• Title/Summary/Keyword: Verification Software

Search Result 952, Processing Time 0.026 seconds

An Estimation of Risky Module using SVM (SVM을 이용한 위험모듈 예측)

  • Kim, Young-Mi;Jeong, Choong-Heui;Kim, Hyeon-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.435-439
    • /
    • 2009
  • Software used in safety-critical system must have high dependability. Software testing and V&V (Verification and Validation) activities are very important for assuring high software quality. If we can predict the risky modules of safety-critical software, we can focus testing activities and regulation activities more efficiently such as resource distribution. In this paper, we classified the estimated risk class which can be used for deep testing and V&V. We predicted the risk class for each module using support vector machines. We can consider that the modules classified to risk class 5 and 4 are more risky than others relatively. For all classification error rates, we expect that the results can be useful and practical for software testing, V&V, and activities for regulatory reviews.

Development of Software for Fidelity Test of Flight Dynamic Model on Fixed Wing Aircraft (고정익 항공기의 비행역학 모델 충실도 테스트를 위한 소프트웨어 개발)

  • Baek, Seung-Jae;Kang, Mun-Hye;Choi, Seong-Hwan;Kim, Byoung Soo;Moon, Yong Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.8
    • /
    • pp.631-640
    • /
    • 2020
  • Currently, aircraft simulator has drawn a great attention because it has significant advantages of economic, temporal, and spatial costs compared with pilot training with real aircraft. Among the components of the aircraft simulator, flight dynamic model plays a key role in simulating the flight of an actual aircraft. Hence, it is important to verify the fidelity of flight dynamic model with an automated tool. In this paper, we develop a software to automatically verify the fidelity of the flight mechanics model for the efficient development of the aircraft simulator. After designing the software structure and GUI based on the requirements derived from the fidelity verification process, the software is implemented with C # language in Window-based environment. Experimental results on CTSW models show that the developed software is effective in terms of function, performance and user convenience.

Application of Safety Analysis and Management in Software Development Process (소프트웨어 개발 프로세스에서의 안전성 분석 및 관리 활동의 적용방안)

  • Kim, Soon-Kyeom;Hong, Jang-Eui
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.1
    • /
    • pp.7-15
    • /
    • 2016
  • As most devices in a wide range of automotive, aerospace, and missile have built-in software that controls the system behaviors, the safety of the software is growing in its importance. That is, the software safety has emerged as one of big issues because the threat of accidents caused by software malfunction is rising. Accident by software can be occurred from user mal-operation, but the fundamental reason of the accident comes from insufficient verification of the safety in software development process. Therefore, this paper presents how the software safety analysis and management activities should be done in the development process. In particular, we propose how to apply the safety analysis and management activities in the prototype or incremental development process.

Research on Application of Requirements-based Software Reliability Verification to Domestic Military Aircraft (요구사항 기반 소프트웨어 신뢰성 인증의 국내 군용 항공기 적용방안 연구)

  • Jeong, Sang-gyu;Seo, Young-jin;Jang, Min-uk;Lee, Yoon-woo
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.4
    • /
    • pp.264-270
    • /
    • 2018
  • In recent years, It is required to verify software reliability according to DO-178, which announced by radio technical commission for aeronautics (RTCA) and recognized by the Federal Aviation Administration (FAA), for civil aircraft developed or intended to fly in the United States or Europe. This is because the reliance on software in each field is deepening, and the efforts for improvement of software reliability have been made first in civil aviation field where economic and social impacts are catastrophic in the event of an accident. In this paper, we have identified some issues to be considered for requirements-based reliability verification required by DO-178 to improve software reliability and present the major elements of the present weapon system acquisition procedure of DAPA for each stage. In addition, we analyzed the results of applying the identified main check factors to a domestic aircraft development project based on the information accumulated in overseas aircraft development projects. As a result, we have shown that it is possible to verify requirements-based software reliability according to DO-178 by adding key checkpoints to the current weapon system acquisition procedure and providing objective inspection criteria.

Investigation of Verification and Evaluation Methods for Tampering Response Techniques Using HW Security Modules (HW 보안 모듈을 활용한 탬퍼링 대응 기술의 검증 및 평가 방안 조사)

  • Dongho Lee;Younghoon Ban;Jae-Deok Lim;Haehyun Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.335-345
    • /
    • 2024
  • In the digital era, data security has become an increasingly critical issue, drawing significant attention. Particularly, anti-tampering technology has emerged as a key defense mechanism against indiscriminate hacking and unauthorized access. This paper explores case studies that exemplify the trends in the development and application of TPM (Trusted Platform Module) and software anti-tampering technology in today's digital ecosystem. By analyzing various existing security guides and guidelines, this paper identifies ambiguous areas within them and investigates recent trends in domestic and international research on software anti-tampering. Consequently, while guidelines exist for applying anti-tampering techniques, it was found that there is a lack of methods for evaluating them. Therefore, this paper aims to propose a comprehensive and systematic evaluation framework for assessing both existing and future software anti-tampering techniques. To achieve this, it using various verification methods employed in recent research. The proposed evaluation framework synthesizes these methods, categorizing them into three aspects (functionality, implementation, performance), thereby providing a comprehensive and systematic evaluation approach for assessing software anti-tampering technology in detail.

