• Title/Summary/Keyword: Memory Attack

Search Result 128, Processing Time 0.021 seconds

Hiding Shellcode in the 24Bit BMP Image (24Bit BMP 이미지를 이용한 쉘코드 은닉 기법)

  • Kum, Young-Jun;Choi, Hwa-Jae;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.691-705
    • /
    • 2012
  • Buffer overflow vulnerability is the most representative one that an attack method and its countermeasure is frequently developed and changed. This vulnerability is still one of the most critical threat since it was firstly introduced in middle of 1990s. Shellcode is a machine code which can be used in buffer overflow attack. Attackers make the shellcode for their own purposes and insert it into target host's memory space, then manipulate EIP(Extended Instruction Pointer) to intercept control flow of the target host system. Therefore, a lot of research to defend have been studied, and attackers also have done many research to bypass security measures designed for the shellcode defense. In this paper, we investigate shellcode defense and attack techniques briefly and we propose our new methodology which can hide shellcode in the 24bit BMP image. With this proposed technique, we can easily hide any shellcode executable and we can bypass the current detection and prevention techniques.

6 Clinical Reports of Temporary Severe Amnesia Patients -focusing on amnesia, hysteric convulsion, dissociative disorder (단기 기억상실을 주증(主症)으로 하는 6례(例)의 임상보고 -중기(中氣), 건망(健忘), 해리성 기억장애 중심으로)

  • Oh, Young-Jin;Kim, Bo-Kyung
    • Journal of Oriental Neuropsychiatry
    • /
    • v.16 no.2
    • /
    • pp.287-299
    • /
    • 2005
  • Dissociative disorder is a psychiatric disorder characterized by a sudden loss of memory, but which has no organic disease or explanation. It usually occurs after heavy psychosocial stress or traumatic experience. A transient cerebral ischemic attack (TIA) is an acute episode of temporary and focal loss of cerebral function of vascular origin. TIAs are rapid in onset; symptoms reach their maximal manifestation in fewer than 5 minutes. Manifestations are of variable duration and typically last 2-15 minutes(rarely as long as 24 h). Most TIA durations are less than 1 hour. Of concern is the careful detection of changes in behavior, speech, gait, memory, movement, and vision. TIAs are uncommon in persons younger than 60 years. I treat 6 cases of Sudden Temporary Amnesia Patients with oriental medicine and they are improved. All of them had amnesia for $6{\sim}10\;hours$. During that time, they show behavioral changes and they are not on the state of unconsciousness. After recovery, they also forget what happen at the time. they have some emotional reason too. In conclusion, 4 cases of them belong to dissociative disorder and 2 other cases, TIA.

  • PDF

Algebraic Attacks on Summation Generators (Summation Generator에 대한 대수적 공격)

  • Lee, Dong-Hoon;Kim, Jae-Heon;Han, Jae-Woo;Hong, Jin;Moon, Duk-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.71-77
    • /
    • 2004
  • It was proved that Hen is an algebraic ,elation of degree [n(l+1]/2] for an (n, 1)-combine. which consists of n LFSRs and l memory bits. For the summation generator with $2^k$ LFSRs which uses k memory bits, we show that there is a non-trivial relation of degree at most $2^k$ using k+1 consecutive outputs. In general, for the summation generator with n LFSRs, we can construct a non-trivial algebraic relation of degree at most 2$^{{2^{[${log}_2$}n]}}$ using [${log}_2$+1 consecutive outputs.

Comparison of artificial intelligence models reconstructing missing wind signals in deep-cutting gorges

  • Zhen Wang;Jinsong Zhu;Ziyue Lu;Zhitian Zhang
    • Wind and Structures
    • /
    • v.38 no.1
    • /
    • pp.75-91
    • /
    • 2024
  • Reliable wind signal reconstruction can be beneficial to the operational safety of long-span bridges. Non-Gaussian characteristics of wind signals make the reconstruction process challenging. In this paper, non-Gaussian wind signals are converted into a combined prediction of two kinds of features, actual wind speeds and wind angles of attack. First, two decomposition techniques, empirical mode decomposition (EMD) and variational mode decomposition (VMD), are introduced to decompose wind signals into intrinsic mode functions (IMFs) to reduce the randomness of wind signals. Their principles and applicability are also discussed. Then, four artificial intelligence (AI) algorithms are utilized for wind signal reconstruction by combining the particle swarm optimization (PSO) algorithm with back propagation neural network (BPNN), support vector regression (SVR), long short-term memory (LSTM) and bidirectional long short-term memory (Bi-LSTM), respectively. Measured wind signals from a bridge site in a deep-cutting gorge are taken as experimental subjects. The results showed that the reconstruction error of high-frequency components of EMD is too large. On the contrary, VMD fully extracts the multiscale rules of the signal, reduces the component complexity. The combination of VMD-PSO-Bi-LSTM is demonstrated to be the most effective among all hybrid models.

