30 results on '"Byung-ki Kim"'
Search Results
2. A Load Balanced Clustering Model for Energy Efficient Packet Transmission in Wireless Sensor Networks
- Author
-
Jae-Hee Lee, Seong-Ho Kang, and Byung-Ki Kim
- Subjects
Branch and bound ,business.industry ,Computer science ,Distributed computing ,Energy conservation ,Data stream clustering ,Computer Science::Networking and Internet Architecture ,Performance measurement ,Latency (engineering) ,business ,Cluster analysis ,Wireless sensor network ,Computer network ,Efficient energy use - Abstract
The energy conservation is the most important subject for long run operation of the sensor nodes with limited power resources. Clustering is one of most energy efficient technique to grouped the sensor nodes into distinct cluster. But, in a cluster based WSN, CHs and gateways bear an extra work load to send the processed data to the sink. The inappropriate cluster formation may cause gateways overloaded and may increase latency in communication. In this paper, we propose a novel load balanced clustering model for improving energy efficiency and giving a guarantee of long network lifetime. We show the result of performance measurement experiments that designs using a branch and bound algorithm and a multi-start local search algorithm to compare with the existing load balanced clustering model.
- Published
- 2015
- Full Text
- View/download PDF
3. Procedural Animation Method for Realistic Behavior Control of Artificial Fish
- Author
-
Chong Han Kim, Byung Ki Kim, and Jae Hong Youn
- Subjects
Constraint (information theory) ,Computer science ,business.industry ,Interactive skeleton-driven simulation ,Completeness (order theory) ,Skeletal animation ,Procedural animation ,Production (economics) ,Animation ,Artificial intelligence ,business ,Physical law - Abstract
In the virtual space with the interactive 3D contents, the degree of mental satisfaction is determined by how fully it reflect the real world. There are a few factors for getting the high completeness of virtual space. The first is the modeling technique with high-polygons and high-resolution textures which can heighten an visual effect. The second is the functionality. It is about how realistic represents dynamic actions between the virtual space and the user or the system. Although the studies on the techniques for animating and controlling the virtual characters have been continued, there are problems such that the long production time, the high cost, and the animation without expected behaviors. This paper suggest a method of behavior control of animation by designing the optimized skeleton which produces the movement of character and applying the procedural technique using physical law and mathematical analysis. The proposed method is free from the constraint on one-to-one correspondence rules, and reduce the production time by controlling the simple parameters, and to increase the degree of visual satisfaction.
- Published
- 2013
- Full Text
- View/download PDF
4. Timer-based Credit Scheduler for Supporting Low Latency Task
- Author
-
Young-Woong Ko and Byung-Ki Kim
- Subjects
Computer science ,business.industry ,A domain ,Hypervisor ,computer.software_genre ,Virtualization ,Virtual machine ,Embedded system ,Deadline scheduler ,Operating system ,Timer ,Latency (engineering) ,business ,computer - Abstract
Virtualization allows multiple commodity operating systems to share on a single physical machine. Resource allocation among virtual machines is a key to determine virtual machine performance. To satisfy time-sensitive task on a domain, hypervisor needs to observe the resource requirements and allocates proper amount of CPU resources in a timely manner. In this paper, we propose a realtime credit scheduler for latency sensitive application on virtual machines. The key idea is to register a time event in the Xen hypervisor. Experiment result shows that the proposed scheme is superior to Credit scheduler.
- Published
- 2012
- Full Text
- View/download PDF
5. Implement of The Authoring Tool for WIPI Business Program using UIDL(User Interface Description Language)
- Author
-
Ki-Chang Park, Dong-Su Lee, and Byung-Ki Kim
- Subjects
Markup language ,Source code ,Interface (Java) ,Programming language ,computer.internet_protocol ,Computer science ,media_common.quotation_subject ,WIPI ,computer.software_genre ,Visualization ,Component (UML) ,Code generation ,computer ,XML ,media_common - Abstract
At present, Authoring tools, which are used to develop the WIPI applications are less convenient to be coded. Usually, the programming tools only focus on the grammar while scarcity of visualization. Developer forced directly codes all times during the development by this cause. As a procedure for rapid WIPI Application Development, in this paper, WIPI API High Level Component is first visualized, in order words, graphic control is developed. Second this control is used in designing the mobile layout. Then UI Markup Language and source code can be generated automatically. With this view, we propose the JIML(Jlet Interface Markup Language) with UI Markup Language based XML of WIPI Jlet Platform and also present the transformable rule for generation to the WIPI code about WIPI Jlet UI from offered JIML. Also we implement the WIPI Jlet Generation System to make the generation to JIML, WIPI code. The Implemented System provides efficiency when developing WIPI Business Application, and helps to enable rapid development.
