• Title/Summary/Keyword: 회피적 행위

Search Result 94, Processing Time 0.031 seconds

Der Vollrauschtatbestand de lege ferenda (완전명정죄 처벌규정의 입법론)

  • Seong, Nak-Hyon
    • Journal of Legislation Research
    • /
    • no.55
    • /
    • pp.137-166
    • /
    • 2018
  • Wenn nach dem starken Trinken etwas strafbares passiert, so ist das Gesamtverhalten als $strafw{\ddot{u}}rdig$ und strafbar anzuerkennen. Aber nach dem Schuldprinzip handelt ohne Schuld, wer bei Begehung der Tat $unf{\ddot{a}}hig$ ist, das Unrecht der Tat einzusehen oder nach dieser Einsicht zu handeln(Koinzidenzprinzip). Die Rechtsfigur der "actio libera in causa" dient dazu, diese in $h{\ddot{a}}ufigen$ $F{\ddot{a}}llen$ als kriminalpolitisch $unerw{\ddot{u}}nscht$ empfundene $L{\ddot{u}}cke$ zu umgehen. Dabei kommt auch dem Vollrauschtatbestand in der Praxis $erh{\ddot{o}}hte$ Bedeutung zu. Der deutsche Gesetzgeber war sich bei der Aufnahme des Vollrauschtatbestandes in das Gesetz durchaus $bewu{\ss}t$, $da{\ss}$ die Vorschrift eine Ausnahme zur Schuldzurechnungsregelung darstellte. Er $w{\ddot{a}}hlte$ jedoch die Form eines $selbst{\ddot{a}}ndigen$ Tatbestandes, um die Durchbrechung des reinen Schuldprinzips $ertr{\ddot{a}}glich$ zu machen. Der Vollrauschtatbestand ist ein abstraktes $Gef{\ddot{a}}hrdungdsdelikt$ -demnach die im Rausch verwirklichte rechtswidrige Tat nur objektive Bedingung der Strafbarkeit ist -, das sachlich eine Schuldzurechnungsregelung $enth{\ddot{a}}lt$, und zwar eine Ausnahme $gegen{\ddot{u}}ber$ die Regelungen ${\ddot{u}}ber$ Schuldzurechnung. Dieser Vollrauschtatbestand ist dennoch als regitime $Erg{\ddot{a}}nzung$ der in Schuldzurechnungsregelungen beschriebenen $Schuldzurechnungsgrunds{\ddot{a}}tze$ anzusehen. Er steht $n{\ddot{a}}mlich$ in Einklang mit dem Schuldgrundsatz, wenn als subjektives Tatbestandsmerkmal des Vollrausches die Kenntnis der $Gef{\ddot{a}}hrlichkeit$ des Rauschzustandes $f{\ddot{u}}r$ die Begehung von Delikten vorausgesetzt wird.

Market Created Risk and the Formation of Stock Price (시장조성위험(市場造成危險)과 주식가격(株式價格)의 형성(形成))

  • Jaang, Dae-Hong
    • The Korean Journal of Financial Management
    • /
    • v.8 no.1
    • /
    • pp.123-137
    • /
    • 1991
  • This paper developes a multiperiod trading model of securities price formation which extends the notion of market created risk introduced by Kraus and Smith [1989]. It is shown that stock price volalitility can depend on combinations of market parameters known to the market participants only imperfectly. Resulting portfolio rebalancing equilibria generate self-justifying price movements while market fundamental remain unchanged.

  • PDF

Automatic Binary Execution Environment based on Real-machines for Intelligent Malware Analysis (지능형 악성코드 분석을 위한 리얼머신 기반의 바이너리 자동실행 환경)

  • Cho, Homook;Yoon, KwanSik;Choi, Sangyong;Kim, Yong-Min
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.3
    • /
    • pp.139-144
    • /
    • 2016
  • There exist many threats in cyber space, however current anti-virus software and other existing solutions do not effectively respond to malware that has become more complex and sophisticated. It was shown experimentally that it is possible for the proposed approach to provide an automatic execution environment for the detection of malicious behavior of active malware, comparing the virtual-machine environment with the real-machine environment based on user interaction. Moreover, the results show that it is possible to provide a dynamic analysis environment in order to analyze the intelligent malware effectively, through the comparison of malicious behavior activity in an automatic binary execution environment based on real-machines and the malicious behavior activity in a virtual-machine environment.

Android Application Call Relationship Analysis Based on DEX and ELF Binary Reverse Engineering (DEX와 ELF 바이너리 역공학 기반 안드로이드 어플리케이션 호출 관계 분석에 대한 연구)

  • Ahn, Jinung;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.45-55
    • /
    • 2019
  • DEX file and share objects (also known as the SO file) are important components that define the behaviors of an Android application. DEX file is implemented in Java code, whereas SO file under ELF file format is implemented in native code(C/C++). The two layers - Java and native can communicate with each other at runtime. Malicious applications have become more and more prevalent in mobile world, they are equipped with different evasion techniques to avoid being detected by anti-malware product. To avoid static analysis, some applications may perform malicious behavior in native code that is difficult to analyze. Existing researches fail to extract the call relationship which includes both Java code and native code, or can not analyze multi-DEX application. In this study, we design and implement a system that effectively extracts the call relationship between Java code and native code by analyzing DEX file and SO file of Android application.

