• Title/Summary/Keyword: 비개인화

Search Result 637, Processing Time 0.025 seconds

Design of Source Code Obfuscation Tool based LLVM to improve security in Embedded System (임베디드 시스템의 보안성 향상을 위한 LLVM 기반의 소스코드 난독화 도구 설계)

  • Ha, Jae-Hyun;Kawk, Donggyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.201-203
    • /
    • 2022
  • 임베디드 시스템이 일상생활 및 각종 산업에 밀접하게 연관되어 개인 정보 및 국가 기술 등 지적 자산에 대한 보안의 필요성이 나타나고 있다. 이러한 문제점은 임베디드 시스템에 들어가는 소프트웨어의 역공학으로부터 초래된다. 따라서 본 논문은 소스 코드에 대해 제어 흐름 평탄화라는 난독화 알고리즘을 설계하는 방법을 제안한다. 이는 독자적으로 작성된 난독화 알고리즘이기 때문에 오픈 소스로 공개되어져 있는 다른 난독화 도구들에 비해 안전한 특징을 가진다. 제어 흐름 평탄화는 프로그램의 기능을 유지하면서 소스 코드의 정적 분석을 어렵게 하는 기법으로, 데이터를 탈취하려는 악의적인 행위를 사전에 예방할 수 있다. 본 논문에서 제안하는 제어 흐름 평탄화 알고리즘은 하나의 기본 블록으로 이루어진 단순한 소스 코드를 여러 개의 기본 블록으로 분할하고, 조건문을 통해 연결하는 방법을 사용하여 알고리즘의 복잡도를 높였다. 이처럼 새롭게 작성된 Pass를 통해 소스코드 난독화를 적용시켜 임베디드 시스템의 보안성을 향상시킬 수 있다.

창업자의 특성이 창업기업의 비재무적 성과에 미치는 영향에 관한 연구: 창업팀 역량의 조절효과를 중심으로

  • Eom, Seung-Gwon;Hwang, Bo-Yun
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2019.04a
    • /
    • pp.167-170
    • /
    • 2019
  • 최근에는 거의 모든 분야에서 ICT와 같은 기술기반 산업과의 융합을 통한 창업현상이 두드러지고 있어, 이들을 대상으로 한 연구는 개인 수준뿐만 아니라 팀 수준의 특성을 함께 살펴보는 것이 더 현실적인 상황을 반영하고 실무적인 시사점을 제공해 줄 것으로 판단된다. 팀창업일 경우 기업의 성과는 개인-팀 역량의 혼합 결과로 볼 수 있기 때문이다. 기존 선행연구에서는 창업기업의 성공과 실패를 가름하는 다양한 요인들을 제시해왔으나, 이러한 요인은 창업자의 개인적 특성, 보유하고 있는 자원 등에서 찾는 선행연구가 대부분이다. 관련 연구들을 종합하면 창업기업의 성장은 창업가 특성, 자원, 전략, 산업, 그리고 조직 구조 및 시스템의 함수로 정리된다. 그러나 창업팀에 대한 연구는 제한적이다. 이에 본 연구는 초기 창업기업의 성과에 영향을 미치는 핵심 요인으로 창업가의 특성인 창업역량(entrepreneurial competency)에 초점을 두고, 창업팀의 역량에 따라 어떠한 영향을 미치는 살펴본다. 개인의 특성에 집중해온 기존 연구에서 더 나아가 창업역량의 영향력을 창업가 개인 수준 및 팀 수준으로 구분하여 함께 살펴보고자 한다. 본 연구 결과를 통해 예비 창업가 및 초기 창업기업이 안정적인 사업화를 위해 팀구성을 어떻게 해야하는지 가이드라인을 제시할 수 있을 것으로 기대된다. 또한, 정부 지자체 민간 등에서 창업지원사업 운영 시 팀구성이 잘 된 창업기업을 선발하는 기준을 수립하기 위한 참고자료로 활용될 수 있을 것으로 기대된다.

  • PDF

Improvement of Personal Information Protection Laws in the era of the 4th industrial revolution (4차 산업혁명 시대의 개인정보보호법제 개선방안)

