• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.024 seconds

Avoiding Automatic Android App Analysis by Detecting Random Touch Generation (무작위 터치 발생 탐지를 이용한 안드로이드 앱 자동 분석 회피에 관한 연구)

  • Yun, Han Jae;Lee, Man Hee
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.21-29
    • /
    • 2015
  • As the number of malicious Android applications increases rapidly, many automatic analysis systems are proposed. Hoping to trigger as many malicious behaviors as possible, the automatic analysis systems are adopting random touch generation modules. In this paper, we propose how to differentiate real human touches and randomly generated touches. Through experiments, we figured out that the distance between two consecutive human touches is shorter than that of random generation module. Also we found that the touch speed of human is also limited. In addition, humans rarely touch the outer area of smartphone screen. By using statistics of human smartphone touch, we developed an algorithm to differentiate between human touches and randomly generated touches. We hope this research will help enhance automatic Android app analysis systems.

An Impact and Problem by the Personal Information Protection Act. on the Financial Sector (개인정보보호법이 금융권에 미치는 영향과 문제점에 관한 고찰)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.31-36
    • /
    • 2013
  • The personal information protection act has been enacted from 2011 for the protection of public and private privacy. Since the application area of the law is so broad, there is a limit to covers everything in the financial field. In this paper, I'll discuss an impact and problem by the personal information protection act. and propose some new task to build an efficient personal information protection governance on financial sector.

Error Concealment Based on Multiple Representation for Wireless Transmission of JPEG2000 Image

  • Ou, Yang;Lee, Won-Young;Yang, Tae-Uk;Chee, Sung-Taek;Rhee, Kyung-Hyune
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1C
    • /
    • pp.68-78
    • /
    • 2008
  • The transmission of multimedia information over error-prone channels such as wireless networks has become an important area of research. In this paper, we propose two Error Concealment(EC) schemes for wireless transmission of JPEG2000 image. The Multiple Representation(MR) is employed as the preprocessing in our schemes, whereas the main error concealing operation is applied in wavelet domain at receiver side. The compressed code-stream of several subsampled versions of original image is transmitted over a single channel with random bit errors. In the decoder side, the correctly reconstructed wavelet coefficients are utilized to recover the corrupted coefficients in other sub-images. The recovery is carried out by proposed basic(MREC-BS) or enhanced(MREC-ES) methods, both of which can be simply implemented. Moreover, there is no iterative processing during error concealing, which results a big time saving. Also, the simulation results confirm the effectiveness and efficiency of our proposed schemes.

Development of Automated Optimum Design Program Considering the Design Details (세부설계사항을 고려한 자동최적설계 프로그램 개발)

  • Chang, Chun Ho
    • Journal of Korean Society of societal Security
    • /
    • v.4 no.1
    • /
    • pp.49-55
    • /
    • 2011
  • The primary objective of this paper is to develop optimal algorithms of reinforced concrete frame structural systems by the limit state design(CP 1110) and to look into the possibility of detailed design of these structural systems. The structural formulation is derived on the finite element method. The objective of optimization of a reinforced structure for a specified geometry is mainly to determine the optimum cross-sectional dimensions of concrete and the area of the various sizes of the reinforcement required for each member. In addition to the detail s such as the amount of web reinforcement, cutoff points of longitudinal reinforcedments etc. are also considered as design variables. In this study, the method of "Generalized Reduced Gradient, Rounding and with Neighborhood search" and "the Sequential Linear Programming" are employed as an analytical method of nonlinear optimization.

  • PDF

A Study of Key Node Search in Reconnaissance Surveillance Sensor Networks (감시정찰 센서네트워크에서 중요노드 탐색 연구)

  • Kook, Yoon-Ju;Kang, Ji-Won;Kim, Jeom-Goo;Kim, Kiu-Nam
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1453-1458
    • /
    • 2009
  • Sensor network for the human approach in a difficult area and a wide range of surveillance and the boundaries for the purpose and mission is the utilization significantly. In this paper we searched important nodes from the surveillance reconnaissance sensor network based on the virtual data. we generated data within the sensor's measurement range in the data transmitted from sensor nodes, and used PCA(Principle Component Analysis) for searching key node. If the important sensor node searched, and we can have easy management and establishing security measures when security problems is happened about nodes. This is for the sensor network in terms of effectiveness and cost-effectively and is directly connected with life span.

A study on structural relationships among police service and citizen (경찰 서비스와 시민간의 구조적 관계 연구)

  • Mun, Jun-Seob;Han, Sang-Seol
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.335-360
    • /
    • 2015
  • Police is an organization that provides service to the public. Police service is focusing on enforcing the law and solving the problem to improve the relationship between police and the public within the society. To accomplish their goal, police should build a better relationship with the public. In the current study, the researcher focused on factors of police service quality, community policing, fear of crime, police-citizen relationship, and the relationship among citizens. The current study used the interview methods for collecting data of 371 individuals from Seoul metro area and resulted that each factors had a causal relationship but police-citizen relationship and citizen-citizen relationship did not show the statistically significant results. Based on this study, the research provided critics and implications.

