• Title/Summary/Keyword: The Sandbox

Search Result 67, Processing Time 0.017 seconds

Malware Analysis Based on Section, DLL (Section, DLL feature 기반 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Ho-gyeong;Ha, Ji-hee;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1077-1086
    • /
    • 2017
  • Malware mutants based on existing malware is widely used because it can easily avoid the existing security system even with a slight pattern change. These malware appear on average more than 1.6 million times a day, and they are gradually expanding to IoT / ICS as well as cyber space, which has a large scale of damage. In this paper, we propose an analytical method based on features of PE Section and DLL that do not give much significance, rather than pattern-based analysis, Sandbox-based analysis, and CFG, Strings-based analysis. It is expected that the proposed model will be able to cope with effective malicious code in case of combined operation of various existing analysis technologies.

A Study on Screening of Surface Waves by Trenches (방진구에 의한 표면파 산란해석)

  • 김희석;이상진;이종세
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2004.04a
    • /
    • pp.235-242
    • /
    • 2004
  • In this study numerical and experimental studies are conducted to examine the wave screening effectiveness of trenches. The numerical study is based on a finite element model of a "sandbox" with Lysmer-Kuhlemeyer-type absorbing boundaries. Using the model, the screening effectiveness of trench is studied for different trench dimensions and distance from source and receiver to trench. The results of the numerical modeling are compared with the results of the ultrasonic experiment which is performed on a acrylic block with a drilled rectangular cut. These results show that the screening effectiveness of the trench is nearly equal if the depth of trench is lager than 60 % of the surface wave length. If is also shown that if the distance between the trench and the source is lager than twice the surface wave length, the thickness of the trench does not affect the screening effectiveness.

  • PDF

Study of Player Attitudes Regarding MMORPG Avatar Customization in the Transformation Stage (MMORPG 아바타 커스터마이징의 변형 과정에서 플레이어 태도 연구)

  • Paik, Paul Chul-ho
    • Journal of Korea Game Society
    • /
    • v.17 no.3
    • /
    • pp.7-20
    • /
    • 2017
  • MMORPG users can create their own identity that they will use to act through in the virtual world utilizing the avatar creation system. The MMORPG customization process, divided into the creation and transformation stages, provides a sandbox for the identity play by users. In this study, analysis of the users' customization attitudes using the Q methodology especially in the transformation stage was conducted. The users' attitudes were found to be categorized into 4 types: 1) fulfilling attitude, 2) customization immersed attitude, 3) customization challenging attitude, and 4) community oriented attitude. Of particular interest are the immersed customization type, where the attitude is driven by the internal motivation of "self-satisfaction" unlike the fulfillment and community oriented attitudes which are driven by instrumental motivation of the avatar, and the continuous desire towards transformation revealed by the challenging customization attitude. This study provides valuable insight in the design perspective for developers in instilling critical immersion elements to the users while preparing to update the level.

A Study on Screening of Surface Waves by Wave Barriers (방진구조물에 의한 표면파 산란해석)

  • Lee, Jong-Seh;Kim, Hee-Seok
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2004.11a
    • /
    • pp.578-581
    • /
    • 2004
  • In this paper numerical and experimental studies are conducted to examine the wave screening effectiveness of wave barriers. The numerical study is based on a finite element model of a 'sandbox' with Lysmer-Kuhlemeyer-type absorbing boundaries. Using the model, the screening effectiveness of wave barriers is studied for different barrier dimensions and distances between the source/receiver and the wave barrier. The results of the numerical modeling are compared with those of the ultrasonic experiment which is performed on an acrylic block with a drilled rectangular cut. Finally, the problem of ground transmitting vibration from a traveling train is numerically treated as a real-world application and the results are discussed in some detail.

  • PDF

An automated control system for concrete temperature development in construction

  • Qiang, Sheng;Leng, Xue-jun;Wang, Xiang-rong;Zhang, Jing-tao;Hua, Xia
    • Computers and Concrete
    • /
    • v.24 no.5
    • /
    • pp.437-444
    • /
    • 2019
  • PLC and its expansion module, electric ball valve and cooling pipe, electric heating steel plate and various components of the system, which is used to control test and process data. By automatically adjusting the opening of the valve, the system makes the top temperature and cooling speed develop along the ideal temperature diachronic curve. Moreover, the system enables the temperature difference between inside and surface of test block limited in a given range by automatically controlling the surface board heating. The method of physical simulation test by sandbox with built-in cooling water pipe and heating rod is adopted. On the premise of a given standard value, the operation of the system is checked under different working conditions. Further, an extension of this system is proposed, which enables its application to obtain some thermal parameters when cooperating with numerical simulation.