The Experiences of the Middle - Aged Women′s Crisis (중년 여성의 위기 경험)

  • 김귀분;유재희;이은자
    • Journal of Korean Academy of Nursing
    • /
    • v.32 no.3
    • /
    • pp.305-316
    • /
    • 2002
  • This study examined the crisis experiencing by middle - aged women and tried to understand their lived experiences also explored the nature of their crisis. Method: The data was collected from 7 participants living in Incheon and Seoul from Sep. 2000 to Feb. 2001. The analysis of the data was made the phenomenological analytic method suggested by Giorgi. Result: The meanings of the lived experiences of the middle - aged women's crisis ; Impatience about decreased physical function : an attack of a disease, decreased strength, decreased quickness, decreased desire, increased concern of health, poor memory, easy fatigue, change of appearance, change of conjugal relations, sense of loss. Psychological, emotional disturbances : sense of emptiness, regret, sharpness, feeling gloomy, fear of dying, loneliness, feeling the want, loss of confidence. Attitude of active life : reinforcement of self experience, enrichment of understanding, search of self satisfaction, search of self development, development of support system, management of independent life. Envy feeling from relative comparison : feeling of comfort, unsatisfaction to the husband, yearning for youth. Conclusion: Therefore, the program should be developed for the program of physical, psychological, and emotional health and expansion of social role of the middle - aged women.

A Case of Pial Arteriovenous Fistula with Giant Venous Aneurysm and Multiple Varices Treated with Coil Embolization

  • Oh, Hyuk-Jin;Yoon, Seok-Mann;Kim, Sung-Ho;Shim, Jai-Joon
    • Journal of Korean Neurosurgical Society
    • /
    • v.50 no.3
    • /
    • pp.248-251
    • /
    • 2011
  • Intracranial pial arteriovenous fistulas (AVFs) are rare vascular lesions of the brain. These lesions consist of one or more arterial connection to a single venous channel without true intervening nidus. A 24-year-old woman visited to our hospital because of headache, vomiting, dizziness and memory disturbance that persisted for three days. She complained several times of drop attack because of sudden weakness on both leg. Cerebral angiograms demonstrated a giant venous aneurysm on right frontal lobe beyond the genu of corpus callosum, multiple varices on both frontal lobes fed by azygos anterior cerebral artery, and markedly dilated draining vein into superior sagittal sinus, suggesting single channel pial AVF with multiple varices. Transarterial coil embolization of giant aneurysm and fistulous portion resulted in complete disappearance of pial AVF without complication.

A Data Sharing Scheme with Security and Flexibility (보안성과 유연성을 갖춘 데이터 공유 방안)

  • Lee, Goo-Yeon;Kim, Hwa-Jong;Jeong, Choong-Kyo
    • Journal of Industrial Technology
    • /
    • v.24 no.B
    • /
    • pp.193-198
    • /
    • 2004
  • We propose and analyse a flexible secure file sharing scheme which can be used for data sharing among members in P2P environment. When a member wants to share data, notification messages are sent to the members with whom the member wants to share data. Each notification message includes one-time password encrypted with the receiver's public key. A member who received the notification message can download the data by using the one-time password. The proposed scheme provides selective sharing, download confirmation and efficient memory management. In terms of security, the proposed scheme supports authentication, entity privacy, replay attack protection and disguise prevention.

  • PDF

Heterogeneity of IL-22-producing Lymphoid Tissue Inducer-like Cells in Human and Mouse

  • Kim, Soochan;Han, Sinsuk;Kim, Mi-Yeon
    • IMMUNE NETWORK
    • /
    • v.10 no.4
    • /
    • pp.115-119
    • /
    • 2010
  • Lymphoid tissue inducer (LTi) cells have been characterized in mouse as a key cell when secondary lymphoid tissues are organized during development and memory T cells are formed after birth. In addition to their involvement in adaptive immune responses, recent studies show that they contribute to innate immune responses by producing large amount of interleukin (IL)-22 against microbial attack. Here, we compare IL-22-producing LTi and LTi-like cells in human and mouse and discuss their heterogeneity in different tissues.

Efficiency Enhancement of CFDS Code (CFDS 코드의 효율성 개선)

  • Kim J. G.;Lee J.;Kim C.;Hong S. K.;Lee K. S.;Ahn C. S.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2005.04a
    • /
    • pp.123-127
    • /
    • 2005
  • The numerical analyses of the complicated flows are widely attempted in these days. Because of the enormous demanding memory and calculation time, parallel processing is used for these problems. In order to obtain calculation efficiency, it is important to choose proper domain decomposition technique and numerical algorithm. In this research we enhanced the efficiency of the CFDS code developed by ADD, using parallel computation and newly developed numerical algorithms. For the huge amount of data transfer between blocks non-blocking method is used, and newly developed data transfer algorithm is used for non-aligned block interface. Recently developed RoeM scheme is adpoted as a spatial difference method, and AF-ADI and LU-SGS methods are used as a time integration method to enhance the convergence of the code. Analyses of the flows around the ONERA M6 wing and the high angle of attack missile configuration are performed to show the efficiency improvement.

  • PDF

A Study of Path Management to Efficient Traceback Technique for MANET (MANET에서 효율적 역추적을 위한 경로관리에 관한 연구)

  • Yang, Hwan Seok;Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.31-37
    • /
    • 2011
  • Recently, MANET(Mobile Ad-hoc Network) is developing increasingly in the wireless network. MANET has weakness because phases change frequently and MANET doesn't have middle management system. Every node which consists of MANET has to perform data forwarding, but traceback is not reliable if these nodes do malicious action owing to attack. It also is not easy to find location of attacker when it is attacked as moving of nodes. In this paper, we propose a hierarchical-based traceback method that reduce waste of memory and can manage path information efficiently. In order to manage trace path information and reduce using resource in the cluster head after network is formed to cluster, method which recomposes the path efficiently is proposed. Proposed method in this paper can reduce path trace failure rate remarkably due to moving of nodes. It can also reduce the cost for traceback and time it takes to collect information.