• Title/Summary/Keyword: application program protection

Search Result 105, Processing Time 0.03 seconds

A Study on the Welding Characteristics of the Galvalume Steel Sheet (Galvalume 강판의 용접성에 관한 연구)

  • 김민주;김순경;전언찬
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1995.10a
    • /
    • pp.642-945
    • /
    • 1995
  • The problem of autobody corrosion has been addressed over the past decade by the increasing use of zinc and zinc alloy costed steels in automotive application. this paper describes the evaluation of formability, weldability and painted corrosion performance of galvalume steel sheet. This paper presents an overview of the program and some initial test results on the weldability, lifetime of the electrode tip shpae of the spot welding and corrosion protection. Galvalume steel sheet improved corrosion performance and spot weldability of galvalume steel has no problem for the variation of welding current. And tip lifetime was changed according to the influence of shape.

  • PDF

A Code Block Cipher Method to Protect Application Programs From Reverse Engineering (응용프로그램 역분석 방지를 위한 코드블록 암호화 방법)

  • Jung, Dong-Woo;Kim, Hyong-Shik;Park, Joong-Gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.85-96
    • /
    • 2008
  • One of the typical methods to prevent tampering and reverse engineering on executable codes is to encrypt them. This paper proposes a code block cipher method based on key chaining to encrypt the code. The block cipher by key chaining has been known to be inadequate for encrypting the code with control transfer, even though the key chaining has advantage of hiding the keys in blocks and making the individual keys different from block to block. This paper proposes a block transformation and duplication method to apply the block cipher by key chaining to the executable codes with control transfer instructions, and shows the idea works with the MIPS instruction set.

AIS application program implementation and test based on IMO Maritime Cloud analysis (IMO 마리타임 클라우드 분석을 통한 AIS응용 프로그램 구현 및 테스트)

  • Lee, Jea-Wook;Mun, ChangHo;Lee, Seojeong
    • Journal of Digital Contents Society
    • /
    • v.16 no.6
    • /
    • pp.927-934
    • /
    • 2015
  • IMO e-Navigation is ongoing project for safety navigation and protection of maritime environment. Maritime Cloud is a part of e-Navigation Strategy Implementation Plan. It is IT framework technology for exchanging information among maritime stakeholders. We found configuration and operation process by analysis on Maritime Cloud architecture and EPD which is a client program. Through the result, we actually implemented client program. Client program targets Berthing data serviced on AIS-ASM. And we used MMS which is function of message exchanging of Maritime Cloud. The test result show data exchanging succeeded. And it will be helpful to develop Maritime Cloud service, to advance Korean Maritime Cloud.

A Study on Improvement of Air Quality Dispersion Model Application Method in Environmental Impact Assessment (I) - Focusing on AERMOD Meteorological Preprocessor - (환경영향평가에서의 대기질 확산모델 적용방법 개선 연구(I) - AERMOD 기상 전처리를 중심으로 -)

  • Kim, Suhyang;Park, Sunhwan;Tak, Jongseok;Ha, Jongsik;Joo, Hyunsoo;Lee, Naehyun
    • Journal of Environmental Impact Assessment
    • /
    • v.31 no.5
    • /
    • pp.271-285
    • /
    • 2022
  • The AERMET, the AERMOD meteorological preprocessing program, mainly used for environmental impact assessment and Integrated Environmental Permit System (IEPS) in Korea, has not considered the land covers characterasitics, and used only the past meteorological data format CD-144. In this study, two results of AERMET application considering CD-144 format and ISHD format, being used internationally, were compared. Also, the atmospheric dispersion characteristics were analyzed with consideration of land cover. In the case of considered the CD-144 format, the actual wind speed was not taken into account in the weak wind (0.6~0.9m/s) and other wind speed due to the unit conversion problem. The predicted concentration considering land cover data was up to 387% larger depending on the topographic and emission conditions than without consideration of land cover. In conclusion, when using meteorological preprocessing program in AERMOD modelling, AERMET, with ISHD format, land cover characterasitics in the area should be considered.

