Korean | English

pISSN : 2092-8114 / eISSN : 2733-4384

2020 KCI Impact Factor : 0.41
Home > Explore Content > All Issues > Article List

2015, Vol.11, No.1

  • 1.

    The Definition and Management Guideline for the Software Configuration Management

    Kwon, Ki Tae | 2015, 11(1) | pp.1~12 | number of Cited : 0
    Abstract PDF
    Software configuration management is identifying software items in the system that can be produced during the software life cycle. And it defines, creates, modify, distributes, reports the correction request for software items, manages in a single process. Effective software configuration management is to ensure consistency, and accuracy. In this study, we present the guideline for the entire configuration management process so that it can be managed consistently the configuration of software development artifacts, work procedures, artifacts. This study is based on the standard process(TTAS.KO-09.0038) of the public part SW business and the standard of life cycle process of software(ISO / IEC 12207 2008 software and system engineering life cycle). This guideline is configured to maintain the activities of ‘detailed instructions on software project management supervision’ and maintain mutual compatibility of them.
  • 2.

    A Comparative Review on Quantitative Analysis for Substantial Similarity Determination of Literal Expression

    Kim, Si Yeol | 2015, 11(1) | pp.13~22 | number of Cited : 0
    Abstract PDF
    This study analysed a case of seoul central district court 2015. 2. 12. 2012 Gahap 541175 presenting persentage of similarity for determing the substantial similarity between literary works. In particular, this study reviewed the criterion and calculation method for the percentage of similarity and suggested the reasonable estimation standards.
  • 3.

    Similarity Analysis of Android Apps Considering Code Obfuscation

    PARKJONGHWA | 임경환 | Lee Kyung Mook and 3other persons | 2015, 11(1) | pp.23~30 | number of Cited : 0
    Abstract PDF
    Code obfuscation is a technique to transform a program into an equivalent one that is harder to reverse engineering. Using code obfuscation tools (or, obfuscators), software developers obfuscate their codes to conceal intellectual properties of the codes, in order to deter reverse engineering or prevent tampering. On the other hand, malicious users may also make use of obfuscation techniques badly to hide the program codes that they have thieved or plagiarized. It would be difficult to detect software theft if pirated software was obfuscated. In this paper, we compare three obfuscators for Android apps, and investigate the effects of the tools on measuring software similarity. To analyze the effects of them, we have measured software similarity between an original source program and the decompiled version from obfuscated program. This study is helpful to detect software theft using similarity measures even though pirated software is obfuscated.
  • 4.

    Assessment of exEyes' Recall using Bellon Reference Corpus as a Benchmark

    Sungha Choi | Doh, Kyung-Goo | 2015, 11(1) | pp.31~39 | number of Cited : 0
    Abstract PDF
    Copyrights for software source codes are given to developers. Korea Copyright Commission utilizes a clone-detection tool, exEyes, to find code clones that can be used to assess software plagiarism. This paper evaluates the recall of exEyes using Bellon Reference Corpus as a benchmark. Four open sources(cook and weltab in C, eclipse-ant and netbean-javadoc in Java) in Bellon Reference Corpus are selected as the benchmark. Among 10,055 clones in the corpus, exEyes' recall rate is 100% in clone type 1, 63% in clone type 2, and 34% in cone type 3. False negatives turn out to be mainly caused by ignoring the meaning of tokens when the comparison is made, and by setting the comparison be made line-by-line.
  • 5.

    Optimization of the Beacon Rx Power Threshold for Scanning Trigger in Wireless LAN

    Ki Jang Geun | 2015, 11(1) | pp.41~46 | number of Cited : 0
    Abstract PDF
    In wireless LAN, relatively small-sized beacons that are transmitted by APs(Access Points) can be received successfully in some border area where the larger data packets can not be successfully transmitted because the larger in packet size, the higher in transmission error probability in the wireless communication. New scan procedure in WLAN will not start before a mobile node moves far away from the AP enough to occur a beacon reception error. In this paper, the updated WLAN simulation model is developed to effectively trigger the scan procedure to reduce the packet loss and the threshold of the beacon rx power is optimized by simulation. In the developed WLAN model, The counter increase when a becon rx power is less than both the designated threshold and the previous rx power. New scan procedure starts when the counter exceeds the predefined value.
  • 6.

    Classification for Similarity Evaluation on Embedded System

    LEE KYU TAE | 2015, 11(1) | pp.47~51 | number of Cited : 0
    Abstract PDF
    As there has been increased in technical abuse and illegal to Information devices system product, the conflict is in the copyright ownership issues. A person who involved in development process moved to other company with the important materials of the product illegally, and then he made a similar product compared with first system. it happens to make a lot of loss to first product company. To compare to two product, the copyright association took an estimation to the first product and illegal copy product. At this time, both company must submit all the materials to be referenced to their assistance. because both developer is a person who have a best knowledge to the product. But on most cases, the defender would not willing to submit their development materials as they know their illegal work. So, the estimator do their mission with limited materials and his expert knowledge. In this paper, we tried to suggest a work procedure and extract an estimation factors to helping the verification.