• Title/Summary/Keyword: Sandbox

Search Result 67, Processing Time 0.037 seconds

Malware Analysis Based on Section, DLL (Section, DLL feature 기반 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Ho-gyeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1077-1086
    • /
    • 2017
  • Malware mutants based on existing malware is widely used because it can easily avoid the existing security system even with a slight pattern change. These malware appear on average more than 1.6 million times a day, and they are gradually expanding to IoT / ICS as well as cyber space, which has a large scale of damage. In this paper, we propose an analytical method based on features of PE Section and DLL that do not give much significance, rather than pattern-based analysis, Sandbox-based analysis, and CFG, Strings-based analysis. It is expected that the proposed model will be able to cope with effective malicious code in case of combined operation of various existing analysis technologies.

A Research on Mobile Malware Model propagated Update Attacks (변조 업데이트를 통해 전파되는 모바일 악성어플리케이션 모델 연구)

  • Ju, Seunghwan;Seo, Heesuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.47-54
    • /
    • 2015
  • The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.

A Study on Screening of Surface Waves by Trenches (방진구에 의한 표면파 산란해석)

  • 김희석;이상진;이종세
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2004.04a
    • /
    • pp.235-242
    • /
    • 2004
  • In this study numerical and experimental studies are conducted to examine the wave screening effectiveness of trenches. The numerical study is based on a finite element model of a "sandbox" with Lysmer-Kuhlemeyer-type absorbing boundaries. Using the model, the screening effectiveness of trench is studied for different trench dimensions and distance from source and receiver to trench. The results of the numerical modeling are compared with the results of the ultrasonic experiment which is performed on a acrylic block with a drilled rectangular cut. These results show that the screening effectiveness of the trench is nearly equal if the depth of trench is lager than 60 % of the surface wave length. If is also shown that if the distance between the trench and the source is lager than twice the surface wave length, the thickness of the trench does not affect the screening effectiveness.

  • PDF

An Implementation of Dynamic Terrain using the Depth Recognition of Sandbox (샌드박스 깊이 인식을 이용한 동적 터레인의 구현)

  • Lee, Bum-Ro
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.315-316
    • /
    • 2016
  • 본 논문에서는 가상현실이나 증강현실과 관련된 응용 콘텐츠 구성에 필요한 동적 터레인의 실시간 구현 기법에 관한 연구를 수행하였다. 동적 터레인은 게임 콘텐츠 개발 환경에서 일반적으로 구현되는 정적 터레인과 달리 런타임에 실시간 변형이 발생할 수 있으며 입력된 터레인의 변형을 콘텐츠 플레이에 지정을 받지 않을 수 있는 짧은 시간 내에 빠르게 실시간 처리하는 것이 필수적으로 필요하다. 본 논문에서는 키넥트의 깊이 카메라를 활용하여 샌드 박스 내의 모래 깊이 값을 인식하고 이를 반영하는 터레인을 실시간으로 생성하는 프레임워크를 개발하고 결과물을 콘텐츠에 적용하여 연구 결과의 유용성을 실증하도록 한다.

  • PDF

Techniques for Maintaining Client Information for CORBA-based Web Applications (CORBA 기반 웹 어플리케이션에서의 클라이언트 정보 저장 및 활용 기법)

  • 유재정;김수동
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10b
    • /
    • pp.611-613
    • /
    • 1998
  • Java 언어와 CORBA의 등장으로 정적인 웹 어플리케이션은 동적인 웹 어플리케이션으로 변해가고 있으며, 클라이언트에서의 처리량도 급속하게 증가하고 있다. Java ORB 환경은 클라이언트와 서버에 프로세스를 각각 분산하여 처리함으로써 네트워크의 효율 및 수행속도를 향상시키는 장점을 가지고 있다. 하지만 Java 애플릿의 보편화에도 불구하고 다양한 클라이언트의 상태 정보를 활용하지 못하고 있으며, 애플릿의 Sandbox 제약사항으로 인해 클라이언트 상태 정보를 서버에 저장해야 함으로써 서버의 과부하 및 네트웍의 트래픽을 증가시키는 문제점이 있다. 본 논문에서는 CORBA기반 웹 환경에서 클라이언트 상태정보 저장 및 활용의 문제점을 살펴보고, 이를 해결할 수 있는 방안으로 서버와 클라이언트상에서의 정보 저장 및 초기화 기법을 제시한다. 또한 웹 어플리케이션 개발 시 클라이언트의 상태정보의 효과적 활용 전략 및 각 기법의 장단점을 살펴보고, CORBA 객체의 이용 상황에 대한 실시간 정보를 계속적으로 보여주는 비쥬얼한 클라이언트 정보 관리자를 소개한다.

