCP retransmission timeout will be occurred in spite of non congestion situations. Thus, TCP congestion window size will be decreased and TCP throughput will be also decreased. To prevent this phenomenon, we propose a method using probe packets after handover to estimate a link delay of the new network. We also propose a method using bandwidth ratio of each network to update RTT. It is shown through NS-2 simulations that the proposed schemes can have better performance than the previous works.

Skip-k Storage Policy (Skip-k 저장방식)

  • Lim, Sang-Gyu
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.19 no.2
    • /
    • pp.95-103
    • /
    • 1993
  • We address a new storage policy, called Skip-k storage, which gives storing priority to the items with relatively higher turnover rates. Applying the policy in storage systems such as AS/RS will reduce expected travel distance considerably. We analyze system behavior and find an appropriate skip size expressed by the system parameters in case arrival rates become larger enough.

  • PDF

예방정비 체제하에서의 공정별 고장시간 간격분석

  • Kim, Chang-Hyun;Kim, Jong-Han
    • IE interfaces
    • /
    • v.4 no.2
    • /
    • pp.35-42
    • /
    • 1991
  • Many authors derived MTTF/MTBF for an operating system by analyzing its actual life time data. However, it is difficult to derive MTTF/MTBF when few breakdowns accur throughout a year. In this paper, we address a new approach to solve that problem under a preventive maintenance policy, in which few breakdowns occur, and also introduce a case study using the results obtained.

  • PDF

A Study on the Technique Develop for Perspective Image Generation and 3 Dimension Simulation in Jecheon (제천시 영상 조감도 생성 및 3차원 시뮬레이션 기술개발에 관한 연구)

  • 연상호;홍일화
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.21 no.1
    • /
    • pp.45-51
    • /
    • 2003
  • Stereo bird's-eyes-view was prepared for 3-dimensional view of various forms of Jecheon city, and 3-dimensional simulation was applied to it so as to show it in moving pictures in spatial. In manufacturing stereo bird's-eyes-view, perspective technology was used in image-making technology, and the basic material images are prepared as fellows: used EOC Images from Arirang-1 satellite, created DEM whose error was optionally geometric corrected after drawn from the contour line of the map on a scale of l/5,000 manufactured by national geography institute as a national standard map, and classified road lines which were manufactured as a road layer vector file of a map on a scale of l/l,000 and then overlay it over the three dimensional image of target area. Especially for the connectivity with address system to be used in new address, an arterial road map on a scale of l/l,000 that had been manufactured to grant new address was used in maximum in road network structure data of city area in this study.

A Study on Security Analysis and Security Design for IPv6 Transition Mechanisms (IPv6 전환 기술의 보안 위협 분석 및 보안 설계에 대한 연구)

  • Choi, In-Seok;Kim, Young-Han;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.689-697
    • /
    • 2005
  • The IETF has created the v6ops Working Group to assist IPv6 transition and propose technical solutions to achieve it. But it's quite problem which security consideration for a stage of IPv4/IPv6 transition and co-existence. There are new security problem threat that it caused by the characteristics of heterogeneity. In this paper, we describe IPv6 transition mechanisms and analyze security problem for IPv6 transition mechanism. also we propose security consideration and new security mechanism. We analyzed DoS and DRDoS in 6to4 environment and presented a address sanity check as a solution. We also showed an attack of address exhaustion in address allocation server. To solve this problem, we proposed challenge-response mechanism in DSTM.

Crystal Defect Chemistry of Strontium Hexaaluminate Magnetoplumbite

  • Park, Jae-Gwan;A.N. Cormack
    • Korean Journal of Crystallography
    • /
    • v.11 no.3
    • /
    • pp.176-181
    • /
    • 2000
  • Computer-based atomistic simulation methods are applied to address quantitatively the crystal defect chemistry of strontium hexaaluminate, SrAl/sub 12/O/sub 19/. Our calculations show that oxygen Frenkel disorder is the dominant intrinsic defect mode to be expected in the multi-component oxide, though Schottky disorder may also exist. When La and Mg enter into SrAl/sub 12/O/sub 19/. Mg prefers to occupy Al(3)4f tetrahedral sites in the magnetoplumbite structure. Our calculations also indicate that O/sub Sr/ defect is improbable in the structure.

  • PDF