• Title/Summary/Keyword: 바이너리 시스템

Search Result 120, Processing Time 0.029 seconds

Implementation of the Fast XML Encoding System for Fast Web Services (Fast 웹서비스를 위한 Fast XML 인코딩 시스템 구현)

  • Choi, Bong-Kyu;Cho, Tae-Beom;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.800-807
    • /
    • 2007
  • Web services came true a services integration, but the XML document decreases the efficiency or the whole application program with connects frequently in relatively slow communication media like network environment embedded system or use the resource limited small-sized instrument like mobile. Thereupon, ITU-T and ISO/IEC suggested encoding standard of binary XML. In this paper, implementation, of Fast XML encoding system through introduction Fast Infoset algorithm and Fast Schema algorithm for web services increase performance. And, offered of test bed that build of Fast Web Services system through Fast XML Encoder.

An Anti-Forensic Technique for Hiding Data in NTFS Index Record with a Unicode Transformation (유니코드 변환이 적용된 NTFS 인덱스 레코드에 데이터를 숨기기 위한 안티포렌식 기법)

  • Cho, Gyu-Sang
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.75-84
    • /
    • 2015
  • In an "NTFS Index Record Data Hiding" method messages are hidden by using file names. Windows NTFS file naming convention has some forbidden ASCII characters for a file name. When inputting Hangul with the Roman alphabet, if the forbidden characters for the file name and binary data are used, the codes are convert to a designated unicode point to avoid a file creation error due to unsuitable characters. In this paper, the problem of a file creation error due to non-admittable characters for the file name is fixed, which is used in the index record data hiding method. Using Hangul with Roman alphabet the characters cause a file creation error are converted to an arbitrary unicode point except Hangul and Roman alphabet area. When it comes to binary data, all 256 codes are converted to designated unicode area except an extended unicode(surrogate pairs) and ASCII code area. The results of the two cases, i.e. the Hangul with Roman alphabet case and the binary case, show the applicability of the proposed method.

Binary Power plant using unused thermal energy and Neural Network Controllers (미활용 열에너지를 이용한 바이너리 발전과 신경망 제어)

  • Han, Kun-Young;Park, Sung-Dae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1302-1309
    • /
    • 2021
  • Recently, the Korean Government announced the Korean New Deal as a national development strategy to overcome the economic recession from the pandemic crisis and lead the global action against structural changes. In the Korean New Deal, the Green New Deal related with the energy aims to achieve net-zero emissions and accelerates the transition towards a low-carbon and green economy. To this end, the government plans to promote an increased use of renewable energy in the society at large. This paper introduces a binary power generation using unused low-grade thermal energy to accelerate the transition towards a low-carbon and green economy and examines a control system based on Neural Network which is capable maintenance at low-cost by an unmanned automated operation in actual power generation environment. It is expected that the realization of binary power generation accelerates introduction of renewable energy along with solar and wind power.

Requirements for Improvement in Transmission Performance for an Optical Delay Interferometer based Optical Duobinary Transmitters (광 간섭계를 이용한 광 듀오바이너리 송신기의 전송 성능 향상에 관한 조건 연구)

  • Lee, Dong-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.119-123
    • /
    • 2010
  • The transmission performance of 10Gb/s optical duobinary transmitters implemented by using a Mach-Zehnder(MZ) modulator and an optical delay interferometer is presented. We investigated the theoretical impact of transmission systems by the modulator driving voltage ratio(=driving voltage/switching voltage) and the optical interferometer time delay to improve transmission distance using computer simulation. By reducing the driving voltage ratio and optimizing the partial bit time delay, the transmission performance has been improved greatly.

A Meta-data Generation Technique for Efficient Code Reuse Attack Detection (효율적인 Code Reuse Attack 탐지를 위한 Meta-data 생성 기술)

  • Han, Sangjun;Heo, Ingoo;Paek, Yunheung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.04a
    • /
    • pp.502-505
    • /
    • 2014
  • 최근 들어, 모바일 기기의 시스템을 장악하여 중요 정보를 빼내는 등의 악성 행위를 위해 Code Reuse Attack (CRA) 이 널리 사용되고 있다. 이러한 CRA 를 막기 위한 방법으로 branch 의 trace 를 분석하여 CRA 고유의 특성을 찾아내는 Signature 기반 탐지 기술이 있다. 이러한 탐지 기술을 효율적으로 지원하기 위하여, 본 논문에서는 ARM 프로세서용 바이너리를 분석하여, signature 분석을 위해 필수적으로 분석되어야 하는 gadget 의 크기를 빠르게 접근할 수 있는 meta-data 를 생성하는 기술을 제안한다. 이러한 meta-data 를 활용하는 방식은 gadget 의 크기를 계산하는 추가적인 코드의 수행을 제거해 주므로, 더욱 효율적으로 CRA 를 탐지할 수 있도록 도와준다. 실험 결과, 이러한 meta-data 는 본래의 바이너리 코드 대비 9% 만의 크기 증가를 일으키는 것으로 나타났다.

