• Title/Summary/Keyword: Malicious Process

Search Result 197, Processing Time 0.024 seconds

Analysis of Public Sector Sharing Rate based on the IoT Device Classification Methodology (사물인터넷(IoT) 기기 분류 체계 기반 공공분야 점유율 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.65-72
    • /
    • 2022
  • The Internet of Things (IoT) provides data convergence and sharing functions, and IoT technology is the most fundamental core technology in creating new services by convergence of various cutting-edge technologies. However, there are different classification systems for the Internet of Things, and when it is limited to the domestic public sector, it is difficult to properly grasp the current status of which devices are installed and operated with what share, and systematic data or research The results are very difficult to find. Therefore, in this study, the relevance of the classification system for IoT devices was analyzed according to reality based on sales, shipments, and growth rate, and based on this, the actual share of IoT devices among domestic public institutions was analyzed in detail. The derived detailed analysis results are expected to be efficiently utilized in the process of selecting IoT devices for research and analysis to advance information protection technology such as responding to malicious code attacks on IoT devices, analyzing incidents, and strengthening security vulnerabilities.

Improvement Research for Information Protection Management System of Small and Medium Enterprises (중소기업의 정보보호 관리체계 개선방안 연구)

  • Hye-Joung Yun;Yong-Woo Lee;Hee-Doo Heo;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.15-20
    • /
    • 2023
  • Recently, digitalization is accelerating in all industries, and the use of information and personal information produced and used in the process of it is very important for the success or failure of a company. However, malicious attempts to steal or leak major information and personal information of a company as an adverse effect continue to increase, and appropriate defense and response are absolutely necessary. However, in the case of small and medium-sized enterprises, the priority of information protection and the possession of professional manpower are very insufficient compared to large enterprises. This paper studies the certification and audit implemented in Korea, and suggests ways to expand the certification of the information protection system suitable for SMEs and improve the effectiveness of the support system through the expansion of the privacy law notification standard and operation of support system.

ECU Data Integrity Verification System Using Blockchain (블록체인을 활용한 ECU 데이터 무결성 검증 시스템)

  • Sang-Pil, Byeon;Ho-Yoon, Kim;Seung-Soo, Shin
    • Journal of Industrial Convergence
    • /
    • v.20 no.11
    • /
    • pp.57-63
    • /
    • 2022
  • If ECU data, which is responsible for collecting and processing data such as sensors and signals of automobiles, is manipulated by an attack, it can cause damage to the driver. In this paper, we propose a system that verifies the integrity of automotive ECU data using blockchain. Since the car and the server encrypt data using the session key to transmit and receive data, reliability is ensured in the communication process. The server verifies the integrity of the transmitted data using a hash function, and if there is no problem in the data, it is stored in the blockchain and off-chain distributed storage. The ECU data hash value is stored in the blockchain and cannot be tampered with, and the original ECU data is stored in a distributed storage. Using the verification system, users can verify attacks and tampering with ECU data, and malicious users can access ECU data and perform integrity verification when data is tampered with. It can be used according to the user's needs in situations such as insurance, car repair, trading and sales. For future research, it is necessary to establish an efficient system for real-time data integrity verification.

Robert Southey, Colonialism, and the East: The Case of Thalaba the Destroyer (로버트 사우디, 식민주의, 그리고 동양 -『파괴자 탈라바』를 중심으로)

  • Cho, Heejeong
    • Journal of English Language & Literature
    • /
    • v.58 no.5
    • /
    • pp.859-880
    • /
    • 2012
  • This paper aims at analyzing Robert Southey's Thalaba the Destroyer in relation to cultural colonialism of the British Romantic period and investigating the ways in which this text portrays the Other through its literary representation of the East. Especially, this paper attempts to show that the Oriental world constructed in Southey's text reveals the imperial subject's self-conscious awareness of its unstable relation with the unknown Other. For this purpose, this paper attends to the formal aspects of Thalaba the Destroyer, examining the process by which the reader's generic expectations about the "epic" undergo complex revisions and frustrations through reading this text. The epic elements contained in Thalaba the Detroyer include the battle between good and evil and the hero's moral epiphany arising from his struggle against malicious enemies. Yet, Thalaba the Destroyer constantly destabilizes the distinction between self and other by leading the reader to recognize the uncomfortable similarity between the poem's tyrannical figures and imperialistic monarchs in the Western civilization. Thus, when the hero enacts a revolution against despotism, the resistant power points not only to the imagined false kingdom within the text, but to the core of the real Empire that seeks to construct its own "garden" in the global scene. In addition, Southey's "panoramic" description of Oriental objects and stories in his footnotes lacks a framing perspective, erasing and de-stabilizing subject/object distinctions. In these footnotes, he exposes his profound attraction to the culture of "Other" and also conveys his aspiration to transforming Eastern myths and stories into profitable literary texts. Southey's attitude to the East in the footnotes appears to be partially grounded upon the interest of mercantile capitalists of the West, who need to discover potential commodities. Yet, simultaneously, he reveals a sense of moral hesitation about his own desire for the materiality of the East, along with deep anxiety arising from the fear of punishment.