Child Sandplay Therapy for Ego Development, a Case-Study (우울한 모를 둔 여아의 자아 발달을 위한 모래놀이치료 사례연구)

  • Choi, Jin-Ah
    • Journal of the Korean Home Economics Association
    • /
    • v.46 no.3
    • /
    • pp.87-101
    • /
    • 2008
  • This research was based on a case study of a child who experienced difficulties in ego development due to her mother's compulsive and depressed behavior. Twenty-four therapeutic play sessions, including 16 sessions involving sandplay, were conducted. Based on discussions by Neumann and Kalff, the child's early psychic development and ego development were observed during these sandplay. As part af this investigation, I conducted counseling sessions in the sandbox where the atmosphere was free and safe. The sessions were based on mother-child unity with the therapist. As a result, the child exhibited restoration of mother-child unity and showed the journey of constellation of self and ego development. The results of this research indicate the effectiveness of sandplay in accelerating ego development.

The Development of Instruction Model for SW Education using the Minecraft Platform (마인크래프트 플랫폼을 이용한 소프트웨어교육 교수학습 모형)

  • Lee, Myungsuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.3
    • /
    • pp.119-128
    • /
    • 2019
  • Minecraft game is a sandboxed game based on a high degree of users' freedom; the game encourages its users to recreate various play patterns to increase their immersion. Although recently there were many studies that use Minecraft game techniques to improve the teaching methods but still not well adapted due to being applications-based techniques. In this paper, we present a teaching model that utilizes the same concept of the Minecraft games in where learners customize the class concepts based on their needs. Moreover, Minecraft-based learning games attempt to be used for learner-led, creativity and programming instruction, to overcome these use-cases limitations, by our study we aim to include the Minecraft-based learning games in class teaching activities, theoretical and practical lessons. In this way, we intend to increase interest in programming lessons, and to increase immersion as another way of game learning. In the future, we attempt to measure various effects of the uses of Minecraft-game-based teaching in programming classes compare to the traditionally used methods.

A Research on Mobile Malware Model propagated Update Attacks (변조 업데이트를 통해 전파되는 모바일 악성어플리케이션 모델 연구)

  • Ju, Seunghwan;Seo, Heesuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.47-54
    • /
    • 2015
  • The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.

Enhancing Kernel Module Security Using WebAssembly (웹어셈블리를 활용한 커널 모듈 보안성 강화)

  • Hajeong Lim;Hojoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.337-344
    • /
    • 2023
  • Modern OSs, including Linux, show high scalability by adopting a monolithic kernel design, but have weak security because they share all memory space. This study presents a kernel module that are isolated inside the kernel using WebAssembly. WebAssembly provides a high-performance virtual machine by defining a low-level instruction set while guaranteeing memory safety. In this paper, the WebAssembly execution environment is implemented inside the kernel, allowing developers to control the operation of kernel modules and achieving higher security.

A Case Study of Combining Two Cross-platform Development Frameworks for Storybook Mobile App

  • Beomjoo Seo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.12
    • /
    • pp.3345-3363
    • /
    • 2023
  • Developers often use cross-platform frameworks to create mobile apps that can run on multiple platforms with minimal code changes. However, these frameworks may not suit all the needs of a specific app, so developers may also use native APIs to add platform-specific features. This method eventually dilutes the advantages of cross-platform development methodology that aims to reduce development costs and time, and often leads to a decision to return back to the original native mobile development methodology. In this study, we explore a different approach: combining different cross-platform tools to develop a storybook mobile app that meets various requirements. We have demonstrated that integrating two cross-platform solutions can be used reliably to develop complex mobile applications. However, we also report that this approach can introduce unforeseen issues such as sandbox redundancy, unexpected functional burdens, and redundant permission requests. Despite these challenges, we believe that combining two cross-platform solutions can be applied to a variety of functional and performance requirements, enabling the development of more sophisticated mobile applications at lower costs and with shorter development timelines than traditional mobile app development methodologies.