• Title/Summary/Keyword: 시스템 콜

검색결과 177건 처리시간 0.03초

Study to detect and block leakage of personal information : Android-platform environment (개인정보 유출 탐지 및 차단에 관한 연구 : 안드로이드 플랫폼 환경)

  • Choi, Youngseok;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제23권4호
    • /
    • pp.757-766
    • /
    • 2013
  • The Malicious code that targets Android is growing dramatically as the number of Android users are increasing. Most of the malicious code have an intention of leaking personal information. Recently in Korea, a malicious code 'chest' has appeared and generated monetary damages by using malicious code to leak personal information and try to make small purchases. A variety of techniques to detect personal information leaks have been proposed on Android platform. However, the existing techniques are hard to apply to the user's smart-phone due to the characteristics of Android security model. This paper proposed a technique that detects and blocks file approaches and internet connections that are not allowed access to personal information by using the system call hooking in the kernel and white-list based approach policy. In addition, this paper proved the possibility of a real application on smart-phone through the implementation.

A Study on QoS Performance Based on CBQ Using Real-time Transport Protocol (RTP를 이용한 CBQ기반의 QoS 성능에 관한 연구)

  • 하미숙;박승섭
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 한국항해항만학회 2004년도 춘계학술대회 논문집
    • /
    • pp.43-48
    • /
    • 2004
  • RTP that is proposed supplement of real-time services on internet environment, as Real-time Transport Protocol, is the protocol that for the purpose of sending data of stream type. RTP and RTCP(Real-time Transport Control Protocol) basically work at the same time, RTCP serves with state information of network at present. RTP has important properties of a transport protocol that runs on end-to-end systems and provides demultiplexing. It also offer reliability and protocol-defined flow/congestion control that transport protocol like TCP can not provides. In this paper, we look around concept and construction of Differentiated sen1ice tint run on RTP and by setting parameters of packet transfer method be used CBQ(Class-Based Queuing) for packet transfer on Differentiated service, each service queue controls properly through packet scheduling method, such as WRR(Weighted Round Robin) and PRR(Packet-by-packet Round Robin) all service classes do not experience the starvation and confirm the performance through computer simulation to achieve fairly scheduling.

  • PDF

A Case Study of Feasibility Analysis Based On Black-Sholes Model for Ubiquitous Computing Technology Development (블랙-숄즈 모형을 활용한 유비쿼터스 기술 개발 타당성 분석 사례 연구)

  • Kwon, Oh-Byung;Kim, Ji-Hoon
    • The Journal of Society for e-Business Studies
    • /
    • 제13권4호
    • /
    • pp.49-69
    • /
    • 2008
  • Recently, ubiquitous computing technology becomes available to develop advanced electronic commerce:u-commerce. Hence, it is the very time to perform feasibility analysis in applying ubiquitous computing technology, especially estimating economical value of the on-going technology. Hence, the purpose of this paper is to propose a financial value estimating methodology in performing feasibility test on ubiquitous computing technology. To do so, Black and Scholes model is basically adopted. To show the feasibility if the idea proposed in this paper, actual case study through focused group interview with those who are actually performing on-going ubiquitous computing projects. As the result, we validated the possibility of applying Black-Sholes model to assessing feasibility analysis for ubiquitous technology development with the price of call option, volatility, and the comparison with other similar technologies.

  • PDF

SPIT Prevention Framework using Expanded White List (확장 화이트리스트 기법을 이용한 SPIT 대응 프레임워크)

  • Bae, Kwang-Yong;Chae, Kang-Suk;Kim, Young-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • 제47권2호
    • /
    • pp.95-102
    • /
    • 2010
  • This paper proposes a SPIT(Spam over IP Telephony) prevention framework which is using expanded white-list in real-time VoIP environment. The existing schemes are vulnerable to attack from spammers since they can continue to transfer SPIT upon changing their ID. And existing frameworks have experienced the time delay and overload as session initiates due to real-time operation. To solve these problems, the proposed scheme expands the scope of white lists by forming social networks using the white list, but it is to decide quickly whether pass a caller ID without searching the entire database. The proposed framework takes the three-stage architecture and the fast scoring system. The proposed framework minimize user's inconvenience and time delay for initiation of session, therefore, it is proper for real-time VoIP environment.

Analysis of the taxi telematics history data based on a state diagram (상태도에 기반한 택시 텔레매틱스 히스토리 데이터 분석)

  • Lee, Jung-Hoon;Kwon, Sang-Cheol
    • Journal of Korea Spatial Information System Society
    • /
    • 제10권1호
    • /
    • pp.41-49
    • /
    • 2008
  • This paper presents a data analysis method for the taxi telematics system which generates a greate deal of location history data. By the record consist of the basic GPS receiver-generated fields, device-added fields such as taxi operation status, and framework-attached fields such as matched link Identifier and position ratio in a link, each taxi can be represented by a state diagram. The transition and the state definition enable us to efficiently extract such information as pick-up time, pick-up distance, dispatch time, and dispatch distance. The analysis result can help to verify the efficiency of a specific taxi dispatch algorithm, while the analysis framework can invite a new challenging service including future traffic estimation, trajectory clustering, and so on.

