• Title/Summary/Keyword: 코드화

Search Result 1,690, Processing Time 0.028 seconds

Development of an open source-based APT attack prevention Chrome extension (오픈소스 기반 APT 공격 예방 Chrome extension 개발)

  • Kim, Heeeun;Shon, Taeshik;Kim, Duwon;Han, Gwangseok;Seong, JiHoon
    • Journal of Platform Technology
    • /
    • v.9 no.3
    • /
    • pp.3-17
    • /
    • 2021
  • Advanced persistent threat (APT) attacks are attacks aimed at a particular entity as a set of latent and persistent computer hacking processes. These APT attacks are usually carried out through various methods, including spam mail and disguised banner advertising. The same name is also used for files, since most of them are distributed via spam mail disguised as invoices, shipment documents, and purchase orders. In addition, such Infostealer attacks were the most frequently discovered malicious code in the first week of February 2021. CDR is a 'Content Disarm & Reconstruction' technology that can prevent the risk of malware infection by removing potential security threats from files and recombining them into safe files. Gartner, a global IT advisory organization, recommends CDR as a solution to attacks in the form of attachments. There is a program using CDR techniques released as open source is called 'Dangerzone'. The program supports the extension of most document files, but does not support the extension of HWP files that are widely used in Korea. In addition, Gmail blocks malicious URLs first, but it does not block malicious URLs in mail systems such as Naver and Daum, so malicious URLs can be easily distributed. Based on this problem, we developed a 'Dangerzone' program that supports the HWP extension to prevent APT attacks, and a Chrome extension that performs URL checking in Naver and Daum mail and blocking banner ads.

Accuracy Assessment of Aerial Triangulation of Network RTK UAV (네트워크 RTK 무인기의 항공삼각측량 정확도 평가)

  • Han, Soohee;Hong, Chang-Ki
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.6
    • /
    • pp.663-670
    • /
    • 2020
  • In the present study, we assessed the accuracy of aerial triangulation using a UAV (Unmanned Aerial Vehicle) capable of network RTK (Real-Time Kinematic) survey in a disaster situation that may occur in a semi-urban area mixed with buildings. For a reliable survey of check points, they were installed on the roofs of buildings, and static GNSS (Global Navigation Satellite System) survey was conducted for more than four hours. For objective accuracy assessment, coded aerial targets were installed on the check points to be automatically recognized by software. At the instance of image acquisition, the 3D coordinates of the UAV camera were measured using VRS (Virtual Reference Station) method, as a kind of network RTK survey, and the 3-axial angles were achieved using IMU (Inertial Measurement Unit) and gimbal rotation measurement. As a result of estimation and update of the interior and exterior orientation parameters using Agisoft Metashape, the 3D RMSE (Root Mean Square Error) of aerial triangulation ranged from 0.153 m to 0.102 m according to the combination of the image overlap and the angle of the image acquisition. To get higher aerial triangulation accuracy, it was proved to be effective to incorporate oblique images, though it is common to increase the overlap of vertical images. Therefore, to conduct a UAV mapping in an urgent disaster site, it is necessary to acquire oblique images together rather than improving image overlap.

Effective Defense Mechanism Against New Vulnerability Attacks (신규 취약점 공격에 대한 효율적인 방어 메커니즘)

  • Kwak, Young-Ok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.499-506
    • /
    • 2021
  • Hackers' cyber attack techniques are becoming more sophisticated and diversified, with a form of attack that has never been seen before. In terms of information security vulnerability standard code (CVE), about 90,000 new codes were registered from 2015 to 2020. This indicates that security threats are increasing rapidly. When new security vulnerabilities occur, damage should be minimized by preparing countermeasures for them, but in many cases, companies are insufficient to cover the security management level and response system with a limited security IT budget. The reason is that it takes about a month for analysts to discover vulnerabilities through manual analysis, prepare countermeasures through security equipment, and patch security vulnerabilities. In the case of the public sector, the National Cyber Safety Center distributes and manages security operation policies in a batch. However, it is not easy to accept the security policy according to the characteristics of the manufacturer, and it takes about 3 weeks or more to verify the traffic for each section. In addition, when abnormal traffic inflow occurs, countermeasures such as detection and detection of infringement attacks through vulnerability analysis must be prepared, but there are limitations in response due to the absence of specialized security experts. In this paper, we proposed a method of using the security policy information sharing site "snort.org" to prepare effective countermeasures against new security vulnerability attacks.