- Published
- 2009
- Full Text
- View/download PDF
6. Decision of Abnormal Quality Unit Lists from Claim Database
- Author
-
Byung-Ki Kim, Sang-Joon Lee, Kyung-Il Moon, and Sang-Hyun Lee
- Subjects
Fallacy ,Decision support system ,Database ,Computer science ,Process (engineering) ,media_common.quotation_subject ,computer.software_genre ,Identification (information) ,Information engineering ,Data extraction ,Quality (business) ,Data mining ,computer ,Software ,Reliability (statistics) ,Information Systems ,media_common - Abstract
Most enterprises have controlled claim data related to marketing, production, trade and delivery. They can extract the engineering information needed to the reliability of unit from the claim data, and also detect critical and latent reliability problems. Existing method which could detect abnormal quality unit lists in early stage from claim database has three problems: the exclusion of fallacy probability in claim, the false occurrence of claim fallacy alarm caused by not reflecting inventory information and too many excessive considerations of claim change factors. In this paper, we propose a process and methods extracting abnormal quality unit lists to solve three problems of existing method. Proposed one includes data extraction process for reliability measurement, the calculation method of claim fallacy alarm probability, the method for reflecting inventory time in calculating claim reliability and the method for identification of abnormal quality unit lists. This paper also shows that proposed mechanism could be effectively used after analyzing improved effects taken from automotive company's claim data adaptation for two years.
- Published
- 2008
- Full Text
- View/download PDF
7. XML Language for Generating J2ME MIDlet User Interfaces
- Author
-
Seong Chae Seo, Park Ki Chang, and Byung Ki Kim
- Subjects
Markup language ,Java ,Natural user interface ,business.industry ,computer.internet_protocol ,Computer science ,Interface (Java) ,Usability ,User interface design ,Human–computer interaction ,User interface ,business ,computer ,XML ,computer.programming_language - Abstract
Many XML-compliant UIDLs(User Interface Description Languages) have been developed to specify user interfaces. Although previous UIDLs are helpful to describe user interfaces of web and desktop applications, they are not available of developing UI of mobile applications. In this paper, in order to effectively specify user interfaces of MIDlet which is application model on J2ME(Java Platform, Micro Edition), we propose MIML(Midlet Interface Markup Language) and present transformation rules to generate source codes from MIML. Further, we enhance the usability of MIML through J2MERenderer which is a tool using presented rules. The proposed method can specify user interfaces of mobile applications and allow developers to keep productivity and consistency in development phase.