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

Analysis of Waterborne Automotive Refinish Paint for Investigating Insurance Fraud (차량 보수도장 보험사기 규명을 위한 수용성 페인트 성분분석)

  • Lee, Joon-Bae;Lee, Cheon-Ho;Ryu, Seung-Jin;Gong, Bokyoung;Kwon, O-Seong;Kim, Myung-Duck;Kim, Nam Yee;Paeng, Ki Jung
    • Applied Chemistry for Engineering
    • /
    • v.28 no.4
    • /
    • pp.490-494
    • /
    • 2017
  • With increasing the number of vehicles, the accident rate also goes up and the damaged vehicles should be painted as a final repair process. At the painting stage the solvent-based paint causes environmental problems. To overcome these problems waterborne refinish paint is frequently used recently. However, for waterborne refinish, the costs of insurance coverage are too expensive, and insurance reimbursement costs could be burdensome. Because of the high price of aquatic paint treatment, the service shop might charge the malicious service price. In this study, the surfactant of Surfynol 104, which is the component in the paint, was used as an indicator whether the vehicle was painted with waterborne paint. The specimen was quantitatively analyzed to contain 0.38% of the surfactant through the standard addition method with isotope substituted internal standard (IS) of fluranthene-d10 by curie point pyrolysis-gas chromatography/mass spectrometry (Py-GC/MS).

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

A Design of User Authentication Protocol using Biometric in Mobile-cloud Environments (모바일 클라우드 환경에서 생체인식을 이용한 사용자 인증 프로토콜 설계)

  • Kim, Hyung-Uk;Kim, Bumryong;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.1
    • /
    • pp.32-39
    • /
    • 2017
  • Recently, usage of mobile cloud services has been increasing. In particular, beyond the constraints of a single cloud computing service, studies on the multi-cloud have been actively pursued. A user must authenticate multiple cloud service providers to use additional cloud services in a multi-cloud. In previous studies, an authentication method using single sign-on (SSO) was not available in all cloud services. Cloud services will not be available when the SSO server is not available due to malicious attacks, because all authentication is done via the SSO server. Additionally, using a broker, there is a vulnerability that can expose authentication information for the service provider to a user who did not sign up. In this paper, we propose a secure user authentication protocol using biometric authentication that does not expose user information when using additional cloud services. The proposed protocol can use a single biometric authentication for multi-cloud services without storing authentication information in each cloud service. In terms of key stability (to ensure stability through the key agreement process and the key area), by disabling various attack methods, such as man-in-the-middle attacks and replay attacks, we provide secure mobile cloud services.

Cultural Politics of Gendered Schadenfreude Surrounding an Idol Focusing on the debate over IU (아이돌을 둘러싼 젠더화된 샤덴프로이데(Schadenfreude)의 문화정치학 <아이유 사태>를 중심으로)

  • Kim, Hyun Gyung
    • Korean journal of communication and information
    • /
    • v.80
    • /
    • pp.115-142
    • /
    • 2016
  • This study aims to reveal the content of and logic behind a recent negative public sentiment toward female idols with the example of a debate over songstress IU's fourth album that was released late last year. While previous studies on fandom have focused on the identification process towards entertainers and making community, a recent phenomenon of "anti-fandom" or "malicious comments" implies that more research is needed on negative emotions such as hostility or schadenfreude (feelings of pleasure from others' misfortunes). Schadenfreude is a social sentiment that originated in modern liberalism, which features contradictions between public equality and private ownership, and that has been intensified in neoliberalism, which features a maximization of this contradiction centering on a meritocracy. Celebrities in Korea often become the targets of schadenfreude, which is associated with the suspicion that they gain popularity not from their abilities but from "just being popular." It should also be noted that this kind of schadenfreude operates differently between male and female entertainers. Specifically, the acquisition of money and fame by modern women whose presence used to be located in the private possessions of males is considered to be due to their unjustified use of sexuality. This is also the background of the recent online misogyny culture in Korea. In this context, IU, who had been successful at building a differentiated image of "sister-like idol artist," became a valid target. Although accusing IU of utilizing pedophilia reflects a stalemate that a current politics of sexual violence faces, it rather damages the name of an individual than attracts public attention to the structural causes of childsexualabuse. This is why I see the way that pedophilia was used in the debate over IU as a schadenfreude. Consequently, the term pedophilia here contributes to an expansion of the entertainment economy that is sustained by rises and falls of the celebrities' stock prices.

  • PDF

Dynamic Evaluation Methods for SMS Phishing Blocking App Based on Detection Setup Function (감지설정기능을 적용한 스미싱 차단앱의 동적 평가방법에 관한 연구)

  • Kim, Jang Il;Kim, Myung Gwan;Kwon, Young Man;Jung, Yong Gyu
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.111-118
    • /
    • 2015
  • Although the development of mobile devices are made us a free life, they were displayed the subject of this financial crime and attacking forces in the other side. Among finance-related crime is become a serious crime that are targeting smartphones by SMS phishing, phishing, pharming, voice phishing etc. In particular, SMS phishing is increased according to phenomenon using the nature of a text message in the mobile. SMS phishing is become new crime due to the burden to the smartphone user. Their crime is also the advanced way from the existing fraud, such as making the malicious apps. Especially it generates loopholes in the law by a method such as using a foreign server. For safe from SMS phishing attacks, proactive pre-diagnosis is even more important rather than post responses. It is necessary to deploy blocking programs for detecting SMS phishing attacks in advance to do this. In this paper we are investigating the process of block types and block apps that are currently deployed and presenting the evaluation of the application of the detection block setting app.