• Title/Summary/Keyword: Forgery Analysis

Search Result 70, Processing Time 0.033 seconds

A Study on Privilege Elevation Attack Management for Smart Transaction Security on BlockChain Etherium Based System

  • Min, Youn-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.65-71
    • /
    • 2019
  • IAs smart device penetration rate is more than 90%, mobile transaction ratio using smart device is increasing. Smart contracts are used in various areas of real life including smart trading. By applying smart contracts to the platform for smart transactions through block-chain technology, the threat of hacking or forgery can be reduced. However, various threats to devices in smart transactions can pose a threat to the use of block chain Etherium, an important element in privilege and personal information management. Smart contract used in block chain Ethereum includes important information or transaction details of users. Therefore, in case of an attack of privilege elevation, it is very likely to exploit transaction details or forge or tamper with personal information inquiry. In this paper, we propose a detection and countermeasure method for privilege escalation attack, which is especially important for block chain for secure smart transaction using block chain Ethereum. When comparing the results of this study with the results of similar applications and researches, we showed about 12~13% improvement in performance and suggested the future countermeasures through packet analysis.

Automatic Detection of Forgery in Cell phone Images using Analysis of CFA Pattern Characteristics in Imaging Sensor (휴대폰의 CFA 패턴특성을 이용한 사진 위변조 탐지)

  • Shim, Jae-Youen;Kim, Seong-Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1118-1121
    • /
    • 2010
  • With the advent of cell phone digital cameras, and sophisticated photo editing software, digital images can be easily manipulated and altered. Although good forgeries may leave no visual clues of having been tampered with, they may, nevertheless, alter the underlying statistics of an image. Most digital camera equipped in cell phones employ a single image sensor in conjunction with a color filter array (CFA), and then interpolates the missing color samples to obtain a three channel color image. This interpolation introduces specific correlations which are likely to be destroyed when tampering with an image. We quantify the specific correlations introduced by CFA interpolation, and describe how these correlations, or lack thereof, can be automatically detected in any portion of an image. We show the efficacy of this approach in revealing traces of digital tampering in lossless and lossy compressed color images interpolated with several different CFA algorithms in test cell phones.

Automatic Detection of Forgery in Video Frames using Analysis of Imaging Device Profile based Pattern Trace (영상기기의 프로파일 분석 기반 패턴추적에 의한 비디오 프레임의 위변조탐지)

  • Shim, Jae-Youen;Chon, In-Hyuk;Kim, Seong-Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1024-1027
    • /
    • 2011
  • 본 논문은 HD (High-definition) video, SD (Standard-definition) video, low quality video, handset video, 4 가지 Imaging Device 에 대한 프로파일 분석을 통해 비디오 프레임 상에 나타나는 위 변조를 검사하는 방법을 제안한다. High-definition video, Standard-definition video, low quality video, handset video 에 대한 분석을 하고 각 영상의 특이 점을 파악 하여 분류한 클래스에 대한 프로파일검사를 통해 EM Algorithm 을 이용하여 영상의 위 변조를 검사 하고 영상의 신뢰성을 높인다.

A comparative analysis of metadata structures and attributes of Samsung smartphone voice recording files for forensic use (법과학적 활용을 위한 삼성 스마트폰 음성 녹음 파일의 메타데이터 구조 및 속성 비교 분석 연구)

  • Ahn, Seo-Yeong;Ryu, Se-Hui;Kim, Kyung-Wha;Hong, Ki-Hyung
    • Phonetics and Speech Sciences
    • /
    • v.14 no.3
    • /
    • pp.103-112
    • /
    • 2022
  • Due to the popularization of smartphones, most of the recorded speech files submitted as evidence of recent crimes are produced by smartphones, and the integrity (forgery) of the submitted speech files based on smartphones is emerging as a major issue in the investigation and trial process. Samsung smartphones with the highest domestic market share are distributed with built-in speech recording applications that can record calls and voice, and can edit recorded speech. Unlike editing through third-party speech (audio) applications, editing by their own builtin speech applications has a high similarity to the original file in metadata structures and attributes, so more precise analysis techniques need to prove integrity. In this study, we constructed a speech file metadata database for speech files (original files) recorded by 34 Samsung smartphones and edited speech files edited by their built-in speech recording applications. We analyzed by comparing the metadata structures and attributes of the original files to their edited ones. As a result, we found significant metadata differences between the original speech files and the edited ones.

Study for the Standardization and Comparison by Processed Morindae Radix (파극천(巴戟天) 포제방법(?製方法)에 따른 품질표준화 연구)

  • Lee, Hye-Won;Chun, Jin-Mi;Lee, A-Yeong;Kim, Ho-Kyoung
    • The Korea Journal of Herbology
    • /
    • v.20 no.4
    • /
    • pp.133-140
    • /
    • 2005
  • Objectives : We have been used many herbal medicines after processing to improve the effect, decrease toxicity and side-effect, and change property. We have studied the physico-chemical change and HPLC pattern of Morindae Radix by means of processing method. Methods : This study was investigated the contents of loss on drying, residue on ignition, residue on acid insoluble ignition, 50% ethanol extract and HPLC pattern of Morindae Radix(Morinda officinalis How.) by processed and non-processed. We have conducted Morindae Radix and Damnacanthi Radix which is circulated in herbal medicine market by forgery. Processed Morindae Radix was prepared by heating of added to salt(SP), liquor(LP) and Glycyrrhizae Radix solution(GP) for 20-40 minutes. Results and Conclusions : From this analysis, we found that the content of 50% ethanol extract was increased by processing method. And we were detected distinguishable marker of processed and non-processed from Morindae Radix(Morinda officinalis How.) by HPLC pattern analysis.

