• Title/Summary/Keyword: software weakness

Search Result 115, Processing Time 0.036 seconds

Recent Development of Reliability Engineering and Research Trend Analysis in Korea (최근 국내 신뢰성 공학의 발전과 연구 동향 및 분석)

  • Lim, Ik Sung
    • Journal of Applied Reliability
    • /
    • v.13 no.4
    • /
    • pp.253-271
    • /
    • 2013
  • Since The Korean Reliability Society had been founded in 1999, development history of reliability engineering in Korea is reviewed and research outputs and papers from 2008 to current are analyzed in terms of types of industry, product life cycle, hardware vs software, and theory vs application. The purpose of this research is to review the recent reliability engineering research conducted in Korea including development history as well as published papers to identify the weakness and/or deficiencies in order to suggest the future research directions, which would contribute the development of industries in Korea.

Development of a Page Turner Application based on Eye Tracking Algorithm for the Performing Artists (연주자를 위한 시선 추적 기반 페이지 터너 애플리케이션 개발)

  • Kim, Tae-Yu;Kim, Seokhoon
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.829-836
    • /
    • 2018
  • Sheet music is one of the inevitable elements for successful melody interpretation, playing or rendering, and performance, most of performing artists usually utilize a paper sheet music in the cases. However, the paper sheet music can be a one of the reason to degrade the concentration of audiences and artists or entire performing flows. In addition, it might be a weakness to use a paper sheet music in an outside performing place. We propose an electronic sheet music page tuner application, which can overcome these problems, based on a Tablet PC. The proposed page tuner application, which uses the OpenCV to adapt an eye tracking and behavior recognition, can provide an automatical page pass function to the performing artists. We will expect that the proposed application can highly decrease the weakness of paper sheet music.

The Relationship Between Hip Abductor and Pelvic Drop During Lateral Step Down in the Elderly

  • Lee, Young-kwon;Jung, Sung-hoon;Yoo, Hwa-ik;Kwon, Oh-yun
    • Physical Therapy Korea
    • /
    • v.29 no.4
    • /
    • pp.249-254
    • /
    • 2022
  • Background: The lateral step down (LSD) is a form of stair negotiation used by the elderly because it requires less movement of the lower extremity. Although it is necessary to study the amount of pelvic drop and the strength of a hip abductor during LSD for intervention, limited studies have investigated the relationship between the amount of pelvic drop and strength of a hip abductor during LSD in elderly people. Objects: This study aimed to determine the relationship between the amount of pelvic drop on an unsupported leg and the strength of the hip abductor during LSD in the elderly. Methods: Thirty elderly people (male: 17, female: 13) were recruited. Subjects performed the LSD task, and the evaluator measured and the amount of pelvic drop on an unsupported side. Also, the isometric strength of the hip abductor was measured in a supine position. Results: We found significant relationships between the strength of the hip abductor and the amount of pelvic drop (r = -0.386). The average hip abductor strength normalized by body weight was 1.06 N/kg (max: 1.99, min: 0.52) and the average contralateral pelvic drop (CPD) angle was 4.16° (max: 15.3, min: 0). Conclusion: Our results indicated that the strength of the hip abductor had a moderate correlation with the CPD during a LSD in the elderly. Hip abductor weakness could translate into altered movement of the pelvis.

Application of Machine Learning Techniques for the Classification of Source Code Vulnerability (소스코드 취약성 분류를 위한 기계학습 기법의 적용)

  • Lee, Won-Kyung;Lee, Min-Ju;Seo, DongSu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.735-743
    • /
    • 2020
  • Secure coding is a technique that detects malicious attack or unexpected errors to make software systems resilient against such circumstances. In many cases secure coding relies on static analysis tools to find vulnerable patterns and contaminated data in advance. However, secure coding has the disadvantage of being dependent on rule-sets, and accurate diagnosis is difficult as the complexity of static analysis tools increases. In order to support secure coding, we apply machine learning techniques, such as DNN, CNN and RNN to investigate into finding major weakness patterns shown in secure development coding guides and present machine learning models and experimental results. We believe that machine learning techniques can support detecting security weakness along with static analysis techniques.

Evaluation of Static Analyzers for Weakness in C/C++ Programs using Juliet and STONESOUP Test Suites

  • Seo, Hyunji;Park, Young-gwan;Kim, Taehwan;Han, Kyungsook;Pyo, Changwoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.17-25
    • /
    • 2017
  • In this paper, we compared four analyzers Clang, CppCheck, Compass, and a commercial one from a domestic startup using the NIST's Juliet test suit and STONESOUP that is introduced recently. Tools showed detection efficacy in the order of Clang, CppCheck, the domestic one, and Compass under Juliet tests; and Clang, the domestic one, Compass, and CppCheck under STONESOUP tests. We expect it would be desirable to utilize symbolic execution for vulnerability analysis in the future. On the other hand, the results of tool evaluation also testifies that Juliet and STONESOUP as a benchmark for static analysis tools can reveal differences among tools. Finally, each analyzer has different CWEs that it can detect all given test programs. This result can be used for selection of proper tools with respect to specific CWEs.

