• Title/Summary/Keyword: Software update

Search Result 222, Processing Time 0.029 seconds

A Study on Optimal Software Maintenance Policies with Warranty Period (보증기기간을 고려한 최적 소프트웨어의 보전정책 연구)

  • Nam, Kyung-H.;Kim, Do-Hoon
    • Journal of Korean Society for Quality Management
    • /
    • v.39 no.2
    • /
    • pp.170-178
    • /
    • 2011
  • In general, a software fault detection phenonenon is described by a software reliability model based on a nonhomogeneous Poisson process(NHPP). In this paper, we propose a software reliability growth model considering the differences of the software environments in both the testing phase and the operational phase. Also, we consider the problem of determining the optimal release time and the optimal warranty period that minimize the total expected software cost which takes account of periodic software maintenance(e.g. patch, update, etc). Finally, we analyze the sensitivity of the optimal release time and warranty period based on the fault data observed in the actual testing process.

Analysis of Security Requirements for Secure Update of IVI(In-Vehicle-Infotainment) Using Threat Modeling and Common Criteria (위협모델링과 공통평가기준을 활용한 인포테인먼트의 안전한 업데이트 보안요구사항 분석)

  • Kang, Soo-young;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.613-628
    • /
    • 2019
  • In-Vehicle Infotainment provides navigation and various functions through the installation of the application. And infotainment is very important to control the entire vehicle by sending commands to the ECU. Infotainment supports a variety of wireless communication protocols to install and update applications. So Infotainment is becoming an attack surface through wireless communcation protocol for hacker's access. If malicious software is installed in infotainment, it can gain control of the vehicle and send a malicious purpose command to the ECU, affecting the life of the driver. Therefore, measures are needed to verify the security and reliability of infotainment software updates, and security requirements must be derived and verified. It must be developed in accordance with SDL to provide security and reliability, and systematic security requirements must be derived by applying threat modeling. Therefore, this paper conducts threat modeling to derive infotainment update security requirements. Also, the security requirements are mapped to the Common Criteria to provide criteria for updating infotainment software.

A Code Banking-based High-speed Concurrent Software Update Method for Single Hop Wireless Sensor Networks (단일 홉 무선 센서 네트워크를 위한 코드 뱅킹 기반의 고속 병렬 소프트웨어 업데이트 기법)

  • Park, Young-Kyun;Nam, Young-Jin
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.7
    • /
    • pp.949-963
    • /
    • 2011
  • Generally, It is indispensible to use an ISP(In System Programming) tool for upgrading, patching, or changing the system software of the each sensor nodes in wireless sensor networks. While under a small number of nodes, the upgrading task is not a serious burden, however if there are a large number of nodes to be updated, the task is almost impossible to do for the given constrains such as limited budgets and resources. Based on this observation, in this paper we have proposed a novel upgrading scheme based on a single hop in IEEE 802.15.4 PAN(Personal Area Network)s. Simulation results have shown the scheme outcomes the conventional methods in the performance measures.

A Configuration Technique for Dynamic Development of Mobile Web (모바일 웹의 동적개발을 위한 설정기법)

  • Kim, Chul-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.6
    • /
    • pp.3841-3850
    • /
    • 2014
  • Owing to the rapid supply of mobile devices, the requirements of users for new mobile software has increased and software vendors (developers) should be able to provide software fast and appropriately. On the other hand, the mobile application in a mobile platform architecture should pass through a complex process to provide the modified mobile application to users and cannot provide an update quickly and immediately. On the other hand, the use of the mobile web is growing because a mobile web can provide an immediate modification of various update requirements to users. Therefore, this paper proposes a dynamic configuration technique for enhancing the productivity of the mobile web development and maintenance in this paper.

Record keeping system of bugs for software quality assurance

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.207-213
    • /
    • 2019
  • Assistance for the quality assurance management and developers to provide high quality software products. Using a bug record keeping system is exceptionally important in software progress, and it is followed vastly by majority of software producing companies in modern era. Regular application of a bug record keeping system is very helpful in developing software systems. We developed this system which helps the software testing team to keep a complete record of their testing activities during the software testing, also increases your confidence in the software quality, class and worth. Our proposed system offers trouble-free and effortless approaches to acquire desired information about bug, also produces different kinds of reports like summary reports, detailed reports etc. It gives facility to create, delete and update any project. Our developed application system is designed by using visual c# at front end and sql server 2008 management studio express at back end.

