• Title/Summary/Keyword: 시스템 콜

Search Result 177, Processing Time 0.019 seconds

발명하는 사람들-제48호

  • Han, Mi-Yeong
    • The Inventors News
    • /
    • no.48
    • /
    • pp.1-16
    • /
    • 2006
  • 축사/발명 유비쿼터스 선도하는 언론 지향/'발명하는 사람들' 창간 4주년 맞다/'발명하는 사람들' 창간 4주년을 축하합니다/반도체 공정분야 특허 출원 급증/운동화에도 웰빙 바람/공기청정기 특허출원 꾸준한 증가/차세대 반도체 특허, 회로.응용 분야에 집중/맥주, 이제 병이 아닌 플라스틱 용기에/특허고객콜센터, 품질인증 획득/특허청,'찾아가는 특허검색서비스' 제공/직무발명보상 개정법 관련 세미나/'쟁점별 특허소송 가이드북'제작/특허청 연구회, 고객감동 경영의 밑거름/한국특허정보원,2006 한국서비스대상 공공부문 대상 수상/현대차, 특허침해 찾으면 로열티 10% 지급/나이키 짝퉁, 한해 3백60만 켤레 적발/특허청, 자동차부품연구원과 업무협약/휴대용 포토 프린터 특허 출원 증가/역사 속의 발명품/하루 10분 발명교실/특허Q&A/한국여성발명협회 13년 발자취/미니인터뷰/이공계 대학교수 대상 특허정보 세미나 개최/실용신안 등록출원, 우선심사 대상 확대/자료 수집을 소홀히 마라/특허청 간부진, 고객 현장 속으로/삼성, 중국 저명상표로/포스코, 특허시스템 가동/도미다의 원너 커트/월마트, 짝퉁 '펜디' 판매로 망신살/일본, '지적재산권 입국' 계획 마련/미국-유럽연합, 짝퉁 퇴치 나선다/특허청, 자체 브랜드 '특허로' 첫상표출원/인청 부평지식재산센터, 발명가 초청강연회 개최/'2006 피츠버그 국제전' 에서 국내 발명가 수상/세계 최고 4대 건강식품/특허법원, 책 제목 출판사 소유로/한국여성발명협회 회원사 발명품 가이드/'2006년 여대생 발명캠프'/

  • PDF

Protective Mechanism for Sensitive Data using Lightweight Process Tracking (경량화 프로세스 추적을 통한 중요 데이터 유출 방지)

  • Kang, Koo-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.33-39
    • /
    • 2009
  • As the usage of computers and mobile handsets is popularized, the processing and storing of private and business data are increased. Hence we note that these sensitive data should never be transferred out of these personal devices without user's permission. In this paper, we propose a simple method to prevent transferring the sensitive data out of personal computing devices through their networking interfaces. The proposed method determines which processes invoke open system call related to the sensitive data, and then traces them within a specific duration. The proposed scheme has advantage over the existing ones using authentication or encryption because it could be still working well independent upon the new attack technologies or the latest vulnerabilities of hardware and software. In order to verify the proposed algorithm, we test it by implementing the necessary codes at the user and kernel spaces of Linux.

Malicious Application Determination Using the System Call Event (시스템 콜 이벤트 분석을 활용한 악성 애플리케이션 판별)

  • Yun, SeokMin;Ham, YouJeong;Han, GeunShik;Lee, HyungWoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.4
    • /
    • pp.169-176
    • /
    • 2015
  • Recently smartphone market is rapidly growing and application market has also grown significantly. Mobile applications have been provided in various forms, such as education, game, SNS, weather and news. And It is distributed through a variety of distribution channels. Malicious applications deployed with malicious objectives are growing as well as applications that can be useful in everyday life well. In this study, Events from a malicious application that is provided by the normal application deployment and Android MalGenome Project through the open market were extracted and analyzed. And using the results, We create a model to determine whether the application is malicious. Finally, model was evaluated using a variety of statistical method.

Malware Classification Possibility based on Sequence Information (순서 정보 기반 악성코드 분류 가능성)

  • Yun, Tae-Uk;Park, Chan-Soo;Hwang, Tae-Gyu;Kim, Sung Kwon
    • Journal of KIISE
    • /
    • v.44 no.11
    • /
    • pp.1125-1129
    • /
    • 2017
  • LSTM(Long Short-term Memory) is a kind of RNN(Recurrent Neural Network) in which a next-state is updated by remembering the previous states. The information of calling a sequence in a malware can be defined as system call function that is called at each time. In this paper, we use calling sequences of system calls in malware codes as input for malware classification to utilize the feature remembering previous states via LSTM. We run an experiment to show that our method can classify malware and measure accuracy by changing the length of system call sequences.

A Stable Random Access Protocol For A Computer Network (안정된 컴퓨터 통신망을 위한 임의 접근 프로토콜)

  • Lee, Sang-Geon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.515-522
    • /
    • 1997
  • A neat prefect stable random access protocol for a broadcast channel,the distributed queuing random access protocol(DQRAP)is presented and evaluated.The DQRAP prootcol utilizes minisolts to provide termaty chan-nel feedback and two distributed queues to:9a) resolve contention and (b) to schedute the transmission of messages.Three minislots are sufficient to resolve collisions faster than the tranmission times of all inboled mecages.Three minislots are suffcient to resolve collisions faster than the tranmission times of all inbolved arrivals when ternary minislot feedback is used.Modelingand simulation indicate that the DQRAP protocol, using as few as three minislits,achives a performance level which approaches that of hypothetical perfect cheduling protocol,ie,the M/D/I system,with respect to propagation delay,thus offers the potential of improved performance over current protocols in satellite,metropolitan and packet radio networks.

