• Title/Summary/Keyword: Deployment process

Search Result 376, Processing Time 0.022 seconds

Mepelyzer : Malicious App Identification Mechanism based on Method & Permission Similarity Analysis of Server-Side Polymorphic Mobile Apps (Mepelyzer : 서버 기반 다형상 모바일 앱에 대한 메소드 및 퍼미션 유사도 기반 악성앱 판별)

  • Lee, Han Seong;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.49-61
    • /
    • 2017
  • Recently, convenience and usability are increasing with the development and deployment of various mobile applications on the Android platform. However, important information stored in the smartphone is leaked to the outside without knowing the user since the malicious mobile application is continuously increasing. A variety of mobile vaccines have been developed for the Android platform to detect malicious apps. Recently discovered server-based polymorphic(SSP) malicious mobile apps include obfuscation techniques. Therefore, it is not easy to detect existing mobile vaccines because some other form of malicious app is newly created by using SSP mechanism. In this paper, we analyze the correlation between the similarity of the method in the DEX file constituting the core malicious code and the permission similarity measure through APK de-compiling process for the SSP malicious app. According to the analysis results of DEX method similarity and permission similarity, we could extract the characteristics of SSP malicious apps and found the difference that can be distinguished from the normal app.

A Feature-Oriented Approach to Variability Management and Consistency Analysis of Multi-Viewpoint Product Line Architectures (다중 관점 제품계열아키텍처의 가변성 관리 및 일관성 검사를 위한 특성 지향 접근방법)

  • Lee, Kwan-Woo
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.803-814
    • /
    • 2008
  • Product line architectures include variable parts to be selected according to product specific requirements. In order to derive architectures that are valid for a particular product from product line architectures, variabilities of product line architectures must be systematically managed. In this paper, we adopt an approach to variability management of product line architectures through an explicit mapping between a feature model and product line architecture models. If this mapping is incorrect or there exists inconsistency among product line architectural elements, variabilities of product line architectures cannot be managed correctly. Therefore, this paper formally defines product line architectural models in terms of conceptual, process, deployment, and module views, and mapping relationships between the feature model and the architectural models. Consistency rules for correct variability management of product line architectures are defined in terms of consistency in each of product line architecture model, consistency between different architectural view models, and consistency between a feature model and product line architectural models. These consistency rules provide a theoretical foundation for deriving valid product architecture from product line architectures.

Development of the Human Satisfaction Dimension for Customer-Oriented Quality Evaluation of Shoes (제화류의 고객지향적 품질평가를 위한 감성만족도 요소 개발에 관한 연구)

  • 김진호;황인극
    • Science of Emotion and Sensibility
    • /
    • v.7 no.2
    • /
    • pp.107-121
    • /
    • 2004
  • Although consumer needs for better products force manufactures to put emphasis on design, often development of a product has been done without the formal phase to consider human needs. In order to identify the implicit needs of customers and the areas of potential demand on a product, several analysis scheme such as QFD(quality function deployment) has been developed. For this, first of all, the methods for evaluating consumers satisfaction about their needs must be determined. However there were only few systematic methods on shoe design. In this paper we developed an innovative framework for human satisfaction evaluation of shoes. As a result, we uncovered 29 dominant human satisfaction dimensions for customer-oriented quality evaluation of a comfortable shoes. Here, 29 satisfaction dimensions were identified as the dimensions that represent the human sensitivity and psychological feeling on comfortable shoes. This study helped the designers and developers clarify the conceptual and abstract aspect of the design evaluation by proposing a more systematic and process-oriented method.

  • PDF

An Establishment of Super Wi-Fi Environment in Ships Based on UHF System of TMS

  • Kim, Jungwoo;Son, Jooyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2103-2123
    • /
    • 2018
  • Ships built today are larger in scale and feature more complex structures. The ever-evolving systems used on board a ship require vast amounts of data processing. In the future, with the advent of smart ships, unmanned ships and other next-generation ships, the volumes of data to be processed will continue to increase. Yet, to date, ship data has been processed using wired networks. Placed at fixed locations, the nodes on wired networks often fail to process data from mobile devices. Despite many attempts made to use Wi-Fi on ships just as on land to create wireless networks, Wi-Fi has hardly been available due to the complex metal structures of ships. Therefore, Wi-Fi on ships has been patchy as the ship-wide total Wi-Fi coverage has not properly implemented. A new ship-wide wireless network environment is part of the technology conducive to the shipbuilding industry. The wireless network environment should not only serve the purpose of communication but also be able to manage and control multiple features in real-time: fault diagnostics, tracking, accident prevention and safety management. To better understand the characteristics of wireless frequencies for ships, this paper tests the widely used TETRA, UHF and Wi-Fi and sheds light on the features, advantages and disadvantages of each technology in ship settings. The proposed deployment of a Super Wi-Fi network leveraging the legacy UHF system of TMS generates a ship-wide wireless network environment. The experimental findings corroborate the feasibility of the proposed ship-wide Super Wi-Fi network environment.

W-Band Radar Altimeter for Drones (드론용 W-대역 레이다 고도계)

  • Lee, Yong-Seok;Lee, Gwon-Hak;Kim, Jun-Seong;Park, Jae-Hyun;Kim, Byung-Sung;Song, Reem
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.4
    • /
    • pp.314-319
    • /
    • 2019
  • In this study, we propose a W-band frequency modulated continuous wave(FMCW) radar altimeter that can measure the altitude based on the frequency differences of transmitted and received signals. This W-band FMCW system is powered by an altitude control algorithm, which we propose to help prevent collisions of drones with obstacles in real deployment by measuring the relative altitude. It is shown that this algorithm enables the drone to be positioned within a 3 % error of altitude from the desired input height. The chip used in the W-band transmitter and receiver was fabricated using a 65-nm CMOS process, and a horn antenna was directly fed by incorporating an embedded waveguide feeder into the chip. The clutter spectra observed in terrains including soil, grass, and calm lake water were measured and compared, confirming the reflectivity characteristics of various surfaces of different water contents.

