• Title/Summary/Keyword: 무결성 검사

Search Result 67, Processing Time 0.037 seconds

A Study on Intrusion Protection Techniques against Linux Kernel Backdoor (리녹스 커널 백도어 침업에 대한 차단 기법 연구)

  • Kim, Jin-Taek;Kho, Jeong-Ho;Hong, Min-Seok;Son, Choul-Woong;Park, Beom;Lee, Do-Won;Lee, Geuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.201-207
    • /
    • 2009
  • As the existing backdoor worked at user mode, which is application mode, it was possible to check the existence of backdoor by the integrity check of system file. However, for the backdoor using kernel module, it is impossible to check its existence by the integrity check of system file. Even various programs were presented to protect this LKM Kernel backdoor, there is limitation in protection as they examine the changes on the system Call Table. This study, recognizing the danger of invasion through such LKM Kernel backdoor, will provide alternative for the limitation which the existing integrity check couldn't prevent intrusion through Kernel backdoor.

  • PDF

A Study on the Preservation Policy for Maintaining the Integrity of Digital Contents (디지털 콘텐츠의 무결성 유지를 위한 장기적인 보존 정책에 관한 연구)

  • Jung, Young-Mi;Yoon, Hwa-Mook;Kim, Jeong-Taek
    • Journal of Information Management
    • /
    • v.41 no.4
    • /
    • pp.205-226
    • /
    • 2010
  • Assuring that the integrity of digital contents is reliably maintained is an important component of long-term digital preservation. The purpose of this study was to examine and analysis the best practices of digital preservation policy and provide the basis theory for establishing a preservation policy for maintaining the integrity of digital contents. In order to achieve the purpose of the study, we examined the digital archiving practices for maintaining the integrity of digital contents. Especially, we focused on the storage media and file formats, the media and format conversion, disaster prevention and recovery, management and handling, inspection and monitoring, and security policies.

Efficient Integrity Checking using Hashed B-Tree Index (Hashed B-트리 인덱스를 이용한 효율적인 무결성 검사)

  • Park, Sun-Seob;Jeong, Jae-Mok;Kim, Hyoung-Joo
    • Journal of KIISE:Databases
    • /
    • v.27 no.2
    • /
    • pp.216-226
    • /
    • 2000
  • This paper suggests a new access path, hashed B-tree which is an efficient access method for integrity checking. Hashed B-tree is based on the observation that most query patterns in enforcing integrity constraints are point queries. Hashed B-tree compresses the key by hashing procedure, which reduces the height of tree and results in fast node search. This method has the advantages such as it can be implemented easily and use the B-tree concurrency control and recovery algorithm with minor modifications.

  • PDF

A Study on Integrity Monitoring Improvement of the DGPS Reference Station (DGPS 기준국 무결성 감시 체계 고도화 방안 연구)

  • Cho, Deuk-Jae;Park, Sang-Hyun;Choi, Jin-Kyu;Suh, Sang-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.31 no.6
    • /
    • pp.509-514
    • /
    • 2007
  • The importance of the GPS is becoming larger and larger since it is one of the Global Navigation Satellite Systems and is regarded as a national infrastructure in the field positioning and timing Nowadays many researches avoiding and/or minimizing economic loss caused by unexpected fault of the GPS are being carried out because GPS fault can give a large impact on social security system as well as economic system NDGPS network which has been authorized by the Ministry of Marine and Fisheries provides services for marine users and evolved into a national infrastructure for GNSS users. Many researchers and engineers are doing research work in order to apply the NDGPS network to other fields. From this trend, it can be expected that the integrity and related functions for the NDGPS users will become more important than before. This paper analyzes integrity informations about the real GNSS fault and proposes method on integrity monitoring improvement of the DGPS reference station.

