• Title/Summary/Keyword: IT보안

Search Result 5,432, Processing Time 0.031 seconds

A Scheme for Identifying Malicious Applications Based on API Characteristics (API 특성 정보기반 악성 애플리케이션 식별 기법)

  • Cho, Taejoo;Kim, Hyunki;Lee, Junghwan;Jung, Moongyu;Yi, Jeong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.187-196
    • /
    • 2016
  • Android applications are inherently vulnerable to a repackaging attack such that malicious codes are easily inserted into an application and then resigned by the attacker. These days, it occurs often that such private or individual information is leaked. In principle, all Android applications are composed of user defined methods and APIs. As well as accessing to resources on platform, APIs play a role as a practical functional feature, and user defined methods play a role as a feature by using APIs. In this paper we propose a scheme to analyze sensitive APIs mostly used in malicious applications in terms of how malicious applications operate and which API they use. Based on the characteristics of target APIs, we accumulate the knowledge on such APIs using a machine learning scheme based on Naive Bayes algorithm. Resulting from the learned results, we are able to provide fine-grained numeric score on the degree of vulnerabilities of mobile applications. In doing so, we expect the proposed scheme will help mobile application developers identify the security level of applications in advance.

Back-Propagation Neural Network Based Face Detection and Pose Estimation (오류-역전파 신경망 기반의 얼굴 검출 및 포즈 추정)

  • Lee, Jae-Hoon;Jun, In-Ja;Lee, Jung-Hoon;Rhee, Phill-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.9B no.6
    • /
    • pp.853-862
    • /
    • 2002
  • Face Detection can be defined as follows : Given a digitalized arbitrary or image sequence, the goal of face detection is to determine whether or not there is any human face in the image, and if present, return its location, direction, size, and so on. This technique is based on many applications such face recognition facial expression, head gesture and so on, and is one of important qualify factors. But face in an given image is considerably difficult because facial expression, pose, facial size, light conditions and so on change the overall appearance of faces, thereby making it difficult to detect them rapidly and exactly. Therefore, this paper proposes fast and exact face detection which overcomes some restrictions by using neural network. The proposed system can be face detection irrelevant to facial expression, background and pose rapidily. For this. face detection is performed by neural network and detection response time is shortened by reducing search region and decreasing calculation time of neural network. Reduced search region is accomplished by using skin color segment and frame difference. And neural network calculation time is decreased by reducing input vector sire of neural network. Principle Component Analysis (PCA) can reduce the dimension of data. Also, pose estimates in extracted facial image and eye region is located. This result enables to us more informations about face. The experiment measured success rate and process time using the Squared Mahalanobis distance. Both of still images and sequence images was experimented and in case of skin color segment, the result shows different success rate whether or not camera setting. Pose estimation experiments was carried out under same conditions and existence or nonexistence glasses shows different result in eye region detection. The experiment results show satisfactory detection rate and process time for real time system.

Hardware Architecture of High Performance Cipher for Security of Digital Hologram (디지털 홀로그램의 보안을 위한 고성능 암호화기의 하드웨어 구조)

  • Seo, Young-Ho;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.374-387
    • /
    • 2012
  • In this paper, we implement a new hardware for finding the significant coefficients of a digital hologram and ciphering them using discrete wavelet packet transform (DWPT). Discrete wavelet transform (DWT) and packetization of subbands is used, and the adopted ciphering technique can encrypt the subbands with various robustness based on the level of the wavelet transform and the threshold of subband energy. The hologram encryption consists of two parts; the first is to process DWPT, and the second is to encrypt the coefficients. We propose a lifting based hardware architecture for fast DWPT and block ciphering system with multi-mode for the various types of encryption. The unit cell which calculates the repeated arithmetic with the same structure is proposed and then it is expanded to the lifting kernel hardware. The block ciphering system is configured with three block cipher, AES, SEED and 3DES and encrypt and decrypt data with minimal latency time(minimum 128 clocks, maximum 256 clock) in real time. The information of a digital hologram can be hided by encrypting 0.032% data of all. The implemented hardware used about 200K gates in $0.25{\mu}m$ CMOS library and was stably operated with 165MHz clock frequency in timing simulation.

Effect of the Inner Pressure on a Hybrid Composite Flywheel Retor (하이브리드 복합재 플라이휠 로터에 작용하는 내압의 효과)

  • Oh Je-Hoon;Han Sang-Chul;Kim Myung-Hoon;Ha Sung Kyu
    • Composites Research
    • /
    • v.18 no.1
    • /
    • pp.45-54
    • /
    • 2005
  • The delamination in the filament-wound composite flywheel rotor often lowers the performance of the flywheel energy storage system. A conventional ring type hub usually causes tensile stresses on the inner surface of the composite rotor, resulting in lowering the maximum rotational speed of the rotor. In this work, the stress and strain distributions within a hybrid composite rotor were derived from the two-dimensional governing equation with the specified boundary conditions, and an optimum pressure at the inner surface of the rotor was proposed to minimize the strength ratio and maximize the storage energy. A split type hub was introduced to apply the calculated optimum pressure at the inner surface, and a spin test was performed up to 40,000 rpm to demonstrate the performance of the split type hub with radial and circumferential strains measured using a wireless telemetry system. From the analysis and the test, it was found that the split type hub successfully generates a compressive pressure on the inner surface of the rotor, which can enhance the performance of the composite rotor by lowering the strength ratio within the rotor.