Case Study on College Calculus Education for Vocational High School Graduates with Coding (직업계 고등학교 졸업생 대상 'Math & 코딩'을 활용한 대학 미분적분학 교육 사례 연구)

  • Lee, Jae Hwa;Lee, Sang-Gu;Ham, Yoonmee
    • Communications of Mathematical Education
    • /
    • v.36 no.4
    • /
    • pp.611-626
    • /
    • 2022
  • In this study, we introduced the case of college calculus course for vocational high school graduates with coding. We suggest this case as an alternative to overcome mathematics anxiety. Contents, python/SageMath codes, and textbook for this course, which help students to easily and quickly review middle and high school mathematics, were newly developed by authors. Due to the use of codes and chat with classmates in learning management system, most of the students who took this course reported that they no longer felt anxious in complex mathematics problems, had a full understanding of calculus concepts, could solve almost problems in any calculus textbooks with or without codes, and could explain calculus concepts to other students in their own words. In this way if mathematics and coding is properly used in mathematics education, it helps students with weak mathematical backgrounds or mathematics anxiety to restore confidence in mathematics in college. This could be applicable in secondary mathematics education.

Prediction of Music Generation on Time Series Using Bi-LSTM Model (Bi-LSTM 모델을 이용한 음악 생성 시계열 예측)

  • Kwangjin, Kim;Chilwoo, Lee
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.65-75
    • /
    • 2022
  • Deep learning is used as a creative tool that could overcome the limitations of existing analysis models and generate various types of results such as text, image, and music. In this paper, we propose a method necessary to preprocess audio data using the Niko's MIDI Pack sound source file as a data set and to generate music using Bi-LSTM. Based on the generated root note, the hidden layers are composed of multi-layers to create a new note suitable for the musical composition, and an attention mechanism is applied to the output gate of the decoder to apply the weight of the factors that affect the data input from the encoder. Setting variables such as loss function and optimization method are applied as parameters for improving the LSTM model. The proposed model is a multi-channel Bi-LSTM with attention that applies notes pitch generated from separating treble clef and bass clef, length of notes, rests, length of rests, and chords to improve the efficiency and prediction of MIDI deep learning process. The results of the learning generate a sound that matches the development of music scale distinct from noise, and we are aiming to contribute to generating a harmonistic stable music.

Characteristics and Meanings of the SF Genre in Korea - From Propaganda of Modernization to Post-Human Discourse (한국 SF의 장르적 특징과 의의 -근대화에 대한 프로파간다부터 포스트휴먼 담론까지)

  • Lee, Ji-Yong
    • Journal of Popular Narrative
    • /
    • v.25 no.2
    • /
    • pp.33-69
    • /
    • 2019
  • This thesis aims to reveal the meanings of SF as a genre in Korea. Most of the studies on the characteristics of SF novels in Korea have revealed the meanings of characteristic elements of SF, or peripherally reviewed the characteristics of works. However, these methodologies have a limitation, such as analysis through the existing methodologies, while overlooking the identity of SF texts with the characteristics as a genre. To clearly define the value of texts in the SF genre, an understanding of the customs and codes of the genre is first needed. Thus, this thesis aims to generally handle matters like the historical context in which Korean SF was accepted by Korean society, and the meanings and characteristics when they were created and built up relationships with readers. In addition to fully investigating SF as a popular narrative & genre narrative that has not been fully handled by academic discourses, this thesis aims to practically reconsider the present/future possibilities of SF, which is currently being reconsidered given that the scientific imagination is regarded as important in the 21st century. This thesis considers the basic signification of Korean SF texts in academic discourses. Through this work, numerous Korean SF that have not been fully handled in the area of literature and cultural phenomena will be evaluated for their significance within the academic discourses, and also reviewed through diverse research afterwards. As a result, this work will be helpful for the development of discourse and the expansion of the Korean narrative area that has been diversely changed since the 21st century.

The Construction and Mechanism of the 'Byeongmat' Discourse ('병맛' 담론의 형성과 담론의 작동방식)

