• Title/Summary/Keyword: 코드 두께

Search Result 710, Processing Time 0.022 seconds

APT attacks and Countermeasures (APT 공격과 대응 방안 연구)

  • Han, Kun-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.25-30
    • /
    • 2015
  • The APT attacks are hackers created a variety of security threats will continue to attack applied to the network of a particular company or organization. It referred to as intelligent sustained attack. After securing your PC after a particular organization's internal staff access to internal server or database through the PC or remove and destroy the confidential information. The APT attack is so large, there are two zero-day attacks and rootkits. APT is a process of penetration attack, search, acquisition, and is divided into outlet Step 4. It was defined in two ways how you can respond to APT through the process. Technical descriptions were divided into ways to delay the attacker's malicious code attacks time and plan for attacks to be detected and removed through.

  • PDF

QR code as Interactive Marketing Communication Media : Focused on Technology Acceptance Model (인터랙티브 마케팅커뮤니케이션 매체로써 QR코드 이용에 관한 연구 : 기술수용모델을 중심으로)

  • Shin, Dong-Hee;Chang, Woo Sung
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.76-86
    • /
    • 2013
  • This study examined users' acceptance process with the QR code as an interactive marketing communications tool. We collected total 200 survey data and 181 questionnaires among them were used for the analysis during for five days, from 9 to 13 in May 2011. The first research question of this study examined the relationship among subjective norms, perceived usefulness, perceived ease of use, attitudes, and intention to use through the structural equation modeling analysis. The result of the first research showed that subjective norms about the use of QR code affect intention to use via perceived usefulness, and also directly influence on it. The perceived usefulness has the biggest impact on the intention to use. The research question 2 was to look at the condition effect with the presence of experience. As the analysis result of the second research question, the relationships between subjective norms and perceived usefulness are not different whether or not groups experience QR code, and both groups appeared to have had significant impact. Whereas the relationship between subjective norms and intention to use showed a significant influence on the population that has the experience with the QR code. In order to encourage use of the QR code, therefore, we will need to highly impress on users subjective norms which are ambient pressure on the use of QR code and positively offer marketing strategy which gives users the opportunities to get experience with the QR code.

Element and Crack Geometry Sensitivities of Finite Element Analysis Results of Linear Elastic Stress Intensity Factor for Surface Cracked Straight Pipes (표면균열이 있는 직관에 대한 선형탄성 응력확대계수 유한요소해석 결과의 요소 및 균열형상 민감도)

  • Ryu, Dongil;Bae, Kyung-Dong;Je, Jin-Ho;An, Joong-Hyok;Kim, Yun-Jae;Song, Tae-Kwang;Kim, Yong-Beum
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.4
    • /
    • pp.521-527
    • /
    • 2013
  • This study provides the elastic stress intensity factors, K, for circumferential and longitudinal surface cracked straight pipes under single or combined loads of internal pressure, bending, and torsion based on three-dimensional (3D) finite element (FE) analyses. FE results are compared with two different types of defect assessment codes (API-579-1 and RCC-MR A16) to prove the accuracy of the FE results and the differences between the codes. Through the 3D FE analysis, it is found that the stress intensity factors are sensitive to the number of elements, which they were believed to not be sensitive to because of path independence. Differences were also found between the FE analysis results for crack defining methods and the results obtained by two different types of defect assessment codes.

Detecting Malicious Codes with MAPbox using Dynamic Class Hierarchies (동적 클래스 계층구조를 이용한 MAPbox상에서의 악성코드 탐지 기법)

  • Kim Cholmin;Lee Seong-uck;Hong Manpyo
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.556-565
    • /
    • 2004
  • A Sandbox has been widely used to prevent damages caused by running of unknown malicious codes. It prevents damages by containing running environment of a program. There is a trade-off in using sandbox, between configurability and ease-of-use. MAPbox, an instance system of sandbox, had employed sandbox classification technique to satisfy both configurability and ease-of-use [1]. However, the configurability of MAPbox can be improved further. In this paper, we introduce a technique to attach dynamic class facility to MAPbox and implement MAPbox-advanced one. Newly generated class in our system has an access control with proper privileges. We show an example for improvements which denote our system have increased the configurability of MAPbox. It was determined as abnormal by MAPbox although is not. Our system could determine it as normal. We also show our techniques to overcome obstacles to implement the system.

