• Title/Summary/Keyword: Verification Software

Search Result 952, Processing Time 0.019 seconds

Development of Integrated Orbit and Attitude Software-in-the-loop Simulator for Satellite Formation Flying

  • Park, Han-Earl;Park, Sang-Young;Park, Chandeok;Kim, Sung-Woo
    • Journal of Astronomy and Space Sciences
    • /
    • v.30 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • An integrated orbit and attitude control algorithm for satellite formation flying was developed, and an integrated orbit and attitude software-in-the-loop (SIL) simulator was also developed to test and verify the integrated control algorithm. The integrated algorithm includes state-dependent Riccati equation (SDRE) control algorithm and PD feedback control algorithm as orbit and attitude controller respectively and configures the two algorithms with an integrating effect. The integrated SIL simulator largely comprises an orbit SIL simulator for orbit determination and control, and attitude SIL simulator for attitude determination and control. The two SIL simulators were designed considering the performance and characteristics of related hardware-in-the-loop (HIL) simulators and were combined into the integrated SIL simulator. To verify the developed integrated SIL simulator with the integrated control algorithm, an orbit simulation and integrated orbit and attitude simulation were performed for a formation reconfiguration scenario using the orbit SIL simulator and the integrated SIL simulator, respectively. Then, the two simulation results were compared and analyzed with each other. As a result, the user satellite in both simulations achieved successful formation reconfiguration, and the results of the integrated simulation were closer to those of actual satellite than the orbit simulation. The integrated orbit and attitude control algorithm verified in this study enables us to perform more realistic orbit control for satellite formation flying. In addition, the integrated orbit and attitude SIL simulator is able to provide the environment of easy test and verification not only for the existing diverse orbit or attitude control algorithms but also for integrated orbit and attitude control algorithms.

Design and Implementation of Customized Protocol and Smartphone App for the All-in-One Sensor Device

  • Bang, Jong-ho;Lee, Song-Yeon;Paik, Jong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.19-26
    • /
    • 2018
  • Social issues for environmental pollution are continuously increasing globally. Especially, Users require services to measure environmental factors in indoor and outdoor and manage related data effectively and conveniently. According to this demand, sensors that can measure environmental factors in indoor and outdoor have been developed. However, since one sensor is composed of independent module, the interface of output data from each sensor is different. To solve the problem, we propose a customized protocol for low-power short-range wireless communication between smartphone using Bluetooth and All-in-One sensor device board and analyze the performance of the proposed customized protocol by developing program for performance verification of interface with user smartphone through Bluetooth. In addition, we implement a smartphone application using proposed protocol.

Security Core Technology Implementation for Hardware-based Smart Devices (HW기반 스마트 단말 보안 핵심기술 구현)

  • Kim, Jeong Nyeo
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.501-505
    • /
    • 2016
  • Recently, the frequency of dealing important information regarding financial services like paying through smart device or internet banking on smart device has been increasing. Also, with the development of smart device execution environment towards open software environment, it became easier for users to download and use random application software, and its security aspect appears to be weakening. This study inspects features of hardware-based smart device security technology. Furthermore, this study proposes a realization method in MTM hardware-based secure smart device execution environment for an application software that runs in smart devices. While existing MTM provides the root of trust function only for the mobile device, the MTM-based mobile security environment technology proposed in this paper can provide numerous security functions that application program needs in mobile device. The further researches on IoT devices that are compatible with security hardware, gateway security technology and methods that secure reliability and security applicable to varied IoT devices by advancing security hardware are the next plan to proceed.

Automatic SDL to Embedded C Code Generation Considering ${\mu}C/OS-II$ OS Environment (${\mu}C/OS-II$ 운영체제환경을 고려한 SDL 명세로부터의 내장형 C 코드 자동 생성)

  • Kwak, Sang-Hoon;Lee, Jeong-Gun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.45-55
    • /
    • 2008
  • Due to the increasing complexity of embedded system design, automatic code generation of embedded software and hardware-software co-design methodologies are gaining great interest from industries and academia. Such an automatic design methodologies are always demanding a formal system specification languages for defining designer's idea clearly and precisely. In this paper, we propose automatic embedded C code generation from SDL (Specification and Description Language, ITU-T recommended the SDL as a standard system description language) with considering a real-time uC/OS-II operating system. Our automatic embedded C code generator is expected to provide a fast specification, verification and performance evaluation platform for embedded software designs.

  • PDF

Digital Tachograph Vehicle Data Digital Authentication System (디지털 운행기록장치의 운행기록 데이터 디지털 인증 시스템)

  • Kang, Joon-Gyu;Kim, Yoo-Won;Lim, Ung-Taeg;Jun, Moon-Seog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.6
    • /
    • pp.47-54
    • /
    • 2013
  • In this paper, we proposed an efficient digital authentication service system for the vehicle data collected from digital tachograph. In domestic, There is no method available to verify that information has not been forged and reliable information for collected vehicle data. The proposed method in this paper can prove transmitted vehicle data that have not been forged using the signature value. The signature value of digital authentication is produced with the digital signature generation key after obtaining the hash value of vehicle data. It is achieved through checking the stored hash value and the hash value match that is obtained with the digital signature verification key from the digital signature value. We confirmed the proposed system can ensure reliability of vehicle data through the system implementation and experiment.