- Published
- 2008
- Full Text
- View/download PDF
8. Design and Implementation of Dynamic Web Server Page Builder on Web
- Author
-
Yong-Min Shin and Byung-Ki Kim
- Subjects
Web server ,medicine.medical_specialty ,Database ,Web development ,Computer science ,business.industry ,Static web page ,Dynamic web page ,computer.software_genre ,Web API ,World Wide Web ,Web page ,medicine ,Web service ,business ,computer ,Web modeling - Abstract
Along with the trend of internet use, various web application developments have been performed to provide information that was managed in the internal database on the web by making a web server page. However, in most cases, a direct program was made without a systematic developmental methodology or with the application of a huge developmental methodology that is inappropriate and decreased the efficiency of the development. A web application that fails to follow a systematic developmental methodology and uses a script language can decrease the productivity of the program development, maintenance, and reuse. In this thesis, the auto writing tool for a dynamic web server page was designed and established by using a database for web application development based on a fast and effective script. It suggests a regularized script model and makes a standardized script for the data bound control tag creator by analyzing a dynamic web server page pattern with the database in order to contribute to productivity by being used in the web application development and maintenance.Key Words:Web Application, Dynamic Server Page, Site Builder
- Published
- 2008
- Full Text
- View/download PDF
9. An Experience Type Virtual Reality Training System for CT(Computerized Tomography) Operations
- Author
-
Young Ho Kim, Byung Ki Kim, and Yong Min Shin
- Subjects
Medical treatment ,Multimedia ,Computer science ,Aviation ,business.industry ,media_common.quotation_subject ,Training system ,Virtual reality ,computer.software_genre ,CT - Computerized tomography ,Virtual machine ,Function (engineering) ,business ,computer ,Educational software ,media_common - Abstract
Simulation system was introduced and used a lot in the fields of aviation, vessel, and medical treatment. 3D Simulation system has been used quite insufficiently as it requires a lot of system resource and huge amount of computer calculation. As the graphic card performance and simulation function developed, however, PC based simulation has been activated and is verified of its possibility as an educational software. However, educational institutions need to invest huge amount of budget and manpower to purchase and maintain CT Equipment. For such a reason, educational institutions entrust their students to hospitals for indirect experience of operation or for mere observation. This study, therefore, developed a CT Virtual reality education system with which medical CT Equipment can be directly operated in PC based 3D Virtual environment.
- Published
- 2007
- Full Text
- View/download PDF
10. Improved Object Recognition using Wavelet Transform & Histogram Equalization in the variable illumination
- Author
-
Byung Ki Kim, Jae Nam Kim, and Byeong Soo Jung
- Subjects
Color normalization ,business.industry ,Computer science ,Stationary wavelet transform ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Histogram matching ,Wavelet transform ,Pattern recognition ,Wavelet packet decomposition ,Wavelet ,Computer Science::Computer Vision and Pattern Recognition ,Adaptive histogram equalization ,Computer vision ,Artificial intelligence ,business ,Histogram equalization - Abstract
There are two problems associated with the existing principal component analysis, which is regarded as the most effective in object recognition technology. First, it brings about an increase in the volume of calculations in proportion to the square of image size. Second, it gives rise to a decrease in accuracy according to illumination changes. In order to solve these problems, this paper proposes wavelet transformation and histogram equalization. Wavelet transformation solves the first problem by using the images of low resolution. To solve the second problem the histogram equalization enlarges the contrast of images and widens the distribution of brightness values. The proposed technology improves recognition rate by minimizing the effect of illumination change. It also speeds up the processing and reduces its area by wavelet transformation.
- Published
- 2006
- Full Text
- View/download PDF
11. Construction of MATLAB API for Fuzzy Expert System Determining Automobile Warranty Coverage
- Author
-
Chul Min Kim, Sang Hyoun Lee, and Byung Ki Kim
- Subjects
Fuzzy expert system ,Computer science ,Warranty ,Data mining ,computer.software_genre ,MATLAB ,computer ,computer.programming_language ,Reliability engineering - Published
- 2005
- Full Text
- View/download PDF
12. Highly reliable Cu interconnect strategy for 10nm node logic technology and beyond
- Author
-
Deok-Hyung Lee, Rak-Hwan Kim, S.Y. Yoo, Jeonghyun Baek, Jung-A Choi, K.-M. Chung, E. S. Jung, Il-Goo Kim, Ki-Yeol Park, Soon-Moon Jung, Soomin Ahn, Byung-ki Kim, J.H. Hwang, Jihoon Cha, JiYeon Ku, Eun-hong Lee, S. S. Paak, Y. W. Cho, Min-Sang Kim, D. Park, J.S. Yoon, Jae-Hak Kim, T. Matsuda, Hyoji Choi, Hye-Lan Lee, Sungho Park, Jisu Kim, B. U. Yoon, H. K. Kang, Sang-Don Nam, Jun-Bum Lee, and Nae-In Lee
- Subjects
Interconnection ,Computer science ,Electronic engineering ,Time-dependent gate oxide breakdown ,Static random-access memory ,Reliability engineering - Abstract
CVD-Ru represents a critically important class of materials for BEOL interconnects that provides Cu reflow capability. The results reported here include superior gap-fill performance, a solution for plausible integration issues, and robust EM / TDDB properties of CVD-Ru / Cu reflow scheme, by iterative optimization of process parameters, understanding of associated Cu void generation mechanism, and reliability failure analysis, thereby demonstrating SRAM operation at 10 nm node logic device and suggesting its use for future BEOL interconnect scheme.