Dynamic Monitoring Framework and Debugging System for Embedded Virtualization System (가상화 환경에서 임베디드 시스템을 위한 모니터링 프레임워크와 디버깅 시스템)

  • Han, Inkyu;Lim, Sungsoo
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.12
    • /
    • pp.792-797
    • /
    • 2015
  • Effective profiling diagnoses the failure of the system and informs risk. If a failure in the target system occurs, it is impossible to diagnose more than one of the exiting tools. In this respect, monitoring of the system based on virtualization is useful. We present in this paper a monitoring framework that uses the characteristics of hardware virtualization to prevent side-effects from a target guest, and uses dynamic binary instrumentation with instruction-level trapping based on hardware virtualization to achieve efficiency and flexibility. We also present examples of some applications that use this framework. The framework provides tracing of guest kernel function, memory dump, and debugging that uses GDB stub with GDB remote protocol. The experimental evaluation of our prototype shows that the monitoring framework incurs at most 2% write memory performance overhead for end users.

A Multimedia Mail System using IMAP Protocol (IMAP 프로토콜을 이용한 멀티미디어 메일 시스템)

  • Lee, Bong-Hwan;Park, Mun-Ho;Lee, Ha-Uk;Ju, Gi-Ho;Lee, Chan-Do;Lee, Nam-Jun;Sim, Yeong-Jin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.5
    • /
    • pp.1297-1307
    • /
    • 1997
  • This paper presents a multimedia mail system which transmit and redeive multimedia mailing messges on Intemet.This mail system is an extension of the exsting e-mail system for multimedia uncluding,text,image,MPEG video,and binary data,The MIME(Multipurpose Intert Mail Extensions)format,which is an extension of REF-822 maill format,is used to reprssent multimedia,and SMTP(Simple Mail Transfer Protocol)is utilized as a mail transport prttocol.The IMAP(Intenet Mail Access Protcol)which privides more functions than the widely used POP(Post Office Protocol)is used as a mailbox retrival protocol.The mail client is complemented on a multimedia PC while the server is implemented on a UNIX system.In the mail system, a mail sending program allows a user to attach binary files such as Postscript files and MPEG compressed video,while a receiving program provides direct interface to application programs to play back received multimedia mail messages.

  • PDF

Cryptography Module Detection and Identification Mechanism on Malicious Ransomware Software (악성 랜섬웨어 SW에 사용된 암호화 모듈에 대한 탐지 및 식별 메커니즘)

  • Hyung-Woo Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Cases in which personal terminals or servers are infected by ransomware are rapidly increasing. Ransomware uses a self-developed encryption module or combines existing symmetric key/public key encryption modules to illegally encrypt files stored in the victim system using a key known only to the attacker. Therefore, in order to decrypt it, it is necessary to know the value of the key used, and since the process of finding the decryption key takes a lot of time, financial costs are eventually paid. At this time, most of the ransomware malware is included in a hidden form in binary files, so when the program is executed, the user is infected with the malicious code without even knowing it. Therefore, in order to respond to ransomware attacks in the form of binary files, it is necessary to identify the encryption module used. Therefore, in this study, we developed a mechanism that can detect and identify by reverse analyzing the encryption module applied to the malicious code hidden in the binary file.

Compact Binary Power plant using unused thermal energy and Neural Network Controllers (미이용 열에너지를 이용한 소형 바이너리 발전과 신경망 제어기)

  • Han, Kun-Young;Jeong, Seok-Chan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.557-560
    • /
    • 2021
  • In the face of the COVID-19 pandemic, the Korean Government announced the Korean New Deal as a national development strategy to overcome the economic recession from the pandemic crisis and lead the global action aginst sturctural changes. The Green New Deal related with the energy aims to achieve net-zero emissions and accelerates the transition towards a low-carbon and green economy. To this end, the government plans to promete an increased use of renewable energy in the the society at large. This paper introduces a compact-binary power plant using unused thermal energy and a control system based on Neural Network in order to accelerate the transition towards a low-carbon and green economy. It is expected that he compact-binary power plant accelerate introduction of renewable energy along with solar and wind power.

  • PDF

Study of Static Analysis and Ensemble-Based Linux Malware Classification (정적 분석과 앙상블 기반의 리눅스 악성코드 분류 연구)

  • Hwang, Jun-ho;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1327-1337
    • /
    • 2019
  • With the growth of the IoT market, malware security threats are steadily increasing for devices that use the linux architecture. However, except for the major malware causing serious security damage such as Mirai, there is no related technology or research of security community about linux malware. In addition, the diversity of devices, vendors, and architectures in the IoT environment is further intensifying, and the difficulty in handling linux malware is also increasing. Therefore, in this paper, we propose an analysis system based on ELF which is the main format of linux architecture, and a binary based analysis system considering IoT environment. The ELF-based analysis system can be pre-classified for a large number of malicious codes at a relatively high speed and a relatively low-speed binary-based analysis system can classify all the data that are not preprocessed. These two processes are supposed to complement each other and effectively classify linux-based malware.