DABC: A dynamic ARX-based lightweight block cipher with high diffusion

  • Wen, Chen;Lang, Li;Ying, Guo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.165-184
    • /
    • 2023
  • The ARX-based lightweight block cipher is widely used in resource-constrained IoT devices due to fast and simple operation of software and hardware platforms. However, there are three weaknesses to ARX-based lightweight block ciphers. Firstly, only half of the data can be changed in one round. Secondly, traditional ARX-based lightweight block ciphers are static structures, which provide limited security. Thirdly, it has poor diffusion when the initial plaintext and key are all 0 or all 1. This paper proposes a new dynamic ARX-based lightweight block cipher to overcome these weaknesses, called DABC. DABC can change all data in one round, which overcomes the first weakness. This paper combines the key and the generalized two-dimensional cat map to construct a dynamic permutation layer P1, which improves the uncertainty between different rounds of DABC. The non-linear component of the round function alternately uses NAND gate and AND gate to increase the complexity of the attack, which overcomes the third weakness. Meanwhile, this paper proposes the round-based architecture of DABC and conducted ASIC and FPGA implementation. The hardware results show that DABC has less hardware resource and high throughput. Finally, the safety evaluation results show that DABC has a good avalanche effect and security.

Noun Sense Identification of Korean Nominal Compounds Based on Sentential Form Recovery

  • Yang, Seong-Il;Seo, Young-Ae;Kim, Young-Kil;Ra, Dong-Yul
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.740-749
    • /
    • 2010
  • In a machine translation system, word sense disambiguation has an essential role in the proper translation of words when the target word can be translated differently depending on the context. Previous research on sense identification has mostly focused on adjacent words as context information. Therefore, in the case of nominal compounds, sense tagging of unit nouns mainly depended on other nouns surrounding the target word. In this paper, we present a practical method for the sense tagging of Korean unit nouns in a nominal compound. To overcome the weakness of traditional methods regarding the data sparseness problem, the proposed method adopts complement-predicate relation knowledge that was constructed for machine translation systems. Our method is based on a sentential form recovery technique, which recognizes grammatical relationships between unit nouns. This technique makes use of the characteristics of Korean predicative nouns. To show that our method is effective on text in general domains, the experiments were performed on a test set randomly extracted from article titles in various newspaper sections.

An Empirical Study of SW Size Estimation by using Function Point (기능점수를 이용한 소프트웨어 규모추정 실증연구)

  • Kim, Seung Kwon;Lee, Jong Moo;Park, Ho In
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.2
    • /
    • pp.115-125
    • /
    • 2011
  • An accurate estimation of software development size is an important factor in calculating reasonable cost of project development and determining its success. In this study, we propose estimation models, using function point based on the functional correlation between software, with empirical data. Three models($FP_{est}(I)$, $FP_{est}(II)$, $FP_{est}(III)$) are developed with correlation and regression analysis. The validity of the models is evaluated by the significance test by comparing values of Mean Magnitude of Relative Error (MMRE) and predictions of each model at level n%. Model $FP_{est}(III)$ proved to be superior to other models such as IFPC(Indicative Function Point Count), EFPC(Estimated Function Point Count), EPFS(Early Prediction of Function Size), $FP_{est}(I)$, and $FP_{est}(II)$. As a result, the accuracy of the model appears to be very high to determine the usefulness of the model to finally overcome weakness of other estimation models. The model can be efficiently used to estimate project development size including software size or manpower allocation.

Risk Scoring System for Software Vulnerability Using Public Vulnerability Information (공개 취약점 정보를 활용한 소프트웨어 취약점 위험도 스코어링 시스템)

  • Kim, Min Cheol;Oh, Sejoon;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1449-1461
    • /
    • 2018
  • As the number of software vulnerabilities grows year by year, attacks on software are also taking place a lot. As a result, the security administrator must identify and patch vulnerabilities in the software. However, it is important to prioritize the patches because patches for all vulnerabilities are realistically hard. In this paper, we propose a scoring system that expands the scale of risk assessment metric by taking into consideration attack patterns or weaknesses cause vulnerabilities with the vulnerability information provided by the NIST(National Institute of Standards and Technology). The proposed scoring system is expanded based on the CWSS and uses only public vulnerability information to utilize easily for any company. In this paper, we applied the automated scoring system to software vulnerabilities, and showed the expanded metrics with consideration for influence of attack pattern and weakness are meaningful.

An Analysis of Measurement in Scrum Method and Its Case Study (스크럼 방법론에서의 측정 지표 분석 및 사례 연구)

  • Kim, Sung-Kun;Hwang, Soon-Sam
    • Information Systems Review
    • /
    • v.10 no.3
    • /
    • pp.185-205
    • /
    • 2008
  • As time to market and rapid reaction to changes in demand is much required, agile software development methodologies whose characteristics are great adaptability and short iteration developments are getting more popular. Though there have been a number of literature suggesting the great potential of agile software development, some recent studies have also mentioned its limitations. We believe there remains much confusion as to whether agile approaches are good to introduce or not. In an effort to provide 'real' characteristics of agile development, this paper evaluates Scrum, one of the most used agile approaches, using a software measurement framework. It also presents a Scrum measurement case study of a web portal company. We believe this study will provide some concrete guidelines as to whether Scrum is worth, what are weak points, and how to control the agile process in order to get over the weakness.