Study on Development of HDD Integrity Verification System using FirmOS (FirmOS를 이용한 HDD 무결성 검사 시스템 개발에 관한 연구)

  • Yeom, Jae-Hwan;Oh, Se-Jin;Roh, Duk-Gyoo;Jung, Dong-Kyu;Hwang, Ju-Yeon;Oh, Chungsik;Kim, Hyo-Ryoung;Shin, Jae-Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.18 no.2
    • /
    • pp.55-61
    • /
    • 2017
  • In radio astronomy, high-capacity HDDs are being used to save huge amounts of HDDs in order to record the observational data. For VLBI observations, observational speeds increase and huge amounts of observational data must be stored as they expand to broadband. As the HDD is frequently used, the number of failures occurred, and then it takes a lot of time to recover it. In addition, if a failed HDD is continuously used, observational data loss occurs. And it costs a lot of money to buy a new HDD. In this study, we developed the integrity verification system of the Serial ATA HDD using FirmOS. The FirmOS is an OS that has been developed to function exclusively for specific purposes on a system having a general server board and CPU. The developed system performs the process of writing and reading specific patterns of data in a physical area of the SATA HDD based on a FirmOS. In addition, we introduced a method to investigate the integrity of HDD integrity by comparing it with the stored pattern data from the HDD controller. Using the developed system, it was easy to determine whether the disk pack used in VLBI observations has error or not, and it is very useful to improve the observation efficiency. This paper introduces the detail for the design, configuration, testing, etc. of the SATA HDD integrity verification system developed.

  • PDF

Design and Implementation of eBook Annotation System using Ontology (온톨로지를 이용한 eBook Annotation 시스템의 설계 및 구현)

  • 신성욱;김종석;고승규;임순범;최윤철
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.11b
    • /
    • pp.211-215
    • /
    • 2002
  • 본 연구에서는 온라인 다중 사용자 환경의 eBook annotation 시스템 개발에서 데이터를 의미 기반으로 관리하고, 데이터에 대하여 상호 공통적인 이해를 표현하며, 그리고 데이터에 대한 무결성 검사 등을 지원하기 위해서 eBook annotation 온톨로지를 설계하였다. eBook annotation 데이터에 대한 상호 공통적인 이해의 표현을 위해서 한국 전자책 문서 표준인 EBKS(Electronic Book of Korea Standard)를 기반으로 설계 하였으며 설계 된 온톨로지는 Conceptual Graph(CG)를 사용하여 표현하였다. 의미 기반의 처리를 위해서 본 온톨로지에서는 동의어(synonym) 관계와 다국어(multilingua) 관계를 고려하였으며 또한 annotation 데이터 생성시 오류 방지와 중요도를 표현 하기 위해서 무결성 검사, 중요성 axiom을 고려 했다. 제안된 온톨로지는 annotation 데이터의 재사용성을 높일 수 있고 의미 정보를 활용함으로써 eLearning, cyberclass과 같은 다중사용자 환경에서 효과적인 협업을 가능하게 한다. 본 연구에서 구현한 eBook annotation 시스템은 설계한 온톨로지를 이용함으로써 의미 기반의 데이터 관리가 가능하다. 또한 annotation 생성 시 온톨로지 구조를 모르더라도 annotation을 생성할 수 있는 인터페이스를 구현하였다.

  • PDF

Video Integrity Checking Scheme by Using Merkle Tree (머클트리를 활용한 영상무결성 검사 기법 )

  • Yun-Hee Kang;Eun-Young CHANG;Taeun Kwonk
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.39-46
    • /
    • 2022
  • Recently, digital contents including video and sound are created in various fields, transmitted to the cloud through the Internet, and then stored and used. In order to utilize digital content, it is essential to verify data integrity, and it is necessary to ensure network bandwidth efficiency of verified data. This paper describes the design and implementation of a server that maintains, manages, and provides data for verifying the integrity of video data. The server receives and stores image data from Logger, a module that acquires image data, and performs a function of providing data necessary for verification to Verifier, a module that verifies image data. Then, a lightweight Merkle tree is constructed using the hash value. The light-weight Merkle tree can quickly detect integrity violations without comparing individual hash values of the corresponding video frame changes of the video frame indexes of the two versions. A lightweight Merkle tree is constructed by generating a hash value of digital content so as to have network bandwidth efficiency, and the result of performing proof of integrity verification is presented.

