• Title/Summary/Keyword: software weakness

Search Result 115, Processing Time 0.024 seconds

A Software Six-Sigma Tool Selection Process based on Organizational Business Value (조직의 비즈니스 가치 기반 소프트웨어 식스 시그마 도구 선정 프로세스)

  • Kwon, Tae-Yong;Baik, Jong-Moon;Ryu, Ho-Yeon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.440-444
    • /
    • 2009
  • In order to improve the effectiveness of software process improvement, more than two models can be use to compensate the weakness of each other. One of integrated models is the one in which CMMI and software six sigma. However, it is very difficult for a small software development organization to select and apply an appropriate set of six sigma tools since there are a lot of six sigma tools and statistical knowledge is required. In this paper, we suggest a six sigma tool selection process to help small organizations select six sigma tools effectively based on organization business value. Thereby, small organizations can efficiently implement CMMI by adopting an appropriate set of six sigma toolkits.

Vulnerability Analysis and Threat Mitigation for Secure Web Application Development (안전한 웹 애플리케이션 개발을 위한 취약점 분석 및 위협 완화)

  • Moon, Jae-Chan;Cho, Seong-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.127-137
    • /
    • 2012
  • Recently, as modern Internet uses mashups, Web 3.0, JavaScript/AJAX widely, the rate at which new vulnerabilities are being discovered is increasing rapidly. It can subsequently introduce big security threats. In order to efficiently mitigate these web application vulnerabilities and security threats, it is needed to rank vulnerabilities based on severity and consider the severe vulnerabilities during a specific phase of software development lifecycle (SDLC) for web applications. In this paper, we have first verified whether the risk rating methodology of OWASP Top 10 vulnerabilities is a reasonable one or not by analyzing the vulnerability data of web applications in the US National Vulnerability Database (NVD). Then, by inspecting the vulnerability information of web applications based on OWASP Top-10 2010 list and CWE (Common Weakness Enumeration) directory, we have mapped the web-related entries of CWE onto the entries of OWASP Top-10 2010 and prioritized them. We have also presented which phase of SDLC is associated with each vulnerability entry. Using this approach, we can prevent or mitigate web application vulnerabilities and security threats efficiently.

Comparison of the Tongue-Palate Pressure Patterns According to the Tongue Pressure in Community-Dwelling Older Adults

  • Min-Ji Jo;Soo-Min Kim;Seong-Chan Park;Hye-Jin Park;Yun-Seon Lee;Tae-Woo Kim;Ji-Seon Hong;Eui-Yeon Lee;Sung-Hoon Kim;Sun-Young Han
    • Journal of dental hygiene science
    • /
    • v.23 no.4
    • /
    • pp.320-329
    • /
    • 2023
  • Background: Oral frailty has garnered considerable interest following its identification as a risk factor for physical frailty. The Korean oral frailty diagnosis criteria have emphasized the need for extensive research on oral frailty diagnostic items and interventions. Our study performed an in-depth analysis of the tongue-palate pressure patterns in healthy community-dwelling older adults. Methods: Of the 217 older adults aged ≥60 years who visited a senior center in Wonju, 205 participants who completed tongue pressure measurement were included in the final analysis. Pressure changes over time were recorded by instructing the participants to press their tongue against the hard palate with for 7 seconds per cycle. The participants were divided into the normal and abnormal tongue pressure (NTP and ATP, respectively) groups based on whether they achieved the target tongue pressure at least once; tongue pressure patterns were compared between the groups. Furthermore, the average time taken to achieve the standard tongue pressure value was calculated for the participants in the NTP group and used to evaluate the decrease in tongue pressure in the ATP group. Results: Among the 205 participants, 40.5% had ATP. The tongue pressure graph revealed a gentle and consistent incline that was maintained even after achieving standard tongue pressure in the NTP group. The graph was more extreme in the ATP group, and the changes in the pressure type varied across individuals; the tongue pressure was only 48.4%, 40.7%, 31.9%, and 22.6% of the NTP in the participants in their 60s, 70s, 80s, and ≥90s, respectively (p<0.05). Conclusion: Tongue pressure weakness was observed in 40.5% of the healthy community-dwelling older adults. Furthermore, ATP graphs were observed in the patients with tongue pressure weakness. Thus, activities improving the oral function in community-dwelling older adults and systematic oral rehabilitation programs should be devised to promote normal swallowing.

An analysis method for complex attack pattern using the coupling metrics (결합척도를 이용한 복합 공격 패턴 분석 방법)

  • Kwon, Ye-Jin;Park, Young-Bom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1169-1178
    • /
    • 2012
  • Recently, since the most software intensive systems are using internet environment for data exchange, the software security is being treated as a big issue. And, to minimize vulnerability of software system, security ensuring steps which are applying secure coding rules, are introduced in the software development process. But, since actual attacks are using a variety of software vulnerabilities, it is hard to analyze software weakness by monotonic analysis. In this paper, it is tried to against the complex attack on the variety of software vulnerability using the coupling which is one of the important characteristic of software. Furthermore, pre-analysis of the complex attack patterns using a combination of various attack methods, is carried out to predict possible attack patterns in the relationship between software modules. And the complex attack pattern analysis method is proposed based on this result.