Child Sandplay Therapy for Ego Development, a Case-Study (우울한 모를 둔 여아의 자아 발달을 위한 모래놀이치료 사례연구)

  • Choi, Jin-Ah
    • Journal of the Korean Home Economics Association
    • /
    • v.46 no.3
    • /
    • pp.87-101
    • /
    • 2008
  • This research was based on a case study of a child who experienced difficulties in ego development due to her mother's compulsive and depressed behavior. Twenty-four therapeutic play sessions, including 16 sessions involving sandplay, were conducted. Based on discussions by Neumann and Kalff, the child's early psychic development and ego development were observed during these sandplay. As part af this investigation, I conducted counseling sessions in the sandbox where the atmosphere was free and safe. The sessions were based on mother-child unity with the therapist. As a result, the child exhibited restoration of mother-child unity and showed the journey of constellation of self and ego development. The results of this research indicate the effectiveness of sandplay in accelerating ego development.

Study of Player Attitudes Regarding MMORPG Avatar Customization in the Transformation Stage (MMORPG 아바타 커스터마이징의 변형 과정에서 플레이어 태도 연구)

  • Paik, Paul Chul-ho
    • Journal of Korea Game Society
    • /
    • v.17 no.3
    • /
    • pp.7-20
    • /
    • 2017
  • MMORPG users can create their own identity that they will use to act through in the virtual world utilizing the avatar creation system. The MMORPG customization process, divided into the creation and transformation stages, provides a sandbox for the identity play by users. In this study, analysis of the users' customization attitudes using the Q methodology especially in the transformation stage was conducted. The users' attitudes were found to be categorized into 4 types: 1) fulfilling attitude, 2) customization immersed attitude, 3) customization challenging attitude, and 4) community oriented attitude. Of particular interest are the immersed customization type, where the attitude is driven by the internal motivation of "self-satisfaction" unlike the fulfillment and community oriented attitudes which are driven by instrumental motivation of the avatar, and the continuous desire towards transformation revealed by the challenging customization attitude. This study provides valuable insight in the design perspective for developers in instilling critical immersion elements to the users while preparing to update the level.

Network Dump of Automated Malware Analysis System based on Real Machine (실머신 기반 악성코드 자동 분석 시스템에서의 네트워크 덤프)

  • Jo, Younghun;Na, Jaechan;Youn, Jonghee M.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.553-554
    • /
    • 2014
  • 이전에 쿠쿠 샌드박스(Cuckoo Sandbox)에서 가지고 있었던 가상환경의 분석환경시스템에서 실머신 기반에서 분석이 가능하도록 구현하는 과정에서 네트워크 덤프(Network Dump)와 관련된 문제가 존재한다. 이런 문제를 해결하기 위해 Server PC와 실머신을 NAT(Network Address Translation)를 사용하여 해결할 수 있는지 알아보고 분석한 결과를 가상머신으로 분석한 결과와 비교하여 차이점이 있는지 알아보고자 한다.

Malware Classification and Analysis of Automated Malware Analysis System (악성코드 자동 분석 시스템의 결과를 이용한 악성코드 분류 및 분석)

  • Na, Jaechan;Jo, Yeong-Hun;Youn, Jonghee M.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.490-491
    • /
    • 2014
  • 쿠쿠 샌드박스(Cuckoo Sandbox)는 가상머신을 이용해 악성코드를 자동으로 동적 분석할 수 있는 도구이다. 우선 악성코드의 MD5값을 이용하여 VirusTotal을 이용해 종류를 분류하고, 쿠쿠 샌드박스로 악성코드 동적을 분석하여 결과파일을 이용해 악성코드에서 호출한 API들에 대한 정보를 추출하고, 다양한 종류별 악성코드 그룹에 대해서 API빈도를 종합하고, 또한 다른 종류군의 악성코드 그룹과 API 빈도를 비교해 특정 종류의 악성코드 그룹에 대한 특징적인 API를 찾아내어 향후 이런 특징 API들을 이용해 악성코드의 종류를 자동으로 판정하기 위한 방법을 제시한다.

A Study on Screening of Surface Waves by Wave Barriers (방진구조물에 의한 표면파 산란해석)

  • Lee, Jong-Seh;Kim, Hee-Seok
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2004.11a
    • /
    • pp.578-581
    • /
    • 2004
  • In this paper numerical and experimental studies are conducted to examine the wave screening effectiveness of wave barriers. The numerical study is based on a finite element model of a 'sandbox' with Lysmer-Kuhlemeyer-type absorbing boundaries. Using the model, the screening effectiveness of wave barriers is studied for different barrier dimensions and distances between the source/receiver and the wave barrier. The results of the numerical modeling are compared with those of the ultrasonic experiment which is performed on an acrylic block with a drilled rectangular cut. Finally, the problem of ground transmitting vibration from a traveling train is numerically treated as a real-world application and the results are discussed in some detail.

  • PDF