A Design and Implementation of GUI-based TDL compiler (GUI 환경하에서 구동되는 TDL 컴파일러의 설계 및 구현)

  • 전상은;김성원;안일환;이호석;김우성
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10c
    • /
    • pp.252-254
    • /
    • 1998
  • 본 연구는 반도체 검사 장비를 국산화하는 프로젝트의 일환 중에서 메모리 칩의 무결성을 검사하는데 사용되는 메모리 테스트 장비의 소프트웨어 개발에 중점을 둔 것이다. 기존에 발표된 프로그램은 자체 개발된 것 없이 외국의 프로그램을 들여와 단지 운영만을 하는 수준이었다. 더욱이 프로그램들도 text모드 하에서만 구동되는 프로그램이었다. 하지만, 본 연구에서는 새로운 컴퓨팅 환경에서 운영될 수 있도록 윈도우즈 하에서 GUI(Graphic User Interface)에 기반한 새로운 TDL 컴파일러를 개발하였다. 개발된 프로그램은 Test Data를 기술하는데 더 효과적이었으며 오류를 검사하고 수정하는데도 큰 효과를 가져다 주었다.

  • PDF

An Algorithm for Referential Integrity Relations Extraction using Similarity Comparison of RDB (유사성 비교를 통한 RDB의 참조 무결성 관계 추출 알고리즘)

  • Kim, Jang-Won;Jeong, Dong-Won;Kim, Jin-Hyung;Baik, Doo-Kwon
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.3
    • /
    • pp.115-124
    • /
    • 2006
  • XML is rapidly becoming technologies for information exchange and representation. It causes many research issues such as semantic modeling methods, security, conversion far interoperability with other models, and so on. Especially, the most important issue for its practical application is how to achieve the interoperability between XML model and relational model. Until now, many suggestions have been proposed to achieve it. However several problems still remain. Most of all, the exiting methods do not consider implicit referential integrity relations, and it causes incorrect data delivery. One method to do this has been proposed with the restriction where one semantic is defined as only one same name in a given database. In real database world, this restriction cannot provide the application and extensibility. This paper proposes a noble conversion (RDB-to-XML) algorithm based on the similarity checking technique. The key point of our method is how to find implicit referential integrity relations between different field names presenting one same semantic. To resolve it, we define an enhanced implicity referentiai integrity relations extraction algorithm based on a widely used ontology, WordNet. The proposed conversion algorithm is more practical than the previous-similar approach.

  • PDF

Effective Comparison of Indirect Branch Addresses for Checking Control-flow Integrity (제어 흐름 무결성 검증을 위한 간접 분기 주소의 효과적인 비교)

  • Kim, Tae-Hwan;Seong, In-Hyeong;Han, Kyung-Sook;Pyo, Chang-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.86-88
    • /
    • 2012
  • 코드 포인터 공격을 이용한 제어 흐름은 실행 중에 간접 분기의 무결성을 검사하는 것으로 보호할 수 있다. 간접 분기는 반복되는 목적지 주소로의 분기인 경우가 많지만, 목적지 주소는 실행 시간에만 알 수 있기 때문에 여러 가지 예외적인 상황을 적절히 대처할 방법이 필요하다. 본 논문에서는 동적 이진 계측화를 활용하여 실행 중 발생하는 간접 분기를 분석하고, 수집한 주소들을 빠르게 비교하는데 효과적인 주소 비교 기법들을 제시한다. 또한 각 기법을 비교하여 프로그램에 따라 주소 비교의 효율성을 극대화하는 방안을 모색하였다. 이러한 기법을 통해 간접 분기가 야기하는 여러 문제점에서부터 보안 분야에 이르기 까지 활용 범위를 넓힐 수 있을 것으로 기대한다.