  • PDF

Fisheries Resources of Sudan

  • Abd El Magid, Magda Ahmed;Elseed, Salah Mahmoud Hamed
    • Journal of Marine Bioscience and Biotechnology
    • /
    • v.3 no.1
    • /
    • pp.42-47
    • /
    • 2008
  • Sudan is the largest country in Africa with an area of $2,505,810km^2$, of water constitutes $129,810km^2$, and cultivable land is 34%. Sudan has a total land boundary of 7,687 km with 9 border countries. This vast country embraces different vegetation patterns reflecting various climatic zones, grading from tropical rain forests in the south through semi-tropical savannah to arid zone in the extreme north, with annual rainfall ranging from 1,600 mm in the south to 25 mm in the north. The aquaculture industry is not developed as yet. Because of their basic characteristics, the Sudan inland and marine capture fisheries are of a small-scale and semi-industrial nature. The demand for fish and fish preparations is growing steadily. The animal resources sector (which includes fisheries) contributes 21% of Sudan GDP. The contribution of fisheries to Sudanese GDP is currently marginal. The per caput supply is only 1.6 kg/year, which is mostly obtained by capture fish landings. Despite the fact that fisheries GDP is extremely low, fish and fish preparations contribute to the food security of a wide sector of the rural and urban communities. Fisheries also provide work opportunities in the form of secondary employment as a source of income that indirectly contributes to household food security.

  • PDF

Honeypot game-theoretical model for defending against APT attacks with limited resources in cyber-physical systems

  • Tian, Wen;Ji, Xiao-Peng;Liu, Weiwei;Zhai, Jiangtao;Liu, Guangjie;Dai, Yuewei;Huang, Shuhua
    • ETRI Journal
    • /
    • v.41 no.5
    • /
    • pp.585-598
    • /
    • 2019
  • A cyber-physical system (CPS) is a new mechanism controlled or monitored by computer algorithms that intertwine physical and software components. Advanced persistent threats (APTs) represent stealthy, powerful, and well-funded attacks against CPSs; they integrate physical processes and have recently become an active research area. Existing offensive and defensive processes for APTs in CPSs are usually modeled by incomplete information game theory. However, honeypots, which are effective security vulnerability defense mechanisms, have not been widely adopted or modeled for defense against APT attacks in CPSs. In this study, a honeypot game-theoretical model considering both low- and high-interaction modes is used to investigate the offensive and defensive interactions, so that defensive strategies against APTs can be optimized. In this model, human analysis and honeypot allocation costs are introduced as limited resources. We prove the existence of Bayesian Nash equilibrium strategies and obtain the optimal defensive strategy under limited resources. Finally, numerical simulations demonstrate that the proposed method is effective in obtaining the optimal defensive effect.

Analysis of Security Technology of Trusted Platform Modules (신뢰할 수 있는 플랫폼 모듈 (TPM; Trusted Platform Module) 연구의 암호기술 분석)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.878-881
    • /
    • 2009
  • As for the technology developed for network security, there is little difference of design ability between the domestic and the foreign studies. Although the development of 2048 RSA processor has been undergone, the processing speed does not meet the requirement due to its long width. These days, an RSA processor architecture with higher speed comsuming less resource is necessary. As for the development of RNG (Random Number Generator), the technology trend is moving from PRNG (Pseudo Random Number Generator) to TRNG (True Random Number Generator), also requiring less area and high speed.

  • PDF

Design and Implementation of Optimal Control Algorithms for Building Energy Management (빌딩 에너지 관리 최적화 알고리즘 설계 및 구현)

  • Jin Jung-Hwa;Chung Sun-Tae
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.16 no.10
    • /
    • pp.969-976
    • /
    • 2004
  • Building energy saving is one of the most important issues in these days. Energy saving control strategies should be developed properly to achieve the saving. One of such area we could apply is the HVAC (Heating, Ventilation and Air-Conditioning) system. Through the optimal control algorithm for building energy management system (EMS), you can not only save the cost of building energy, but also protect HVAC system components against the unexpected condition. In order to verify the effectiveness of building energy saving, field test was accomplished for several months at 'A' building. And to get the measured data, remote control was used. If the remote control is used in BAS (Building Automation System), control and monitoring can be done for all of the building systems, such as HVAC, power, lighting, security and fire-alarm etc. anywhere any time. Using the remote control, Control and monitoring is possible for the testing system without going there. As the results of field test, we could reduce $5{\sim}10\%$ of the building energy cost.