• Title/Summary/Keyword: Illegal Software

Search Result 94, Processing Time 0.026 seconds

Digital Imaging Source Identification Using Sensor Pattern Noises (센서 패턴 잡음을 이용한 디지털 영상 획득 장치 판별)

  • Oh, Tae-Woo;Hyun, Dai-Kyung;Kim, Ki-Bom;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.12
    • /
    • pp.561-570
    • /
    • 2015
  • With the advance of IT technology, contents from digital multimedia devices and softwares are widely used and distributed. However, novice uses them for illegal purpose and hence there are needs for protecting contents and blocking illegal usage through multimedia forensics. In this paper, we present a forensic technique for identifying digital imaging source using sensor pattern noise. First, the way to acquire the sensor pattern noise which comes from the imperfection of photon detector against light is presented. Then, the way to identify the similarity of digital imaging sources is explained after estimating the sensor pattern noises from the reference images and the unknown image. For the performance analysis of the proposed technique, 10 devices including DSLR camera, compact camera, smartphone and camcorder are tested and quantitatively analyzed. Based on the results, the proposed technique can achieve the 99.6% identification accuracy.

Robust Anti Reverse Engineering Technique for Protecting Android Applications using the AES Algorithm (AES 알고리즘을 사용하여 안드로이드 어플리케이션을 보호하기 위한 견고한 역공학 방지기법)

  • Kim, JungHyun;Lee, Kang Seung
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1100-1108
    • /
    • 2015
  • Classes.dex, which is the executable file for android operation system, has Java bite code format, so that anyone can analyze and modify its source codes by using reverse engineering. Due to this characteristic, many android applications using classes.dex as executable file have been illegally copied and distributed, causing damage to the developers and software industry. To tackle such ill-intended behavior, this paper proposes a technique to encrypt classes.dex file using an AES(Advanced Encryption Standard) encryption algorithm and decrypts the applications encrypted in such a manner in order to prevent reverse engineering of the applications. To reinforce the file against reverse engineering attack, hash values that are obtained from substituting a hash equation through the combination of salt values, are used for the keys for encrypting and decrypting classes.dex. The experiments demonstrated that the proposed technique is effective in preventing the illegal duplication of classes.dex-based android applications and reverse engineering attack. As a result, the proposed technique can protect the source of an application and also prevent the spreading of malicious codes due to repackaging attack.

A Study an Effective Copyright Protection Method for Webtoons (효과적인 웹툰 저작권 보호 방법에 관한 연구)

  • Yoon, Hee-Don;Cho, Seong-Hwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.1
    • /
    • pp.106-112
    • /
    • 2019
  • The Korea Copyright Commission has pursued copyright technology R&D projects to prevent illegal copying of comics and Webtoons. We developed a feature-based scanned comic filtering technology in order to apply technical measures to specific types of online service providers. We also developed technologies in order to monitor and identify illegally distributed comics on webhard sites and to monitor and identify illegally distributed webtoons. Even though all comic books posted on webhard sites are illegal, it is no trouble to download and access popular comics by accessing websites in foreign countries. Even under these circumstances, the comic and webtoon copyright protection technologies developed over the past six years have been used at all. In this paper, we examine what the problems are and find solutions to propose a copyright protection method for webtoons.

