• Title/Summary/Keyword: Program Execution

Search Result 611, Processing Time 0.053 seconds

Study on KSLV-II Program's Budget Execution Management (한국형발사체개발사업 예산 집행 관리 방안 연구)

  • Lee, Hyo Young;Cho, Dong Hyun;Yoo, Il Sang
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.13 no.1
    • /
    • pp.73-78
    • /
    • 2017
  • Space development program is a large and complex system consisting of a multi-disciplinary high-end technologies and it is important to implement a program management system connected with systems engineering as well as to develop critical technologies. Major organizations in space fields carry out effective budget execution management and operation according to the strategy and objective of space development using information systems. Korea Space Launch Vehicle II(KSLV-II) has adopted a cost management plan using a system engineering to complete the program within the assigned schedule and budget. This paper introduces the budget execution management system applied to KSLV-II budget management and the budget execution dashboard system for supporting program decision making.

Design of the Function for User Program Execution Control in the Windows Environments (윈도우 환경에서 사용자 프로그램 실행 권한 제어 기능 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1553-1560
    • /
    • 2016
  • In this paper, we design a program that controls the execution permissions for the running application in the Windows system environment. It does not allow general users to execute the program converting the specific location information of the execution program, to any of the bit values with the formal structure information in window program. The converted bit value can be returned to the original bit value in the case of an authorized user, so that the original program can be normally performed. By doing so, it can be more safely used in the risk of reverse engineering for Windows executable program. We implemented the control program for the program execution authority we proposed in this paper, and the experiment was performed. At the results of experiments, it was confirmed that the control function to permit execution for the user program was working properly in the Windows environment.

Performance Comparison of Parallel Programming Frameworks in Digital Image Transformation

  • Shin, Woochang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.1-7
    • /
    • 2019
  • Previously, parallel computing was mainly used in areas requiring high computing performance, but nowadays, multicore CPUs and GPUs have become widespread, and parallel programming advantages can be obtained even in a PC environment. Various parallel programming frameworks using multicore CPUs such as OpenMP and PPL have been announced. Nvidia and AMD have developed parallel programming platforms and APIs for program developers to take advantage of multicore GPUs on their graphics cards. In this paper, we develop digital image transformation programs that runs on each of the major parallel programming frameworks, and measure the execution time. We analyze the characteristics of each framework through the execution time comparison. Also a constant K indicating the ratio of program execution time between different parallel computing environments is presented. Using this, it is possible to predict rough execution time without implementing a parallel program.

Automatic Programming-Error Detection by Plan Matching and Program Execution (플랜정합과 프로그램 실행을 통한 프로그래밍 오류분석에 관한 연구)

  • Song, Jong-Soo;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.985-997
    • /
    • 2004
  • In this paper, an automatic programming error-diagnosing system is provided for novice C programmers by plan matching and program execution. Program execution results are used to provide flexibility in describing the relationship between programming plans, to verify the correctness of the plan matching differences, and to detect the influence of a plan's error to the related plan. We can give easy and informative explanations to the students according to a plan's error and the resulting effects to related plans. The students are consulted to check their program's correctness with the given test data. Our error-diagnosing system is tested with student's programs for the 14 various and difficult problems and gives acceptable recognition results.

  • PDF

Static Analysis Based on Backward Control Flow Graph Generation Method Model for Program Analysis (프로그램 분석을 위한 정적분석 기반 역추적 제어흐름그래프 생성 방안 모델)

  • Park, Sunghyun;Kim, Yeonsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1039-1048
    • /
    • 2019
  • Symbolic execution, an automatic search method for vulnerability verification, has been technically improved over the last few years. However, it is still not practical to analyze the program using only the symbolic execution itself. One of the biggest reasons is that because of the path explosion problem that occurs during program analysis, there is not enough memory, and you can not find the solution of all paths in the program using symbolic execution. Thus, it is practical for the analyst to construct a path for symbolic execution to a target with vulnerability rather than solving all paths. In this paper, we propose a static analysis - based backward CFG(Control Flow Graph) generation technique that can be used in symbolic execution for program analysis. With the creation of a backward CFG, an analyst can select potential vulnerable points, and the backward path generated from that point can be used for future symbolic execution. We conducted experiments with Linux binaries(x86), and indeed showed that potential vulnerability selection and backward CFG path generation were possible in a variety of binary situations.

