• Title/Summary/Keyword: code reuse

Search Result 128, Processing Time 0.021 seconds

Research on a Conceptual Model of Architecture Framework for Simulation based Acquisition (SBA를 위한 아키텍처 프레임워크 개념모델에 관한 연구)

  • Sohn, MyE
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.309-318
    • /
    • 2010
  • Simulation-based acquisition(SBA) is a new acquisition paradigm to deliver combat systems cheaper, faster, and better. ROK MND adopts the vision of SBA and is pushing ahead with dramatic reform. However, ROK MND does not develop the SBA architecture framework which facilitates the reuse of tools and techniques and data software code and algorithms among participants of collaborative environments. In this paper, we propose a conceptual Model of architecture framework for SBA. To do so, we analyse acquisition process of MND and propose the to-be operational view that describes fundamental concept for how Government, Industry, and Academia can collaborate and share information more effectively throughout the acquisition process. Furthermore, we identify the tools and techniques that supports the operational nodes, and propose technical view and all view, too. technical view compose of set of standards that can ensure interoperability among tools, techniques and data, and all view provide an overarching description of the architecture.

A Study on eGovFrame Security Analysis and Countermeasures (eGovFrame 보안 분석 및 대응 방안에 관한 연구)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.181-188
    • /
    • 2023
  • The e-Government standard framework provides overall technologies such as reuse of common components for web environment development such as domestic government/public institutions, connection of standard modules, and resolution of dependencies. However, in a standardized development environment, there is a possibility of updating old versions according to core versions and leakage of personal and confidential information due to hacking or computer viruses. This study directly analyzes security vulnerabilities focusing on websites that operate eGovFrame in Korea. As a result of analyzing/classifying vulnerabilities at the internal programming language source code level, five items associated with representative security vulnerabilities could be extracted again. As a countermeasure against this, the security settings and functions through the 2 steps (1st and 2nd steps) and security policy will be explained. This study aims to improve the security function of the e-government framework and contribute to the vitalization of the service.

A Study on the Standard Architecture of IFF Interface SW in the Naval Combat Management System

  • Yeon-Hee Noh;Dong-Han Jung;Young-San Kim;Hyo-Jo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.139-149
    • /
    • 2024
  • In this paper, we propose the standard architecture for the IFF interface SW in naval combat management system(CMS). The proposed standard interface architecture is a method designed to reduce modification efforts and man-month of reliability test for the existing the IFF interface SW of 11 types. We identified highly dependent CMS and GFE information, leading to the redefinition of standard requirements and functions, and proceeded with the initial design applying the Naval Shield Component Platform(NSCP). Subsequently, using the Feature Model, we derived additional common and variable elements for the interface of multiple CMS and GFE. Considering the S.O.L.I.D principles, we designed the final architecture. The proposed IFF Interface SW, based on the standard architecture, is expected to enhance management efficiency through a common architecture, increase code reusability and scalability, and reduce development costs by shortening reliability testing times.

Preliminary Evaluation of Clearance Level of Uranium in Metal Waste Using the RESRAD-RECYCLE Code (RESRAD-RECYCLE 전산코드를 활용한 금속폐기물 내 우라늄 자체처분 허용농도 예비 평가)

  • SunWoo Lee;JungHwan Hong;JungSuk Park;KwangPyo Kim
    • Journal of Radiation Industry
    • /
    • v.17 no.4
    • /
    • pp.457-469
    • /
    • 2023
  • The clearance level by nuclide is announced by the Nuclear Safety and Security Commission. However, the clearance level of uranium existing in nature has not been announced, and research is needed. Therefore, the purpose of this study was to evaluate the clearance level of uranium nuclides appropriate to domestic conditions preliminary. For this purpose, this study selected major processes for recycling metal wastes and analyzed the exposure scenarios and major input factors by investigating the characteristics of each process. Then, the radiation dose to the general public and workers was evaluated according to the selected scenarios. Finally, the results of the radiation dose per unit radioactivity for each scenario were analyzed to derive the clearance level of uranium in metal waste. The results of the radiation dose assessment for both the general public and workers per unit radioactivity of uranium isotopes were shown to meet the allowable dose (individual dose of 10 µSv y-1 and collective dose of 1 Man-Sv y-1) regulated by the Nuclear Safety and Security Commission. The most conservative scenarios for volumetric and surface contamination were evaluated for the handling of the slag generated after the melting of the metal waste and the direct reuse of the contaminated metal waste into the building without further disposal. For each of these scenarios, the radioactivity concentration by uranium isotope was calculated, and the clearance level of uranium in metal waste was calculated through the radioactivity ratio by enrichment. The results of this study can be used as a basic data for defining the clearance level of uranium-contaminated radioactive waste.