A Blockchain-enabled Multi-domain DDoS Collaborative Defense Mechanism

  • Huifen Feng;Ying Liu;Xincheng Yan;Na Zhou;Zhihong Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.916-937
    • /
    • 2023
  • Most of the existing Distributed Denial-of-Service mitigation schemes in Software-Defined Networking are only implemented in the network domain managed by a single controller. In fact, the zombies for attackers to launch large-scale DDoS attacks are actually not in the same network domain. Therefore, abnormal traffic of DDoS attack will affect multiple paths and network domains. A single defense method is difficult to deal with large-scale DDoS attacks. The cooperative defense of multiple domains becomes an important means to effectively solve cross-domain DDoS attacks. We propose an efficient multi-domain DDoS cooperative defense mechanism by integrating blockchain and SDN architecture. It includes attack traceability, inter-domain information sharing and attack mitigation. In order to reduce the length of the marking path and shorten the traceability time, we propose an AS-level packet traceability method called ASPM. We propose an information sharing method across multiple domains based on blockchain and smart contract. It effectively solves the impact of DDoS illegal traffic on multiple domains. According to the traceability results, we designed a DDoS attack mitigation method by replacing the ACL list with the IP address black/gray list. The experimental results show that our ASPM traceability method requires less data packets, high traceability precision and low overhead. And blockchain-based inter-domain sharing scheme has low cost, high scalability and high security. Attack mitigation measures can prevent illegal data flow in a timely and efficient manner.

A Study of PICS/RDF-Based Internet Content Rating System: Issues Related to Freedom of Expression (PICS/RDF 기반 인터넷 내용 등급 시스템 연구: 표현의 자유를 중심으로)

  • Kim, You-Seung
    • Journal of the Korean Society for information Management
    • /
    • v.24 no.3
    • /
    • pp.271-297
    • /
    • 2007
  • Since the use of the Internet has proliferated, the availability of illegal and harmful content has been a great concern to both governments and Internet users. Among various solutions for issues related to such content, Internet content filtering technologies have been developed for enabling users to deal with harmful content. In recent years, commercial filtering has become massively popular. Many parents, teachers and even governments have chosen commercial filtering software as a feasible technical solution for protecting minors from harmful information on the Internet. The Internet content filtering software market has grown significantly. However, Internet content filtering software has led to intense debate among civil liberties groups, They deem this to be censorship and argue that Internet filtering technologies are simply unworkable because they have inherent weaknesses. They are critical of the fact that most filtering has violated free speech rights and will eventually wipe out honor and controversial, yet innocent incidences of free speech on the Internet. In this article Internet content filtering, in particular PICS/RDF-based label filtering, so-called Internet content rating system, will be explored and its advantages and drawbacks relating to end-users' autonomy and freedom of expression will be discussed.

Development of Functional USB Solution to Contain Executable Software Using Scanning Mechanism (스캐닝 기법을 이용한 실행 소프트웨어를 담을 수 있는 기능성 USB 솔루션 개발)

  • Kim, Nam-Ho;Hwang, Bu-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.947-952
    • /
    • 2012
  • The technology suggested in this study is the method to contain executable software in a portable storage devices like the USB and install an application program to operate it in any client devices. To solve this problem, we can store pre-scanned information on the above client's files, registry, and services in the device before installing the proper application program to be installed using the scanning method and manage in the USB the resources that generated and changed by post-scanning the information after installing the above application program in the client's device. After that, necessary files in the client to be used can be copied for using, and after use, related files are deleted, and it also includes the process to return to the previous system environment. This method is advantageous in that once any sort of application programs needed to be installed gets to be installed in an external portable storage devices like the USB, the application program installed can be operated in any computer not raising any issues like illegal copy.

Page Group Search Model : A New Internet Search Model for Illegal and Harmful Content (페이지 그룹 검색 그룹 모델 : 음란성 유해 정보 색출 시스템을 위한 인터넷 정보 검색 모델)