On-Demand Remote Software Code Execution Unit Using On-Chip Flash Memory Cloudification for IoT Environment Acceleration

  • Lee, Dongkyu;Seok, Moon Gi;Park, Daejin
    • Journal of Information Processing Systems
    • /
    • v.17 no.1
    • /
    • pp.191-202
    • /
    • 2021
  • In an Internet of Things (IoT)-configured system, each device executes on-chip software. Recent IoT devices require fast execution time of complex services, such as analyzing a large amount of data, while maintaining low-power computation. As service complexity increases, the service requires high-performance computing and more space for embedded space. However, the low performance of IoT edge devices and their small memory size can hinder the complex and diverse operations of IoT services. In this paper, we propose a remote on-demand software code execution unit using the cloudification of on-chip code memory to accelerate the program execution of an IoT edge device with a low-performance processor. We propose a simulation approach to distribute remote code executed on the server side and on the edge side according to the program's computational and communicational needs. Our on-demand remote code execution unit simulation platform, which includes an instruction set simulator based on 16-bit ARM Thumb instruction set architecture, successfully emulates the architectural behavior of on-chip flash memory, enabling embedded devices to accelerate and execute software using remote execution code in the IoT environment.

Input File Based Dynamic Symbolic Execution Method for Software Safety Verification (소프트웨어 안전성 검증을 위한 입력 파일 기반 동적 기호 실행 방법)

  • Park, Sunghyun;Kang, Sangyong;Kim, Hwisung;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.811-820
    • /
    • 2017
  • Software automatic technology research recently focuses not only on generating a single path test-case, but also on finding an optimized path to reach the vulnerability through various test-cases. Although Dynamic Symbolic Execution (DSE) technology is popular among these automatic technologies, most DSE technology researches apply only to Linux binaries or specific modules themselves. However, most software are vulnerable based on input files. Therefore, this paper proposes an input file based dynamic symbolic execution method for software vulnerability verification. As a result of applying it to three kinds of actual binary software, it was possible to create a test-case effectively reaching the corresponding point through the proposed method. This demonstrates that DSE technology can be used to automate the analysis of actual software.

The Study on Improvement of the Program that Traces the Binary Codes in Execution (실행 중인 바이너리 코드 추출 프로그램의 기능 확장 연구)

  • Chang, Hang-Bae;Kwon, Hyuk-Jun;Kim, Yang-Hoon;Kim, Guk-Boh
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1309-1315
    • /
    • 2009
  • This research goal of developing and producing a tool that finds security weakness that may happen when a usual program is executed. The analyzing tool for security weakness has the major functions as follows. In case that a part of anticipated security weakness are in execution, it traces a machine language to a part in execution. And Monitoring System calls and DLL(API) calls when a program is in execution. The result of this study will enable to contribute to use as educational materials for security service in companies and related agencies and to prevent from hacking of external information invaders in the final analysis.

  • PDF

The Effect of Algorithm Execution Time Analysis using Unplugged Program on the Computational Thinking of Third Grade Students (언플러그드 방식을 활용한 알고리즘 수행시간 분석이 초등학교 3학년 학생의 컴퓨팅 사고력에 미치는 효과)

  • Kim, Jungah;Oh, Minwoo;Yang, Younghun;Kim, Taehun;Kim, Jonghoon
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.1
    • /
    • pp.19-27
    • /
    • 2019
  • This study analyzed the effect of an unplugged educational program which focuses on the algorithm execution time analysis on enhancing the computational thinking of the third grade students. An unplugged educational program was developed by following the procedures of the ADDIE model based on the result of the demand analysis conducted with 70 incumbent elementary school teachers and 120 third grade students. The developed program was applied to 24 third grade students for 36 classes in six days and a comparison was made through pre-post comparison tests with 24 students who were taught with a board game program for the same period of time. As a result, the unplugged education program which focuses on the algorithm execution time analysis is deemed to have positive effect on the computational thinking of the third grade students.