• Title/Summary/Keyword: Evasion

Search Result 241, Processing Time 0.023 seconds

A Study on the Crimes Using NFT in P2E (P2E내 NFT를 이용한 범죄에 관한 연구)

  • Song, HyeJin
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.3
    • /
    • pp.600-608
    • /
    • 2022
  • Purpose: The purpose of this study is to examine the types of crimes taking place using NFT in P2E games, and to devise measures to prevent crimes and legal sanctions between the government and companies. Method: In order to classify crime types in the metaverse, crime types were analyzed based on the results of previous studies and current incidents. Results: Most of the crimes taking place through NFTs in P2E games are hacking, money laundering, and copyright issues. Although games are regulated in Korea, these are crimes that can occur if game regulations are loosened in the future. Therefore, crime types were classified into hacking, money laundering, tax evasion, copyright issues, and game speculation, and various cases of damage have already occurred in foreign countries. Conclusion: Currently, no crimes are occurring in Korea due to game regulations, but as seen in foreign cases, large amounts of hacking and money laundering using NFTs are taking place in Korea. this will have to be provided

Cultural Discount Analysis of Chinese and Korean Co-production Movies (한중 합작 영화의 문화 할인 분석)

  • Yang, Li-Juan
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.6
    • /
    • pp.103-111
    • /
    • 2019
  • Under the background of globalization, the borderless nature of film and television language makes the exchange of film as the carrier become an important part of cultural exchanges in various countries. Therefore, film co-production between China and the United States, China and Japan, China and South Korea and other countries has become an important part of the current Chinese film industry. Among them, China and South Korea are close neighbors, and the exchanges between the two countries' films are also increasing. Korean movies have recovered since the 1990s, and they prospered at the beginning of the 21st century, and have formed a unique influence in the international community, especially in crime, suspense, love and other types of films. The co-production of Chinese and Korean films began to appear in 2000, and the signing of the "China-Korea Co-production Film Agreement" in 2014 prompted the rapid convergence of Chinese and Korean film co-productions. However, the co-productions of China and South Korea did not achieve good expectations in terms of communication effects and market evaluation. This article will use the "cultural discount" theory in cross-cultural communication to analyze the reasons for the cultural discounts produced by Chinese and Korean co-productions and how to avoid this phenomenon to the maximum extent.

In Situ Sensing of Copper-plating Thickness Using OPD-regulated Optical Fourier-domain Reflectometry

  • Nayoung, Kim;Do Won, Kim;Nam Su, Park;Gyeong Hun, Kim;Yang Do, Kim;Chang-Seok, Kim
    • Current Optics and Photonics
    • /
    • v.7 no.1
    • /
    • pp.38-46
    • /
    • 2023
  • Optical Fourier-domain reflectometry (OFDR) sensors have been widely used to measure distances with high resolution and speed in a noncontact state. In the electroplating process of a printed circuit board, it is critically important to monitor the copper-plating thickness, as small deviations can lead to defects, such as an open or short circuit. In this paper we employ a phase-based OFDR sensor for in situ relative distance sensing of a sample with nanometer-scale resolution, during electroplating. We also develop an optical-path difference (OPD)-regulated sensing probe that can maintain a preset distance from the sample. This function can markedly facilitate practical measurements in two aspects: Optimal distance setting for high signal-to-noise ratio OFDR sensing, and protection of a fragile probe tip via vertical evasion movement. In a sample with a centimeter-scale structure, a conventional OFDR sensor will probably either bump into the sample or practically out of the detection range of the sensing probe. To address this limitation, a novel OPD-regulated OFDR system is designed by combining the OFDR sensing probe and linear piezo motors with feedback-loop control. By using multiple OFDR sensors, it is possible to effectively monitor copper-plating thickness in situ and uniformize it at various positions.

Network Forensics and Intrusion Detection in MQTT-Based Smart Homes

  • Lama AlNabulsi;Sireen AlGhamdi;Ghala AlMuhawis;Ghada AlSaif;Fouz AlKhaldi;Maryam AlDossary;Hussian AlAttas;Abdullah AlMuhaideb
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.95-102
    • /
    • 2023
  • The emergence of Internet of Things (IoT) into our daily lives has grown rapidly. It's been integrated to our homes, cars, and cities, increasing the intelligence of devices involved in communications. Enormous amount of data is exchanged over smart devices through the internet, which raises security concerns in regards of privacy evasion. This paper is focused on the forensics and intrusion detection on one of the most common protocols in IoT environments, especially smart home environments, which is the Message Queuing Telemetry Transport (MQTT) protocol. The paper covers general IoT infrastructure, MQTT protocol and attacks conducted on it, and multiple network forensics frameworks in smart homes. Furthermore, a machine learning model is developed and tested to detect several types of attacks in an IoT network. A forensics tool (MQTTracker) is proposed to contribute to the investigation of MQTT protocol in order to provide a safer technological future in the warmth of people's homes. The MQTT-IOT-IDS2020 dataset is used to train the machine learning model. In addition, different attack detection algorithms are compared to ensure the suitable algorithm is chosen to perform accurate classification of attacks within MQTT traffic.

