Korean | English

pISSN : 2092-8114 / eISSN : 2733-4384

2020 KCI Impact Factor : 0.41
Aims & Scope
moremore
 The Korea Software Assessment and Valuation Society is an academic institution that promotes the academic development and friendship of its members by developing and sharing software evaluation techniques applicable to copyright protection.    Members respect the value of research by complying with research ethics in academic research and presentation, and contribute to the academic advancement of software evaluation techniques for copyright protection and plagiarism prevention for software developers.    Research results on technologies that identify copyright infringement, such as software appraisal techniques and plagiarism, are selected through rigorous screening, and strict ethical regulations are followed to achieve the purpose of the association.
Editor-in-Chief
moremore
LEE KYU TAE

(Kongju national university)

Citation Index
more
  • KCI IF(2yr) : 0.41
  • KCI IF(5yr) : 0.35
  • Centrality Index(3yr) : 0.418
  • Immediacy Index : 0.0714

Current Issue : 2020, Vol.16, No.2

moremore
  • Similarity Detection in Object Codes and Design of Its Tool

    Jang-Hee Yoo | 2020, 16(2) | pp.1~8 | number of Cited : 0
    Abstract PDF
    The similarity detection to plagiarism or duplication of computer programs requires a different type of analysis methods and tools according to the programming language used in the implementation and the sort of code to be analyzed. In recent years, the similarity appraisal for the object code in the embedded system, which requires a considerable resource along with a more complicated procedure and advanced skill compared to the source code, is increasing. In this study, we described a method for analyzing the similarity of functional units in the assembly language through the conversion of object code using the reverse engineering approach, such as the reverse assembly technique to the object code. The instruction and operand table for comparing the similarity is generated by using the syntax analysis of the code in assembly language, and a tool for detecting the similarity is designed.
  • A Study on Injection Attacks and Defenses on Microsoft Windows

    Ho Jun Seong | Jo Chang Yeon | LEE HO WOONG and 1other persons | 2020, 16(2) | pp.9~23 | number of Cited : 0
    Abstract PDF
    Microsoft's Windows system is widely used as an operating system for the desktops and enterprise servers of companies or organizations, and is a major target of cyber attacks. Microsoft provides various protection technologies and strives for defending the attacks through periodic security patches, however the threats such as DLL injection and process injection still exist. In this paper, we analyze 12 types of injection techniques in Microsoft Windows, and perform injection attack experiments on four application programs. Through the results of the experiments, we identify the risk of injection techniques, and verify the effectiveness of the mitigation technology for defending injection attacks provided by Microsoft. As a result of the experiments, we have found that the current applications are vulnerable to several injection techniques. Finally, we have presented the mitigation techniques for these injection attacks and analyzed their effectiveness.
  • A Study on the Adoption of Discovery in Copyright Litigation

    Kim, Si Yeol | 2020, 16(2) | pp.25~35 | number of Cited : 0
    Abstract PDF
    In the Korean litigation system, structural maldistribution of evidence still remains a conundrum. Numerous solutions have been discussed so far and, today, few people deny the need for adopting a system similar to the discovery procedure in the United States. In the intellectual property (IP) domain, a wide range of legislative attempts have been made to improve the litigation system, especially for patent litigation. However, the adoption of discovery in copyright litigation is seldom discussed, despite the fact that copyright infringement lawsuits increasingly involve highly technical issues, especially in case of copyrightable computer programs. The lack of discussion on discovery adoption forms a stark contrast with the active attempts to adapt and adopt discovery procedure for patent litigation. In copyright infringement lawsuits, especially for copyrighted computer programs, securing evidence takes on crucial importance. However, in reality, there are numerous obstacles. Some lawsuits proceed even without properly securing the infringed work. To address this issue, the current litigation system needs to be improved by adopting a procedure similar to discovery. This paper reviews what solutions are being utilized today, and how we should approach the issue.
  • LOADING
  • LOADING