  • Park, Jae-Yeon
    • Journal of Popular Narrative
    • /
    • v.25 no.3
    • /
    • pp.143-180
    • /
    • 2019
  • This article aims to examine the manner in which the 'Byeongmat' discourse was constructed, and the mechanism of the 'Byeongmat' discourse. I claim that the constructed discourse excludes disabled persons and women. When the 'Byeongmat' first appeared in the mainstream, it was understood as being presented only by webtoons. Furthermore 'Byeongmat' and webtoons were understood as almost synonymous. In this sense, it is no exaggeration to say that the way in which the 'Byeongmat' discourse was constructed is the way in which 'Byeongmat webtoons' were interpreted. In this article, to find out how the 'Byeongmat' discourse was constructed, I examine two things. First, the reception of media of 'Byeongmat'. 'Byeongmat' was at first understood as 'kitsch' by the media, but soon after generational meaning was added. Second, the interpretation of 'Byeongmat' in academia. In academia, the 'Byeongmat' discourse is advanced as a refined generationalism. Regardless of the 'Byeongmat webtoon' itself, 'Byeongmat webtoon' is interpreted as a text which is destructing narrative and filled with parodies. Furthermore this characteristic of the 'Byeongmat webtoon' is interpreted as a resistance culture of the younger generation. However, this interpretation serves as a mechanism which excludes the disabled and women. Currently, Korean society faces the popularization of the 'Byeongmat' code, the decline of the 'Byeongmat webtoons' and the crack of the younger generation discourse. The current situation allows the 'Byeongmat' discourse to be criticized without losing its social context while securing a distance of critcism. I expect that this article can contribute to further diversifying interpretations of 'Byeongmat' and 'Byeongmat webtoons', and accelerating the crack on the younger generation discourse.

A Basic Study on the Radiological Characteristics and Disposal Methods of NORM Wastes (공정부산물의 방사선적 특성과 처분방안에 관한 기본 연구)

  • Jeong, Jongtae;Baik, Min-Hoon;Park, Chung-Kyun;Park, Tae-Jin;Ko, Nak-Youl;Yoon, Ki Hoon
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.12 no.3
    • /
    • pp.217-233
    • /
    • 2014
  • Securing the radiological safety is a prerequisite for the safe management of the naturally occurring radioactive materials (NORM) which cannot be reused. This becomes a crucial focus of our R&D efforts upon the implementation of the Act on Protective Action Guidelines against Radiation in the Natural Environment. To secure the safety, the establishment of technical bases and procedures for securing radiological safety related to the disposal of NORM is required. Thus, it is necessary to analyze the characteristics, to collect the data, to have the radiological safety assessment methodologies and tools, to investigate disposal methods and facilities, and to study the effects of the input data on the safety for the NORM wastes. Here, we assess the environmental impact of the NORM waste disposal with respect to the major domestic and foreign NORM characteristics. The data associated with major industries are collected/analyzed and the status of disposal facilities and methodologies relevant to the NORM wastes is investigated. We also suggest the conceptual design concept of a landfill disposal facility and the management plan with respect to the major NORM wastes characteristics. The radionuclide pathways are identified for the atmospheric transport and leachate release and the environmental impact assessment methodology for the NORM waste disposal is established using a relevant code. The assessment and analysis on the exposure doses and excessive cancer risks for the NORM waste disposal are performed using the characteristics of the representative domestic NORM wastes including flying ash, phosphor gypsum, and redmud. The results show that the exposure dose and the excessive cancer risks are very low to consider any radiation effects. This study will contribute to development in the areas of the regulatory technology for securing radiological safety relevant to NORM waste disposal and to the implementation technology for the Act.

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.

VLSI Design of DWT-based Image Processor for Real-Time Image Compression and Reconstruction System (실시간 영상압축과 복원시스템을 위한 DWT기반의 영상처리 프로세서의 VLSI 설계)

  • Seo, Young-Ho;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1C
    • /
    • pp.102-110
    • /
    • 2004
  • In this paper, we propose a VLSI structure of real-time image compression and reconstruction processor using 2-D discrete wavelet transform and implement into a hardware which use minimal hardware resource using ASIC library. In the implemented hardware, Data path part consists of the DWT kernel for the wavelet transform and inverse transform, quantizer/dequantizer, the huffman encoder/huffman decoder, the adder/buffer for the inverse wavelet transform, and the interface modules for input/output. Control part consists of the programming register, the controller which decodes the instructions and generates the control signals, and the status register for indicating the internal state into the external of circuit. According to the programming condition, the designed circuit has the various selective output formats which are wavelet coefficient, quantization coefficient or index, and Huffman code in image compression mode, and Huffman decoding result, reconstructed quantization coefficient, and reconstructed wavelet coefficient in image reconstructed mode. The programming register has 16 stages and one instruction can be used for a horizontal(or vertical) filtering in a level. Since each register automatically operated in the right order, 4-level discrete wavelet transform can be executed by a programming. We synthesized the designed circuit with synthesis library of Hynix 0.35um CMOS fabrication using the synthesis tool, Synopsys and extracted the gate-level netlist. From the netlist, timing information was extracted using Vela tool. We executed the timing simulation with the extracted netlist and timing information using NC-Verilog tool. Also PNR and layout process was executed using Apollo tool. The Implemented hardware has about 50,000 gate sizes and stably operates in 80MHz clock frequency.