• Title/Summary/Keyword: 발견과 증명

Search Result 260, Processing Time 0.028 seconds

A Study on Tainting Technique for leaking official certificates Malicious App Detection in Android (공인인증서 유출형 안드로이드 악성앱 탐지를 위한 Tainting 기법 활용 연구)

  • Yoon, Hanj Jae;Lee, Man Hee
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.27-35
    • /
    • 2018
  • The certificate is electronic information issued by an accredited certification body to certify an individual or to prevent forgery and alteration between communications. Certified certificates are stored in PCs and smart phones in the form of encrypted files and are used to prove individuals when using Internet banking and smart banking services. Among the rapidly growing Android-based malicious applications are malicious apps that leak personal information, especially certificates that exist in the form of files. This paper proposes a method for judging whether malicious codes leak certificates by using DroidBox, an Android-based dynamic analysis tool.

  • PDF

Characteristics of Jacket Matrix for Communication Signal Processing (통신신호처리를 위한 Jacket 행렬의 특성(特性))

  • Lee, Moon-Ho;Kim, Jeong-Su
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.103-109
    • /
    • 2021
  • About the orthogonal Hadamard matrix announced by Hadamard in France in 1893, Professor Moon Ho Lee newly defined it as Center Weight Hadamard in 1989 and announced it, and discovered the Jacket matrix in 1998. The Jacket matrix is a generalization of the Hadamard matrix. In this paper, we propose a method of obtaining the Symmetric Jacket matrix, analyzing important properties and patterns, and obtaining the Jacket matrix's determinant and Eigenvalue, and proved it using Eigen decomposition. These calculations are useful for signal processing and orthogonal code design. To analyze the matrix system, compare it with DFT, DCT, Hadamard, and Jacket matrix. In the symmetric matrix of Galois Field, the element-wise inverse relationship of the Jacket matrix was mathematically proved and the orthogonal property AB=I relationship was derived.

Run-to-Run Fault Detection of Reactive Ion Etching Using Support Vector Machine (Support Vector Machine을 이용한 Reactive ion Etching의 Run-to-Run 오류검출 및 분석)

  • Park Young-Kook;Hong Sang-Jeen;Han Seung-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.962-969
    • /
    • 2006
  • To address the importance of the process fault detection for productivity, support vector machines (SVMs) is employed to assist the decision to determine process faults in real-time. The reactive ion etching (RIE) tool data acquired from a production line consist of 59 variables, and each of them consists of 10 data points per second. Principal component analysis (PCA) is first performed to accommodate for real-time data processing by reducing the dimensionality or the data. SVMs for eleven steps or etching m are established with data acquired from baseline runs, and they are further verified with the data from controlled (acceptable) and perturbed (unacceptable) runs. Then, each SVM is further utilized for the fault detection purpose utilizing control limits which is well understood in statistical process control chart. Utilizing SVMs, fault detection of reactive ion etching process is demonstrated with zero false alarm rate of the controlled runs on a run to run basis.

Fault Detection of Reactive Ion Etching Using Time Series Support Vector Machine (Time Series Support Vector Machine을 이용한 Reactive Ion Etching의 오류검출 및 분석)

  • Park Young-Kook;Han Seung-Soo;Hong Sang-J.
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.247-250
    • /
    • 2006
  • Maximizing the productivity in reactive ion etching, early detection of process equipment anomaly became crucial in current high volume semiconductor manufacturing environment. To address the importance of the process fault detection for productivity, support vector machines (SVMs) is employed to assist the decision to determine process faults in real-time. SVMs for eleven steps of etching runs are established with data acquired from baseline runs, and they are further verified with the data from controlled (acceptable) and perturbed (unacceptable) runs. Then, each SVM is further utilized for the fault detection purpose utilizing control limits which is well understood in statistical process control chart. Utilizing SVMs, fault detection of reactive ion etching process is demonstrated with zero false alarm rate of the controlled runs on a run to run basis.

  • PDF

Proving Causation With Epidemiological Evidence in Tobacco Lawsuits (담배소송에서 역학적 증거에 의한 인과관계의 증명에 관한 소고)

  • Lee, Sun Goo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.49 no.2
    • /
    • pp.80-96
    • /
    • 2016
  • Recently, a series of lawsuits were filed in Korea claiming tort liability against tobacco companies. The Supreme Court has already issued decisions in some cases, while others are still pending. The primary issue in these cases is whether the epidemiological evidence submitted by the plaintiffs clearly proves the causal relationship between smoking and disease as required by civil law. Proving causation is difficult in tobacco lawsuits because factors other than smoking are involved in the development of a disease, and also because of the lapse of time between smoking and the manifestation of the disease. The Supreme Court (Supreme Court Decision, 2011Da22092, April 10, 2014) has imposed some limitations on using epidemiological evidence to prove causation in tobacco lawsuits filed by smokers and their family members, but these limitations should be reconsidered. First, the Court stated that a disease can be categorized as specific or non-specific, and for each disease type, causation can be proven by different types of evidence. However, the concept of specific diseases is not compatible with multifactor theory, which is generally accepted in the field of public health. Second, when the epidemiological association between the disease and the risk factor is proven to be significant, imposing additional burdens of proof on the plaintiff may considerably limit the plaintiff's right to recovery, but the Court required the plaintiffs to provide additional information such as health condition and lifestyle. Third, the Supreme Court is not giving greater weight to the evidential value of epidemiological study results because the Court focuses on the fact that these studies were group-level, not individual-level. However, group-level studies could still offer valuable information about individual members of the group, e.g., probability of causation.

