Korean | English

pISSN : 2092-8114 / eISSN : 2733-4384

Home > Explore Content > All Issues > Article List

2020, Vol.16, No.2

  • 1.

    Similarity Detection in Object Codes and Design of Its Tool

    Jang-Hee Yoo | 2020, 16(2) | pp.1~8 | number of Cited : 0
    Abstract PDF
    The similarity detection to plagiarism or duplication of computer programs requires a different type of analysis methods and tools according to the programming language used in the implementation and the sort of code to be analyzed. In recent years, the similarity appraisal for the object code in the embedded system, which requires a considerable resource along with a more complicated procedure and advanced skill compared to the source code, is increasing. In this study, we described a method for analyzing the similarity of functional units in the assembly language through the conversion of object code using the reverse engineering approach, such as the reverse assembly technique to the object code. The instruction and operand table for comparing the similarity is generated by using the syntax analysis of the code in assembly language, and a tool for detecting the similarity is designed.
  • 2.

    A Study on Injection Attacks and Defenses on Microsoft Windows

    Ho Jun Seong , Jo Chang Yeon , LEE HO WOONG and 1 other persons | 2020, 16(2) | pp.9~23 | number of Cited : 0
    Abstract PDF
    Microsoft's Windows system is widely used as an operating system for the desktops and enterprise servers of companies or organizations, and is a major target of cyber attacks. Microsoft provides various protection technologies and strives for defending the attacks through periodic security patches, however the threats such as DLL injection and process injection still exist. In this paper, we analyze 12 types of injection techniques in Microsoft Windows, and perform injection attack experiments on four application programs. Through the results of the experiments, we identify the risk of injection techniques, and verify the effectiveness of the mitigation technology for defending injection attacks provided by Microsoft. As a result of the experiments, we have found that the current applications are vulnerable to several injection techniques. Finally, we have presented the mitigation techniques for these injection attacks and analyzed their effectiveness.
  • 3.

    A Study on the Adoption of Discovery in Copyright Litigation

    Kim, Si Yeol | 2020, 16(2) | pp.25~35 | number of Cited : 0
    Abstract PDF
    In the Korean litigation system, structural maldistribution of evidence still remains a conundrum. Numerous solutions have been discussed so far and, today, few people deny the need for adopting a system similar to the discovery procedure in the United States. In the intellectual property (IP) domain, a wide range of legislative attempts have been made to improve the litigation system, especially for patent litigation. However, the adoption of discovery in copyright litigation is seldom discussed, despite the fact that copyright infringement lawsuits increasingly involve highly technical issues, especially in case of copyrightable computer programs. The lack of discussion on discovery adoption forms a stark contrast with the active attempts to adapt and adopt discovery procedure for patent litigation. In copyright infringement lawsuits, especially for copyrighted computer programs, securing evidence takes on crucial importance. However, in reality, there are numerous obstacles. Some lawsuits proceed even without properly securing the infringed work. To address this issue, the current litigation system needs to be improved by adopting a procedure similar to discovery. This paper reviews what solutions are being utilized today, and how we should approach the issue.
  • 4.

    Analysis Method for Revision and Addition of the Specification to Appraisal

    Byung-Tae Chun | 2020, 16(2) | pp.37~44 | number of Cited : 0
    Abstract PDF
    As the information society develops, various cases of copyright infringement have occurred. In many disputes between companies, software similarity appraisal is dominated. This thesis is a study on the method of calculating the similarity of the standards subject to appraisal. In other words, it is a study to calculate the amount of revision and addition of the specification to be assessed. The analysis method compares the table of contents of both specifications and finds the same or similar part. The similarity weight is determined according to the degree of similarity. Weights identify and assign the degree of similarity between the expert's expertise and the specification. If it is completely newly added, the similarity weight is 1, if it is partially modified, the similarity weight is 0.4, and if it is almost the same as before, it is calculated by giving a weight of 0.05. Through this paper, it was found that the result of calculating the similarity to the specification is 21.2 pages.
  • 5.

