• Title/Summary/Keyword: Configurability

Search Result 15, Processing Time 0.03 seconds

Detecting Malicious Codes with MAPbox using Dynamic Class Hierarchies (동적 클래스 계층구조를 이용한 MAPbox상에서의 악성코드 탐지 기법)

  • Kim Cholmin;Lee Seong-uck;Hong Manpyo
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.556-565
    • /
    • 2004
  • A Sandbox has been widely used to prevent damages caused by running of unknown malicious codes. It prevents damages by containing running environment of a program. There is a trade-off in using sandbox, between configurability and ease-of-use. MAPbox, an instance system of sandbox, had employed sandbox classification technique to satisfy both configurability and ease-of-use [1]. However, the configurability of MAPbox can be improved further. In this paper, we introduce a technique to attach dynamic class facility to MAPbox and implement MAPbox-advanced one. Newly generated class in our system has an access control with proper privileges. We show an example for improvements which denote our system have increased the configurability of MAPbox. It was determined as abnormal by MAPbox although is not. Our system could determine it as normal. We also show our techniques to overcome obstacles to implement the system.

A Configurable Software-based Approach for Detecting CFEs Caused by Transient Faults

  • Liu, Wei;Ci, LinLin;Liu, LiPing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1829-1846
    • /
    • 2021
  • Transient faults occur in computation units of a processor, which can cause control flow errors (CFEs) and compromise system reliability. The software-based methods perform illegal control flow detection by inserting redundant instructions and monitoring signature. However, the existing methods not only have drawbacks in terms of performance overhead, but also lack of configurability. We propose a configurable approach CCFCA for detecting CFEs. The configurability of CCFCA is implemented by analyzing the criticality of each region and tuning the detecting granularity. For critical regions, program blocks are divided according to space-time overhead and reliability constraints, so that protection intensity can be configured flexibly. For other regions, signature detection algorithms are only used in the first basic block and last basic block. This helps to improve the fault-tolerant efficiency of the CCFCA. At the same time, CCFCA also has the function of solving confusion and instruction self-detection. Our experimental results show that CCFCA incurs only 10.61% performance overhead on average for several C benchmark program and the average undetected error rate is only 9.29%. CCFCA has high error coverage and low overhead compared with similar algorithms. This helps to meet different cost requirements and reliability requirements.

Managing Product Evolution in Agile Manufacturing Environments

  • Jin, Min.;Ting, T.C.
    • The Journal of Information Technology and Database
    • /
    • v.3 no.1
    • /
    • pp.45-63
    • /
    • 1996
  • This paper presents an integrated object-oriented database approach for managing the evolution of products in agile manufacturing environments, Schema evolution modification facilities are provided to support full potential versioning of type definitions. All of the possible versions for a composite product are not explicitly represented to avoid version proliferation. However, valid configurations of any composite products can be provided to comply with customer demands, The attributes of composite products are classified in order to provide well-defined representation scheme for composite products and to be exploited in version control. The attributes are partitioned into composite-related and non composite-related categories. Composite-related attributes consist of subproducts and description ones. Subproducts attributes represent physical constituents of a composite product. Description attributes represent external features, assembling, and correspondence property. Interface attributes are introduced for managing configurability and version propagation. Version derivations due to the changes to the interface attributes are propagated toward the product composition hierarchy, The validity of configurations of composite products is checked by using configurability maps. Instance objects which represent the actual product instances are stored and manipulated in the database in order to support traceability during product life cycle.

  • PDF

A Classification Technique for Configuration Requirements Elicitation of SaaS (SaaS의 설정 요구사항 추출을 위한 분류 기법)

  • Han, Jong-Dae;Shim, Jae-Kun;Lee, Byung-Jeong;Oh, Jae-Won;Wu, Chi-Su
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1259-1263
    • /
    • 2010
  • SaaS is an emerging paradigm for software development and deployment, expected to able to reduce cost. SaaS is also considered as a crucial technology for implementation of cutting-edge technology, such as distributed computing, green computing, and cloud computing. SaaS is requested to be configurable software to satisfy various customers, therefore it is very important to consider every configurability requirement during requirement elicitation. Our research suggests a classification technique to secure completeness of configuration requirement.

Security for the 3rd-Generation Mobile Telecommunication System (3세대 이동통신 시스템에서의 보호)

  • 박영호;이창순
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1999.12a
    • /
    • pp.579-589
    • /
    • 1999
  • 본 논문에서는 3GPP를 근간으로 3세대 이동통신에서의 보호에 관하여 소개한다. 3세대 이동통신 시스템에 보호기술을 제공하기 위한 2세대 이동통신 시스템의 결점과 3세대 이동통신 시스템에서의 보호원칙 및 보호목적을 기술한다. 3세대 이동통신 보호시스템은 네트워크 접근 보호, 네트워크 영역 보호, 사용자 영역 보호, 응용 영역 보호 및 visibility and configurability로 분류되au 각 보호영역에서 보호서비스들이 제공된다. 또한, 3세대 이동통신에서의 인증 및 키 일치 메카니즘 및 보호알고리즘에 관해서도 기술한다.

