• Title/Summary/Keyword: 윈도우 환경

Search Result 568, Processing Time 0.034 seconds

Study for improving attack Complexity against RSA Collision Analysis (RSA 충돌 분석 공격 복잡도 향상을 위한 연구)

  • Sim, Bo-Youn;Won, Yoo-Seung;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.261-270
    • /
    • 2015
  • In information security devices, such as Smart Cards, vulnerabilities of the RSA algorithm which is used to protect the data were found in the Side Channel Analysis. The RSA is especially vulnerable to Power Analysis which uses power consumption when the algorithm is working. Typically Power Analysis is divided into SPA(Simple Power Analysis) and DPA(Differential Power Analysis). On top of this, there is a CA(Collision Analysis) which is a very powerful attack. CA makes it possible to attack using a single waveform, even if the algorithm is designed to secure against SPA and DPA. So Message blinding, which applies the window method, was considered as a countermeasure. But, this method does not provide sufficient safety when the window size is small. Therefore, in this paper, we propose a new countermeasure that provides higher safety against CA. Our countermeasure is a combination of message and exponent blinding which is applied to the window method. In addition, through experiments, we have shown that our countermeasure provides approximately 124% higher attack complexity when the window size is small. Thus it can provide higher safety against CA.

A Study on the Automatic Speech Control System Using DMS model on Real-Time Windows Environment (실시간 윈도우 환경에서 DMS모델을 이용한 자동 음성 제어 시스템에 관한 연구)

  • 이정기;남동선;양진우;김순협
    • The Journal of the Acoustical Society of Korea
    • /
    • v.19 no.3
    • /
    • pp.51-56
    • /
    • 2000
  • Is this paper, we studied on the automatic speech control system in real-time windows environment using voice recognition. The applied reference pattern is the variable DMS model which is proposed to fasten execution speed and the one-stage DP algorithm using this model is used for recognition algorithm. The recognition vocabulary set is composed of control command words which are frequently used in windows environment. In this paper, an automatic speech period detection algorithm which is for on-line voice processing in windows environment is implemented. The variable DMS model which applies variable number of section in consideration of duration of the input signal is proposed. Sometimes, unnecessary recognition target word are generated. therefore model is reconstructed in on-line to handle this efficiently. The Perceptual Linear Predictive analysis method which generate feature vector from extracted feature of voice is applied. According to the experiment result, but recognition speech is fastened in the proposed model because of small loud of calculation. The multi-speaker-independent recognition rate and the multi-speaker-dependent recognition rate is 99.08% and 99.39% respectively. In the noisy environment the recognition rate is 96.25%.

  • PDF

Design of 900MHz RFID Educational System (900MHz RFID 교육용 시스템의 설계)

  • Oh, Do-Bong;Kim, Dae-Hee;Jung, Joong-soo;Jung, Kwang-wook
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.515-520
    • /
    • 2009
  • This paper presents the software design of RFID Educational system based on using 900MHz air interface between the reader and the tag. Software of the reader and active tag is developed on embedded environment and the software of PC controlling the reader is on window OS. ATmega128 processor is used for H/W of the reader and active tag, and C language is used for their developing. Programming on window OS used MFC. Main functions of this system are to control tag containing EPC global Data by PC through the reader, to obtain information of tag through the internet and to read/write data on tag memory. Software design of 900MHz RFID educational system is done on the basis of these functions.

  • PDF

Sequence Pattern Mining Using Meaning-based Transaction Structure for USN system (USN 환경에서 의미 기반 트랜잭션 구조를 이용한 순차 패턴 탐사 기법)

  • Choi, Pilsun;Kang, Donghyun;Kim, Hwan;Kim, Daein;Hwang, Buhyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.1105-1108
    • /
    • 2012
  • 순차 패턴 탐사 기법은 순서를 갖는 패턴들의 집합 중에 빈발하게 발생하는 패턴을 찾아내는 기법이다. USN 환경에서 발생하는 스트림 데이터는 시간 속성을 갖는 이벤트들의 집합으로 표현할 수 있으며 순차 패턴 탐사 기법을 이용하여 유용한 정보를 탐사할 수 있다. 그러나 스트림 데이터 환경에서는 데이터가 무한하고 연속적으로 발생하기 때문에 모든 데이터를 저장하여 패턴을 탐사하는 기법을 적용하는 데는 문제가 있다. 이 논문에서는 향상된 데이터 처리방식을 사용하여 순차패턴을 탐사하는 스트림 데이터 마이닝 기법에 대하여 제안한다. 제안하는 기법은 의미 단위의 가변적 윈도우를 사용하여 스트림 데이터로부터 트랜잭션을 생성하고 이 트랜잭션들의 집합을 해시와 슬라이딩 윈도우를 사용하여 스트림 데이터의 순차 패턴을 탐사한다. 이를 이용한 제안 기법은 실시간 시스템에 적합하게 데이터 저장 공간 사용의 효율성을 높이고 신속하게 유용한 패턴을 탐사할 수 있다.

A Comparative Study on the Impulsive Noise Mitigation Algorithms for Orthogonal Frequency Division Multiplexing Systems (직교 주파수분할다중화 시스템을 위한 충격성 잡음 완화 알고리즘에 대한 비교 연구)

  • Ma, Shuang;Kang, Seog Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1051-1060
    • /
    • 2014
  • In this paper, performance of an orthogonal frequency division multiplexing (OFDM) system in an impulsive noise environment is analyzed. Here, it is verified that performance of the OFDM system with window nonlinearity, which is one of the impulsive noise mitigation algorithms, is dependent on the over-sampling rate and the size of window. With respect to the variation of those parameters, we also provide an appropriate region of threshold values that control amplitudes of the sampled waveform of received signals. As a result, a new combination of parameters which improves error performance of OFDM system in an impulsive noise environment as compared to the previously reported parameters is presented.

