Learn More
Performance bugs are frequently observed in commodity software. While profilers or source code-based tools can be used at development stage where a program is diagnosed in a well-defined environment, many performance bugs survive such a stage and affect production runs. OS kernel-level tracers are commonly used in post-development diagnosis due to their(More)
In this paper, a novel design concept for roll-to-roll printing equipment used for manufacturing printed electronic devices by multi-layer printing is presented. The roll-to-roll printing system mainly consists of printing units for patterning the circuits, tension control components such as feeders, dancers, load cells, register measurement and control(More)
Cloud application marketplaces of modern cloud infrastructures offer a new software deployment model, integrated with the cloud environment in its configuration and policies. However, similar to traditional software distribution which has been suffering from software piracy and reverse engineering, cloud marketplaces face the same challenges that can deter(More)
Diagnosis of performance problems is an essential part of software development and maintenance. This is in particular a challenging problem to be solved in the production environment where only program binaries are available with limited or zero knowledge of the source code. This problem is compounded by the integration with a significant number of(More)
Audit logging is an important approach to cyber attack investigation. However, traditional audit logging either lacks accuracy or requires expensive and complex binary instrumentation. In this paper, we propose a Windows based audit logging technique that features accuracy and low cost. More importantly, it does not require instrumenting the applications,(More)
My research interests broadly span the areas of operating systems and dynamic/static program analysis with a focus on building secure and robust program execution environments. Cyber attacks against personal and enterprise computers are rapidly evolving. Due to the rise of mobile computing, cloud computing, cyber-physical systems, and the " Internet of(More)
We propose a security analysis system that enables tracking and understanding system intrusions fully and precisely, using deterministic virtual machine replay and virtual machine introspection. Understanding the behaviors of system intrusions is important for malware defense systems to discover their vulnerabilities and prevent them to be exploited for the(More)
Web-based malware equipped with stealthy cloaking and obfusca-tion techniques is becoming more sophisticated nowadays. In this paper, we propose J-FORCE, a crash-free forced JavaScript execution engine to systematically explore possible execution paths and reveal malicious behaviors in such malware. In particular, J-FORCE records branch outcomes and mutates(More)
Compact-sized printing machine with the capability of various printing methods in one printing unit is proposed. The printing method is changeable to gravure, gravure-offset, or flexo by alternating the web path and printing rollers. The machine also has multiple printing units with register control for the multilayer printings. The developed machine is(More)
Korean traditional meat patties (Tteokgalbi) were prepared by replacing part of the lean meat content with either pork backfat or canola oil and the effect of substitution on sensory quality of the meat patties was investigated. Compared to the control patties, pork-loin Tteokgalbi with 10% pork backfat or 10% canola oil had significantly higher overall(More)
  • 1