• Title/Summary/Keyword: 위변조

Search Result 474, Processing Time 0.031 seconds

A Study on Edit Order of Text Cells on the MS Excel Files (MS 엑셀 파일의 텍스트 셀 입력 순서에 관한 연구)

  • Lee, Yoonmi;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.319-325
    • /
    • 2014
  • Since smart phones or tablet PCs have been widely used recently, the users can create and edit documents anywhere in real time. If the input and edit flows of documents can be traced, it can be used as evidence in digital forensic investigation. The typical document application is the MS(Microsoft) Office. As the MS Office applications consist of two file formats that Compound Document File Format which had been used from version 97 to 2003 and OOXML(Office Open XML) File Format which has been used from version 2007 to now. The studies on MS Office files were for making a decision whether the file has been tampered or not through detection of concealed items or analysis of documents properties so far. This paper analyzed the input order of text cells on MS Excel files and shows how to figure out what cell is the last edited in digital forensic perspective.

Multiplication optimization technique for Elliptic Curve based sensor network security (Elliptic curve기반 센서네트워크 보안을 위한 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1836-1842
    • /
    • 2010
  • Sensor network, which is technology to realize the ubiquitous environment, recently, could apply to the field of Mechanic & electronic Security System, Energy management system, Environment monitoring system, Home automation and health care application. However, feature of wireless networking of sensor network is vulnerable to eavesdropping and falsification about message. Presently, PKC(public key cryptography) technique using ECC(elliptic curve cryptography) is used to build up the secure networking over sensor network. ECC is more suitable to sensor having restricted performance than RSA, because it offers equal strength using small size of key. But, for high computation cost, ECC needs to enhance the performance to implement over sensor. In this paper, we propose the optimizing technique for multiplication, core operation in ECC, to accelerate the speed of ECC.

Secure Storage and Management of Vaccination Records Allowing Restrictive Access upon Users' Consent (사용자 동의로 제한적 접근을 허용하는 백신 접종 기록의 안전한 보관 및 관리)

  • Park, Jun-Cheol
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.100-109
    • /
    • 2021
  • As the COVID-19 vaccination begins, it is necessary to safely store and manage the vaccination history for vaccinated people, as well as provide only the minimal information for the requested purpose, not in the form of all or nothing, to the institution requesting vaccination personal information. This paper proposes a scheme to safely store and manage the people's vaccination records in a non-forgeable blockchain, and to ensure that users provide only the minimal information necessary to the verifier from their vaccination personal information. A user authorizes the verifier to access the information he has consented with by entering the fingerprint on his smartphone, and in this process, no personal information or secrets can be exposed to an attacker. In addition, it is guaranteed that it is neither possible to impersonate the user nor to steal user personal information even in the case of theft or loss of the smartphone, or leakage of information from the vaccination history management institution. Using the scheme, users have no fear on external exposure of personal information and follow-up damage due to excessive information provision by giving out only the minimal information suited to the verifier.

A Study on Building System of e-Discovery about Logistics Information of Safty Agricultural-livestock Products (안심 농축수산물 물류정보에 관한 e-Discovery시스템 구축 연구)

  • Jung, Kyung-yong;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.287-290
    • /
    • 2014
  • The Large-scale Agricultural & Livestock Products consists largely of distribution at The nation's of school and military foods. but false information on the Agricultural & Livestock Products in a safe food supply has become a social issue. The food suppliers deliver food resource in a school-large food establishments such as Change to domestic high-quality Livestock products from low-quality foreign Livestock products, Change to eco-friendly agricultural produce from normal agricultural produce, Change to fresh vegetables from contaminated vegetables. In this paper, e-Discovery system applies to the methods and security of incorrect logistics information and evidential data about illegal products of agriculture & livestock, it is necessary as studies about compensation and liability.

  • PDF

Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain (블록체인을 이용한 위변조 안드로이드 악성 앱 판별)

  • Hwang, Sumin;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.61-68
    • /
    • 2019
  • Although the number of smartphone users is continuously increasing due to the advantage of being able to easily use most of the Internet services, the number of counterfeit applications is rapidly increasing and personal information stored in the smartphone is leaked to the outside. Because Android app was developed with Java language, it is relatively easy to create counterfeit apps if attacker performs the de-compilation process to reverse app by abusing the repackaging vulnerability. Although an obfuscation technique can be applied to prevent this, but most mobile apps are not adopted. Therefore, it is fundamentally impossible to block repackaging attacks on Android mobile apps. In addition, personal information stored in the smartphone is leaked outside because it does not provide a forgery self-verification procedure on installing an app in smartphone. In order to solve this problem, blockchain is used to implement a process of certificated application registration and a fake app identification and detection mechanism is proposed on Hyperledger Fabric framework.

Blockchain-based Copyright Management System Capable of Registering Creative Ideas (창의적인 아이디어를 등록할 수 있는 블록체인 기반의 저작권 관리시스템)

  • Hwang, Jung-sik;Kim, Hyun-gon
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.57-65
    • /
    • 2019
  • Creative works such as webtoon and web novel are part of property rights. However, illegal copies of them are distributed on the internet easily, which raises social issues in today's society. In order to tackle these problems, this paper proposes and presents a blockchain based copyright management system that ensures forgery prevention, robust security features, improving trading performance, cost-effective, and enhanced visibility. The system allows a user to register creative works formally just the same as before registration and also to register simple creative ideas just anytime. In the latter case, if an idea or a thought flashes across through somebody's mind, he or she can register it to the system immediately without formal registration process and afterward, can utilize a way to prove its originality through the system. Regarding large size images and video files of creative works, the system reduces data size and storage volume sharply to be processed by network entities by storing original creative works separately and including only the hash result of creative works to the transactions.