- Published
- 2014
- Full Text
- View/download PDF
13. Low Latency Scheduling on Multi BOOST Environment
- Author
-
Jeong-Gun Lee, Byung Ki Kim, Young Woong Ko, and Seon-Woo Lee
- Subjects
Computer science ,business.industry ,Virtual machine ,Embedded system ,Real-time computing ,Virtual machine scheduling ,Latency (engineering) ,business ,computer.software_genre ,computer ,Fair-share scheduling ,Scheduling (computing) - Abstract
In virtual machine environments, it is difficult to allocate CPU resource in a timely manner when lots of domains are in BOOST priority. In this paper, we present a virtual machine scheduling scheme based on realtime priority and efficiently deals with multi BOOST problem. We evaluate our prototype in terms of latency over diverse workloads. Our experiment result shows that the proposed realtime priority scheme effectively allocates CPU resources for low latency guest domain over varying workloads.
- Published
- 2012
- Full Text
- View/download PDF
14. Design and Implementation of Resource Management Tool for Virtual Machine
- Author
-
Byung Ki Kim, Young Jun Yoo, Young Woong Ko, and Chuck Yoo
- Subjects
Resource (disambiguation) ,Computer science ,business.industry ,Quality of service ,Hypervisor ,Workload ,computer.software_genre ,Scheduling (computing) ,Virtual machine ,Embedded system ,Operating system ,Multimedia system ,User interface ,business ,computer - Abstract
To support real time task in a virtual machine, hypervisor have to monitor system resource and provide exact resource for real time task. There are several monitor tools running on virtual machine, however, it has limitations on supporting detailed information for monitoring real time workload, performance degradation and difficult for controlling user interface. In this work, we proposed a resource monitoring and feedback tool for Xen virtual machine called XMM. XMM provides accurate resource monitoring in a hypervisor level without incurring much overhead. We also provide a GUI based control tool adjusting system resources based on user intervention, which can be useful in a multimedia system where user preference is important. XMM shows lots of information reflecting system behavior and it can give scheduling feedback for handling real time task. We believe XMM can be a useful tool for Xen virtual machine for various purposes.
- Published
- 2012
- Full Text
- View/download PDF
15. VCPU Shaping for Supporting Latency Sensitive Workloads
- Author
-
Chuck Yoo, Young Woong Ko, and Byung Ki Kim
- Subjects
business.industry ,Virtual machine ,Computer science ,Embedded system ,Quality of service ,Virtual machine scheduling ,Latency (engineering) ,business ,computer.software_genre ,computer - Abstract
In virtual machine environments, it is difficult to allocate CPU resource in a timely manner when lots of domains are in BOOST priority. In this paper, we present a virtual machine scheduling scheme based on VCPU shaping and efficiently deals with multi BOOST problem. We evaluate our prototype in terms of latency over diverse workloads. Our experiment result shows that the proposed realtime priority scheme effectively allocates CPU resources for low latency guest domain over varying workloads.