  • Yuk, Hyeon-Gyu;Yu, Byeong-Jeon;Park, Myeong-Sun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.12
    • /
    • pp.1516-1528
    • /
    • 1999
  • 월드 와이드 웹(World Wide Web)에 존재하는 음란성 유해 정보는 많은 국가에서 사회적인 문제를 일으키고 있다. 그러나 현재 음란성 유해 정보로부터 미성년자를 보호하는 실효성 있는 방법은 유해 정보 접근 차단 프로그램을 사용하는 방법뿐이다. 유해 정보 접근 차단 프로그램은 기본적으로 음란성 유해 정보를 포함한 유해 정보 주소 목록을 기반으로 사용자의 유해 정보에 대한 접근을 차단하는 방식으로 동작한다.그런데 대규모 유해 정보 주소 목록의 확보를 위해서는 월드 와이드 웹으로부터 음란성 유해 정보를 자동 색출하는 인터넷 정보 검색 시스템의 일종인 음란성 유해 정보 색출 시스템이 필요하다. 그런데 음란성 유해 정보 색출 시스템은 그 대상이 사람이 아닌 유해 정보 접근 차단 프로그램이기 때문에 일반 인터넷 정보 검색 시스템과는 달리, 대단히 높은 검색 정확성을 유지해야 하고, 유해 정보 접근 차단 프로그램에서 관리가 용이한 검색 목록을 생성해야 하는 요구 사항을 가진다.본 논문에서는 기존 인터넷 정보 검색 모델이 "문헌"에 대한 잘못된 가정 때문에 위 요구사항을 만족시키지 못하고 있음을 지적하고, 월드 와이드 웹 상의 문헌에 대한 새로운 정의와 이를 기반으로 위의 요구사항을 만족하는 검색 모델인 페이지 그룹 검색 모델을 제안한다. 또한 다양한 실험과 분석을 통해 제안하는 모델이 기존 인터넷 정보 검색 모델보다 높은 정확성과 빠른 검색 속도, 그리고 유해 정보 접근 차단 프로그램에서의 관리가 용이한 검색 목록을 생성함을 보인다.Abstract Illegal and Harmful Content on the Internet, especially content for adults causes a social problem in many countries. To protect children from harmful content, A filtering software, which blocks user's access to harmful content based on a blocking list, and harmful content search system, which is a special purpose internet search system to generate the blocking list, are necessary. We found that current internet search models do not satisfy the requirements of the harmful content search system: high accuracy in document analysis, fast search time, and low overhead in the filtering software.In this paper we point out these problems are caused by a mistake in a document definition of the current internet models and propose a new internet search model, Page Group Search Model. This model considers a document as a set of pages that are made for one subject. We suggest a Group Construction algorithm and a Group Evaluation algorithm. And we perform experiments to prove that Page Group Search Model satisfies the requirements.uirements.

Design and implementation of Android obfuscation technique using layout file transformation (레이아웃 파일 변환을 이용한 안드로이드 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.1-7
    • /
    • 2020
  • Android apps are mostly distributed as an apk files, and when the apk file is uncompressed, resource files such as xml files, images, and sounds related to app design can be extracted. If the resources of banking or finance-related apps are stolen and fake apps are distributed, personal information could be stolen or financial fraud may occur. Therefore, it is necessary to make it difficult to steal the design as well as the code when distributing the app. In this paper, we implemented a tool to convert the xml file into Java code and obfuscate using the Proguard, and evaluated the execution performance. If the layout obfuscation technique proposed in this paper is used, it is expected that the app operation performance can be improved and the illegal copying damage caused by the theft of the screen design can be prevented.

Intranet을 위한 방화벽 시스템구현에 관한 연구

  • 최석윤;김중규
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.2 no.1
    • /
    • pp.103-123
    • /
    • 1997
  • This dissertation provides a theoretic study on the network security in general , the firewall in particular. In fact the firewall has been recognized as a very promising option to obtain the security inthe real work network environment . The dissertation provides a throuth theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procddure to make analysis and plans of the firewall configuration . Based on the above investigation and analysis, this dissertation provides two approaches to network security , which address anumber of issuesboth at the network and at applicatino level. At the network level, a new method is proposed which uses packet filtering based on the analysis of the counter plot about the screen router.On the other hand, at the application level, a novel method is explored which employs secureity software. Firewall-1 , on Bastion host. To demonstrate the feasibililty and the effectiveness of the proposed methodologties , a prototype implementation is made The experiment result shows that the screen router employing the proposed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegal packets entering form external hackers. Meanwhile , at the application level, the proposed software approach employing Firewall-1 is proved to be robust enugh to prevent hackings from the outer point the point protocal connnection . Theoretically, it is not possible to provide complete security to the network system, because the network security involve a number of issues raised form low level network equipments form high level network protocol. The result inthis dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.