FPGA Modem Platform Design for eHSPA and Its Regularized Verification Methodology (eHSPA 규격을 만족하는 FPGA모뎀 플랫폼 설계 및 검증기법)

  • Kwon, Hyun-Il;Kim, Kyung-Ho;Lee, Chung-Yong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.2
    • /
    • pp.24-30
    • /
    • 2009
  • In this paper, the FPGA modem platform complying with 3GPP Release 7 eHSPA specifications and its regularized verification flow are proposed. The FFGA platform consists of modem board supporting physical layer requirements, MCU and DSP core embedded control board to drive the modem board, and peripheral boards for RF interfacing and various equipment interfaces. On the other hand, the proposed verification flow has been regularized into three categories according to the correlation degrees of hardware-software inter-operation, such as simple function test, scenario test call processing and system-level performance test. When it comes to real implementations, the emulation verification strategy for low power mobile SoC is also introduced.

Scheme for Verification Between Mobile Devices in a Service with Expiration Time by Using Zero-knowledge Proof (영지식 증명을 이용한 가입기간이 정해진 서비스에서 이동 통신 기기간 인증 기법)

  • Park, Young-Hoon;Seo, Seung-Woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.23-32
    • /
    • 2013
  • As the mobile communication technology is developed, the services for communication between the mobile devices are provided, and the amount of usage is increasing tremendously. For the device-to-device communication, the device should be verified if it is a service member. The existing verification schemes include interactions with the third party, while this may cause the problems that the bandwidth is dissipated and the devices which are out of the communication range of the base station cannot communicate with other devices. To solve such problems, we propose a new scheme for verification between mobile devices without interaction of third party. For the proposed scheme, we develop and employ a new zero-knowledge proof protocol, which verifies the device's membership and its expiration time. Furthermore, the scheme guarantees privacy of the mobile device since it checks the encrypted verification message without decrypting, and protects replaying attack since it uses challenge-response method.

A Study on Verification and Editing of NC Part-program (NC파트프로그램의 검증 및 오류 수정에 관한 연구)

  • 김찬봉;박세형;양민양
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.17 no.5
    • /
    • pp.1074-1083
    • /
    • 1993
  • NC simulation has been used to replace the test cutting of NC machining. Although it can reduce the NC part programming effort, it still has a problem. If any error is found during the simulation, then the part has to be reprogrammed and it is time consumming. This paper presents a method for verifying and editing the NC code after the post-processing without going back to the part programming stage. A data structure and an algorithm to verify and edit the NC code interactively with the aid of graphics is introduced. Z-map method is used for the shaded image display and cross-sectional view display of the macined parts. The method was implemented in a IBM/PC-386 with MS-Windows software, and the multi-window function of the of the MS-Windows is used for the simultaneous editing and verification.

Verification, Validation, and Accreditation (VV&A) Considering Military and Defense Characteristics

  • Kim, Jung Hoon;Jeong, Seugmin;Oh, Sunkyung;Jang, Young Jae
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.1
    • /
    • pp.88-93
    • /
    • 2015
  • In this paper, we identify the characteristics of modeling and simulation (M&S) for military and defense and propose the method of verification, validation, and accreditation (VV&A) using the identified characteristics. M&S has been widely used for many different applications in military and defense, including training, analysis, and acquisition. Various methods and processes of VV&A have been proposed by researchers and M&S practitioners to guarantee the correctness of M&S. The notion of applying formal credibility assessment in VV&A originated in software engineering reliability testing and the systems engineering development process. However, the VV&A techniques and processes proposed for M&S by the research community have not addressed the characteristics and issues specific to military and defense. We first identify the characteristics and issues of military/defense M&S and then propose techniques and methods for VV&A that are specific for military/defense M&S. Possible approaches for the development of VV&A are also proposed.

On-line Signature Verification using Segment Matching and LDA Method (구간분할 매칭방법과 선형판별분석기법을 융합한 온라인 서명 검증)

  • Lee, Dae-Jong;Go, Hyoun-Joo;Chun, Myung-Geun
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.12
    • /
    • pp.1065-1074
    • /
    • 2007
  • Among various methods to compare reference signatures with an input signature, the segment-to-segment matching method has more advantages than global and point-to-point methods. However, the segment-to-segment matching method has the problem of having lower recognition rate according to the variation of partitioning points. To resolve this drawback, this paper proposes a signature verification method by considering linear discriminant analysis as well as segment-to-segment matching method. For the final decision step, we adopt statistical based Bayesian classifier technique to effectively combine two individual systems. Under the various experiments, the proposed method shows better performance than segment-to-segment based matching method.