  • PDF

Development of the Hybrid embedded IP-PBX (하이브리드 임베디드 IP-PBX 개발)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.83-89
    • /
    • 2011
  • Nowadays, Internet Telephony Services based on SIP are gaining an explosive increase for general user. Thus a various demands of the user about convenience of IP-PBX are growing. The most important requirements of these is hybrid IP telephony system which is connected not only internet telephone but also general PSTN telephone. Therefore, in this paper, we have developed Hybrid IP-PBX connected all type of telephony terminals for small office. We have developed FXS module for connecting all type and FXO for using PSTN telephone number also. This Hybrid IP-PBX that is can be connected Soft-phone provide various optional services. We measured voice quality and test simultaneous calling for proof of validity.

iCaMs: An Intelligent System for Anti Call Phishing and Message Scams (iCaMs: 안티 콜 피싱 및 메시지 사기를 위한 지능형 시스템)

  • Tran, Manh-Hung;Yang, Hui-Gyu;Dang, Thien-Binh;Choo, Hyun-Seung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.156-159
    • /
    • 2019
  • The damage from voice phishing reaches one trillion won in the past 5 years following report of Business Korea on August 28, 2018. Voice phishing and mobile phone scams are recognized as a top concern not only in Korea but also in over the world in recent years. In this paper, we propose an efficient system to identify the caller and alert or prevent of dangerous to users. Our system includes a mobile application and web server using client and server architecture. The main purpose of this system is to automatically display the information of unidentified callers when a user receives a call or message. A mobile application installs on a mobile phone to automatically get the caller phone number and send it to the server through web services to verify. The web server applies a machine learning to a global phone book with Blacklist and Whitelist to verify the phone number getting from the mobile application and returns the result.

Detecting Android Emulators for Mobile Games (Focusing on Detecting Nox and LD Player) (모바일 게임용 안드로이드 에뮬레이터 탐지 기법 (Nox와 LD Player 탐지 기법 중심으로))

  • Kim, Nam-su;Kim, Seong-ho;Pack, Min-su;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Many game and financial apps have emulator detection functionality to defend against dynamic reverse engineering attacks. However, existing Android emulator detection methods have limitations in detecting the latest mobile game emulators that are similar to actual devices. Therefore, in this paper, we propose a method to effectively detect Android emulators for mobile games based on Houdini module and strings of a library. The proposed method detects the two emulators, Nox and LD Player through specific strings included in libc.so of bionic, and an analysis of the system call execution process and memory mapping associated with the Houdini module.

The Structural Impact of Technology Readiness on Call Center Counselors' Intention to Use in the Introduction of Artificial Intelligence Systems: Focusing on AICC(Artificial Intelligence Contact Center) (인공지능 시스템 도입에 있어서 기술 준비도가 콜센터 상담사들의 사용 의도에 미치는 구조적인 영향: AICC(인공지능 컨택 센터)를 중심으로)

  • Seong Sik Baeck;Jun Seop Lee
    • Journal of Information Technology Services
    • /
    • v.22 no.4
    • /
    • pp.1-19
    • /
    • 2023
  • This study is a study on the effect of technical readiness factors on counselors' intention to use when applying AICC. AICC counselors experience improved customer service and emotional stability by receiving various monitor notification window services based on artificial intelligence algorithms such as customer counseling history, prohibited word control system, and customized counseling system. Accordingly, this study tried to verify using factors derived from technology readiness theory and technology acceptance theory among the factors affecting the intention to continue using AICC provided to counselors. To verify the research hypothesis, the causal relationship between variables such as Optimism, Innovativeness, Discomfort, Insecurity, and Technology Acceptance Theory, such as Team Support, Ease of Usage, and Innovation Resistance, was verified. As a result of empirical analysis, first, it was verified that Optimism has a positive (+) effect on Team Support and Ease of Usage, and Discomfort and Insecurity have a negative (-) effect on Ease of Usage and Team Support. Second, it was confirmed that Team Support and Ease of Usage had a positive effect on the Intention to use AICC. Based on the above empirical analysis results, the concepts of Technical Readiness were clearly proved, and in practical terms, AICC helped inquiry, quality evaluation, recording, and management of counseling history, ultimately increased corporate work efficiency.

Implementation of Multi-Protocol Interface for Web-based Collaborative Service (웹 기반 공동작업을 위한 다중 프로토콜 인터페이스 방법의 구현)

  • 이은령;김지용;설동명;김두현;임기욱
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.2
    • /
    • pp.340-351
    • /
    • 2003
  • We introduce our experiences of the design and implementation of the Page Together system that has expanded hyperlink metaphor to utilize human resources in the web. This system supports that a user connects with others in the web, communicates through video/audio channel, navigates same web pages simultaneously and cooperates some work on Internet. For these functions, it comprises Collaborative Browsing Module (CBM), Multimedia Conferencing Module(MCM) Data Conferencing Module(I)CM) and Multi Protocol Interface(MPI). We adopted three standard protocols, IEC, H.323 and T.120 for each nodule and it allows developers to use them easily. We also defined MPI to synchronize information of session among modules. Each module exchanges information each other in session creating process and session terminating process. After a session is created once, each module works independently as its won protocol. Interferences among modules are reduced as minimizing to exchange information. We also introduce a web site that provides web board service based on the Page Together system. A user may post a notice with a link to himself/herself on our web board. After then, if someone read that notice and has any question about it, he or she can try to connect to the writer as clicking the link in that notice and communicate each other. This service site shows that our system can be applied to diverse internet services such as distance teaming and distance conference.

  • PDF