• Title/Summary/Keyword: 목적 주소 검증

Search Result 18, Processing Time 0.025 seconds

Software Attack Detection Method by Validation of Flow Control Instruction’s Target Address (실행 제어 명령어의 목적 주소 검증을 통한 소프트웨어 공격 탐지 기법)

  • Choi Myeong-Ryeol;Park Sang-Seo;Park Jong-Wook;Lee Kyoon-Ha
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.397-404
    • /
    • 2006
  • Successful software attacks require both injecting malicious code into a program's address space and altering the program's flow control to the injected code. Code section can not be changed at program's runtime, so malicious code must be injected into data section. Detoured flow control into data section is a signal of software attack. We propose a new software attack detection method which verify the target address of CALL, JMP, RET instructions, which alter program's flow control, and detect a software attack when the address is not in code section. Proposed method can detect all change of flow control related data, not only program's return address but also function pointer, buffer of longjmp() function and old base pointer, so it can detect the more attacks.

Overseas Address Data Quality Verification Technique using Artificial Intelligence Reflecting the Characteristics of Administrative System (국가별 행정체계 특성을 반영한 인공지능 활용 해외 주소데이터 품질검증 기법)

  • Jin-Sil Kim;Kyung-Hee Lee;Wan-Sup Cho
    • The Journal of Bigdata
    • /
    • v.7 no.2
    • /
    • pp.1-9
    • /
    • 2022
  • In the global era, the importance of imported food safety management is increasing. Address information of overseas food companies is key information for imported food safety management, and must be verified for prompt response and follow-up management in the event of a food risk. However, because each country's address system is different, one verification system cannot verify the addresses of all countries. Also, the purpose of address verification may be different depending on the field used. In this paper, we deal with the problem of classifying a given overseas food business address into the administrative district level of the country. This is because, in the event of harm to imported food, it is necessary to find the administrative district level from the address of the relevant company, and based on this trace the food distribution route or take measures to ban imports. However, in some countries the administrative district level name is omitted from the address, and the same place name is used repeatedly in several administrative district levels, so it is not easy to accurately classify the administrative district level from the address. In this study we propose a deep learning-based administrative district level classification model suitable for this case, and verify the actual address data of overseas food companies. Specifically, a method of training using a label powerset in a multi-label classification model is used. To verify the proposed method, the accuracy was verified for the addresses of overseas manufacturing companies in Ecuador and Vietnam registered with the Ministry of Food and Drug Safety, and the accuracy was improved by 28.1% and 13%, respectively, compared to the existing classification model.

Design of Integrated Address Analysis Mechanism for the Next-Generation Integrated Network (차세대 통합 망을 위한 통합형 주소분석 메커니즘 설계)

  • 신현순;조기성
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.11
    • /
    • pp.39-45
    • /
    • 2004
  • This paper proposes an algorithm of address analysis for the next-generation networks. That is, we present integrated address analysis of the Numbering Plans of public telecommunication networks such as those of the ATM network. The purpose of implementing software for integrated address analysis is to actively and flexibly cope with a large change of information while operating the system and the network. By designing and implementing a database structure and an address analysis algorithm, interworking is possible among part (local) networks that each have a different Addressing Plan within an integrated network. Proposed relational model database structure has effect that do to manage address information of complicated network efficiently. Also, apply in real environment and proved excellency through interworking test to verify mechanism that propose.

Indirect Branch Target Address Verification for Defense against Return-Oriented Programming Attacks (Return-Oriented Programming 공격 방어를 위한 간접 분기 목적 주소 검증 기법)

  • Park, Soohyun;Kim, Sunil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.217-222
    • /
    • 2013
  • Return-Oriented Programming(ROP) is an advanced code-reuse attack like a return-to-libc attack. ROP attacks combine gadgets in program code area and make functions like a Turing-complete language. Some of previous defense methods against ROP attacks show high performance overhead because of dynamic execution flow analysis and can defend against only certain types of ROP attacks. In this paper, we propose Indirect Branch Target Address Verification (IBTAV). IBTAV detects ROP attacks by checking if target addresses of indirect branches are valid. IBTAV can defends against almost all ROP attacks because it verifies a target address of every indirect branch instruction. Since IBTAV does not require dynamic execution flow analysis, the performance overhead of IBTAV is relatively low. Our evaluation of IBTAV on SPEC CPU 2006 shows less than 15% performance overhead.

Development of Walk Score Application GUI in Smart Device for Improvement of User Convenience (사용자 편의성 향상을 위한 스마트 단말에서의 워크스코어 어플리케이션 GUI 개발)

  • An, Donghyeok;Kim, Eun Jung
    • Smart Media Journal
    • /
    • v.8 no.2
    • /
    • pp.86-93
    • /
    • 2019
  • The purpose of this study is to develop walk score application GUI in a smart device for improving user convenience. This study uses the walk score dataset of Seoul City developed in previous studies. Application GUI consists of five parts: address input window and search button, detail information (address, latitude, longitude, walk score), window switching and input window for a number of data, data input window, and menu button. For verifying application GUI, this study uses 12 locations (sets of address, latitude, longitude, and walk score) near Gangnam Station and Myungdong Station in Seoul in several scenarios. First, this study checks if the application has been implemented with address and keyword search options. Then, new data insertion and file output operations are evaluated. The application system developed in this study operated properly in all scenarios. This walk score application can be a useful device in our daily lives.

