• Title/Summary/Keyword: weakness

Search Result 3,398, Processing Time 0.032 seconds

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

Two Cases of Benign Monomelic Amyotrophy of the Lower Extremities (하지에 생긴 양성 일지성 근위축 2예)

  • Lee, Dong Kuck
    • Annals of Clinical Neurophysiology
    • /
    • v.2 no.2
    • /
    • pp.125-129
    • /
    • 2000
  • Benign monomelic amyotrophy(BMA) is an uncommon cause of progressive mildly disabling atrophy and weakness of a limb. It predominantly affects the distal upper limb of young men. I present two men with BMA of the lower extremities. Although the disorder seemed clinically confined to a arm or leg, I confirmed by electromyography evidence of denervation in the other extremities. I reviewed the literatures and discuss the differential diagnosis. BMA is a diagnosis of exclusion that requires consideration in men with unilateral arm or leg atrophy and weakness.

  • PDF

Fingerprint Image Enhancement using a Modified Anisotropic Gaussian Filter (개선된 Anisotropic Gaussian 필터를 이용한 지문 영상 향상)

  • 조희덕;김상희;박원우
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.293-296
    • /
    • 2003
  • The enhancement of fingerprint image is necessary to improve the performance of fingerprint recognition. The enhancement of fingerprint image with Gabor Filter(GF) is widely used. However GF has the weakness such as long processing time and the sensitivity to ridge frequency. To overcome these weaknesses, we propose a Modified Anisotropic Gaussian Filter(MAGF) which is modified from Anisotropic Filter proposed by S. Greenburg's(SAF). This proposed MAGF can reduce the calculation time of ridge frequency and improve the weakness of sensitivity to ridge frequency. We also explained that MAGF is better than others mathematically and experimentally.

  • PDF

Development of the wireless data control system for wireless A/V LCD TV (무선 A/V LCD TV용 무선데이터 제어 시스템 설계 및 제작)

  • 김태선;홍영호;최덕규;박차훈;조재민
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.2279-2282
    • /
    • 2003
  • This paper is research to control method between wireless LCD TV and Set-Top-Box. Audio and Video signal control of wireless LCD TV through Set-Top-Box, usually two systems fairly be away, there is weakness that must go to set-top-box for operation. In this paper design and manufacture to solve this weakness.

  • PDF

Cauda Equina Syndrome Caused by Bilateral Facet Cyst Accompanying Spinal Stenosis

  • Kim, Seok-Won;Lee, Seung-Myung
    • Journal of Korean Neurosurgical Society
    • /
    • v.37 no.1
    • /
    • pp.76-78
    • /
    • 2005
  • We report a rare case of cauda equina syndrome due to bilateral lumbar facet cyst. A 62-year-old woman has developed both legs sciatica 3 months prior to her visit, but recently motor weakness and voiding difficulty occurred. Lumbar magnetic resonance image showed bilateral lumbar facet cyst compressing and surrounding both L5 nerve root and accompanying spinal stenosis. Urgent decompressive laminectomy and cyst removal was performed. Although sciatica was relieved and motor weakness was recovered usefully. Voiding difficulty and dysesthesia were not improved.

Atypical Radiologic Manifestation of NARP Mimicking MELAS: a Case Report

  • Lee, Youdae;Lee, Donghoon;Hwang, Hokyeong
    • Investigative Magnetic Resonance Imaging
    • /
    • v.22 no.2
    • /
    • pp.119-122
    • /
    • 2018
  • Neurogenic weakness, ataxia and retinitis pigmentosa (NARP) syndrome is a rare maternally inherited mitochondrial disorder. Radiologic findings in NARP syndrome are varied; they include cerebral and cerebellar atrophy, basal ganglia abnormalities, and on rare occasions, leukoencephalopathy. This article describes an extremely rare case of NARP syndrome mimicking mitochondrial encephalomyopathy, lactic acidosis, and stroke-like episodes (MELAS).

Induction of Decision Tress Using the Threshold Concept (Threshold를 이용한 의사결정나무의 생성)

  • 이후석;김재련
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.21 no.45
    • /
    • pp.57-65
    • /
    • 1998
  • This paper addresses the data classification using the induction of decision trees. A weakness of other techniques of induction of decision trees is that decision trees are too large because they construct decision trees until leaf nodes have a single class. Our study include both overcoming this weakness and constructing decision trees which is small and accurate. First, we construct the decision trees using classification threshold and exception threshold in construction stage. Next, we present two stage pruning method using classification threshold and reduced error pruning in pruning stage. Empirical results show that our method obtain the decision trees which is accurate and small.

  • PDF

Obstacle Avoidance for a Remote Mobile Robot Using Modified DT Algorithm (수정형 DT알고리즘을 이용한 원격 이동 로봇의 장애물 회피)

  • Lee, Kee-Seong;Cho, Hyun-Chul
    • Proceedings of the KIEE Conference
    • /
    • 1999.07g
    • /
    • pp.3095-3097
    • /
    • 1999
  • A New path planning using modified DT(distance transform) algorithm for a remote mobile robot is proposed. The weakness of DT algorithm is that the generated path is not the best path of all possible paths. Modified DT algorithm proposed can compensate for the weakness of DT algorithm, but the operating time of the proposed is longer than that of DT algorithm.

  • PDF

The Security Establishment for Cloud Computing through CASE Study

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.6
    • /
    • pp.89-99
    • /
    • 2020
  • Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.

한방진단시스템 DSOM의 진단결과에 따른 월경통 환자의 허실(虛實) 진단에 대한 연구

  • Lee, In-Sun;Cho, Hye-Sook;Youn, hyoun-Min;Jung, Kyoung-Keun;Kim, Kyu-Kon;Park, Ji-Eun;Choi, Sum-Mi
    • Journal of Pharmacopuncture
    • /
    • v.10 no.1 s.22
    • /
    • pp.137-155
    • /
    • 2007
  • Purpose : This study was undertaken to make a diagnosis weakness and firmness (虛實) of Dysmenorrhea patients by diagnosis questionnaires system(Diagnosis System of Oriental Medicine-DSOM) Methods : The subjects were 58 volunteers who was suffering for dysmenorrhea, employed using Measure of Menstrual Pain (MMP) questionnaire. The had agreed to take part in this experiment, with didn't take any anodyne drugs. The MMP score by using 7 questions and the Menstrual Symptom Severity List(MSSL-D) was measured before and after menstruation cycle. Results and Conclusions : The findings of this study were as follows; 1. We examined Pathogenic Factor's frequency of DSOM, Coldness(寒) was 45 persons 80.36%, Damp(濕) was 40 persons 71.43%, Heart(心) was 37 persons 66.07%, Heat syndrom(熱) was 9 persons 16.07%, insufficiency of Yang(陽虛) was 6 persons 10.71%. 2. We divided Dysmenorrhea patients into two groups(weakness and firmness) by Results of DSOM, Firmness was 25 Persons 43.1%, Weakness was 23 persons 39.7%, Unknown was 10 persons 17.2%. 3. In estimation based on Measure of Menstrual Pain (MMP) questionnaire Severe menstrual pain is weakness, Mild menstrual pain is Firmness. 4. In estimation of coldness and heat syndrom, Coldness was 40 persons 69.0%, Heat syndrom, was 2 persons 3.5%, Possess both coldness and heat syndrom was 9 persons 15.5%.