  • PDF

Application Driven Cluster Based Group Key Management with Identifier in Mobile Wireless Sensor Networks

  • Huh, Eui-Nam;Nahar Sultana
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.1 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • This paper proposes and analyzes a scalable and an efficient cluster based group key management protocol by introducing identity based infrastructure for secure communication in mobile wireless sensor networks. To ensure scalability and dynamic re-configurability, the system employs a cluster based approach by which group members are separated into clusters and the leaders of clusters securely communicate with each other to agree on a group key in response to changes in membership and member movements. Through analysis we have demonstrated that our protocol has a high probability of being resilient for secure communication among mobile nodes. Finally, it is established that the proposed scheme is efficient for secure positioning in wireless sensor networks.

Embedded Real-Time Software Architecture for Unmanned Autonomous Helicopters

  • Hong, Won-Eui;Lee, Jae-Shin;Rai, Laxmisha;Kang, Soon-Ju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.5 no.4
    • /
    • pp.243-248
    • /
    • 2005
  • The UAV (Unmanned Aerial Vehicle) systems like unmanned autonomous helicopters are used in various missions of flight navigation and used to collect the environmental information of the surroundings. To realize the full functionalities of the UAV, the software part becomes a challenging problem. In this paper embedded real-time software architecture for unmanned autonomous helicopter is proposed that guarantee real-time performance of hard-real time tasks and re-configurability of soft-real time and non-real time tasks. The proposed software architecture has four layers: hardware, execution, service agent and remote user interface layer according to the reactiveness level for external events. In addition, the layered separation of concurrent tasks makes different kinds of mission reconfiguration possible in the system. An Unmanned autonomous helicopter system was implemented (Kyosho RC Helicopter) in our lab to test and evaluate the performance of the proposed system.

Development of Heterarchical Control System through Automated Plant Monitoring (공장모니터링을 통한 수평구조 공장제어시스템의 개발)

  • Lee, Seok-Hee;Bae, Yong-Hwan
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.14 no.1
    • /
    • pp.108-118
    • /
    • 1997
  • The heterarchical structure provides a more attractive solution to the conventional hierarchical structure as the density and level of distrubution of computing resources in manufacturing system expands. Tracing the evolution of control structures for automated manufacturing systems, this paper discusses the design principles for heterarchical system to reduce complexity, increase extendability, flexible configurability and suggests a good example of real-time adaptation using the concept of intelligent agent of manufac- turing entities and fault diagmosis system.

  • PDF

Implementation of a Digital Convergence Platform for Future Home Multimedia Appliances (미래 홈 멀티미디어 가전을 위한 디지털 컨버젼스 플랫폼 구현)

  • Oh, Hwa-Yong;Kim, Dong-Hwan;Lee, Eun-Seo;Chang, Tae-Guy
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.983-986
    • /
    • 2005
  • This paper describes a digital convergence platform(DCP) whice is implemented based on the MPEG-21 multimedia framework. The DCP is a newly proposed solution in this research for the convergence service of future home multimedia environment. The DCP is a common platform designed to have the feature of configurability, via means of S/W, which is needed for the convergence service of diverse digital media. A distributed peer to peer service and transaction model is also a new feature realized in the DCP using the MPEG-21 multimedia framework. A prototype DCP is implemented to verify its functions of multimedia service and transactions. The developed DCPs are networked with IP clustering storage systems for the distributed service of multimedia. Successful streaming services of the MPEG-2/4 video and audio are verified with the implemented test-bed system of the DCP.

  • PDF

Optimized and Portable FPGA-Based Systolic Cell Architecture for Smith-Waterman-Based DNA Sequence Alignment

  • Shah, Hurmat Ali;Hasan, Laiq;Koo, Insoo
    • Journal of information and communication convergence engineering
    • /
    • v.14 no.1
    • /
    • pp.26-34
    • /
    • 2016
  • The alignment of DNA sequences is one of the important processes in the field of bioinformatics. The Smith-Waterman algorithm (SWA) performs optimally for aligning sequences but is computationally expensive. Field programmable gate array (FPGA) performs the best on parameters such as cost, speed-up, and ease of re-configurability to implement SWA. The performance of FPGA-based SWA is dependent on efficient cell-basic implementation-unit design. In this paper, we present an optimized systolic cell design while avoiding oversimplification, very large-scale integration (VLSI)-level design, and direct mapping of iterative equations such as previous cell designs. The proposed design makes efficient use of hardware resources and provides portability as the proposed design is not based on gate-level details. Our cell design implementing a linear gap penalty resulted in a performance improvement of 32× over a GPP platform and surpassed the hardware utilization of another implementation by a factor of 4.23.