• Title/Summary/Keyword: static code analysis

Search Result 372, Processing Time 0.025 seconds

Big Data Processing and Performance Improvement for Ship Trajectory using MapReduce Technique

  • Kim, Kwang-Il;Kim, Joo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.65-70
    • /
    • 2019
  • In recently, ship trajectory data consisting of ship position, speed, course, and so on can be obtained from the Automatic Identification System device with which all ships should be equipped. These data are gathered more than 2GB every day at a crowed sea port and used for analysis of ship traffic statistic and patterns. In this study, we propose a method to process ship trajectory data efficiently with distributed computing resources using MapReduce algorithm. In data preprocessing phase, ship dynamic and static data are integrated into target dataset and filtered out ship trajectory that is not of interest. In mapping phase, we convert ship's position to Geohash code, and assign Geohash and ship MMSI to key and value. In reducing phase, key-value pairs are sorted according to the same key value and counted the ship traffic number in a grid cell. To evaluate the proposed method, we implemented it and compared it with IALA waterway risk assessment program(IWRAP) in their performance. The data processing performance improve 1 to 4 times that of the existing ship trajectory analysis program.

Malware Detection Using Deep Recurrent Neural Networks with no Random Initialization

  • Amir Namavar Jahromi;Sattar Hashemi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.177-189
    • /
    • 2023
  • Malware detection is an increasingly important operational focus in cyber security, particularly given the fast pace of such threats (e.g., new malware variants introduced every day). There has been great interest in exploring the use of machine learning techniques in automating and enhancing the effectiveness of malware detection and analysis. In this paper, we present a deep recurrent neural network solution as a stacked Long Short-Term Memory (LSTM) with a pre-training as a regularization method to avoid random network initialization. In our proposal, we use global and short dependencies of the inputs. With pre-training, we avoid random initialization and are able to improve the accuracy and robustness of malware threat hunting. The proposed method speeds up the convergence (in comparison to stacked LSTM) by reducing the length of malware OpCode or bytecode sequences. Hence, the complexity of our final method is reduced. This leads to better accuracy, higher Mattews Correlation Coefficients (MCC), and Area Under the Curve (AUC) in comparison to a standard LSTM with similar detection time. Our proposed method can be applied in real-time malware threat hunting, particularly for safety critical systems such as eHealth or Internet of Military of Things where poor convergence of the model could lead to catastrophic consequences. We evaluate the effectiveness of our proposed method on Windows, Ransomware, Internet of Things (IoT), and Android malware datasets using both static and dynamic analysis. For the IoT malware detection, we also present a comparative summary of the performance on an IoT-specific dataset of our proposed method and the standard stacked LSTM method. More specifically, of our proposed method achieves an accuracy of 99.1% in detecting IoT malware samples, with AUC of 0.985, and MCC of 0.95; thus, outperforming standard LSTM based methods in these key metrics.

Android Malware Analysis Technology Research Based on Naive Bayes (Naive Bayes 기반 안드로이드 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1087-1097
    • /
    • 2017
  • As the penetration rate of smartphones increases, the number of malicious codes targeting smartphones is increasing. I 360 Security 's smartphone malware statistics show that malicious code increased 437 percent in the first quarter of 2016 compared to the fourth quarter of 2015. In particular, malicious applications, which are the main means of distributing malicious code on smartphones, are aimed at leakage of user information, data destruction, and money withdrawal. Often, it is operated by an API, which is an interface that allows you to control the functions provided by the operating system or programming language. In this paper, we propose a mechanism to detect malicious application based on the similarity of API pattern in normal application and malicious application by learning pattern of API in application derived from static analysis. In addition, we show a technique for improving the detection rate and detection rate for each label derived by using the corresponding mechanism for the sample data. In particular, in the case of the proposed mechanism, it is possible to detect when the API pattern of the new malicious application is similar to the previously learned patterns at a certain level. Future researches of various features of the application and applying them to this mechanism are expected to be able to detect new malicious applications of anti-malware system.