An Experimental Study of Generality of Software Defects Prediction Models based on Object Oriented Metrics (객체지향 메트릭 기반인 결함 예측 모형의 범용성에 관한 실험적 연구)

  • Kim, Tae-Yeon;Kim, Yun-Kyu;Chae, Heung-Seok
    • The KIPS Transactions:PartD
    • /
    • v.16D no.3
    • /
    • pp.407-416
    • /
    • 2009
  • To support an efficient management of software verification and validation activities, much research has been conducted to predict defects in early phase. And defect prediction models have been proposed to predict defects. But the generality of the models has not been experimentally studied for other software system. In other words, most of prediction models were applied only to the same system that had been used to build the prediction models themselves. Therefore, we performed an experiment to explore generality of major prediction models. In the experiment, we applied three defects prediction models to three different systems. As a result, we cannot find their generality of defect prediction capability. The cause is analyzed to result from a different metric distribution between the systems.

Software Code Attestation for IoT Devices by Bluetooth Low Energy (저전력 블루투스를 통한 사물 인터넷 장치의 소프트웨어적인 코드 검증)

  • Kim, GeunYoung;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1211-1221
    • /
    • 2016
  • In IoT environment, making sure of trust of IoT devices is the most important one than others. The security threats of nowadays almost stay at exposure or tampering of information. However, if human life is strongly connected to the Internet by IoT devices, the security threats will probably target human directly. In case of devices, authentication is verified using the device-known private key. However, if attacker can modify the device physically, knowing the private key cannot be the evidence of trust any more. Thus, we need stronger verification method like code attestation. In this paper, we use software-based code attestation for efficiency. We also suggest secure code attestation method against copy of original code and implement it on embedded device and analyze its performance.

A Testing Method for Web-Based Banking Applications Using Formal Specification (정형 명세를 이용한 웹 기반 은행 어플리케이션의 테스트 기법)

  • Ahn, Young-Hee;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.855-864
    • /
    • 2004
  • Programmers can be got the test-related information for implementation without interference of source code complexity by use of the formal specification. Especially the external inputs and system responses can be represented precisely by formal specification in testing phase of web-based software systems. This paper suggests a method of extracting test cases by use of formal specification. Object-Z formal specification represents various test-related information for complex functions of web-based applications. State Transition Models could be built from the formal specification so that test scenarios were extracted from STDs from the highest level to detail levels. The target system for verification of this method is a web-based banking system which is necessary to be secured and critical on errors. This method would be an important factor in automatizing test procedure for web-based application software systems combining the user-base test technique.

Analysis of Satisfaction of Elementary School Students and Teachers for Software Practice Education in Real-Time Video Classes (실시간 화상 수업 환경에서 소프트웨어 실습 교육에 대한 초등학생 및 교사의 만족도 분석)

  • Kang, Doobong;Park, Hansuk
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.5
    • /
    • pp.825-834
    • /
    • 2021
  • This study analyzed learners' satisfaction and in-depth interviews with teachers after operating a software practical curriculum as a real-time video class for fifth and sixth graders in elementary school. The correlation between learner's presence, class overall, interaction, and real-time video class satisfaction showed that the positive correlation between presence, class overall, interaction, and satisfaction with real-time video classes was somewhat high. There were some differences in the real-time video class participation environment and real-time video class satisfaction, but it was not found to be statistically significant. In the case of teachers, it was difficult to respond to problems occurring in each student's individual environment, interactions between students, and individual feedback problems for a sluggish student. To solve this problem, opinions such as preliminary guidance and verification of real-time video class connection environment, error support for sluggish students and individual class participation environment, and feedback on individual tasks using LMS were suggested.

Security Verification of Korean Open Crypto Source Codes with Differential Fuzzing Analysis Method (차분 퍼징을 이용한 국내 공개 암호소스코드 안전성 검증)

  • Yoon, Hyung Joon;Seo, Seog Chung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1225-1236
    • /
    • 2020
  • Fuzzing is an automated software testing methodology that dynamically tests the security of software by inputting randomly generated input values outside of the expected range. KISA is releasing open source for standard cryptographic algorithms, and many crypto module developers are developing crypto modules using this source code. If there is a vulnerability in the open source code, the cryptographic library referring to it has a potential vulnerability, which may lead to a security accident that causes enormous losses in the future. Therefore, in this study, an appropriate security policy was established to verify the safety of block cipher source codes such as SEED, HIGHT, and ARIA, and the safety was verified using differential fuzzing. Finally, a total of 45 vulnerabilities were found in the memory bug items and error handling items, and a vulnerability improvement plan to solve them is proposed.