  • PDF

A Study on the Evidence Investigation of Forged/Modulated Time-Stamp at iOS(iPhone, iPad) (iOS(iPhone, iPad)에서의 타임스탬프 위·변조 흔적 조사에 관한 연구)

  • Lee, Sanghyun;Lee, Yunho;Lee, Sangjin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.7
    • /
    • pp.173-180
    • /
    • 2016
  • Since smartphones possess a variety of user information, we can derive useful data related to the case from app data analysis in the digital forensic perspective. However, it requires an appropriate forensic measure as smartphone has the property of high mobility and high possibility of data loss, forgery, and modulation. Especially the forged/modulated time-stamp impairs the credibility of digital proof and results in the perplexity during the timeline analysis. This paper provides traces of usage which could investigate whether the time-stamp has been forged/modulated or not within the range of iOS based devices.

A Study on Tainting Technique for leaking official certificates Malicious App Detection in Android (공인인증서 유출형 안드로이드 악성앱 탐지를 위한 Tainting 기법 활용 연구)

  • Yoon, Hanj Jae;Lee, Man Hee
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.27-35
    • /
    • 2018
  • The certificate is electronic information issued by an accredited certification body to certify an individual or to prevent forgery and alteration between communications. Certified certificates are stored in PCs and smart phones in the form of encrypted files and are used to prove individuals when using Internet banking and smart banking services. Among the rapidly growing Android-based malicious applications are malicious apps that leak personal information, especially certificates that exist in the form of files. This paper proposes a method for judging whether malicious codes leak certificates by using DroidBox, an Android-based dynamic analysis tool.

  • PDF

Code Automatic Analysis Technique for Virtualization-based Obfuscation and Deobfuscation (가상화 기반 난독화 및 역난독화를 위한 코드 자동 분석 기술)

  • Kim, Soon-Gohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.724-731
    • /
    • 2018
  • Code obfuscation is a technology that makes programs difficult to understand for the purpose of interpreting programs or preventing forgery or tampering. Inverse reading is a technology that analyzes the meaning of origin through reverse engineering technology by receiving obfuscated programs as input. This paper is an analysis of obfuscation and reverse-toxicization technologies for binary code in a virtualized-based environment. Based on VMAttack, a detailed analysis of static code analysis, dynamic code analysis, and optimization techniques were analyzed specifically for obfuscation and reverse-dipidization techniques before obfuscating and reverse-dipulation techniques. Through this thesis, we expect to be able to carry out various research on virtualization and obfuscation. In particular, it is expected that research from stack-based virtual machines can be attempted by adding capabilities to enable them to run on register-based virtual machines.

Injection Molding of Vertebral Fixed Cage Implant

  • Yoo, Kyun Min;Lee, Seok Won;Youn, Jae Ryoun;Yoon, Do Heum;Cho, Yon Eun;Yu, Jae-Pil;Park, Hyung Sang
    • Fibers and Polymers
    • /
    • v.4 no.2
    • /
    • pp.89-96
    • /
    • 2003
  • A vertebral cage is a hollow medical device which is used in spine forgery. By implanting the cage into the spine column, it is possible to restore disc and relieve pressure on the nerve roots. Most cages have been made of titanium alloys but they detract the biocompatibility. Currently PEEK (polyether ether ketone) if applied to various implants because it has good properties like heat resistance, chemical resistance, strength, and especially biocompatibility. A new shape of vertebral cage is designed and injection molding of PEEK is considered for production. Before injection molding of the cage, it is needed to evaluate process conditions and properties of the final product. Variables affecting the shrinkage of the cage are considered, e.g., injection time, packing pressure, mold temperature, and melt temperature. By using the numerical simula-tion program, MOLDFLOW, several cases are studied. Data files obtained by MOLDFLOW analysis are used for stress anal-ysis with ABAQUS, and shrinkage and residual stress fields are predicted. With these results, optimum process conditions are determined.

A Study of Verification for Modification of Location Information in Disaster Image Transmitting Through a Smart-phone (스마트폰을 이용한 재난 영상의 위치변조에 대한 검증에 관한 연구)

  • Seo, Tae-Woong;Lee, Sung-Ryoul;Bae, Byung-Chul;Yoon, E-Joong;Kim, Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.242-249
    • /
    • 2012
  • Recently, value added location based service and convergence monitoring and control system is growing. The cases include increasing usage of smart-phone for taking picture, wireless network, GPS and digital map. Especially, Smart-phone is appropriate for using image information and location information. However it is possible to be exploited for forgery and manipulation. So we experimented on transferring modified data on the smart-phone as image and location information in EXIF and researched the technology for data verification. In addition, we have designed security monitoring and control prototype considering axis-address matching analysis used geocoding, watermarking verification, encryption.