A Bayesian Approach to Software Optima I Re lease Policy (소프트웨어 최적출하정책의 베이지안 접근방법)

  • 김희수;이애경
    • Proceedings of the Korean Reliability Society Conference
    • /
    • 2002.06a
    • /
    • pp.273-273
    • /
    • 2002
  • In this paper, we investigate a software release policy with software reliability growth factor during the warranty period by assuming that the software reliability growth is assumed to occur after the testing phase with probability p and the software reliability growth is not assumed to occur after the testing phase with probability 1-p. The optimal release policy to minimize the expected total software cost is discussed. Numerical examples are shown to illustrate the results of the optimal policy. And we consider a Bayesian decision theoretic approach to determine an optimal software release policy. This approach enables us to update our uncertainty when determining optimal software release time, When the failure time is Weibull distribution with uncertain parameters, a bayesian approach is established. Finally, numerical examples are presented for illustrative propose.

  • PDF

Structure and functional improvement of KTX DEP software (KTX 고장코드 수집 소프트웨어의 구조와 기능개선)

  • Jung, Sung-Youn;Kim, Hyung-In;Jung, Do-Won;Cho, Taek-Seon
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.952-963
    • /
    • 2008
  • The collection of KTX trainset fault code is made by DEP software. We can improve software function and update data after understanding DEP software function and software structure. For the improvement of trainset function and its performance, the same improvement of performance and structure change as DEP software, which collects and analyzes train's fault information, are required. Accordingly, we made a research for functional strucfure of KTX fault code collection software, STR3F, variable declaration through Script.rxr file and code analysis method and proceeded research for realizing more improved user environment of DEL software and fault analysis method.

  • PDF

A Study on Vulnerability Analysis and Memory Forensics of ESP32

  • Jiyeon Baek;Jiwon Jang;Seongmin Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.3
    • /
    • pp.1-8
    • /
    • 2024
  • As the Internet of Things (IoT) has gained significant prominence in our daily lives, most IoT devices rely on over-the-air technology to automatically update firmware or software remotely via the network connection to relieve the burden of manual updates by users. And preserving security for OTA interface is one of the main requirements to defend against potential threats. This paper presents a simulation of an attack scenario on the commoditized System-on-a-chip, ESP32 chip, utilized for drones during their OTA update process. We demonstrate three types of attacks, WiFi cracking, ARP spoofing, and TCP SYN flooding techniques and postpone the OTA update procedure on an ESP32 Drone. As in this scenario, unpatched IoT devices can be vulnerable to a variety of potential threats. Additionally, we review the chip to obtain traces of attacks from a forensics perspective and acquire memory forensic artifacts to indicate the SYN flooding attack.

Policy and Mechanism for Safe Function-level Dynamic Kernel Update (함수 단위 동적 커널 업데이트를 위한 보안 정책 및 기법의 설계)

  • Park, Hyun-Chan;Yoo, Chuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.8
    • /
    • pp.808-812
    • /
    • 2008
  • In recent years, the software vulnerability becomes an important problem to the safety in operating system kernel. Many organizations endeavor to publish patches soon after discovery of vulnerability. In spite of the effort, end-system administrators hesitate to apply the patches to their system. The reasons of hesitation are the reboot disruption and the distrust of patches. To solve this problem we propose a dynamic update system for non-updatable kernel, named DUNK. The DUNK provides: 1) a dynamic update mechanism at function-level granularity to overcome the reboot disruption and 2) a safety verification mechanism to overcome the distrust problem, named MAFIA. In this paper, we describe the design of DUNK and detailed algorithm of MAFIA.

A Concurrency Control Scheme over T-tree in Main Memory Databases with Multiversion

  • Ying Xia;Cho, Sook-Kyoung;Oh, Young-Hwan;Kim, June;Bae, Hae-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.210-212
    • /
    • 2000
  • In this paper, we present a comcurrency control scheme over the index structure in main memory databases using multiversion mechanism, and implement it on T-tree. As a well-known idea for comcurrency control, multiversion allows multiple transactions to reat and write different versions of the same data item, each transaction sees a consistent set of versions for all the data items it accesses[1]. Logical versioning and physical versioning techniques are used to keep versions of data item and versions of index node respectively. The main features of this multiversion indexing approach are (1)update operations and rotations on T-tree can take place concurrently, (2)the number of locking and latching requirement is sharply reduced because read-only transactions do not obtain any locks or latches and update transactions obtain latches only when actually performing the update, (3)it reduces storage overhead for tracking version and reclaims storage in time, and (4)it provides complete isolation of read-only transactions from update transactions, so the read-only transactions can get response information without any block.

  • PDF