Part1 : Numerical Code Validation and Quantitative Analyses of Ice Accretion around Airfoils (Part1 : 익형 주위 결빙 예측 코드 검증 및 정량적 분석)

  • Son, Chan-Kyu;Oh, Se-Jong;Yee, Kwan-Jung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.11
    • /
    • pp.1094-1104
    • /
    • 2010
  • In the previous studies, the validation of numerical codes has been conducted based on the qualitative comparison of predicted ice shapes with experiments, which poses a significant limit on the systematic analysis of ice shapes due to the variation of meteorological conditions. In response to this, the numerical code has been quantitatively validated against available experiment for the ice accretion on cylinders and airfoils in the present study. Ice shapes accumulated on the bodies are systematically investigated with respect to various icing parameters. To this end, maximum thickness, heading direction and ice thickness are quantified and expressed in the polar coordinate system for the comparison with other numerical results. By applying the quantitative analysis, similar shapes are intuitively distinguished. The developed numerical code underestimates the ice accretion area and the ice thickness of lower surface. In order to improve the accuracy, further accurate aerodynamic solver is required for the water droplet trajectories.

Propose and Performance Analysis of Turbo Coded New T-DMB System (터보부호화된 새로운 T-DMB 시스템 제안 및 성능 분석)

  • Kim, Hanjong
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.269-275
    • /
    • 2014
  • The DAB system was designed to provide CD quality audio and data services for fixed, portable and mobile applications with the required BER below $10^{-4}$. However for the T-DMB system with the video service of MPEG-4 stream, BER should go down $10^{-8}$ by adding FEC blocks which consist of the Reed-Solomon (RS) encoder/decoder and convolutional interleaver/deinterleaver. In this paper we propose two types of turbo coded T-DMB system without altering the puncturing procedure and puncturing vectors defined in the standard T-DMB system for compatibility. One(Type 1) can replace the existing RS code, convolutional interleaver and RCPC code by a turbo code and the other one (Type 2) can substitute the existing RCPC code by a turbo code. Simulation results show that two new turbo coded systems are able to yield considerable performance gain after just 2 iterations. Type 2 system is better than type 1 but the amount of performance improvement is small.

An Implementation of Embedded Speaker Identifier for PDA (PDA를 위한 내장형 화자인증기의 구현)

  • Kim, Dong-Ju;Roh, Yong-Wan;Kim, Dong-Gyu;Chung, Kwang-Woo;Hong, Kwang-Seok
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.286-289
    • /
    • 2005
  • 기존의 물리적 인증도구를 이용한 방식이나 패스워드 인증 방식은 분실, 도난, 해킹 등에 취약점을 가지고 있다. 따라서 지문, 서명, 홍채, 음성, 얼굴 등을 이용한 생체 인식기술을 보안 기술로 적용하려는 연구가 진행중이며 일부는 실용화도 되고 있다. 본 논문에서는 최근 널리 보급되어 있는 임베디드 시스템중의 하나인 PDA에 음성 기술을 이용한 내장형 화자 인증기를 구현하였다. 화자 인증기는 음성기술에서 널리 사용되고 있는 벡터 양자화 기술과 은닉 마코프 모델 기술을 사용하였으며, PDA의 하드웨어적인 제약 사항을 고려하여 사용되는 벡터 코드북을 두 가지로 다르게 하여 각각 구현하였다. 처음은 코드북을 화자 등록시에 발성음만을 이용하여 생성하고 화자인증 시에 이용하는 방법이며, 다른 하나는 대용량의 음성 데이터베이스를 이용하여 코드북을 사전에 생성하여 이를 화자 인증시에 이용하는 방법이다. 화자인증기의 성능평가는 5명의 화자가 10번씩 5개의 단어에 대하여 실험하여, 각각 화자종속 코득북을 이용한 인증기는 88.8%, 99.5%, 화자독립 코드북을 이용한 인증기는 85.6%, 95.5%의 인증율과 거절율을 보였으며, 93.5%와 90.0%의 평균 확률을 보였다.. 실험을 통하여 화자독립 인증기의 경우가 화자종속 인증기의 경우보다 낮은 인식율을 보였지만, 화자종속 인증기에서 나타나는 코드북 훈련시에 발생하는 메모리 문제를 해결 할 수 있었다.