New Defense Method Against Software Vulnerability Attack by Control Flow Address Validation (제어흐름주소 검증을 이용한 소프트웨어 취약점 공격 대응 기법)

  • 최명렬;김기한;박상서
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.343-345
    • /
    • 2004
  • 높은 효율성과 시스템 자원을 세일하게 제어할 수 있는 편리성을 제공하기 위해서 소프트웨어의 안전성에 대한 책임을 개발자가 지게하는 C 언어의 특성으로 인해서 버퍼 오버플로우, 포맷 스트링 기법 등을 이용한 소프트웨어 공격이 계속 나타나고 있다. 지금까지 알려진 소프트웨어 공격 기법의 다수가 버퍼 오버프로우 기법을 이용한 것이어서 지금까지의 연구는 주로 버퍼 오버플로우 공격 방지 및 탐지에 집중되어 있어 다른 공격 기법에 적용하는 데는 한계가 있었다. 본 논문에서는 소프트웨어 공격의 궁극적인 목적이 제어흐름을 변경시키는 것이라는 것을 바탕으로 프로그램의 제어흐름이 정상적인 범위를 벗어날 경우 이를 공격으로 탐지하는 새로운 기법을 제안하고 기존 연구 결과들과 비교하였다.

  • PDF

Cumulative Risk and Problem Behavioral of Divorced Family's Children (누적적 위험요인과 이혼가정자녀의 문제행동과의 관련성 연구)

  • Ju, So-Hee
    • Journal of the Korean Society of Child Welfare
    • /
    • no.26
    • /
    • pp.61-86
    • /
    • 2008
  • This Study examines the relationship between Cumulative Risk and Behavioral Problem of children's in divorced family. The cumulative risk was Summed for each children to creative an cumulative scores. Scores on the index ranged from 0 to 12. Cumulative Risk was associated with Behavioral Problem. Moreover the analyses revealed positive, linear associated between Cumulative Risk and Behavioral Problem. Cumulative Risk predicted Problem Behavioral of Divorced Family's Children. Finding indicate that the amount of risk in Divorced Family's childrens lives was useful for determining the extent to which cumulative risk exposure plays an etiological role in Behavioral Problem. On the basis of these results, this article provided some suggestions for promoting of children welfare.

Development of a Decompiler for Verification and Analysis of an Intermediate Code in ANSI C Compiler (ANSI C 컴파일러에서 중간코드의 검증과 분석을 위한 역컴파일러의 개발)

  • Kim, Young-Keun;Kwon, Hyeok-Ku;Lee, Yang-Sun
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.411-419
    • /
    • 2007
  • Mounted on mobile device, set-top box, or digital TV, EVM is a virtual machine solution that can download and execute dynamic application programs. And the SIL(Standard Intermediate Language) is intermediate language of the EVM, which has a set of opcodes for object-oriented language and a sequential language. Since the C compiler used on each platform depends on the hardware, it converts C program to objective code, and then executes. To solve this problem, our research team developed ANSI C compiler and the EVM. Our ANSI C compiler outputs the SIL code based on stack machine. This paper presents the SIL-to-C decompiler in which converts the SIL code to three address code. Thus, the decompiler allows us to verify SIL code created by ANSI C compiler, and analyze a program from C language source level.

  • PDF

A Study on the Definition Methodology of Korean SCI Journals (SCI에 등재된 한국 학술지를 정의하는 방법에 대한 연구)

  • Lee, Choon-Shil;Lee, Nam-Young
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.18 no.2
    • /
    • pp.271-288
    • /
    • 2007
  • The purpose of this study is to investigate how one can find all journals of a country covered in a database such as SCI. We searched SCI and JCR Science Edition 2006 databases for Korean journals using four definition criteria-Country of a journal publication, Editorship, Unique words appeared in a journal title designating a country, a number of papers from a country in a journal. We also checked related literatures and websites to find information on SCI Korean journals. The study shows that 40 Korean journals were covered in SCI in 2006. SCI identified 38 of them as journals from South Korea, and JCR 2006 included 36. 11 journals had unique words indicating that they are Korean journals. 9 journals were Korean journals among the top 20 SCT journals by the number of papers with Korean addresses, and 36 journals were included among the top 500 SCI journals.

Design and Implementation of MPOA using SDL (SDL을 이용한 MPOA 설계 및 구현)

  • Lim, Ji-Young;Kim, Hee-Jung;Lim, Soo-Jung;Chae, Ki-Joon;Lee, Mee-Jung;Choi, Kil-Young;Kang, Hun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.6
    • /
    • pp.643-656
    • /
    • 2000
  • MPOA proposed and standardized by the ATM Forum is a protocol tllat provides effective bridging and routing for ATM networks in a diverse network environment. Its plimary goal is to transfer unicast data effectively among the subnets. In this paper, MPOA components are implemented using the SDL(Specification and Description Language) which the ITU has standardized for the development of communication systems. In addition, MPOA procedures for various operations such as address translation for packets from upper layers, Ingress/Egress cache management and shortcut configuration, are examined with tlle help of the SDT(SDL Design Too]) simulator.

  • PDF