The Role of Trivalent Chromium as a Supplement (3가 크롬의 보조제로서의 역할)

  • 박형숙;강영희
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.33 no.4
    • /
    • pp.762-768
    • /
    • 2004
  • Chromium has been known to be involved in the glucose metabolism, and hence the utilization of cellular glucose is impaired in the chromium deficiency. Chromium has been recognized as an essential nutrient since the finding of low-molecular-weight Cr-binding substance (LMWCr) as a biological modifier of insulin action. Clinical chromium deficiency associated with glucose intolerance that respond to the administration of chromium. The major impediment to the use of orally administered chromium is poor absorption of trivalent chromium in its inorganic form. Trivalent chromium is more available in yeast md, more recently, as chromium picolinate for oral absorption. The widespread use of these supplements has resulted in controversy regarding chromium's role as a nutrient, its use for treatment of insulin resistance, and its potential toxicity. Most recent evidence strongly supports tile conclusion that there is little fear of toxic reactions from chromium consumption. This report reviews the evidence for the potential toxicity of chromium supplements in contrast with its usefulness as a nutrient or therapeutic agent in the treatment or prevention of insulin resistance.

Design of 1.9GHz CMOS RF Up-conversion Mixer (1.9GHz CMOS RF Up-conversion 믹서 설계)

  • Choi, Jin-Young
    • Journal of IKEEE
    • /
    • v.4 no.2 s.7
    • /
    • pp.202-211
    • /
    • 2000
  • Utilizing the circuit simulator SPICE, we designed a 1.9GHz CMOS up-conversion mixer and explained in detail the simulation procedures including device modeling for the circuit design. Since the measured characteristics of the chip fabricated using the $0.5{\mu}m$ standard CMOS process had shown a big deviation from the characteristics expected by the original simulations, we tried to figure out the proper reasons for the discrepancies. Simulations considering the discovered problems in the original simulations have shown the validity of the simulation method tried for the design. We have shown that the utilized standard CMOS process can be used for the implementation of the chip characteristics similar to those of the equivalent chip fabricated using the GaAs MESFET process.

  • PDF

A Length-based File Fuzzing Test Suite Reduction Algorithm for Evaluation of Software Vulnerability (소프트웨어 취약성 평가를 위한 길이기반 파일 퍼징 테스트 슈트 축약 알고리즘)

  • Lee, Jaeseo;Kim, Jong-Myong;Kim, SuYong;Yun, Young-Tae;Kim, Yong-Min;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.231-242
    • /
    • 2013
  • Recently, automated software testing methods such as fuzzing have been researched to find software vulnerabilities. The purpose of fuzzing is to disclose software vulnerabilities by providing a software with malformed data. In order to increase the probability of vulnerability discovery by fuzzing, we must solve the test suite reduction problem because the probability depends on the test case quality. In this paper, we propose a new method to solve the test suite reduction problem which is suitable for the long test case such as file. First, we suggested the length of test case as a measure in addition to old measures such as coverage and redundancy. Next we designed a test suite reduction algorithm using the new measure. In the experimental results, the proposed algorithm showed better performance in the size and length reduction ratio of the test suite than previous studies. Finally, results from an empirical study suggested the viability of our proposed measure and algorithm for file fuzzing.

A Meeting of Euler and Shannon (오일러(Euler)와 샤논(Shannon)의 만남)

  • Lee, Moon-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.59-68
    • /
    • 2017
  • The flower and woman are beautiful but Euler's theorem and the symmetry are the best. Shannon applied his theorem to information and communication based on Euler's theorem. His theorem is the root of wireless communication and information theory and the principle of today smart phone. Their meeting point is $e^{-SNR}$ of MIMO(multiple input and multiple output) multiple antenna diversity. In this paper, Euler, who discovered the most beautiful formula($e^{{\pi}i}+1=0$) in the world, briefly guided Shannon's formula ($C=Blog_2(1+{\frac{S}{N}})$) to discover the origin of wireless communication and information communication, and these two masters prove a meeting at the Shannon limit, It reveals something what this secret. And we find that it is symmetry and element-wise inverse are the hidden secret in algebraic coding theory and triangular function.

Discovery of Behavior Sequence Pattern using Mining in Smart Home (스마트 홈에서 마이닝을 이용한 행동 순차 패턴 발견)

  • Chung, Kyung-Yong;Kim, Jong-Hun;Kang, Un-Gu;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.19-26
    • /
    • 2008
  • With the development of ubiquitous computing and the construction of infrastructure for one-to-one personalized services, the importance of context-aware services based on user's situation and environment is being spotlighted. The smart home technology connects real space and virtual space, and converts situations in reality into information in a virtual space, and provides user-oriented intelligent services using this information. In this paper, we proposed the discovery of the behavior sequence pattern using the mining in the smart home. We discovered the behavior sequence pattern by using mining to add time variation to the association rule between locations that occur in location transactions. We can predict the path or behavior of user according to the recognized time sequence and provide services accordingly. To evaluate the performance of behavior consequence pattern using mining, we conducted sample t-tests so as to verify usefulness. This evaluation found that the difference of satisfaction by service was statistically meaningful, and showed high satisfaction.