- Published
- 2012
- Full Text
- View/download PDF
16. Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine
- Author
-
Kyung Woo Hur, Jae Hyeok Jang, Young Woong Ko, Byung Ki Kim, and Jeong-Gun Lee
- Subjects
User Friendly ,Trace buffer ,Low overhead ,business.industry ,Computer science ,Control (management) ,computer.software_genre ,Task (computing) ,Virtual machine ,Embedded system ,System information ,Operating system ,business ,computer - Abstract
In a virtual machine, there is much requirement for supporting realtime characteristic. To support realtime task in a virtual machine, we have to monitor and control resources including CPU, memory, I/O device. Recently several monitor tools are released running on virtual machines including Xenmon. However, it has limitations on supporting detailed information for monitoring realtime workloads. Furthermore, frequent access to trace buffer severely degrades the overall system performance. In this paper, we propose a light-weight monitor tools for Xen virtual machine, which provides workloads monitoring with high accuracy, and users can monitor lots of system information with low overhead. We also provide GUI tools for user friendly purpose.
- Published
- 2011
- Full Text
- View/download PDF
17. Feedback Scheduling for Realtime Task on Xen Virtual Machine
- Author
-
Jae Hyuck Jang, Young Woong Ko, Kyung Woo Hur, and Byung Ki Kim
- Subjects
Exploit ,Computer science ,business.industry ,Quality of service ,Temporal isolation among virtual machines ,Virtual machine scheduling ,Workload ,computer.software_genre ,Scheduling (computing) ,Virtual machine ,Embedded system ,Operating system ,Central processing unit ,business ,computer - Abstract
In virtual machine environments, it is difficult to allocate CPU resource to virtual machine efficiently because virtual machine lacks knowledge of each domains workload. Especially, realtime tasks in guest domain have to finish before their deadline, however, virtual machine scheduler is not aware of guest-level tasks and how much resources guest domain requires. In this paper, we present a virtual machine scheduling framework based on feedback mechanism. The proposed mechanism exploits various scheduling information from each domain. Xen scheduler controls the CPU allocation by increasing or decreasing CPU slices. We evaluate our prototype in terms of realtime task performance over diverse workload. Our experiment result shows that feedback mechanism effectively allocates CPU resources for guest domain in varying workloads.
- Published
- 2011
- Full Text
- View/download PDF
18. ICLS : Intelligent Cricket-based Location Tracking System Using Sensor Fusion
- Author
-
Wan Yeon Lee, Byung Ki Kim, Ho Min Jung, and Young Woong Ko
- Subjects
Intelligent sensor ,business.industry ,Computer science ,Mobile computing ,Robot ,Context awareness ,Ranging ,Mobile robot ,Computer vision ,Artificial intelligence ,business ,Sensor fusion ,Wireless sensor network - Abstract
The key issues in ubiquitous sensor networks for context awareness is location-tracking. The main goal of location-tracking is to find the position of a moving object. In this paper, we describes the design and implementation of ICLS (Intelligent Cricket-based Location System). Especially, a more accurate location-tracking system using a sensor fusing mechanism is proposed herein. The benefits of sensor fusion are that it can obtain more accurate, complete, or dependable results. ICLS employs an ltrasonic sensor for ranging by time-of-flight measurements and uses a magnetic sensor to detect obstacles. To yield a more accurate navigation, a novel pass finding algorithm is also proposed in this paper. The results of the experiment that was conducted in this study show that a mobile robot moves towards a destination with a high degree of accuracy.
- Published
- 2008
- Full Text
- View/download PDF
19. A Fuzzy Reasoning Model of Two-Dimensional Warranty System
- Author
-
Byung Ki Kim, Kyung Il Moon, Sang-Joon Lee, Min Tae Lee, Sang-Hyun Lee, Jae Hee Lee, and Seung beom Park
- Subjects
Operations research ,Group method of data handling ,Computer science ,Warranty ,Fuzzy reasoning ,Plan (drawing) ,Data mining ,Product (category theory) ,computer.software_genre ,Fuzzy logic ,computer ,Maintenance engineering ,Reliability (statistics) - Abstract
Much of the literature on warranty analysis considers failure models which are indexed by a single variable, such as age or usage. However, there are situations where several characteristics are used together as criteria for judging the eligibility of a failed product. The warranty analysis characterized by a region in a two-dimensional plane with one axis representing age and the other axis representing usage is known as a "two-dimensional" warranty plan. A classical warranty plan requires crisp data obtained from strictly controlled reliability tests. However, in a real situation these requirements might not be fulfilled. In an extreme case, the warranty claims data come from users whose reports are expressed in a vague way. It might be caused by subjective and imprecise perception of failures by a user, by imprecise records of warranty data, or by imprecise records of the rate of usage. This paper suggests different tools appropriate for modeling a two-dimensional warranty plan, and a suitable fuzzy method to handle vague data.