    Detection of Source Code Security Vulnerabilities Using code2vec Model

    Joon Hyuk Yang , Ji Hwan Mo , Sung-Moon Hong and 1 other persons | 2020, 16(2) | pp.45~52 | number of Cited : 1
    Abstract PDF
    Traditional methods of detecting security vulnerabilities in source-code require a lot of time and effort. If there is good data, the issue could be solved by using the data with machine learning. Thus, this paper proposes a source-code vulnerability detection method based on machine learning. Our method employs the code2vec model that has been used to propose the names of methods, and uses as a data set, Juliet Test Suite that is a collection of common security vulnerabilities. The evaluation shows that our method has high precision of 97.3% and recall rates of 98.6%. And the result of detecting vulnerabilities in open source project shows hopeful potential. In addition, it is expected that further progress can be made through studies covering with vulnerabilities and languages not addressed here.
  • 6.

    Hybrid Trust Computational Model for M2M Application Services

    Yukyong Kim | 2020, 16(2) | pp.53~62 | number of Cited : 0
    Abstract PDF
    In the end-user domain of an IoT environment, there are more and more intelligent M2M devices that provide resources to create and share application services. Therefore, it can be very useful to manage trust by transferring the role of the existing centralized service provider to end users in a P2P environment. However, in a decentralized M2M computing environment where end users independently provide or consume services, mutual trust building is the most important factor. This is because malicious users trying to build malfunctioning services can cause security problems in M2M computing environments such as IoT. In this paper, we provide an integrated analysis and approach for trust evaluation of M2M application services, and an optimized trust evaluation model that can guarantee reliability among users of the M2M community.
  • 7.

    Design and Implementation of a Face Authentication System

    Lee, Seungik | 2020, 16(2) | pp.63~68 | number of Cited : 1
    Abstract PDF
    This paper proposes a face authentication system based on deep learning framework. The proposed system is consisted of face region detection and feature extraction using deep learning algorithm, and performed the face authentication using joint-bayesian matrix learning algorithm. The performance of proposed paper is evaluated by various face database , and the face image of one person consists of 2 images. The face authentication algorithm was performed by measuring similarity by applying 2048 dimension characteristic and combined Bayesian algorithm through Deep Neural network and calculating the same error rate that failed face certification. The result of proposed paper shows that the proposed system using deep learning and joint bayesian algorithms showed the equal error rate of 1.2%, and have a good performance compared to previous approach.
  • 8.

    A Study on Determining the Optimal Time to Launch of Software Considering Error Correction Time

    AHN, CHEOL-HOON | 2020, 16(2) | pp.69~76 | number of Cited : 0
    Abstract PDF
    In this paper, the problem of determining the optimal time to market of software was studied using error correction time, an indicator of error correction difficulty. In particular, it was intended to modify the assumption that error detection time and correction time are independent in the software reliability growth model considering the existing error correction time, and to establish a general framework model that expresses the correlation between error detection time and correction time to determine when the software will be released. The results showed that it was important from an economic perspective to detect errors that took time to correct early in the test. It was concluded that it was very important to analyze the correlation between error detection time and error correction time in determining when to release the optimal software.
  • 9.

    Study on Distributed Ledger Technology using Thing-user Group Management of Network of Everything

    SUYEON KIM , Kahng Hyun Kook | 2020, 16(2) | pp.77~85 | number of Cited : 0
    Abstract PDF
    In this paper, We studied the operation of distributed ledger technology used as a core technology for smart contracts and the components of distributed ledger technology. As a solution applying the entity of distributed ledger technology to NoE, we proposed the protocol of the distributed ledger technology using the thing user social group management function of NoE protocols being standardized in ISO/IEC JTC1 SC6. The management function of things user social group in NoE provides stable protocol functions and data transmission management, and provides group management functions such as member discovery function and data transmission channel management function. It is expected to be useful for member management functions of distributed ledger nodes by providing a service that apply the component of distributed ledger technology. We intend to actively reflect this technology in the future network functions of ISO/IEC JTC1 SC6, which is undergoing standardization.
  • 10.