International Trends for Utilization of Maritime Radio Communication Systems (해상무선통신시스템의 적용에 관한 국제동향 연구)

  • Jeong, Jung-Sik;Kim, Byung-Ok;Jang, Dong-Won;An, Kwang;Choi, Seong-Yong
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2006.05a
    • /
    • pp.177-183
    • /
    • 2006
  • IMO and ITU-R have done an intensive study to develop performance standards and technical standards of maritime digital communication systems, respectively. In particular, each administration strives to develop new agenda items of adopting digital new technologies. IMO COMSAR submitted draft performance standard of LRIT to IMO MSC, so that IMO mandates carriage requirement of LRIT In addition to that, COMSAR is preparing performance standard of AIS-SART, and approved the utilization of mobile phones for SAR activities. On the other hand, a new agenda item concerning E-navigation strategy was submitted to MSC 81th meeting. These challenges toward enhanced maritime radio communication systems would make it change largely the concepts of traditional navigation We suggest future directions of maritime information communication systems, investigating the study results of IMO and ITU-R.

  • PDF

Empirical Study on the Performance Analysis and Function of Jindo Coastal Vessel Traffic Service (진도 연안VTS의 성과 분석 및 기능에 관한 실증적 연구)

  • Jeong, Jae-Yong;Jung, Cho-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.18 no.4
    • /
    • pp.308-315
    • /
    • 2012
  • Hebei Spirit Oil Spill that happened in 2007 had prompted the need of revisiting the coastal safety. In response to this, Korea had made an effort to implement VTS in every coastline in the country. There are a lot of theoretical studies on VTS function nowadays, but coastal VTS are less frequently studied. In this paper, performance analysis results and accident prevention activities of Jindo Coastal VTS center were summarized and the Coastal VTS function are investigated. Jindo Coastal VTS covers relatively wide area and various places with various maritime traffic characteristics are the major navigation vessels, which means that it is important to control these vessels. Since the probability of accidents due to human error is relatively high in coastal area due to negligence tendency of crews during coastal area navigation, coastal VTS has to provide sufficient assistance to navigating vessels. Like most harbour VTS, Coastal VTS provides not only main information service, navigational assistance and traffic organization services but also various services related with advanced search-and-rescue assistance, marine national security, maritime crime prevention, oil spill response, traffic services for non-service vessel, and safety supervision for water leisure boats.

Mobile phone payment system using a light signal (휴대폰의 광원을 이용한 디지털 카드 시스템)

  • Hu, Moon-Heang;Shin, Moon-Sun;Ryu, Kuen-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1237-1244
    • /
    • 2009
  • In this paper, we proposed a mobile phone payment system using light signal containing payment related information. The digicard system we proposed creates virtual mobile card such as credit numbers and the created information is loaded in mobile phone. The virtual card information should be changed to pulse signal by light signal devices of mobile phone and the specific digicard system reader is able to read light signal. In recent years, a mobile phone payment system has been developed in order to provide user's convenience. But the mobile phone payment system has problems such as the production costs and complex and large size. In order to solve the aforementioned problems, we proposed mobile phone payment system being implemented by updating software without additional hardware modules. Therefore it is possible to apply the proposed digicard system to all kinds of mobile phone. Also encryption module is implemented to solve the problem of the security and privacy. According to an aspect of the present invention, there is provided a mobile phone payment system using a light signal containing payment-related information, comprising: a mobile phone; a photo receiver: and a control server.

Design and Development of Middleware for Clinical Trial System based on Brain MR Image (뇌 MR 영상기반 임상연구 시스템을 위한 미들웨어 설계 및 개발)

  • Jeon, Woong-Gi;Park, Kyoung-Jong;Lee, Young-Seung;Choi, Hyun-Ju;Jeong, Sang-Wook;Kim, Dong-Eog;Choi, Heung-Kook
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.6
    • /
    • pp.805-813
    • /
    • 2012
  • In this paper, we have designed and developed a middleware for an effectively approaching database to the existed brain disease clinical research system. The brain disease clinical research system was consisted of two parts i.e., a register and an analyzer. Since the register collects the registration data the analyzer yields a statistical data which based on the diverse variables. The middleware has designed to database management and a large data query processing of clients. By separating the function of each feature as a module, the module which was weakened connectivity between functionalities has been implemented the re-use module. And image data module used a new compression method from image to text for an effective management and storage in database. We tested the middleware system using 700 actual clinical medical data. As a result, the total data transmission time was improved maximum 115 times faster than the existing one. Through the improved module structures, it is possible to provide a robust and reliable system operation and enhanced security functionality. In the future, these middleware importances should be increased to the large medical database constructions.

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.

A Efficient RSIP Address Translation Technique in Linux-based Intranet Environment (리눅스기반 인트라넷 환경에서 효율적인 RSIP주소 변환기법)

  • Lee, Youngtaek;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.1
    • /
    • pp.39-48
    • /
    • 2004
  • An IP address shortage problem is happening with a rapid propagation of the Internet and demands about a new IP address. Address translation technology as NAT is becoming use widely in order to solve these problems. NAT is an very useful If address translation technique that allows two connected networks to use different and incompatible IP address schemes. Rut it is difficult to use NAT particularly for applications that embeded IP addresses in data payloads or encrypted IP packet to guarantee End-to-End Security such as IPSec. In addition to rewiting the source/destination IP address in the packet, NAT must modify IP checksum every time, which could lead to considerablely performance decrease of the overall system in the process of address translation. RSIP is an alternative to solve these disadvantages and address shortage problems of NAT. Both NAT and RSIP divide networks into inside and outside addressing realms. NAT translates addresses between internal network and external network, but RSIP uses a borrowed external address for outside communications. RSIP server assigns a routable, public address to an RSIP client temporaily to communicate with public network outside the private network. In this paper, I will analyze NAT and RSIP gateway system, and then I will propose the Linux-based RSIP gateway for more efficient IP Address Translation in Intranet environments based on RSIP standard of IETF.

  • PDF