• Title/Summary/Keyword: Manifest information

Search Result 77, Processing Time 0.028 seconds

The Main Substance and Some Problems of 24 hours Advance Cargo Manifest Declaration Rule (선적 24시간전 적하목록전송규칙(24 Hours Rules)의 주요내용과 문제점)

  • Han, Sang-Hyun;Eom, Kwang-Yeol
    • The Journal of Information Technology
    • /
    • v.8 no.1
    • /
    • pp.95-112
    • /
    • 2005
  • This paper will look into the Main Substance and Some Problems of 24 hours Advance Cargo Manifest Declaration Rule, focuses on the Policy implication of Korea's and counter measures of our parties concerned about 24-hour advance vessel manifest rule. The 24-hour rule requires cargo owners to submit cargo manifest information to U.S. Customs 24 hours before vessel sailing from the final foreign port to a U.S. port. Cargo manifest information must be complete, accurate, and timely. As of February 2, 2003 manifest information can be submitted by paper or electronically. Cargo descriptions must be at a level of detail consistent with Harmonized Tariff Schedule (HTS) codes used by U.S. Customs. HTS codes are 10 digits. Electronic submissions are made via the Automated Manifest System (AMS) run by U.S. Customs.

  • PDF

A Code Concealment Method using Java Reflection and Dynamic Loading in Android (안드로이드 환경에서 자바 리플렉션과 동적 로딩을 이용한 코드 은닉법)

  • Kim, Jiyun;Go, Namhyeon;Park, Yongsu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.17-30
    • /
    • 2015
  • Unlike existing widely used bytecode-centric Android application code obfuscation methodology, our scheme in this paper makes encrypted file i.e. DEX file self-extracted arbitrary Android application. And then suggests a method regarding making the loader app to execute encrypted file's code after saving the file in arbitrary folder. Encrypted DEX file in the loader app includes original code and some of Manifest information to conceal event treatment information. Loader app's Manifest has original app's Manifest information except included information at encrypted DEX. Using our scheme, an attacker can make malicious code including obfuscated code to avoid anti-virus software at first. Secondly, Software developer can make an application with hidden main algorithm to protect copyright using suggestion technology. We implement prototype in Android 4.4.2(Kitkat) and check obfuscation capacity of malicious code at VirusTotal to show effectiveness.

Android Malware Detection Using Permission-Based Machine Learning Approach (머신러닝을 이용한 권한 기반 안드로이드 악성코드 탐지)

  • Kang, Seongeun;Long, Nguyen Vu;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.617-623
    • /
    • 2018
  • This study focuses on detection of malicious code through AndroidManifest permissoion feature extracted based on Android static analysis. Features are built on the permissions of AndroidManifest, which can save resources and time for analysis. Malicious app detection model consisted of SVM (support vector machine), NB (Naive Bayes), Gradient Boosting Classifier (GBC) and Logistic Regression model which learned 1,500 normal apps and 500 malicious apps and 98% detection rate. In addition, malicious app family identification is implemented by multi-classifiers model using algorithm SVM, GPC (Gaussian Process Classifier) and GBC (Gradient Boosting Classifier). The learned family identification machine learning model identified 92% of malicious app families.

A Reference Architecture and Manifest Standard Suggestions for Interworking Open Web Store (OWS(Open Web Store) 연동을 위한 참조 모델 및 Manifest 표준 제안)

  • Ryu, Taejun;Kim, Changjun;Jeon, Jonghong;Lee, Seungyoon;Park, Sangwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.11
    • /
    • pp.779-788
    • /
    • 2013
  • With a wide dissemination of smartphones, the number of native applications developed and sold freely by anyone is growing now. The application market activated by Apple's App Store is spreading more rapidly with Google's Google Play. But due to platform-dependent of native application's attribute, developers are programming at each platform. As a result, development cost is increasing compared to earnings. To solve a dependency problem, people focused on web application developed by web-based language. However, stores at each browser are requiring a web application to follow manifest format. And this causes browser-dependent problem. Those problems can be solved by installing a certain browser, but this can make an application useless on the other browser of a store. Dependency problem can narrow not only user's application variation, but also concentration on some specific store. OWS(Open Web Store) is a standard store that supports various web environments. It overcomes browser or platform dependency problems by interworking applications between stores. Also customers are able to choose a large number of applications. In this paper, related to OWS, I would like to suggest manifest standards and store's reference architecture. An interworking scenario is going to be proposed as well.

여성의류 유통경로에서 의존성.권력원천.갈등 - 백화점 입점업체를 중심으로

  • 정현주
    • Journal of Distribution Research
    • /
    • v.3 no.1
    • /
    • pp.123-143
    • /
    • 1998
  • The aim of this paper is to investigate the women's apparel distribution channel in the well-known department stores located in the central Seoul area. Since the department store has its reputation, information and enormous buying power, it is the one of the major leading retails in the women's apparel industry. In doing so, the relationship between the channel members in terms of the level of dependence, power sources and perceived conflict and manifest conflict has been studied. Particularly, based on French and Raven's power sources, position source is added. It refers to a channel member's (Merchandizer in the department store) source over another based on the expection the former (Merchandizer in the department store) will be able to allocate the location and size of the store influencing the latter's sale and profit. The key informants are the merchandizers who work in the apparel companies contracting with major department stores. Finally, of the 284 questionnaires collected, 235 are usable. The hypotheses are tested through LISREL. The results of statistical analysis support that : Dependence has a positive effect on noncoercive bases of power. Coercive bases of power have a positive effect on manifest conflict as well as perceived conflict while noncoercive bases of power have a negative effect mainly on manifest conflict. Thus, the relation between the major department stores and the women's apparel companies in there seems to have bilateral dependence rather than highly unilateral dependence.