Analysis of Propylen Chlorohydrin in Hydroxypropyl Distarch Phosphate by Accelerated Solvent Extractor (ASE) (가속화용매추출기를 이용한 히드록시프로필인산이전분의 프로필렌클로로히드린 분석방법에 관한 연구)

  • Lee, Myung-Ja;Sin, Yeong-Min;Jeong, Eui-Han;Choi, Tae-Jin;Chung, Sook-Hyun;An, Won-Gun
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.31 no.4
    • /
    • pp.604-608
    • /
    • 2002
  • Accelerated solvent extraction (ASE) was used for a rapid and simple extraction of propylenchlorohydrin (PCH) residue in hydroxylpropyl modified starch. The effects of temperature, pressure and extraction solvent on the extraction efficiency were investigated to find the optimal condition of ASE. The optimal conditions for PCH extraction in hydroxylpropyl modified starch were static time of 50 min, purge time of 300 sec, heating time of 5min, temperature of 12$0^{\circ}C$, pressure of 2500 psi, flush (%) with 100 volumes, and ethylacetate as an extraction solvent. The recovery (96.1%) of this method was higher than that (76.4%) of Code of Food Additive. Therefore, the ASE was a good method in both aspects of efficiency and effectiveness.

Experimental Curvature Analysis of Reinforced Concrete Piers with Lap-Spliced Longitudinal Steels subjected to Seismic Loading (지진하중을 받는 주철근 겹침이음된 철근콘크리트 교각의 곡률분석)

  • Chung, Young-Soo;Park, Chang-Kyu;Song, Hee-Won
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.10 no.1 s.47
    • /
    • pp.41-49
    • /
    • 2006
  • Through the 1982 Urahawa-ohi and the 1995 Kobe earthquakes, a number of bridge columns were observed to develop a flexural-shear failure due to the bond slip as a consequence of premature termination of the column longitudinal reinforcement. Because the seismic behavior of RC bridge piers is largely dependent on the performance of the plastic hinge legion of RC bridge piers, it is desirable that the seismic capacity of RC bridge pier is to evaluate as a curvature ductility. The provision for the lap splice of longitudinal steel was not specified in KHBDS(Korea Highway Bridge Design Specification) before the implementation of 1992 seismic design code, but the lap splice of not more than 50%, longitudinal reinforcement was newly allowed in the 2005 version of the KHBDS. The objective of this research is to investigate the distribution and ductility of the curvature of RC bridge column with the lap splice of longitudinal reinforcement in the plastic hinge legion. Six (6) specimens were made in 600 mm diameter with an aspect ratio of 2.5 or 3.5. These piers were cyclically subjected to the quasi-static loads with the uniform axial load of $P=0.1f_{ck}A_g$. According to the slip failure of longitudinal steels of the lap spliced specimen by cyclic loads, the curvatures of the lower and upper parts of the lap spliced region were bigger and smaller than the corresponding paris of the specimen without a lap splice, respectively. Therefore, the damage of the lap spliced test column was concentrated almost on the lower part of the lap spliced region, that appeared io be failed in flexure.

How to Combine Secure Software Development Lifecycle into Common Criteria (CC에서의 소프트웨어 개발보안 활용에 대한 연구)

  • Park, Jinseok;Kang, Heesoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.171-182
    • /
    • 2014
  • Common Criteria is a scheme that minimize IT products's vulnerabilities in accordance with the evaluation assurance level. SSDLC(Secure Software Development Lifecycle) is a methodology that reduce the weakness that can be used to generate vulnerabilities of software development life cycle. However, Common Criteria does not consider certificated IT products's vulnerabilities after certificated it. So, it can make a problem the safety and reliability of IT products. In addition, the developer and the evaluator have the burden of duplicating evaluations of IT products that introduce into the government business due to satisfy both Common Criteria and SSDLC. Thus, we researched the relationship among the Common Criteria, the static code analysis tools, and the SSDLC. And then, we proposed how to combine SSDLC into Common Criteria.

Experimental Performance Estimate of a 40m PSC I Girder for Railway Bridges (40m PSC I형 철도교의 동적 성능 평가)

  • Yeo, Inho
    • Journal of the Korean Society for Railway
    • /
    • v.16 no.5
    • /
    • pp.394-401
    • /
    • 2013
  • Here we report the results of an experimental laboratory test to verify the applicability to railway bridges of a PSC I girder of which the upper flange thickness was increased to improve sectional performance. The thicker this flange is, the further upward the neutral axis is moved. If in this way the span length can be increased to 40m long, the bridge may be constructed with four girders instead of five. Therefore, construction cost could be lowered by reducing the weight of the long span structure due to increased sectional efficiency. It was also necessary to be certain that the dynamic performance of this relatively flexible structure would be applicable to railway bridges. Therefore numerical analysis, as well as static and dynamic tests, was carried out for a full-size PSC I girder. Based on these results, it was verified that the performance of the PSC I railway bridge satisfied the performance criteria of the design code.