- Published
- 2008
- Full Text
- View/download PDF
20. On Determination of Early Warning Grade Based on AHP Analysis in Warranty Database
- Author
-
Chulsu Park, Yuyang Liu, Seungbeom Park, Byung-Ki Kim, Sang-Hyun Lee, Culhyun Kim, and Min-Tae Lee
- Subjects
Quality management ,Operations research ,Warning system ,Computer science ,media_common.quotation_subject ,Warranty ,Analytic hierarchy process ,computer.software_genre ,Quantitative analysis (finance) ,Information system ,Quality (business) ,Data mining ,computer ,media_common - Abstract
A warranty claims information system is in general developed as three steps. The first step is a quantitative analysis through the time series detection of warranty claims data. The second step is early warning grade determination, considering both of the quantitave analysis and qualitative factors related to the early warning one. The third step is unit list sampling with pure warranty claims in all these activities. Especially, the considerations in early warning grade determination are the qualitative factors such as change due to complaints of customers, variations between regions, unit types and models, parts significance and so on. AHP analysis is appropriate in connection with these problems. This paper suggests a neural network learning model in determining early warning grade of warranty claims data, which includes AHP analysis and knowledge of quality experts. The early warning grade of warranty claims data using this model can compromise a dispute with rapid quality improvement and cost efficiency. The test result also suggests that the proposed method enhances accuracy of early warning grades in warranty claims database, which is at national famous automobile company.
- Published
- 2008
- Full Text
- View/download PDF
21. A Fuzzy Logic-Based Approach to Two-Dimensional Warranty System
- Author
-
Chulsu Park, Dong-Su Lee, Seungbeom Park, Byung-Ki Kim, Jae-Hee Lee, Kyung-Il Moon, and Sang-Hyun Lee
- Subjects
Operations research ,Computer science ,Warranty ,Plan (drawing) ,Product (category theory) ,Data mining ,computer.software_genre ,computer ,Fuzzy logic ,Reliability (statistics) - Abstract
Much of the literature on warranty analysis considers failure models which are indexed by a single variable, such as age or usage. However, there are situations where several characteristics are used together as criteria for judging the eligibility of a failed product. The warranty analysis characterized by a region in a two-dimensional plane with one axis representing age and the other axis representing usage is known as a "two-dimensional" warranty plan. A classical warranty plan requires crisp data obtained from strictly controlled reliability tests. However, in a real situation these requirements might not be fulfilled. In an extreme case, the warranty claims data come from users whose reports are expressed in a vague way. It might be caused by subjective and imprecise perception of failures by a user, by imprecise records of warranty data, or by imprecise records of the rate of usage. This paper suggests different tools appropriate for modeling a two-dimensional warranty plan, and a suitable fuzzy method to handle vague data.
- Published
- 2008
- Full Text
- View/download PDF
22. Kinematical Access for Realistic Behavior Generation of Artificial Fish
- Author
-
Byung-Ki Kim, Chong-Han Kim, Soonja Yeom, Min-Woo Shin, Seung-Moon Jeong, and Im-Chul Kang
- Subjects
Elasticity (cloud computing) ,Computer science ,business.industry ,Event (relativity) ,Artificial life ,Decision tree ,Behavioral pattern ,Evasion (network security) ,Animation ,Artificial intelligence ,Cyberspace ,business - Abstract
The objects real time rendered in the 3D cyberspace can interact with each others according to the events which are happened when satisfying some conditions. But, to representing the behaviors with these interactions, too many event conditions are considered because each behavior pattern and event must be corresponded in a one-to-one ratio. It leads to problems which increase the system complexity. So, in this paper, we try to physical method based on elasticity force for representing more realistic behaviors of AI fish and present a new method can create the various behavior patterns responding to one evasion event.