Application of Multi-Attribute Utility Analysis for the Decision Support of Countermeasures in Early Phase of a Nuclear Emergency (원자력 사고시 초기 비상대응 결정지원을 위한 다속성 효용 분석법의 적용)

  • Hwang, Won-Tae;Kim, Eun-Han;Suh, Kyung-Suk;Jeong, Hyo-Joon;Han, Moon-Hee;Lee, Chang-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.1
    • /
    • pp.65-71
    • /
    • 2004
  • A multi-attribute utility analysis was investigated as a tool for the decision support of countermeasures in early phase of a nuclear accident. The utility function of attributes was assumed to be the second order polynomial expressions, and the weighting constant of attributes was determined using a swing weighting method. Because the main objective of this study focuses on the applicability of a multi-attribute utility analysis as a tool for the decision support of countermeasures in early phase of a nuclear accident, less quantifiable attributes were not included due to lack of information. In postulated accidental scenarios for the application of the designed methodology, the variation of the numerical values of total utility for the considered actions, e.g. sheltering, evacuation and no action, was investigated according to the variation of attributes. As a result, it was shown that the numerical values of total utility for the actions are distinctly different depending on the exposure dose and monetary value of dose. As increasing in both attributes, the rank of the numerical values of total utility increased for evacuation, which is more extreme action than for sheltering, while that of no action decreased. As expected probability of high dose is higher, the break-even values for the monetary value of dose, which are the monetary value of dose when the ranking of actions is changed, were lower. In audition, as aversion psychology for dose is higher, the break-even values for dose were lower.

A study on the regulation for unfairness and unfair trade practices in franchise business (프랜차이즈 거래의 불공정성에 대한 규제와 불공정거래행위에 관한 연구 - 공정거래위원회 심결례 분석을 중심으로 -)

  • Gwon, Yong-Deok;U, Jong-Pil;Lee, Sang-Yun
    • The Korean Journal of Franchise Management
    • /
    • v.2 no.1
    • /
    • pp.119-133
    • /
    • 2011
  • The objective of this study is to establish the basic concepts for franchise agreements in consideration of both theoretical and practical conditions, to set the parameters for the discussion regarding the practical business matters pertaining to franchise agreements, and to analyze the criteria for determining the illegality of unfair trade practices based on research into actual practices in franchise transactions and on case studies of the implementation of laws by the Fair Trade Commission. The study aims to thereby contribute to the stabilization of laws in franchise transactions, benefiting all parties including franchise-related institutions, participants in franchise transactions, and related consumers. In conclusion, even in cases where regulatory exceptions are applied within the Fair Franchise Transactions Act when determining the illegality of franchised businesses, it is impossible to eliminate illegality unless all necessary and sufficient conditions have been included, and even if the procedure for evading illegality has been undertaken, illegality may not be eliminated unless the contents thereof are legitimate.

A Study on Older Adults' Meaning of 'Ageism' (노인차별에 대한 노인의 의미화 방식에 관한 연구)

  • Lee, Ji young
    • 한국노년학
    • /
    • v.29 no.4
    • /
    • pp.1205-1232
    • /
    • 2009
  • This study investigates what older adults give meaning of ageism with relation to their self-identity. The main findings are as follows. The participants' response to daily life ageism is divided in four types: 'denial', 'evasion', 'acceptance', 'problematic proposal', and 'isolation'. In conclusion, this study contributes to understanding ageism in-depth. The findings of this study discover tension and suppression within society regarding ageism from the perspectives of the older participants, and reveal the latent dimension which is not caught with the language.

Research on Utilizing Emulab for Malware Analysis (악성코드 분석을 위한 Emulab 활용 방안 연구)

  • Lee, Man-hee;Seok, Woo-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.117-124
    • /
    • 2016
  • Virtual environment is widely used for analyzing malware which is increasing very rapidly. However, knowing this trend, hackers are adopting virtual environment detection techniques for malware to kill itself or stop malicious behaviors when detecting virtual environments. Various research is going on in order to thwart any efforts to utilize anti-virtualization techniques, but until now several techniques can evade most of well known virtual environments, making malware analysis very difficult. Emulab developed by Utah University assigns real systems and networks as researchers want in realtime. This research seeks how to use Emulab for malware analysis.

Prospect Theory based NPC Decision Making Model on Dynamic Terrain Analysis (동적 지형분석에서의 전망이론 기반 NPC 의사결정 모델)

  • Lee, Dong Hoon
    • Journal of Korea Game Society
    • /
    • v.14 no.4
    • /
    • pp.37-44
    • /
    • 2014
  • In this paper, we propose a NPC decision making model based on Prospect Theory which tries to model real-life choice, rather than optimal decision. For this purpose, we analyse the problems of reference point setting, diminishing sensitivity and loss aversion which are known as limitations of the utility theory and then apply these characteristics into the decision making in game. Dynamic Terrain Analysis is utilized to evaluate the proposed model and experimental result shows the method have effects on inducing diverse personality and emergent behavior on NPC.

Countermeasure for Detecting IAT Hooking (IAT 후킹 탐지 방안에 대한 연구)

  • Yim, Habin;Oh, Insu;Lee, Kyungroul;Yim, Kangbin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.207-208
    • /
    • 2017
  • 악성코드는 매년 그 수가 증가하고 있으며, 악성코드의 공격기법이 지능적이고 복합적으로 진화함에 따라 이에 대한 분석과 대응이 요구된다. 하지만 일부 악성코드는 감염여부를 숨기기 위하여 분석에 대한 회피방법으로 루트킷을 통하여 방어자에 의한 악성코드의 코드 분석을 우회함으로써 은폐된 상태로 악의적인 공격을 수행한다. 따라서 본 논문에서는 유저레벨에서 IAT(Import Address Table)의 정보를 후킹하여 악성 행위를 수행하는 루트킷을 탐지하는 대응방안을 제안한다.

  • PDF