  • PDF

Security Issues in All-optical networks for High-speed Information Communication (초고속정보통신망을 위한 광 네트워크에서의 보안 모델 해석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.864-867
    • /
    • 2005
  • All-optical networks are emerging as a promising technology for per second class communication. However, they are intrinsically different from electro-optical networks, particularly because they do not regenerate signals in the networks. The characteristics of all-optical network components and architectures manifest and still unstudied security vulnerabilities but also offer a new array of possible countermeasures. In this paper, we have analysed the security issue to protect against intrusion.

  • PDF

Improving Interpretability of Multivariate Data Through Rotations of Artificial Variates

  • Hwang, S.Y.;Park, A.M.
    • Journal of the Korean Data and Information Science Society
    • /
    • v.15 no.2
    • /
    • pp.297-306
    • /
    • 2004
  • It is usual that multivariate data analysis produces related (small number of) artificial variates for data reduction. Among them, refer to MDS(multidimensional scaling), MDPREF(multidimensional preference analysis), CDA(canonical discriminant analysis), CCA(canonical correlation analysis) and FA(factor analysis). Varimax rotation of artificial variables which is originally invented in FA for easy interpretations is applied to diverse multivariate techniques mentioned above. Real data analysisis is performed in order to manifest that rotation improves interpretations of artificial variables.

  • PDF

A Study on the Function of Personality as a Human-ware in Management (기업경영에 있어서 인성기능의 휴먼웨어적 접근)

  • 이철우
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.22 no.51
    • /
    • pp.11-19
    • /
    • 1999
  • This study intends to define $\ulcorner$personality$\lrcorner$ as $\ulcorner$Human-ware$\lrcorner$ based on $\ulcorner$Gene-ware$\lrcorner$ in business management. The sides of personality in management are important source of manifestation of ‘Synergy’, because the importance of personality, that is, $\ulcorner$attitude$\lrcorner$ in individuals is increasing compared with the traditional techniques, $\ulcorner$craft$\lrcorner$. In this work it is considered that Human-ware activates interchange in reciprocal relation between Gene-ware and Hard-ware and performs balancing, intermediating (catalyzing) functions in relative that things(Geneware $\leftrightarrow$ Humanware $\leftrightarrow$ Hardware). $\ulcorner$Gene-ware$\lrcorner$ represents factor and phenomena of life in evolutionary information as human instincts, system of Gene-duum(Gene+Residuum(in phenomenology) ), Synchronization(in structuralism). In this view, this paper defines the concepts and effects of personality in management as the results of creative and stational functions of Human-ware. And this paper intends to identify the strata of psycho in human as three vertical aspects of $\ulcorner$Manifest$\lrcorner$, $\ulcorner$Latent$\lrcorner$, and $\ulcorner$Found$\lrcorner$, in this respects, function of Human-ware have analogy to that of Manifest in psychological behaviors. Finally, reviewing the Ford system based on Fordism and Taylor's system in Industrial Engineering, pursues the meaning and importance of personality, that is Humanware in management.

  • PDF

Measuring Similarity of Android Applications Using Method Reference Frequency and Manifest Information (메소드 참조 빈도와 매니페스트 정보를 이용한 안드로이드 애플리케이션들의 유사도 측정)

  • Kim, Gyoosik;Hamedani, Masoud Reyhani;Cho, Seong-je;Kim, Seong Baeg
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.3
    • /
    • pp.15-25
    • /
    • 2017
  • As the value and importance of softwares are growing up, software theft and piracy become a much larger problem. To tackle this problem, it is highly required to provide an accurate method for detecting software theft and piracy. Especially, while software theft is relatively easy in the case of Android applications (apps), screening illegal apps has not been properly performed in Android markets. In this paper, we propose a method to effectively measure the similarity between Android apps for detecting software theft at the executable file level. Our proposed method extracts method reference frequency and manifest information through static analysis of executable Android apps as the main features for similarity measurement. Each app is represented as an n-dimensional vectors with the features, and then cosine similarity is utilized as the similarity measure. We demonstrate the effectiveness of our proposed method by evaluating its accuracy in comparison with typical source code-based similarity measurement methods. As a result of the experiments for the Android apps whose source file and executable file are available side by side, we found that our similarity degree measured at the executable file level is almost equivalent to the existing well-known similarity degree measured at the source file level.

Design of Two-Step Open System for Personalized Health Data Access (개인화된 건강 데이터 처리를 위한 2-Step 개방형 시스템의 설계)

  • Jeon, Young-Jun;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.177-183
    • /
    • 2015
  • The purpose of ICT Healing platform is the prevention of chronic disease. It is intended to early warning of the disease through the information such as the bio-signals and lifestyle. In this paper, we provide a 2-Step open system(TOS) for personalized health data access. TOS is connected between the personal health related data providers and service providers of individuals ICT Healing platform, a software engine for relaying personalized health data. The proposed system, to operate in isolation to 2 step in personal health document repository Inbound module and Outbound module to provide an inquiry service to external organizations. Therefore, we propose a personalized editable Manifest concept for defining data exchange between Step. This can be used as a reference model to collect the personal health information is scattered in many health related service institutions (Hospitals, Fitness Centers, Health Examination Centers, Personal Health Device, etc.) and under private-led liberalization.