Consideration on the Perception Change for Radiation of High School Students through an Experiencing Program (체험학습을 통한 고등학생의 방사선 인식 변화에 대한 고찰)

  • Nam, Jong Soo;Kim, Yong Woo;Lee, Ji Sook;Seo, Kyung Won
    • Journal of Radiation Protection and Research
    • /
    • v.39 no.1
    • /
    • pp.65-69
    • /
    • 2014
  • The Korean nuclear industry has been influenced by Fukushima nuclear accident of Japan which occurred two years ago. With information about the accident mainly through mass media such as television or internet, most people are inclined to have a negative perception about nuclear and radiation. They have lack of proper understanding of the fact. Especially, Korean students being future generation have a very limited chance to learn about nuclear and radiation from their regular school curricula. To meet this need, the effectiveness of an extra curricula program is studied using a set of survey on the change of knowledge and perception on radiation, which has been conducted by providing a radiation experiencing program, developed for this study, to high school students in Daejeon area. As a result, a large number of students are found to have enhanced their knowledge on radiation, while some students have shown their positive change of perception on radiation. Based on this, further study may need to improve the survey method and to promote its application for the development of more diverse and systematic radiation experiencing programs. Moreover, better ways for synergy between education and public relations activities on radiation safety may need to be sought.

Performance Estimation of Hexagonal Rockfall Protection Net by Numerical Analysis (수치해석을 이용한 육각 낙석방지망의 성능 평가)

  • Oh, Sewook;Park, Soobeom;Kwon, Youngcheul
    • Journal of the Korean GEO-environmental Society
    • /
    • v.15 no.11
    • /
    • pp.53-59
    • /
    • 2014
  • It has been generally recognized that the conventional rockfall protection nets have several problems to actual field application in the aspect of shock absorption, lack of pullout bearing capacities, and net damages. Because of the recognition, authors have tried to develop a new rockfall protection system consisted of shock absorption parts and hexagonal net configuration. In the previous research by the authors, the performance of the newly developed rockfall protection system has been investigated through the laboratory tests and the full-scale testing. In this study, subsequently, numerical analysis program is organized to make a confirmation of the structural stability and performance. For the correct design procedure of the hexagonal net system, it is essential to understand the various mechanical behavior of the entire system. It is also important to be reproduced the systematic characteristics of the system acquired by laboratory and full-scale testing by numerical analysis in order to carry out the numerical experiment to understand various mechanical behavior of the system. As a conclusion, the hexagonal net has better performance in mechanical and physical behavior compared with that of the rectangular net. Furthermore, due to the hexagonal net shows a good performance in aspect of the load distribution, it gives a good alternative in long-term management of the rockfall protection net.

Development of Health Promotion Program for Individuals With Arthritis -Application of Holistic Model- (관절염 환자를 위한 건강증진 프로그램의 개발 -총체적 모델의 적용-)

  • 오현수;김영란
    • Journal of Korean Academy of Nursing
    • /
    • v.29 no.2
    • /
    • pp.314-327
    • /
    • 1999
  • In this study, domains, contents, and effects of pre-existed intervention programs for individuals with arthritis were meta-analyzed to develop arthritis health promotion program based on Holistic Model. The developed program includes strategies of cognition, environment, and behavior. and also generates positive changes in the physical, psychological, and social demensions. Then needs assessment on conveniently selected 153 women who visited a university hospital in Seoul or in Inchon are conducted to identify the objective domains of arthritis health promotion program According to the study results. target health problems of the arthritis health promotion program were shown as pain, disability, depression, and role impediment in social domain. These objectives could be achieved by including the strategies of changing cognition, the strategies of changing behavior through learning the skill related to the health promoting behavior. and the strategies of changing environment in the health promotion program. That is, it is analyzed that the contents of program are not exclusive one another in physical. psychological. and social demensions, and also are not exclusive one another in aspect of cognition, behavior, and environment. The necessary methods to achieve the desired objectives for the developed arthritis health promotion program and evaluation subjects are as follows : (1) In the arthritis health promotion program, knowledge on management of arthritis, efficacy related to arthritis management, skill for pain management, skill for exercise, establishment of positive self-concept, enhancement of positive thinking, stress management. skill for problem solving, skill for setting goals. skill for requesting help, and skill for communication are all included. Through the improvement of all those strategies, intermediate objectives, such as “joint protection, and maintenance of pain management behavior”, “maintenance of regular exercise”, and “promotion of coping skill in psychosocial dimension” are achieved. (2) These intermediate objectives are also the methods for achieving objectives in next stage. It implies that through the intermediate objectives. the final objectives such as “minimization of physical symptoms and signs”, “maximization of psychological function”, and “maximazation of role performance in social domain” could be achieved. Each of these final objectives reflects the different dimension of quality of life, respectively. When these objectives are achieved, the quality of life that client perceives is improved. Therefore, through evaluation of these final objectives, the level of achieving final outcome of arthritis health promotion such as quality of life is determined.

