• Title/Summary/Keyword: 매크로 프로그램

Search Result 53, Processing Time 0.033 seconds

Lock-free unique identifier allocation for parallel macro expansion

  • Son, Bum-Jun;Ahn, Ki Yung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.1-8
    • /
    • 2022
  • In this paper, we propose a more effective unique identifier allocation method for macro expansion in a single-process multicore parallel computing environment that does not require locks. Our key idea for such an allocation method is to remove sequential dependencies using the remainder operation. We confirmed that our lock-free method is suitable for improving the performance of parallel macro expansion through the following benchmark: we patched an existing library, which is based on a sequential unique identifier allocation, with our proposed method, and compared the performances of the same program but using two different versions of the library, before and after the patch.

OLE File Analysis and Malware Detection using Machine Learning

  • Choi, Hyeong Kyu;Kang, Ah Reum
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.149-156
    • /
    • 2022
  • Recently, there have been many reports of document-type malicious code injecting malicious code into Microsoft Office files. Document-type malicious code is often hidden by encoding the malicious code in the document. Therefore, document-type malware can easily bypass anti-virus programs. We found that malicious code was inserted into the Visual Basic for Applications (VBA) macro, a function supported by Microsoft Office. Malicious codes such as shellcodes that run external programs and URL-related codes that download files from external URLs were identified. We selected 354 keywords repeatedly appearing in malicious Microsoft Office files and defined the number of times each keyword appears in the body of the document as a feature. We performed machine learning with SVM, naïve Bayes, logistic regression, and random forest algorithms. As a result, each algorithm showed accuracies of 0.994, 0.659, 0.995, and 0.998, respectively.

A Study on Implementing an Automated Tool for De-Obfuscating a ConfuserEx (ConfuserEx의 난독화 복구 자동화 시스템 구축 연구)

  • Jae-hwi Lee;Young-seok Park;Dong-hyeon Kim;Gyu Heo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.129-137
    • /
    • 2023
  • According to a continuous attempts to manipulate content on portal sites using automated programs, a Naver, one of a portal site from Korea, is also trying to secure and analyze the programs to respond to the attempts. However, since some of the programs are secured by obfuscation tools, it is necessary to develop de-obfuscation technique. In this paper, we analyze a ConfuserEx, which occupied high percentage from obfuscation tools that applied to obtained programs, and propose an automated tool for de-obfuscating to save time for unpacking.

Closed-code-conversion: Transforming Open Code Multi-staged Programs into Closed Ones (다단계 프로그램에서 프로그램 생성 단계의 자유변수 제거)

  • Eo, Hyun-Jun;Yi, Kwang-Keun
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.3
    • /
    • pp.244-251
    • /
    • 2009
  • We present a transformation which converts open-code multi-staged programs into closed ones. Staged computation, which explicitly divides a computation into separate stages, is a unifying framework for existing program generation systems. Because a multi-staged program generates another program, which can also generate a third program and on, the implementation of a multi-staged language is not straightforward. Dynamic binding of (lexically free) variables in code also makes the implementation of a multi-staged language hard. By converting each code into code of function which takes environment for free variables as its argument and giving an actual environment at the code-composition site, we can transform a open-code program into a closed-code one. Combining with Davies and Pfenning's method, our closed-code-conversion enables the implementation of the unstaged language to be useful for executing multi-staged programs. We also prove the correctness of our conversion: the converted program is equivalent to the original program, and the converted program does not have open code.

Development of Fire Ignition Frequency Calculation program Using NUREG/CR-6850 Method (NUREG/CR-6850 방법론을 적용한 화재점화빈도 계산 프로그램 개발)

  • Ho, Myoung-Soo;Lee, Jang-Youn;Kang, Dae-Il
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2012.04a
    • /
    • pp.109-112
    • /
    • 2012
  • 원자력발전소는 타 산업시설에 비해 화재발생 가능성이 낮으나 방사성물질 누출가능성을 최소화하기 위하여 심층방어와 다중방호 설계를 통한 안전성확보가 매우 중요하다. 이를 위해 국내에서는 화재위험도분석(FHA)과 안전정지능력분석(SSA) 및 화재 확률론적안전성분석(Fire PSA)을 수행하고 있으며, 이 중 화재 PSA는 주요 화재구역 선별, 구역별 화재발생빈도 및 기기손상확률 계산, 화재사고 경위분석 및 화재취약성 파악 등을 분석한다. 본 논문에서는 미국 원자력규제위원회(USNRC)와 전력연구소(EPRI)가 공동 연구개발한 화재 PSA 방법론인 NUREG/CR-6850 기법을 적용하여, 화재 PSA에 필요한 화재점화빈도(Fire Ignition Frequency)를 정량적으로 계산하였다. 정확한 결과값을 도출하기 위해 매크로를 이용한 프로그램인 FIFA(Fire Ignition Frequency Analyzer)를 개발하였으며, 향후 국내 원전 화재 PSA 분석업무에 유용하게 사용될 수 있을 것으로 기대된다.