  • Choi, Kyoung-jin
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.177-211
    • /
    • 2017
  • In the course of the emergence and development of new ICT technologies and services such as Big Data, Internet of Things and Artificial Intelligence, the future will change by these new innovations in the Fourth Industrial Revolution. The future of this fourth industrial revolution will change and our future will be data-based society or economy. Since there is personal information at the center of it, the development of the economy through the utilization of personal information will depend on how to make the personal information protection laws. In Korea, which is trying to lead the 4th industrial revolution, it is a legal interest that can not give up the use of personal information, and also it is an important legal benefit that can not give up the personal interests of individuals who want to protect from personal information. Therefore, it is necessary to change the law on personal information protection in a rational way to harmonize the two. In this regard, this article discusses the problems of duplication and incompatibility of the personal information protection law, the scope of application of the personal information protection law and the uncertainty of the judgment standard, the lack of flexibility responding to the demand for the use of reasonable personal information, And there is a problem of reverse discrimination against domestic area compared to the regulated blind spot in foreign countries. In order to solve these problems and to improve the legislation of personal information protection in the era of the fourth industrial revolution, we proposed to consider both personal information protection and safe use by improving the purpose and regulation direction of the personal information protection law. The balance and harmony between the systematical maintenance of the personal information protection legislation and laws and regulations were also set as important directions. It is pointed out that the establishment of rational judgment criteria and the legislative review to clarify it are necessary for the constantly controversial personal information definition regulation and the method of allowing anonymization information as the intermediate domain. In addition to the legislative review for the legitimate and non-invasive use of personal information, there is a need to improve the collective consent system for collecting personal information to differentiate the subject and to improve the legislation to ensure the effectiveness of the regulation on the movement of personal information between countries. In addition to the issues discussed in this article, there may be a number of challenges, but overall, the protection and use of personal information should be harmonized while maintaining the direction indicated above.

Development of Time Lag Considered (TLC) Crowd Load Model Based on Probabilistic Approach (개인별 시간지연효과를 고려한 확률론적 군중 하중모형 개발)

  • Kim, Sung-Yong;Lee, Cheol-Ho
    • Journal of Korean Society of Steel Construction
    • /
    • v.24 no.1
    • /
    • pp.1-11
    • /
    • 2012
  • To overcome the limitations of current evaluation procedures for floor vibration under crowd loading, two kinds of uncertainties associated with individual time lag differences and the complex behavior of crowd should be taken into account. The complex behavior of crowds has yet to be fully described, even though individual differences can be dealt with statistically. This paper proposes time lag considered (TLC) crowd model based on a probabilistic approach. The load reduction factor, which reflects the effect of a general degree of synchronization among crowd, is proposed. Extensive Monte Carlo simulations were carried out to determine various crowd behaviors by using the TLC crowd model proposed. The TLC crowd model can rationally treat the energy loss of various crowd patterns. This indicates that it may be used as a theoretical basis in refining dynamic load factor of crowd loading.

A Study on the Use of Criminal Justice Information Big Data in terms of the Structuralization and Categorization (형사사법정보의 빅데이터 활용방안 연구: 구조화 범주화 관점으로)

  • Kim, Mi Ryung;Roh, Yoon Ju;Kim, Seonghun
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.4
    • /
    • pp.253-277
    • /
    • 2019
  • In the era of the 4th Industrial Revolution, the importance of data is intensifying, but there are many cases where it is not easy to use data due to personal information protection. Although criminal justice information is expected to have various useful values such as crime prediction and prevention, scientific investigation of criminal investigations, and rationalization of sentencing, the use of criminal justice information is currently limited as a matter of legal interpretation related to privacy protection and criminal justice information. This study proposed to convert criminal justice information into 'crime data' and use it as big data through the structuralization and categorization of criminal justice information. And when using "crime data," legal issues, value in use, considerations for data generation and use were verified by experts, and future strategic development plans were identified. Finally we found that 'crime data' seems to have solved the privacy problem, but it is necessary to specify in the criminal justice information related law and it is urgent to be organized in a standardized form for analysis to use big data. Future directions are to derive data elements, construct a dictionary thesaurus, define and classify personal sensitive information for data grading, and develop algorithms for shaping unstructured data.

Intelligent Broadcasting System and Services for Personalized Semantic Contents Consumption (개인화된 의미 기반 콘텐츠 소비를 위한 지능형 방송 시스템과 서비스)

  • Jin, Sung Ho;Cho, Jun Ho;Ro, Yong Man;Kim, Jae-Gon
    • Journal of Broadcast Engineering
    • /
    • v.10 no.3
    • /
    • pp.422-435
    • /
    • 2005
  • Compared with analog broadcasting, digital broadcasting supports technical background to provide personalize the TV watching environment by offering broadcasting services that can adapt to viewers' preferences. However, current digital broadcasting shows limited services such as reservation recording, simple program guiding with an electronic program guide (EPG) on a personal video recorder system, and primitive data broadcasting by broadcasters. Therefore, the purpose of this paper is to suggest a new broadcasting environment which gives a person facility and a difference fur watching TV by serving enhanced personalized services. For that reason, we propose an intelligent broadcasting system which can minimize viewer's actions, and enhanced broadcasting services which are based on understanding of the semantics of broadcasting contents. To implement the system, agent technology as well as the MPEG-7 and TV-Anytime Forum (TVAF) are employed. For content-level services, real-time content filtering and personalized video skimming are designed and implemented. To verify the usefulness of the proposed system, we demonstrate it with a test-bed on which content-level personalized services are implemented.