  • PDF

Method of Signature Extraction and Selection for Ransomware Dynamic Analysis (랜섬웨어 동적 분석을 위한 시그니처 추출 및 선정 방법)

  • Lee, Gyu Bin;Oak, Jeong Yun;Im, Eul Gyu
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.2
    • /
    • pp.99-104
    • /
    • 2018
  • Recently, there are increasing damages by ransomware in the world. Ransomware is a malicious software that infects computer systems and restricts user's access to them by locking the system or encrypting user's files saved in the hard drive. Victims are forced to pay the 'ransom' to recover from the damage and regain access to their personal files. Strong countermeasure is needed due to the extremely vicious way of attack with enormous damage. Malware analysis method can be divided into two approaches: static analysis and dynamic analysis. Recent malwares are usually equipped with elaborate packing techniques which are main obstacles for static analysis of malware. Therefore, this paper suggests a dynamic analysis method to monitor activities of ransomware. The proposed method can analyze ransomwares more accurately. The suggested method is comprised of extracting signatures of benign program, malware, and ransomware, and selecting the most appropriate signatures for ransomware detection.

PRML detection using the patterns of run-length limited codes (런-길이 제한 코드의 패턴을 이용한 PRML 검출 방법)

  • Lee Joo hyun;Lee Jae jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.3C
    • /
    • pp.77-82
    • /
    • 2005
  • Partial response maximum likelihood (PRML) detection using the Viterbi algorithm involves the calculation of likelihood metrics that determine the most likely sequence of decoded data. In general, it is assumed that branches at each node in the trellis diagram have same probabilities. If modulation code with minimum and maximum run-length constraints is used, the occurrence ratio (Ro) of each particular pattern is different, and therefore the assumption is not true. We present a calculation scheme of the likelihood metrics for the PRML detection using the occurrence ratio. In simulation, we have tested the two (1,7) run-length-limited codes and calculated the occurrence ratios as the orders of PR targets are changed. We can identify that the PRML detections using the occurrence ratio provide more than about 0.5dB gain compared to conventional PRML detections at 10/sup -5/ BER in high-density magnetic recording and optical recording channels.

A Program Code Compression Method with Very Fast Decoding for Mobile Devices (휴대장치를 위한 고속복원의 프로그램 코드 압축기법)

  • Kim, Yong-Kwan;Wee, Young-Cheul
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.11
    • /
    • pp.851-858
    • /
    • 2010
  • Most mobile devices use a NAND flash memory as their secondary memory. A compressed code of the firmware is stored in the NAND flash memory of mobile devices in order to reduce the size and the loading time of the firmware from the NAND flash memory to a main memory. In order to use a demand paging properly, a compressed code should be decompressed very quickly. The thesis introduces a new dictionary based compression algorithm for the fast decompression. The introduced compression algorithm uses a different method with the current LZ method by storing the "exclusive or" value of the two instructions when the instruction for compression is not equal to the referenced instruction. Therefore, the thesis introduces a new compression format that minimizes the bit operation in order to improve the speed of decompression. The experimental results show that the decoding time is reduced up to 5 times and the compression ratio is improved up to 4% compared to the zlib. Moreover, the proposed compression method with the fast decoding time leads to 10-20% speed up of booting time compared to the booting time of the uncompressed method.