  • PDF

Design and Implementation of Birthmark Technique for Unity Application

  • Heewan Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.85-93
    • /
    • 2023
  • Software birthmark refers to a unique feature inherent in software that can be extracted from program binaries even in the absence of the original source code of the program. Like human genetic information, the similarity between programs can be calculated numerically, so it can be used to determine whether software is stolen or copied. In this paper, we propose a new birthmark technique for Android applications developed using Unity. The source codes of Unity-based Android applications use C# language, and since the core logic of the program is included in the DLL module, it must be approached in a different way from normal Android applications. In this paper, a Unity birthmark extraction and comparison system was implemented, and reliability and resilience were evaluated. The use of the Unity birthmark technique proposed in this paper is expected to be effective in preventing illegal copy or code theft of the Unity-based Android applications.

U.S. Forest Service Research : Its Administration and Management

  • Krugman, Stanley L.
    • Journal of Korean Society of Forest Science
    • /
    • v.76 no.3
    • /
    • pp.243-248
    • /
    • 1987
  • The U.S. Forest Service administers the world's largest forestry research organization. From its modest beginning in 1876, some 30 years before the United States national forest system was established, the research branch has devoted its effort to meet current and future information needs of the forestry community of the United States, not just for the U.S. Forest Service. The research branch is one of three major administrative units of the U.S. Forest Service. The others being the National Forest System and State and Private Forestry. Currently the National Forest System comprises 155 national forests, 19 national grasslands, and 18 utilization projects located in 44 states. Puerto Rico, and the Virgin Islands. The National Forest System manages these areas for a large array of uses and benefits including timber, water, forage, wildlife, recreation, minerals, and wilderness. It is through the State and Private Forestry branch that the U.S. Forest Service cooperates and coordinates forestry activities and programs with state and local governments, forest industries, and private landowners. These activities include financial and technical assistance in disease, insect, and fire protection ; plan forestry programs ; improve harvesting and marketing practices ; and transfer forestry research results to user groups. Forestry research is carried out through eight regional Forest Experiment Stations and the Forest Product Laboratory. Studies are maintained at 70 administrative sites, and at 115 experimental forest and grasslands. All of the current sciences that composed modern forestry are included in the research program. These range from forest biology (i. e. silviculture, ecology, physiology, and genetics) to the physical, mathematical, engineering, managerial, and social sciences. The levels of research range from application, developmental, and basic research. Research planning and priority identification is an ongoing process with elements of the research program changing to meet short-term critical information needs(i. e. protection research) to long-term opportunities(i. e. biotechnology). Research planning and priority setting is done in cooperation with National Forest Systems, forest industries, universities, and individual groups such as environmental, wilderness, or wildlife organizations. There is an ongoing review process of research administration, organization, and science content to maintain quality of research. In the U.S. Forest Service the research responsibility is not completed until the new information is being applied by the various user group : I. e. technology transfer program. Research planning and development in the U.S. Forest Service is a dynamic activity. Porgrams for the year 2000 and beyond are now in the planning stage.

  • PDF

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.