Leakage Flow Influence on SHF pump model performances

  • Dupont, Patrick;Bayeul-Laine, Annie-Claude;Dazin, Antoine;Bois, Gerard;Roussette, Olivier;Si, Qiaorui
    • International Journal of Fluid Machinery and Systems
    • /
    • v.8 no.3
    • /
    • pp.193-201
    • /
    • 2015
  • This paper deals with the influence of leakage flow existing in SHF pump model on the analysis of internal flow behaviour inside the vane diffuser of the pump model performance using both experiments and calculations. PIV measurements have been performed at different hub to shroud planes inside one diffuser channel passage for a given speed of rotation and various flow rates. For each operating condition, the PIV measurements have been trigged with different angular impeller positions. The performances and the static pressure rise of the diffuser were also measured using a three-hole probe. The numerical simulations were carried out with Star CCM+ 9.06 code (RANS frozen and unsteady calculations). Some results were already presented at the XXth IAHR Symposium for three flowrates for RANS frozen and URANS calculations. In the present paper, comparisons between URANS calculations with and without leakages and experimental results are presented and discussed for these flow rates. The performances of the diffuser obtained by numerical calculations are compared to those obtained by the three-holes probe measurements. The comparisons show the influence of fluid leakages on global performances and a real improvement concerning the efficiency of the diffuser, the pump and the velocity distributions. These results show that leakage is an important parameter that has to be taken into account in order to make improved comparisons between numerical approaches and experiments in such a specific model set up.

Collapse response assessment of low-rise buildings with irregularities in plan

  • Manie, Salar;Moghadam, Abdoreza S.;Ghafory-Ashtiany, Mohsen
    • Earthquakes and Structures
    • /
    • v.9 no.1
    • /
    • pp.49-71
    • /
    • 2015
  • The present paper aims at evaluating damage and collapse behavior of low-rise buildings with unidirectional mass irregularities in plan (torsional buildings). In previous earthquake events, such buildings have been exposed to extensive damages and even total collapse in some cases. To investigate the performance and collapse behavior of such buildings from probabilistic points of view, three-dimensional three and six-story reinforced concrete models with unidirectional mass eccentricities ranging from 0% to 30% and designed with modern seismic design code provisions specific to intermediate ductility class were subjected to nonlinear static as well as extensive nonlinear incremental dynamic analysis (IDA) under a set of far-field real ground motions containing 21 two-component records. Performance of each model was then examined by means of calculating conventional seismic design parameters including the response reduction (R), structural overstrength (${\Omega}$) and structural ductility (${\mu}$) factors, calculation of probability distribution of maximum inter-story drift responses in two orthogonal directions and calculation collapse margin ratio (CMR) as an indicator of performance. Results demonstrate that substantial differences exist between the behavior of regular and irregular buildings in terms of lateral load capacity and collapse margin ratio. Also, results indicate that current seismic design parameters could be non-conservative for buildings with high levels of plan eccentricity and such structures do not meet the target "life safety" performance level based on safety margin against collapse. The adverse effects of plan irregularity on collapse safety of structures are more pronounced as the number of stories increases.

Open Source Software Security Issues and Applying a Secure Coding Scheme (오픈 소스의 소프트웨어 보안 문제 및 시큐어 코딩 적용방안)

  • Kim, Byoungkuk
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.8
    • /
    • pp.487-491
    • /
    • 2017
  • Open source software allows the users to freely use, copy, distribute and modify source code without any particular limitations, and this offers the advantages of low entry cost, fast and flexible development, compatibility, reliability and safety. The emergence of many useful open source projects has the advantage of achieving high levels of output with lower costs and time commitment for software development. However, this also increases the risks caused by the security vulnerabilities of the used open source software. There is still no separate process to verify security in using open source software. In this paper, we analyze the security weakness in open source and propose a secure coding scheme in adopting open source, which is known to be highly reliable from a security point of view.