Quantified Lockscreen: Integration of Personalized Facial Expression Detection and Mobile Lockscreen application for Emotion Mining and Quantified Self (Quantified Lockscreen: 감정 마이닝과 자기정량화를 위한 개인화된 표정인식 및 모바일 잠금화면 통합 어플리케이션)

  • Kim, Sung Sil;Park, Junsoo;Woo, Woontack
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1459-1466
    • /
    • 2015
  • Lockscreen is one of the most frequently encountered interfaces by smartphone users. Although users perform unlocking actions every day, there are no benefits in using lockscreens apart from security and authentication purposes. In this paper, we replace the traditional lockscreen with an application that analyzes facial expressions in order to collect facial expression data and provide real-time feedback to users. To evaluate this concept, we have implemented Quantified Lockscreen application, supporting the following contributions of this paper: 1) an unobtrusive interface for collecting facial expression data and evaluating emotional patterns, 2) an improvement in accuracy of facial expression detection through a personalized machine learning process, and 3) an enhancement of the validity of emotion data through bidirectional, multi-channel and multi-input methodology.

A Study of Individual Differences across Numerosity Sensitivity, Visual Working Memory and Visual Attention (수량민감도와 시각작업기억 및 시각적 주의 간 개인차 연구)

  • Kim, Giyeon;Cho, Soohyun;Hyun, Joo-Seok
    • Science of Emotion and Sensibility
    • /
    • v.18 no.2
    • /
    • pp.3-18
    • /
    • 2015
  • Numerosity perception is considered as an innate ability of human being where its sensivitiy may widely vary across each individual person. The present study explored the relationship between visual working memory (VWM), visual search efficiency, and numerosity sensitivity. To accomplish this, we calculated each participant's K-value from change detection performance representing one's storage capacity in VWM, slopes of search RTs representing the search efficiency, and discrimination sensitivity for a quantity difference across two sets of dot arrays representing the numerosity sensitivity. The correlational analysis across the measurements revealed that participants with a high VWM capacity better discriminated the numerosity difference in the arrays when the spatial information in the two dot arrays was preserved. In contrast, the participants with high search efficiency discriminated better the difference in the arrays when the spatial information in the arrays was not preserved. The results indicate high VWM-capacity individuals were presumably able to use a strategy of storing the dot arrays by grouping them into a smaller pattern of dot arrays while high search-efficiency individuals were able to use a strategy of rapidly switching their focused attention across the dots in the arrays to count each individual dot. These in sum suggest that individual differences in numerosity sensitivity rely on one's working memory capacity as well as their efficient use of switching focused attention.

Subject Matter in Lee Chang-Dong's Film (이창동 영화에 표현된 개인)

  • Chae, Heeju;Min, Kyungwon
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.122-129
    • /
    • 2015
  • Director Lee Chang-dong's movies deal mainly with the matter of subject as a human individual. He attempts to show how the subject as a human individual is structured in society through the characters in the movies. It can be seen that a considerable part of this is connected to the matter of subject which is maintained by Michel Foucault, a modern French philosopher. Foucault contends that the subject has lost its identity in the huge structure of society and has become the object. The subject is alienated within the power. The subject is also divided into normality and abnormality in the social structure. Particularly, the movie directed by Lee Chang-dong shows an individual containing consideration toward self and Foucault also showed his attempts in his later years to newly interpret the subject in the context of consideration toward self. Through this thesis, I attempt to examine the matter of the subject that the film director Lee Chang-dong and Foucault have in common.

De-Identified Face Image Generation within Face Verification for Privacy Protection (프라이버시 보호를 위한 얼굴 인증이 가능한 비식별화 얼굴 이미지 생성 연구)

  • Jung-jae Lee;Hyun-sik Na;To-min Ok;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.201-210
    • /
    • 2023
  • Deep learning-based face verificattion model show high performance and are used in many fields, but there is a possibility the user's face image may be leaked in the process of inputting the face image to the model. Althoughde-identification technology exists as a method for minimizing the exposure of face features, there is a problemin that verification performance decreases when the existing technology is applied. In this paper, after combining the face features of other person, a de-identified face image is created through StyleGAN. In addition, we propose a method of optimizingthe combining ratio of features according to the face verification model using HopSkipJumpAttack. We visualize the images generated by the proposed method to check the de-identification performance, and evaluate the ability to maintain the performance of the face verification model through experiments. That is, face verification can be performed using the de-identified image generated through the proposed method, and leakage of face personal information can be prevented.