A Study on Refined Information Generation through Classes Composition Based on Reengineering (재공학 기반의 클래스 합성을 통한 정련화된 정보 생성에 관한 연구)

  • 김행곤;한은주
    • Journal of Korea Multimedia Society
    • /
    • v.1 no.2
    • /
    • pp.239-248
    • /
    • 1998
  • Software reengineering is making various research for solutions against problem of maintain existing system. Reengineering has a meaning of development of softwares on existing systems through the reverse-engineering and the forward-engineering. It extracts classes from existing system's softwares to increase the comprehension of the system and enhance the maintenability of softwares. Most of the important concepts used in reengineering is composition that is restructuring of the existing objects from other components. The classes and clusters in storage have structural relationship with system's main components to reuse in the higher level. These are referenced as dynamic informations through structuring an architect for each of them. The classes are created by extractor, searcher and composer through representing existing object-oriented source code. Each of classes and clusters extract refined informations through optimization. New architecture is created from the cluster based on its classes' relationship in storage. This information can be used as an executable code later on. In this paper, we propose the tools, it presented by this thesis presents a new information to users through analysing, based on reengineering, Object-Oriented informations and practicing composition methodology. These composite classes will increase reusability and produce higher comprehension information to consist maintainability for existing codes.

  • PDF

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.

An Experiment in Refactoring an Object-Oriented CASE Tool (객체 지향 CASE 도구에 대한 재구조화 실험)

  • Jo, Jang-U;Kim, Tae-Gyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.932-940
    • /
    • 1999
  • Object-oriented programming is often touted as promoting software reuse. However it is recognized that objected-oriented software often need to be restructured before it can be reused. refactoring is the process that changes the software structure to make it more reusable, easier to maintain and easire to be enhanced wit new functionalities. This paper desirbes experience gained and lessons learned from restructuring OODesigner, a Computer Aided Software Engineering(CASE) tool that supports Objects Modeling Technique(OMT). this tool supports a wide range of features such as constructing object modeler of OMT, managing information repository, documenting class resources, automatical generating C++ and java code, reverse engineering of C++ and Java cod, searching and reusing classes in the corresponding repository and collecting metrics data. although the version 1.x was developed using OMT(i.e the tool has been designed using OMT) and C++, we recognized that the potential maintenance problem originated from the ill-designed class architecture. Thus this version was totally restructured, resulting in a new version that is easier to maintain than the old version. In this paper, we briefly describe its restructuring process, emphasizing the fact that the Refactoring of the tool is conducted using the tool itself. Then we discuss lessons learned from these processes and we exhibit some comparative measurements of the developed version.

  • PDF

Development of Simple and Rapid Radioactivity Analysis for Thorium Series in the Products Containing Naturally Occurring Radioactive Materials (NORM) (천연방사성물질(NORM)을 함유한 가공제품 내 토륨계열 방사능 평가를 위한 간단/신속 분석법 개발)

  • Yoo, Jaeryong;Park, Seyoung;Yoon, Seokwon;Ha, Wi-Ho;Lee, Jaekook;Kim, Kwang Pyo
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.1
    • /
    • pp.71-79
    • /
    • 2016
  • Background: It is necessary to analyze radioactivity of naturally occurring radioactive materials (NORM) in products to ensure radiological safety required by Natural Radiation Safety Management Act. The pretreatments for the existing analysis methods require high technology and time. Such destructive pretreatments including grinding and dissolution of samples make impossible to reuse products. We developed a rapid and simple procedure of radioactivity analysis for thorium series in the products containing NORM. Materials and Methods: The developed method requires non-destructive or minimized pretreatment. Radioactivity of the product without pretreatment is initially measured using gamma spectroscopy and then the measured radioactivity is adjusted by considering material composition, mass density, and geometrical shape of the product. The radioactivity adjustment can be made using scaling factors, which is derived by radiation transport Monte Carlo simulation. Necklace, bracelet, male health care product, and tile for health mat were selected as representative products for this study. The products are commonly used by the public and directly contacted with human body and thus resulting in high radiation exposure to the user. Results and Discussion: The scaling factors were derived using MCNPX code and the values ranged from 0.31 to 0.47. If radioactivity of the products is measured without pretreatment, the thorium series may be overestimated by up to 2.8 times. If scaling factors are applied, the difference in radioactivity estimates are reduced to 3-24%. Conclusion : The developed procedure in this study can be used for other products with various materials and shapes and thus ensuring radiological safety.