- Published
- 2007
- Full Text
- View/download PDF
23. Real-Time Motion Simulation of Artificial Fish for Virtual Marine World
- Author
-
Eun-Seok Kim, Byung-Ki Kim, Min-Woo Shin, Seung-Moon Jeong, Cheol-Min Kim, and Im-Chul Kang
- Subjects
Computer science ,Computer graphics (images) ,Interactive skeleton-driven simulation ,Artificial life ,Complex system ,Animation ,Virtual reality ,Motion control ,Motion (physics) ,Expression (mathematics) ,ComputingMethodologies_COMPUTERGRAPHICS - Abstract
In interactive 3D cyber space systems including computer games and virtual reality applications, we have increased need for real-time interactive control of articulated body motions for more realistic expression of characters. Animation methods that based on articulated body motions are used for produce real-time control of artificial life's motion. But these methods are not adequate to complex systems, like virtual marine world, that lead to many interactive actions. In this paper, we present the real-time animation method that can be applied to control of artificial fish for constructing the virtual marine world.
- Published
- 2007
- Full Text
- View/download PDF
24. Kimchi: A Binary Rewriting Defense Against Format String Attacks
- Author
-
Young Dae Kim, Jun Yong Choi, Byung Ki Kim, Jin Ho You, Seong Chae Seo, and Sang Jun Lee
- Subjects
Programming language ,Call stack ,Computer science ,business.industry ,Static analysis ,computer.software_genre ,scanf format string ,Parent function ,Embedded system ,Pointer (computer programming) ,Binary code ,Rewriting ,business ,computer ,Machine code - Abstract
We propose a binary rewriting system called Kimchi that modifies binary programs to protect them from format string attacks in runtime. Kimchi replaces the machine code calling conventional printf with code calling a safer version of printf, safe_printf, that prevents its format string from accessing arguments exceeding the stack frame of the parent function. With the proposed static analysis and binary rewriting method, it can protect binary programs even if they do not use the frame pointer register or link the printf code statically. In addition, it reduces the performance overhead of the patched program by not modifying the calls to printf with the format string argument located in the read-only memory segment, which are not vulnerable to the format string attack.
- Published
- 2006
- Full Text
- View/download PDF
25. Protection Against Format String Attacks by Binary Rewriting
- Author
-
Jin Ho You, Jun Yong Choi, Young Dae Kim, Byung Ki Kim, Seong Chae Seo, and Sang Jun Lee
- Subjects
scanf format string ,Call stack ,Computer science ,Pointer (computer programming) ,String (computer science) ,Operating system ,Binary code ,Rewriting ,Static analysis ,computer.software_genre ,computer ,Machine code - Abstract
We propose a binary rewriting system called Kimchi that modifies binary programs to protect them from format string attacks in runtime. Kimchi replaces the machine code calling conventional printf with code calling a safer version of printf, safe_printf, that prevents its format string from accessing arguments exceeding the stack frame of the parent function. With the proposed static analysis and binary rewriting method, it can protect binary programs even if they do not use the frame pointer register or link the printf code statically. In addition, it replaces the printf calls without extra format arguments like printf(buffer) with the safe code printf(”%s”, buffer), which are not vulnerable, and reduces the performance overhead of the patched program by not modifying the calls to printf with the format string argument located in the read-only memory segment, which are not vulnerable to the format string attack.
- Published
- 2005
- Full Text
- View/download PDF
26. Building Security Requirements Using State Transition Diagram at Security Threat Location
- Author
-
Sang Jun Lee, Jun Yong Choi, Byung Ki Kim, Jin Ho You, Young Dae Kim, and Seong Chae Seo
- Subjects
Exploit ,Computer science ,Vulnerability ,Covert channel ,Asset (computer security) ,Computer security ,computer.software_genre ,Security testing ,Security information and event management ,Threat ,Software development process ,Security engineering ,Software ,Vulnerability assessment ,Security bug ,Cloud computing security ,business.industry ,Software development ,Information security ,Computer security model ,Security service ,Software security assurance ,Security through obscurity ,Security convergence ,Network security policy ,business ,computer ,Countermeasure (computer) - Abstract
The security requirements in the software life cycle has received some attention recently. However, it is not yet clear how to build security requirements. This paper describes and illustrates a process to build application specific security requirements from state transition diagrams at the security threat location. Using security failure data, we identify security threat locations which attackers could use to exploit software vulnerabilities. A state transition diagram is constructed to be used to protect, mitigate, and remove vulnerabilities relative to security threat locations. In the software development process, security requirements are obtained from state transition diagrams relative to the security threat location.