  • PDF

Study on Design of IP PBX of Distribute Base on SIP Protocol Stack (SIP프로토콜 스텍을 기반으로 하는 분산형 IP PBX 단말기 설계)

  • Yoo Seung-Sun;Yoo Gi-Hyoung;Lim Pyung-Jong;Hyun Chul-Ju;Kwak Hoon-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제31권4A호
    • /
    • pp.377-384
    • /
    • 2006
  • According to fast VoIP technology development, more and more companies change voice network into IP based network among branch offices. IP PBX, which is deployed up to now, composed of IP phone and VoIP Gateway. Every telphone has replaced with If phone which support VoIP and VoIP gateway is installed in PBTN connection point to relay voice data. It can reduce the communication expense of International call, long distance call and call between a headquater and a trance because it uses internet line. In this paper, IP PBX is implemented that can distribute call using PBX network only usig personal terminal without Proxy Server. Depending on Role, terminal can be registered Master, Server and Client and it is verified in terms of performance and validation.

Design and Implementation of Navigation Operating System APIs for Set-based POI Search Algorithm (집합 기반 POI 검색을 지원하는 내비게이션 운영체제 기능 설계 및 구현)

  • Ahn, Hyeyeong;Lee, Jongwoo
    • KIISE Transactions on Computing Practices
    • /
    • 제21권3호
    • /
    • pp.269-274
    • /
    • 2015
  • As smart device companies such as Google or Apple develop competitive mobile-based automotive operating systems and navigation systems, the range of choice for users in such markets is expanding. Navigation systems equipped with mobile operating systems have increased convenience for users. However, since an API for the POI databases used in navigation systems doesn't exist, the number of applications using POI data is insufficient. In this paper, we designed and implemented system calls for navigation operating systems with a focus on POI search, in order to resolve such limitations. The system calls support set-based POI search functions, and therefore provides solutions to search performance degradation problems caused by false inputs. As a result of performance evaluation, not only did the search performance improve, but there was also no problem in applying APIs in applications.

D-channel protocol application for NT2 function with small concentration and it's implementation using general O.S (소규모 집선용 NT2기능에 적합한 D채널 프로토콜 응용 및 이의 범용 O.S에 의한 구현)

  • 김협종;김시원;김재근;조규섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제12권5호
    • /
    • pp.451-465
    • /
    • 1987
  • With the introduction of ISDN network, the D channel protocol has bee defined as a signalling method for ISDN user-network interface. Therefore the NT2(Network Termination 2) which carry out concentration and switching function, must process the D channel related information. This paper describes how the D channel protocoal is applied and implented in a small ISDN subscriber concentrating system that has NT2 functions. The application protocol proposed is addressed taking into consideration the compatibility with ISDN standard facilities, TE(Terminal Equipment) or ET(Exchange Terminator), This protocol has been implementes using a general multitask operating system and it has the features of the minimized information processing and the simpified algorithm which are suitable for a small system. Its application programs are divided into various tasks to facilitate the addition and the modification of function. In this paper, we briefly outline the protocol defined in CCITT and show the application protocol that has fitted in a small concentrating system with NT2 functions. Also we present the experimental results and implementation method of this protocol.

  • PDF

A Study on Smishing Block of Android Platform Environment (안드로이드 플랫폼 환경에서의 스미싱 차단에 관한 연구)

  • Lee, Si-Young;Kang, Hee-Soo;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제24권5호
    • /
    • pp.975-985
    • /
    • 2014
  • As financial transactions with a smartphone has become increasing, a myriad of security threats have emerged against smartphones. Among the many types of security threats, Smishing has evolved to be more sophisticated and diverse in design. Therefore, financial institutions have recommended that users doesn't install applications with setting of "Unknown sources" in the system settings menu and install application which detects Smishing. Unfortunately, these kind of methods come with their own limitations and they have not been very effective in handling Smishing. In this paper, we propose a systematic method to detect Smishing, in which the RIL(Radio Interface Layer) collects a text message received and then, checks if message databases stores text message in order to determine whether Smishing malware has been installed on the system. If found, a system call (also known as a hook) is used to block the outgoing text message generated by the malware. This scheme was found to be effective in preventing Smishing as found in our implementation.

Smart Safety Stick for Transportation Vulnerable using IoT Technology (IoT 기술을 적용한 교통약자용 스마트 안전스틱 설계)

  • Hee-Joo, Park;Myung-Jae, Lim;Won-Mo, Gal
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제23권1호
    • /
    • pp.177-182
    • /
    • 2023
  • The Act on the Promotion of Mobility for the Transportation Vulnerable stipulates that the transportation vulnerable should be able to enjoy convenience when using public transportation. However, this law is not being implemented properly enough to bring up a petition saying, "Please allow the visually impaired to take a bus." Even if you try to use a call taxi for the disabled instead of public transportation, you have to apply and wait two to three hours. Therefore, this paper aims to design and implement systems for the vulnerable and their guardians, such as increasing the opening time of the ticket gate more than usual if the cane rings a notification on the bus and subway station designated using Bluetooth. Accordingly, it is expected to bring about effects such as the availability of public transportation, economic savings, safety guarantees, and prevention of missing children for the vulnerable.