  • PDF

Research Trend of Illegal Contents Trace Technology (불법콘텐츠 추적 기술 연구동향)

  • Jung, H.Won;Lee, J.S.;Suh, Y.H.
    • Electronics and Telecommunications Trends
    • /
    • v.20 no.4 s.94
    • /
    • pp.120-128
    • /
    • 2005
  • 인터넷 환경이 급속도로 발전함에 따라 멀티미디어의 범람과 사용자들의 유료 콘텐츠사용에 대한 인식 부족으로 디지털 콘텐츠의 지적재산권 침해가 빈번하게 발생하고 있으며, 이러한 불법콘텐츠들의 무분별한 공유는 디지털콘텐츠 산업 발전을 저해하는 심각한 문제로 대두되고 있다. 이에 따라 최근 디지털 콘텐츠의 저작권 보호를 위해서 저작권 단속활동을 강화하고 있으며 다양한 P2P/웹하드 환경에서도 불법콘텐츠를 검색및 다운로드하고 콘텐츠를 식별하고 불법배포자를 추적할 수 있는 기술을 필요로 하게되었다. 그러나 대부분의 불법콘텐츠들은 약 80%가 P2P, 웹하드, 동호회/카페를 통해서 전파되고 있으며 각 업체별 클라이언트 프로그램의 다양성 때문에 불법콘텐츠의 검색 및 불법복제자 추적이 매우 어려운 실정이다. 불법콘텐츠의 추적 및 차단을 위해 워터마킹/핑거프린팅, 네트워크 모니터링, 매크로 프로그램, 공개 P2P 프로토콜 조작, 페이크 파일 유포 등의 기술들이 사용되고 있다. 본 고에서는 불법콘텐츠 국내외 시장현황과 업체의 기술동향을 살펴보고 불법배포자 추적을 위해 필요한 핑거프린팅과 특징점 기반 콘텐츠 식별 기술에 대해 설명한다. 그리고 P2P와 웹하드에서 불법콘텐츠들을 자동으로 다운로드하고 불법배포자들을 추적할 수 있는 시스템 아키텍처에 대하여 설명한다.

A Research of Anomaly Detection Method in MS Office Document (MS 오피스 문서 파일 내 비정상 요소 탐지 기법 연구)

  • Cho, Sung Hye;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.87-94
    • /
    • 2017
  • Microsoft Office is an office suite of applications developed by Microsoft. Recently users with malicious intent customize Office files as a container of the Malware because MS Office is most commonly used word processing program. To attack target system, many of malicious office files using a variety of skills and techniques like macro function, hiding shell code inside unused area, etc. And, people usually use two techniques to detect these kinds of malware. These are Signature-based detection and Sandbox. However, there is some limits to what it can afford because of the increasing complexity of malwares. Therefore, this paper propose methods to detect malicious MS office files in Computer forensics' way. We checked Macros and potential problem area with structural analysis of the MS Office file for this purpose.

Development and Application of Internet-based Consumer Education Program for Children (인터넷 기반 아동소비자 교육프로그램 개발 및 적용)

  • 김영옥
    • Journal of Korean Home Economics Education Association
    • /
    • v.15 no.3
    • /
    • pp.13-28
    • /
    • 2003
  • This study presents a development of internet-based consumer education program for children. We also investigate how this program affects on the children's consumer competency and how much children are interested in this program. This program consists of 6 domains: the concept of consumer. wants and scarcity. advertisement, tips on purchasing. consumer's rights. and consumer's problem imd solutions. In order to attract children. multimedia data such as pictures. drawings. and animations were included in designing the screens. The subjects of this study were 40 children at forth grade to participate in consumer education program. Surveys were conducted twice to collect data for consumer competency and children's interest in the program. According to the results of t-test. We found that consumer education has a positive effect on consumer knowledge and consumer-role attitude but has not a positive effect on consumer skill. We also found that children's interest on this program was very high.

  • PDF

The Comparison among Various Propagation prediction Models for Broadcasting Wave (방송 전파 예측을 위한 다양한 전파전파 모델들의 비교 연구)

  • 이영대;조한진;양경석;박천석;남상욱;목하균
    • Journal of Broadcast Engineering
    • /
    • v.3 no.1
    • /
    • pp.61-68
    • /
    • 1998
  • This paper compares various propagation models developed by several researchers with the measurements in Korea. The models we have considered are Okumura model, Longley-Rice model, ITU-R model and Lee model. The measured signal is vertically IXllarized E -field transmitted from Mt. Namsan at 320MHz. According to the result, Okumura model shows the best performance for the overall test IXlints, and ITU-R model has a good performance as Okumura model for receiving points above lOkm from the transmitter.

  • PDF

The improvement of micro-drilling method of SUS430 material (SUS430 소재의 미세홀 가공시 가공방법 개선)

  • Lee K.Y.;Kim H.M.;Park S.S.;Park H.Y.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2006.05a
    • /
    • pp.237-238
    • /
    • 2006
  • Micro drilling is a very important machining method to produce precise parts or small molds. General macro-program for drilling is a non-efficient method because of many movements to safety height. In this research new macro-program was suggested to raise machining-efficiency. New micro-drilling method caused the much reduction of machining time and the same tool life.

  • PDF