The Deployment of Dutch Collective Housing Types and Case Study of Contemporary Perimeter Block Housing (네덜란드 집합주택유형의 전개와 현대 블록형 집합주택 사례 연구)

  • Lim, Jae Heon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.525-534
    • /
    • 2022
  • The supply of housing can be understood through a close relationship with the urbanization phenomenon. Through industrialization and urbanization, many cities have implemented systems and policies for housing supply due to population concentration in cities, poor housing quality, and lack of housing. In the case of the Netherlands, the Housing Act was enacted in 1901 to improve the residential environment during the period when the population was concentrated in the city, and various efforts were made to expand the housing supply. Through this process, we understand the background of collective housing types in the Netherlands and analyze the application stages of contemporary residential housing planning in Rotterdam and Amsterdam. On the other hand, through the experience of Western society, we examine how to view the problem of multi-family housing types in our society, where the proportion of apartments is continuously increasing.

ECPS: Efficient Cloud Processing Scheme for Massive Contents (클라우드 환경에서 대규모 콘텐츠를 위한 효율적인 자원처리 기법)

  • Na, Moon-Sung;Kim, Seung-Hoon;Lee, Jae-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.17-27
    • /
    • 2010
  • Major IT vendors expect that cloud computing technology makes it possible to reduce the contents service cycle, speed up application deployment and skip the installation process, reducing operational costs, proactive management etc. However, cloud computing environment for massive content service solutions requires high-performance data processing to reduce the time of data processing and analysis. In this study, Efficient_Cloud_Processing_Scheme(ECPS) is proposed for allocation of resources for massive content services. For high-performance services, optimized resource allocation plan is presented using MapReduce programming techniques and association rules that is used to detect hidden patterns in data mining, based on levels of Hadoop platform(Infrastructure as a service). The proposed ECPS has brought more than 20% improvement in performance and speed compared to the traditional methods.

A Study on the Development of DevSecOps through the Combination of Open Source Vulnerability Scanning Tools and the Design of Security Metrics (오픈소스 취약점 점검 도구 및 종합 보안 메트릭 설계를 통한 DevSecOps 구축방안 연구)

  • Yeonghae Choi;Hyeongjun Noh;Seongyun Cho;Hanseong Kang;Dongwan Kim;Suhyun Park;Minjae Cho;Juhyung Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.699-707
    • /
    • 2023
  • DevSecOps is a concept that adds security procedures to the operational procedures of DevOps to respond to the short development and operation cycle. Multi-step vulnerability scanning process should be considered to provide reliable security while supporting rapid development and deployment cycle in DevSecOps. Many open-source vulnerability scanning tools available can be used for each stage of scanning, but there are difficulties in evaluating the security level and identifying the importance of information in integrated operation due to the various functions supported by the tools and different security results. This paper proposes an integrated security metric design plan for scurity results and the combination of open-source scanning tools that can be used in security stage when building the open-source based DevSecOps system.

Script-based cloud integration mechanism to support hybrid cloud implementation (하이브리드 클라우드 구축을 지원하기 위한 스크립트 기반의 클라우드 결합 기법)

  • Kim, Ungsoo;Park, Joonseok;Yeom, Keunhyuk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.5
    • /
    • pp.80-92
    • /
    • 2017
  • The popularity of cloud computing has led to the emergence of various types of cloud services, and the hybrid cloud, a deployment model that integrates public cloud and private cloud and offset their shortcomings, is in the spotlight recently. However, the complexity of different clouds integration and the lack of related integration solutions have delayed the adoption of hybrid cloud and cloud strategy by companies and organizations. Therefore, in this paper, we propose a cloud integration mechanism to solve the integration complexity problem. The cloud integration mechanism proposed in this paper consists of integration script that solves the cloud integration by the script based on the hybrid cloud function, a process of creating and executing it, and a script creation model applying the software design pattern. By integrating the various cloud services, we can quickly generate scripts that meet the user's needs. It is expected that the introduction of hybrid cloud and the acquisition of cloud strategy can be accelerated through this proposed integration mechanism.

Secret Sharing based Node Authentication in FANET (FANET에서의 비밀분산 기반 노드 인증)

  • Yang Ji Hun;Lee Soo Jin
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.25-34
    • /
    • 2022
  • This paper proposes a secret sharing based fast node authentication technique applicable to Flying Ad-Hoc Network (FANET) that can be used to construct self-organized communication network in multi drones and drone squadrons operations. Before deployment, each node stores an exponential share, exponential secret and a portion of PUF CRP table. After being deployed in the field, in the early-stage of network formation, each node broadcasts its ID, exponential share and a hash value of PUF Response and pseudo-random number. Then each node performs a reconstruction of the exponential secret using the exponential shares transmitted from neighboring nodes. When the exponential secret is reconstructed, simultaneous authentication is completed for all nodes that have transmitted the exponential share used in the reconstruction. A node that transmits an incorrect exponential share to disturb the reconstruction of the exponential secret during the authentication process can be detected before performing the reconstruction through the verification of the hash value, and will be excluded from the reconstruction.