Low Delay IntMDCT Using Power Complementary Window (파워 상호보완 윈도우를 이용한 지연 감소 IntMDCT)

  • Lee, Sang-Hwan;Lee, In-Sung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.6
    • /
    • pp.525-531
    • /
    • 2013
  • In this paper, we propose to apply low delay algorithm using power complementary window to Integer Modified Discrete Cosine Transform (IntMDCT). Conventional transform, the Modified Discrete Cosine Transform (MDCT) usually produces floating point values for integer input values. This causes the expansion of the data. To refine on this, IntMDCT that produces integer values even for integer input values have emerged. However, IntMDCT has a problem of the algorithm delay, such as MDCT. Delay has became a key issue in environments for the purpose of real-time communications. In order to reduce the delay, the proposed algorithm was applied and the results of the performance evaluation show that delay of IntMDCT has reduced by halfexisting delay.

Design and Implementation of embedded Linux for PDA (개인 휴대정보 단말기를 위한 내장형 리눅스 설계 및 구현)

  • 정홍섭;박철우;박규석
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.11a
    • /
    • pp.900-904
    • /
    • 2001
  • PDA(Personal Digital Assistant)는 GUI(Graphical User Interface) 환경이 필수적이다. 최근 기존의 개인정보 관리기능 외에 휴대단말기를 내장한 인터넷 기능, 멀티미디어 기능, 게임 등이 가능한 고성능의 PDA가 일반화됨에 따라, 기존의 단일 task 환경 대신 뛰어난 GUI와 멀티미디어 환경을 지원하는 내장형 운영 체제가 사용될 전망이다. 본 논문에서는 Linux의 GTK+/GDK(GNU Image Manipulation Program Toolkit) 툴킷을 이용하여 Framebuffer를 직접적으로 사용할 수 있게 하고, 불필요한 내부 함수를 제거함으로써 X-윈도우시스템으로 인한 오버헤드 및 저장공진을 줄일 수 있는 내장형 운영체제를 설계 및 구현한다.

  • PDF

Windows 7 Operating System Event based Visual Incident Analysis System (윈도우즈 7 운영체제 이벤트에 대한 시각적 침해사고 분석 시스템)

  • Lee, Hyung-Woo
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.223-232
    • /
    • 2012
  • Recently, the leakage of personal information and privacy piracy increase. The victimized case of the malicious object rapidlies increase. Most of users use the windows operating system. Recently, the Windows 7 operating system was announced. Therefore, we need to study for the intrusion response technique at the next generation operate system circumstances. The accident response technique developed till now was mostly implemented around the Windows XP or the Windows Vista. However, a new vulnerability problem will be happen in the breach process of reaction as the Windows 7 operating system is announced. In the windows operating system, the system incident event needs to be efficiently analyzed. For this, the event information generated in a system needs to be visually analyzed around the time information or the security threat weight information. Therefore, in this research, we analyzed visually about the system event information generated in the Windows 7 operating system. And the system analyzing the system incident through the visual event information analysis process was designed and implemented. In case of using the system developed in this study the more efficient accident analysis is expected to be possible.

A Study on the Setting Method of the File System Audit Function of Windows for Enhancing Forensic Readiness (포렌식 준비도 제고를 위한 윈도우의 파일 시스템 감사 기능 설정 방안에 관한 연구)

  • Lee, Myeong-Su;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.79-90
    • /
    • 2017
  • If digital forensic investigators can utilize file access logs when they audit insider information leakage cases or incident cases, it would be helpful to understand user's behaviors more clearly. There are many known artifacts related to file access in MS Windows. But each of the artifacts often lacks critical information, and they are usually not preserved for enough time. So it is hard to track down what has happened in a real case. In this thesis, I suggest a method to utilize SACL(System Access Control List) which is one of the audit functions provided by MS Windows. By applying this method of strengthening the Windows's audit settings, even small organizations that cannot adopt security solutions can build better environment for conducting digital forensic when an incident occurs.

Development of Windows Mobile Applications using Model Transformation Techniques (모델 변환 기법을 활용한 윈도우즈 모바일 어플리케이션 개발)

  • Kim, Woo-Yeol;Son, Hyun-Seung;Kim, Jae-Seung;Kim, R. Young-Chul
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.11
    • /
    • pp.1091-1095
    • /
    • 2010
  • The existing smart-phone software is dependent on the platform, which should be developed per each different platform, Each vendor will develop its own platform such as Apple's Cocoa platform, Google Android, Microsoft Windows Mobile, etc. In this paper, we apply model transformation technique for developing heterogenous software at a time in heterogenous smart phone area. This approach separates the independent model and dependent model. and automatically transforms the difference between them with model transformation language. To execute model transformation, it is required with meta model, model transformation language. In this paper, we are applied to smart-phones as follows: model will be UMLmodel, metamodel be UML metamodel, and choose ATL as Model transformation language. We show examples of the Windows Mobile platform environment to be developed using model transformation. As a result, if we use platform-independent model in this paper and redefine model transformation rules for the iPhone or Android, it will be automatically transformed into heterogenous platforms.