A Study on the API Gateway for human resources management modules extensions in ERP

  • Lee, Ji-Woon;Seo, Hee-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.79-88
    • /
    • 2021
  • In this paper, we propose a API Gateway technique for the expansion of human resource management module, one of the ERP functions. The institution has introduced ERP (Enterprise Resource Planning) based on its efforts to transform all human and physical resources into business competitiveness and its response to the digital knowledge informatization environment, and listed it as multiple success factors. Human resource management is one of the factors that have been dealt with. However, ERP's Human Resources Management Module remains in the role of functional personnel management. How to utilize human resources begins with navigating and recognizing human resources. The proposed API Gateway technique leverages blockchain networks to design and implement APIs for human resource sharing and navigation, including the possibility of extending ERP's human resource management module. Secondly, it was designed and implemented using a smart contract that behaves like an API for preventing information forgery. The proposed method will not only be used as a tool that can actively utilize human resources, but will also be a complete resource for utilizing big data technology.

Status Analysis of Adulterated Herbal Medicine (국내외 위변조 한약 현황 분석)

  • Lee, Soojin
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.34 no.5
    • /
    • pp.215-221
    • /
    • 2020
  • Adulterated herbal medicine is intentionally added with undeclared improper or inferior ingredients which should not be in herbal medicine. The contamination with potentially hazardous substances such as heavy metal, pesticides, fungus, and microorganism sometimes can be regarded as one of adulteration in a broad sense. The problem of adulteration is that adulterated herbal medicine shows poor quality and/or can cause adverse events. Therefore, it is important to control adulteration issues for quality assurance and qualitative improvement of herbal medicines. This study aims to summarize and make a reference how to control adulterated herbal medicine. In this process, this study is to investigate studies about adulterated herbal medicine via searching Korean and foreign electronic databases such as PubMed, NDSL and OASIS. Finally eighteen papers were included to this study and analyzed according to the type of study, the category and efficacy of adulterants, the type of analysis methodologies and possible adverse events of adulterants. Phosphodiesterase type 5 (PDE-5) inhibitors for male sexual enhancement and anorexic, laxative, diuretic agents for weight loss and treating obesity has been used frequently as adulterants. The range of adverse event caused by adulterated herbal medicine were very wide from mild symptoms such as diarrhea, constipation, dizziness and blurred vision to very severe symptoms such as heart failure, hypoglycemia and renal impairment. This study showed the recent trend on the research of adulterated herbal medicine and this will be the ground to develop more detailed systems to control adulterated herbal medicine.

Development and Validation of Multiplex PCR Method for the Identification of Pagrus major and Sciaenops ocellatus (참돔과 홍민어 판별을 위한 Multiplex PCR 검사법의 개발과 검증)

  • Choi, Iseul;Shin, Jiyoung;Yang, Ji-young
    • Journal of Food Hygiene and Safety
    • /
    • v.35 no.6
    • /
    • pp.561-566
    • /
    • 2020
  • Nowadays, with increase of seafood consumption, there have been increasing reports of defective seafood products. There have been incidents of red drum (Sciaenops ocellatus) being sold as red seabream (Pagrus major). In this study, we sought to develop and validate species-specific PCRs to differentiate between P. major and S. ocellatus to prevent the sale of S. ocellatus as P. major. Primers for P. major were designed to bind 12s rRNA and those for S. ocellatus were designed to bind 16s rRNA. Multiplex PCR showed a 468 bp amplicon for P. major and a 181 bp amplicon for S. ocellatus. The limit of detection of P. major and S. ocellatus was present at 1 ng each. The developed primers were validated with 19 P. major samples of food items purchased through the internet. Using this monitoring method, the experimental results and tested species were in agreement. Hence, the developed multiplex PCR method is considered reliable to authenticate P. major and S. ocellatus.

Current status of food safety detection methods for Smart-HACCP system (스마트-해섭(Smart-HACCP) 적용을 위한 식품안전 검시기술 동향)

  • Lim, Min-Cheol;Woo, Min-Ah;Choi, Sung-Wook
    • Food Science and Industry
    • /
    • v.54 no.4
    • /
    • pp.293-300
    • /
    • 2021
  • Food safety accidents have been increasing by 2% over 5,000 cases every year since 2009. Most people know that the best method to prevent food safety accidents is a quick inspection, but there is a lack of inspection technology that can be used at the non-analytic level to food production and distribution sites. Among the recent on-site diagnostic technologies, the methods for testing gene-based food poisoning bacteria were introduced with the STA technology, which can range from sample to detection. If food safety information can be generated without forgery by directly inspecting food hazard factors by remote, unmanned, not human, pollution sources can be managed by predicting risks more accurately from current big-data and artificial intelligence technology. Since this information processing can be used on smartphones using the current cloud technology, it is judged that it can be used for food safety to small food businesses or catering services.