Taxonomy Framework for Metric-based Software Quality Prediction Models (소프트웨어 품질 예측 모델을 위한 분류 프레임워크)

  • Hong, Euy-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.6
    • /
    • pp.134-143
    • /
    • 2010
  • This paper proposes a framework for classifying metric-based software quality prediction models, especially case of software criticality, into four types. Models are classified along two vectors: input metric forms and the necessity of past project data. Each type has its own characteristics and its strength and weakness are compared with those of other types using newly defined criteria. Through this qualitative evaluation each organization can choose a proper model to suit its environment. My earlier studies of criticality prediction model implemented specific models in each type and evaluated their prediction performances. In this paper I analyze the experimental results and show that the characteristics of a model type is the another key of successful model selection.

A Feature Comparison of Modern Digital Forensic Imaging Software (현대 디지털 포렌식 이미징 소프트웨어 도구 특징 비교에 대한 연구)

  • Ham, Jiyoon;James, Joshua I.
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.15-20
    • /
    • 2019
  • Fundamental processes in digital forensic investigation - such as disk imaging - were developed when digital investigation was relatively young. As digital forensic processes and procedures matured, these fundamental tools, that are the pillars of the reset of the data processing and analysis phases of an investigation, largely stayed the same. This work is a study of modern digital forensic imaging software tools. Specifically, we will examine the feature sets of modern digital forensic imaging tools, as well as their development and release cycles to understand patterns of fundamental tool development. Based on this survey, we show the weakness in current digital investigation fundamental software development and maintenance over time. We also provide recommendations on how to improve fundamental tools.

Validation Test Codes Development of Static Analysis Tool for Secure Software (안전한 소프트웨어 개발을 위한 정적분석 도구 시험코드 개발)

  • Bang, Jiho;Ha, Rhan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.420-427
    • /
    • 2013
  • Recently, for secure software development, static analysis tools have been used mostly to analyze the source code of the software and identify software weaknesses caused of vulnerabilities. In order to select the optimal static analysis tool, both weaknesses rules and analysis capabilities of the tool are important factors. Therefore, in this paper we propose the test codes developed for evaluating the rules and analysis capabilities of the tools. The test codes to involve 43 weaknesses such as SQL injection etc. can be used to evaluate the adequacy of the rules and analysis capabilities of the tools.

A Study on Survey and Applicability of Evaluation and Selection Models for Software Products (소프트웨어 제품을 위한 평가 선정 모형의 조사 및 적용성에 관한 연구)

  • Park, Ho-In;Jung, Ho-Won
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1706-1718
    • /
    • 1997
  • The rapid increase in the use of many commercial software products has necessitated a systematic and objective method of their evaluation and selection. Our study focuses on the assignment of weights and choice of proper models. First, the weights of attributes are assigned consistently by using the analytic hierarchy process. Second, many models, which can be suitable for the structure of evaluation and selection for software product, are collected, categorized into two types of model, and compared in terms of their strength and weakness. The models involved are four compensatory models and seven noncompensatory models. Finally, they are analyzed through the application of specific software products(database data modelers) in terms of their attributes. Our study enhances the applicability of models to a variety of user requirement utilizing the evaluating procedure and applications.

  • PDF

Design and Implementation of MDDI Protocol for Mobile System (모바일 시스템을 위한 MDDI 프로토콜 설계 및 구현)

  • Kim, Jong-Moon;Lee, Byung-Kwon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1089-1094
    • /
    • 2013
  • In this study, we propose how th implement a MDDI(Mobile Display Digital Interface) protocol packet generation method in software. MDDI protocol is widely used in mobile display device. MDDI protocol packets are generated by software within micro processor. This method needs the minimum hardware configuration. In order to implementation of this method, we design a hardware platform with a high performance microprocessor and a FPGA. The packets generated by software within microprocessor are converted into LVDS signals, and transmitted by hardware within FPGA. This study suggests the benefits of the way how software can easily create a variety of packet. But, this proposed method takes more time in packet transmission compared to the traditional method. This weakness remains as a future challenge, which can be soon improved.

The Development of Modularized Post Processing GPS Software Receiving Platform using MATLAB Simulink

  • Kim, Ghang-Ho;So, Hyoung-Min;Jeon, Sang-Hoon;Kee, Chang-Don;Cho, Young-Su;Choi, Wansik
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.9 no.2
    • /
    • pp.121-128
    • /
    • 2008
  • Modularized GPS software defined radio (SDR) has many advantages of applying and modifying algorithm. Hardware based GPS receiver uses many hardware parts (such as RF front, correlators, CPU and other peripherals) that process tracked signal and navigation data to calculate user position, while SDR uses software modules, which run on general purpose CPU platform or embedded DSP. SDR does not have to change hardware part and is not limited by hardware capability when new processing algorithm is applied. The weakness of SDR is that software correlation takes lots of processing time. However, in these days the evolution of processing power of MPU and DSP leads the competitiveness of SDR against the hardware GPS receiver. This paper shows a study of modulization of GPS software platform and it presents development of the GNSS software platform using MATLAB Simulink™. We focus on post processing SDR platform which is usually adapted in research area. The main functions of SDR are GPS signal acquisition, signal tracking, decoding navigation data and calculating stand alone user position from stored data that was down converted and sampled intermediate frequency (IF) data. Each module of SDR platform is categorized by function for applicability for applying for other frequency and GPS signal easily. The developed software platform is tested using stored data which is down-converted and sampled IF data file. The test results present that the software platform calculates user position properly.