- Published
- 2005
- Full Text
- View/download PDF
27. Space, polarization, and angle diversity for cellular base stations operating in urban environments
- Author
-
D.G. Sweeney, Jeffrey H. Reed, Warren L. Stutzman, and Byung-Ki Kim
- Subjects
Base station ,Computer science ,Electronic engineering ,Terrain ,Polarization (waves) ,Antenna diversity ,Angle diversity ,Multipath propagation ,Computer Science::Information Theory ,Cooperative diversity ,Diversity scheme - Abstract
Cellular telephone systems offer high reliability in favorable environments such as open rural areas. However, in urban areas and in rough terrain mobile and personal terminals experience multipath fading. Diversity techniques are used at the base station to overcome multipath fading. Although space diversity is the most common form of antenna diversity, it is the least attractive because it requires a second antenna widely separated from the first, as well as associated cable runs and installation costs. Interest has focused on polarization diversity that uses a single dual polarized antenna in place of two space diversity antennas. Angle diversity is also effective, but is not commonly employed. No direct, simultaneous comparisons of space, polarization, and angle diversity have been reported. Virginia Tech, sponsored by Metawave, is performing measurements of the three diversities under identical conditions. The measurements and results are described.
- Published
- 2002
- Full Text
- View/download PDF
28. Kimchi: A Binary Rewriting Defense Against Format String Attacks.
- Author
-
Jooseok Song, Taekyoung Kwon, Yung, Moti, Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, and Byung Ki Kim
- Abstract
We propose a binary rewriting system called Kimchi that modifies binary programs to protect them from format string attacks in runtime. Kimchi replaces the machine code calling conventional with code calling a safer version of , , that prevents its format string from accessing arguments exceeding the stack frame of the parent function. With the proposed static analysis and binary rewriting method, it can protect binary programs even if they do not use the frame pointer register or link the code statically. In addition, it reduces the performance overhead of the patched program by not modifying the calls to with the format string argument located in the read-only memory segment, which are not vulnerable to the format string attack. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
29. Building Security Requirements Using State Transition Diagram at Security Threat Location.
- Author
-
Yue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao, Seong Chae Seo, Jin Ho You, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, and Byung Ki Kim
- Abstract
The security requirements in the software life cycle has received some attention recently. However, it is not yet clear how to build security requirements. This paper describes and illustrates a process to build application specific security requirements from state transition diagrams at the security threat location. Using security failure data, we identify security threat locations which attackers could use to exploit software vulnerabilities. A state transition diagram is constructed to be used to protect, mitigate, and remove vulnerabilities relative to security threat locations. In the software development process, security requirements are obtained from state transition diagrams relative to the security threat location. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
30. Protection Against Format String Attacks by Binary Rewriting.
- Author
-
Yue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao, Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, and Byung Ki Kim
- Abstract
We propose a binary rewriting system called Kimchi that modifies binary programs to protect them from format string attacks in runtime. Kimchi replaces the machine code calling conventional printf with code calling a safer version of printf, safe_printf, that prevents its format string from accessing arguments exceeding the stack frame of the parent function. With the proposed static analysis and binary rewriting method, it can protect binary programs even if they do not use the frame pointer register or link the printf code statically. In addition, it replaces the printf calls without extra format arguments like printf(buffer) with the safe code printf("%s", buffer), which are not vulnerable, and reduces the performance overhead of the patched program by not modifying the calls to printf with the format string argument located in the read-only memory segment, which are not vulnerable to the format string attack. [ABSTRACT FROM AUTHOR]
- Published
- 2005
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.