• Title/Summary/Keyword: startup code

Search Result 16, Processing Time 0.018 seconds

A Study on Application of Fatigue Correction Factor for Environmental Fatigue Evaluation of Pressurizer Surge Line (가압기 밀림관 환경피로평가를 위한 피로보정계수 적용에 관한 연구)

  • Yang, Jun-Seog;Park, Chi-Yong;Kang, Seon-Ye
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.33 no.10
    • /
    • pp.1151-1157
    • /
    • 2009
  • Nuclear power plants applying for the continued operation over design life are required to address the effects of reactor water environment in fatigue design requirement of the ASME Code. Reactor water environmental effects are generally evaluated by calculating fatigue correction factors on fatigue usage. This paper describes the application for pressurizer surge line of environmental fatigue correction factors and the strain rate impact in the application. From this paper, the environmental fatigue correction factors resulted from the assumption of a step change in temperature are especially compared with those calculated from the data measured during plant startup. As a conclusion of this paper, the design transient conditions applied to the fatigue design may be conservative in case of the environmental fatigue evaluation.

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.

Improving application startup time by automatic profiling (Automatic Usage Profiling을 통한 초기 앱 실행 속도 개선 방법)

  • Chae, Hyangseok;Baik, Jongmoon
    • Journal of Software Engineering Society
    • /
    • v.28 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • Google released an initial version of Android that runs Dex(Dalvik Executable) through the Dalvik Runtime. Since Dalvik Runtime is based on interpreter, JIT(Just-in-time) compilation has been applied to improve performance. After Lollipop(Android 5.0) Dalvik Runtime has replaced with ART Runtime which support AOT (Ahead-of-time) compilation of Dex into Native Code. The late st Android has a problem that the application execution speed is slow until the AOT compilation is completed according to the actual usage record after the installation of the app. To improve the problem we have investigate the characteristics of profile that can improve the execution speed of the application and generate the profile automatically. Finally we propose a method that can optimize the application at install time. With the proposed method we can optimize selectively at install time and can help improving the execution speed of the app from the initial execution.

A Study of Using the Car's Black Box to generate Real-time Forensic Data (자동차의 블랙박스를 이용한 실시간 포렌식 자료 생성 연구)

  • Park, Dea-Woo;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.253-260
    • /
    • 2008
  • This paper is based on the ubiquitous network of telematics technology, equipped with a black box to the car by a unique address given to IPv6. The driver's black box at startup and operation of certification, and the car's driving record handling video signals in real-time sensor signals handling to analyze the records. Through the recorded data is encrypted transmission, and the Ubiquitous network of base stations, roadside sensors through seamless mobility and location tracking data to be generated. This is a file of Transportation Traffic Operations Center as a unique address IPv6 records stored in the database. The car is equipped with a black box used on the road go to Criminal cases, the code automotive black boxes recovered from the addresses and IPv6, traffic records stored in a database to compare the data integrity verification and authentication via secure. This material liability in the courtroom and the judge Forensic data are evidence of the recognition as a highly secure. convenient and knowledge in the information society will contribute to human life.

  • PDF

Implementation of Hypervisor for Virtualizing uC/OS-II Real Time Kernel (uC/OS-II 실시간 커널의 가상화를 위한 하이퍼바이저 구현)

  • Shin, Dong-Ha;Kim, Ji-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.103-112
    • /
    • 2007
  • In this paper, we implement a hypervisor that runs multiple uC/OS-II real-time kernels on one microprocessor. The hypervisor virtualizes microprocessor and memory that are main resources managed by uC/OS-II kernel. Microprocessor is virtualized by controlling interrupts that uC/OS-II real-time kernel handles and memory is virtualized by partitioning physical memory. The hypervisor consists of three components: interrupt control routines that virtualize timer interrupt and software interrupt, a startup code that initializes the hypervisor and uC/OS-II kernels, and an API that provides communication between two kernels. The original uC/OS-II kernel needs to be modified slightly in source-code level to run on the hypervisor. We performed a real-time test and an independent computation test on Jupiter 32-bit EISC microprocessor and showed that the virtualized kernels run without problem. The result of our research can reduce the hardware cost, the system space and weight, and system power consumption when the hypervisor is applied in embedded applications that require many embedded microprocessors.

  • PDF

A Study on the Learning Modes of Start-up Accelerating Program: Focusing on Korean Accelerators in the ICT Field Targeting Global Market (액셀러레이터 보육 프로그램이 제공하는 학습방식에 관한 연구: 글로벌 지향 ICT 분야 액셀러레이터를 중심으로)

  • Shin, Seung Yong;Lee, Jonghyun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.1
    • /
    • pp.31-46
    • /
    • 2023
  • This study classified and confirmed the learning modes about start-ups that are based on the accelerator's program which was focusing on the Korean accelerators in the ICT field targeting global market. Eight accelerator practitioners were interviewed who were in charge of operating programs for accelerators, qualitatively analyzing method of the interview was conducted. The interview results to identify various learning modes that accelerators provide to startups through programs. In order to identify and classify learning modes, the researcher reviewed various prior documents and using categories of experience accumulation, observation, experimentation, trial and error, and improvisation as a priori code for the qualitative analysis. The interview results were analyzed through a subject analysis. As the result of the study, the learning modes offered by the accelerator's programs to startups were confirmed, with two subcategories identified for each of the five categories: experiential, learning from others, experimental, trial and error, and improvisation. Given the limited research on accelerator programs and their main function, the main function of accelerators, this study identified the types of learning modes that offered by the accelerator's programs to startups from the perspective of learning. This study provides important insights into the types of learning modes that offered by the accelerator programs, which can help to improve our understanding of how accelerators support organizational learning for startups. Additionally, this information can be useful for startups considering in participating in the accelerator programs, as it can help them making informed decisions about their involvement.

  • PDF