    The Study on the Software Safety Maturity Model using CMMI and TMMi

    Seungmok Lee , Young-Gon Kim , Kyeong-Soo An | 2020, 16(2) | pp.87~98 | number of Cited : 0
    Abstract PDF
    Recently, IoT, artificial intelligence, cloud, big data, and mobile fields have converged, leading to a new industrial era called the 4th industrial revolution. This 4th industrial revolution has been expanded to all industry area and Software has been taken as important role in this revolution. Thus Software Safety is the huge factor because Software is highly relevant to human safety in accordance with Software expansion. However this Software Safety has been focused on not organization improvement activities but current design/development, In this paper, to solve this issue, Software Safety Maturity level and relevant Process Area is defined. This study is expected to contribute to systematic software safety activities.
  • 11.

    A Study on Updated Object Detection and Extraction of Underground Information

    KIM KWANG SOO , LEE,HYUNGSUB , Kim Juwan | 2020, 16(2) | pp.99~107 | number of Cited : 1
    Abstract PDF
    An underground integrated map is being built for underground safety management and is being updated periodically. The map update proceeds with the procedure of deleting all previously stored objects and saving newly entered objects. However, even unchanged objects are repeatedly stored, deleted, and stored. That causes the delay of the update time. In this study, in order to shorten the update time of the integrated map, an updated object and an unupdated object are separated, and only updated objects are reflected in the underground integrated map, and a system implementing this technology is described. For the updated object, an object comparison method using the center point of the object is used, and a quad tree is used to improve the search speed. The types of updated objects are classified into addition and deletion using the shape of the object, and change using its attributes. The proposed system consists of update object detection, extraction, conversion, storage, and history management modules. This system has the advantage of being able to update the integrated map about four times faster than the existing method based on the data used in the experiment, and has the advantage that it can be applied to both ground and underground facilities.
  • 12.

    Analysis of Problems when Generating Negative Power for IT devices

    Jun,Ho-Ik , Lee HyunChang | 2020, 16(2) | pp.109~115 | number of Cited : 2
    Abstract PDF
    In this paper, the problem that occurs when negative voltage is generated using an inexpensive buck device in an IT device that is supplied with a single power by an adapter or battery is analyzed. For the cause analysis, the principle of operation of the buck device and the principle of the inverter circuit were examined, and the circuit characteristics of the inverter circuit were analyzed using the buck device. As a result of the analysis, it was confirmed that the inverter circuit using the buck device initially needs a large starting current, and in particular, in the case of a current capacity that is less than the starting current in the circuit that supplies power, it was confirmed that it could fall into a state similar to the latch-up phenomenon. In order to confirm the analysis result, an experimental circuit was constructed and the input current was checked. If the supply current is sufficient, it is confirmed that over-current flows and starts. If the supply current is insufficient, the circuit cannot start and a latch-up phenomenon occurs.
  • 13.

    Analysis of Gain and Frequency in a DFB laser with Cleaved Facets

    Lee Changseok , Kwon Kee Young , Ki Jang Geun and 1 other persons | 2020, 16(2) | pp.117~125 | number of Cited : 1
    Abstract PDF
    In this paper, when both the refractive index grating and the gain grating exist in a 1.55um DFB laser with two cleaved mirror facets, when the phase of  is fixed to 0 and the phase of is changed to   , , , , the change in frequency and oscillation gain was theoretically analyzed. In the case of    , the oscillation gain required for lasing is the lowest and the most stable frequency operation is obtained in the case of ( phase=,  phase=) and   , when  is varied from 0.1 to 10. In the case of    , when ( phase=,  phase= ) and   , the oscillation gain required for lasing is the lowest and the difference between the oscillation gains of the higher-order modes is large so that the most stable frequency operation is obtained.
  • 14.

    Monitoring System for Optimized Power Management with Indoor Sensor

    Do Hyeun Kim , LEE KYU TAE | 2020, 16(2) | pp.127~133 | number of Cited : 0
    Abstract PDF
    As the usages of artificial intelligence is increased, the demand to algorithms for small portable devices increases. Also as the embedded system becomes high-performance, it is possible to implement algorithms for high-speed computation and machine learning as well as operating systems. As the machine learning algorithms process repetitive calculations, it depend on the cloud environment by network connection. For an stand alone system, low power consumption and fast execution by optimized algorithm are required. In this study, for the purpose of smart control, an energy measurement sensor is connected to an embedded system, and a real-time monitoring system is implemented to store measurement information as a database. Continuously measured and stored data is applied to a learning algorithm, which can be utilized for optimal power control, and a system interfacing various sensors required for energy measurement was constructed.
  • 15.