Discrimination of biological and artificial nicotine in e-liquid

  • Hyoung-Joon Park;Heesung Moon;Min Kyoung Lee;Min Soo Kim;Seok Heo;Chang-Yong Yoon;Sunyoung Baek
    • Analytical Science and Technology
    • /
    • v.36 no.1
    • /
    • pp.22-31
    • /
    • 2023
  • As the use of e-liquid cigarettes is rapidly increasing worldwide, it multiplies the potential risk undisclosed to the health of non- and smokers. To reduce the hazard, each country has its own set of regulations for controlling e-liquids. In Korea, the narrow definition of tobacco makes it difficult and have been steadily occurring tax evasion exploiting the difference in natural and artificial nicotine. Therefore, it is very important to distinguish source of nicotine for their regulation. To find biochemical discriminant markers, this study established analysis methods based on high-performance liquid chromatography coupled with diode array detector (HPLC-DAD) and high-performance liquid chromatography coupled with triple Quadrupole mass spectrometry (HPLC-MS/MS) for nicotine enantiomers and tobacco alkaloids targeted using the difference in pathways of nicotine biosynthesis and chemical synthesis. The method was validated by experimenting linearity (R2 > 0.999), recovery (80.99-108.41 %), accuracy (94.11-109.73 %) and precision (0.04-8.27 %). Then, the results for discrimination of the nicotine obtained from analysis of 65 commercial e-liquid products available in Korean market was evaluated. The method successfully applied to the e-liquids and one sample labelled 'synthetic nicotine' for tax exemption was found to contain a natural nicotine product. This method can be used to determine whether an e-liquid product uses natural or artificial nicotine and monitor non-taxable e-liquid products. The method is more scientific than the existing one, which relies only on field evidence.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

De-Obfuscated Scheme for Obfuscation Techniques Based on Trampoline Code (트램폴린 코드 기반의 난독화 기법을 위한 역난독화 시스템)

  • Minho Kim;Jeong Hyun Yi;Haehyun Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1043-1053
    • /
    • 2023
  • Malware analysts work diligently to analyze and counteract malware, while developers persistently devise evasion tactics, notably through packing and obfuscation techniques. Although previous works have proposed general unpacking approaches, they inadequately address techniques like OEP obfuscation and API obfuscation employed by modern packers, leading to occasional failures during the unpacking process. This paper examines the OEP and API obfuscation techniques utilized by various packers and introduces a system designed to automatically de-obfuscate them. The system analyzes the memory of packed programs, detects trampoline codes, and identifies obfuscated information, for program reconstruction. Experimental results demonstrate the effectiveness of our system in de-obfuscating programs that have undergone OEP and API obfuscation techniques.

Anonymous Electronic Promissory Note System Based on Blockchain (블록체인 기반 익명 전자 어음 시스템)

  • HyunJoo Woo;Hyoseung Kim;Dong Hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.947-960
    • /
    • 2023
  • In Korea, traditional paper promissory notes are currently undergoing a transformation, being gradually replaced by electronic notes. This transformation is being steered under the Korea Financial Telecommunications Institute, a trusted authority. However, existing electronic systems have security vulnerabilities, including the risk of hacking and internal errors within the institute. To this end, we have defined a novel anonymous electronic promissory note system based on blockchain. We have constructed a concrete protocol and conducted security analysis of our protocol. Note that, in our protocol, every note information is committed so that the note remains undisclosed until the point of payment. Once the note information becomes public on the blockchain, it enables the detection of illicit activities, such as money laundering and tax evasion. Furthermore, our protocol incorporates a feature of split endorsement, which is a crucial functionality permitted by the Korean electronic note system. Consequently, our proposed protocol is suitable for practical applications in financial transactions.

MicroRNA expression profiling in the lungs of genetically different Ri chicken lines against the highly pathogenic avian influenza H5N1 virus

  • Sooyeon Lee;Suyeon Kang;Jubi Heo;Yeojin Hong;Thi Hao Vu;Anh Duc Truong;Hyun S Lillehoj;Yeong Ho Hong
    • Journal of Animal Science and Technology
    • /
    • v.65 no.4
    • /
    • pp.838-855
    • /
    • 2023
  • The highly pathogenic avian influenza (HPAI) virus triggers infectious diseases, resulting in pulmonary damage and high mortality in domestic poultry worldwide. This study aimed to analyze miRNA expression profiles after infection with the HPAI H5N1 virus in resistant and susceptible lines of Ri chickens.For this purpose, resistant and susceptible lines of Vietnamese Ri chicken were used based on the A/G allele of Mx and BF2 genes. These genes are responsible for innate antiviral activity and were selected to determine differentially expressed (DE) miRNAs in HPAI-infected chicken lines using small RNA sequencing. A total of 44 miRNAs were DE after 3 days of infection with the H5N1 virus. Computational program analysis indicated the candidate target genes for DE miRNAs to possess significant functions related to cytokines, chemokines, MAPK signaling pathway, ErBb signaling pathway, and Wnt signaling pathway. Several DE miRNA-mRNA matches were suggested to play crucial roles in mediating immune functions against viral evasion. These results revealed the potential regulatory roles of miRNAs in the immune response of the two Ri chicken lines against HPAI H5N1 virus infection in the lungs.

Case Study of Building a Malicious Domain Detection Model Considering Human Habitual Characteristics: Focusing on LSTM-based Deep Learning Model (인간의 습관적 특성을 고려한 악성 도메인 탐지 모델 구축 사례: LSTM 기반 Deep Learning 모델 중심)

  • Jung Ju Won
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.65-72
    • /
    • 2023
  • This paper proposes a method for detecting malicious domains considering human habitual characteristics by building a Deep Learning model based on LSTM (Long Short-Term Memory). DGA (Domain Generation Algorithm) malicious domains exploit human habitual errors, resulting in severe security threats. The objective is to swiftly and accurately respond to changes in malicious domains and their evasion techniques through typosquatting to minimize security threats. The LSTM-based Deep Learning model automatically analyzes and categorizes generated domains as malicious or benign based on malware-specific features. As a result of evaluating the model's performance based on ROC curve and AUC accuracy, it demonstrated 99.21% superior detection accuracy. Not only can this model detect malicious domains in real-time, but it also holds potential applications across various cyber security domains. This paper proposes and explores a novel approach aimed at safeguarding users and fostering a secure cyber environment against cyber attacks.