    Iris Localization using the Pupil Center Point based on Deep Learning in RGB Images

    YongSoo Choi , Jang-Hee Yoo | 2020, 16(2) | pp.135~142 | number of Cited : 0
    Abstract PDF
    In this paper, we describe the iris localization method in RGB images. Most of the iris localization methods are developed for infrared images, thus an iris localization method in RGB images is required for various applications. The proposed method consists of four stages: i) detection of the candidate irises using circular Hough transform (CHT) from an input image, ii) detection of a pupil center based on deep learning, iii) determine the iris using the pupil center, and iv) correction of the iris region. The candidate irises are detected in the order of the number of intersections of the center point candidates after generating the Hough space, and the iris in the candidates is determined based on the detected pupil center. Also, the error due to distortion of the iris shape is corrected by finding a new boundary point based on the detected iris center. In experiments, the proposed method has an improved accuracy about 27.4% compared to the CHT method.
  • 16.

    Development of 3-State Blind Digital Watermark based on the Correlation Function

    Chol Yong Soo | 2020, 16(2) | pp.143~151 | number of Cited : 0
    Abstract PDF
    The digital content‘s security and authentication are important in the field of digital content application. There are some methods to perform the authentication. The digital watermarking is one of authentication methods. Paper presents a digital watermark authentication method that works in the application of digital image. The proposed watermark has the triple status information and performs the embedding and the detection without original Content. When authenticating the owner information of digital content, an autocorrelation function is used. In addition, a spread spectrum method is used to be adaptive to the signal of the original content in the frequency domain(DWT Domain). Therefore, the possibility of errors occurring in the detection of hidden information was reduced. it also has a advantage what Watermarking in DWT has faster embedding and detection time than other transformation domains(DFT, DCT, etc.). if it has a an image of size N=mXm, the computational amount can be reduced from   ∙   to    . The particular advantage is that it can hide more information(bits) per bit.
  • 17.

    Development of Digital Image Forgery Detection Method Utilizing LE(Local Effect) Operator based on L0 Norm

    Chol Yong Soo | 2020, 16(2) | pp.153~162 | number of Cited : 0
    Abstract PDF
    Digital image forgery detection is one of very important fields in the field of digital forensics. As the forged images change naturally through the advancement of technology, it has made it difficult to detect forged images. In this paper, we use passive forgery detection for copy paste forgery in digital images. In addition, it detects copy-paste forgery using the L0 Norm-based LE operator, and compares the detection accuracy with the forgery detection using the existing L2, l1 Norm-based LE operator. In comparison of detection rates, the proposed lower triangular(Ayalneh and Choi) window was more robust to BAG mismatch detection than the conventional window filter. In addition, in the case of using the lower triangular window, the performance of image forgery detection was measured increasingly higher as the L2, L1 and L0 Norm LE operator was performed.
  • 18.

    Introduction and Analysis of Open Source Software Development Methodology

    Kyung-A Son , Yun Young-Sun | 2020, 16(2) | pp.163~172 | number of Cited : 0
    Abstract PDF
    Recently, concepts of the Fourth Industrial Revolution technologies such as artificial intelligence, big data, and cloud computing have been introduced and the limits of individual or team development policies are being reviewed. Also, a lot of latest technology source codes have been opened to the public, and related studies are being conducted based on them. Meanwhile, the company is applying the strengths of the open source software development methodology to proprietary software development, and publicly announcing support for open source development methodology. In this paper, we introduced several software development methodology such as open source model, inner source model, and the similar DevOps model, which have been actively discussed recently, and compared their characteristics and components. Rather than claiming the excellence of a specific model, we argue that if the software development policy of an individual or affiliated organization is established according to each benefit, they will be able to achieve software quality improvement while satisfying customer requirements.