• Title/Summary/Keyword: Windows Operating System

Search Result 241, Processing Time 0.025 seconds

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

Implementation of Commercial IWB Interface using Image Processing (영상처리를 이용한 상업용 전자칠판의 인터페이스 구현)

  • Ko, Eunsang;Rhee, Yang Won;Lee, Chang Woo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.19-24
    • /
    • 2012
  • In this paper we introduce a commercial interactive whiteboard (IWB) system named ImSensorTouch by ImSensor Inc. Using this interface system, we can control our computer through the interactive whiteboard screen just by touching it with your finger or a pen. The interface interacts with Windows operating system (OS) and is adaptable to changes of surroundings especially temperature, and illumination condition. The proposed system calculates the difference between a reference image and a current image captured by a camera in the optical receptive field. And the position making the difference is used to generate the position on Windows screen. Then, we send a mouse event on the position to Windows OS. We have implemented the system using a critical section(CS) with two threads for the reference frame update process in which an adaptive thresholding technique is periodically exploited to get reliable result. We expect the system is competitive and promises a bright future in the IWB market.

Design and Implementation of Patch Management System for Improving System Security (시스템 보안성 향상을 위한 패치관리시스템 설계 및 구현)

  • 서정택;윤주범;최대식;박응기;박춘식
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.43-51
    • /
    • 2004
  • Operating systems and application programs have security vulnerabilities derived from the software development process. Recently, incident cases related with the abuses of these vulnerabilities are increasing and the damages caused by them are becoming very important security issues all over the nations. Patch management is one of the most important processes to fix vulnerabilities of softwares and to ensure a security of systems. Since an institute or a company has distributed hierarchical and heterogeneous systems, it is not easy to update patches promptly. In this paper, we propose patch management framework to safely distribute and install the patches on Windows, Linux, and Solaris client systems. Besides, we considered extensibility and hierarchical structure for our patch management framework to support large scaled network environment.

  • PDF

Design and Implementation of a Efficient Storage Virtualization System based on Distributed Hash Tables (분산 해시 테이블 기반의 효율적인 저장 장치 가상화 시스템의 설계 및 구현)

  • Kim, Jong-Hyeon;Lee, Sang-Jun
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.103-112
    • /
    • 2009
  • This paper proposes an efficient storage virtualization system which allows users to view hard disk resources of numerous nodes as a large logical space using distributed hash tables of P2P techniques. The proposed system is developed at device level of Windows operating system and is suitable for users in Intranet environments. This system is developed to be recognized as one hard disk at the Windows explorer for user conveniences and does not need a supplementary client program at the application layer. In addition, it enhances security via cutting off breaches from external networks.

  • PDF

Design and Implementation of a 3D Virtual Desktop System based on Windows Operation System (윈도우즈 운영체제 기반의 3D 가상 데스크톱 시스템 설계 및 구현)

  • Hong, Seung-Pyo;Oh, Myeong-Jin;Shin, Jung-Hoon;Lee, Sang-Jun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1249-1253
    • /
    • 2010
  • As personal computers have been recently improved in performance, the multi tasking of running several applications at the same time has been generalized. Since only one task space is provided for performing such tasks on Windows operating system, a number of computer users feel inconvenient. In this paper, we propose a 3D Virtual Desktop System which can show a process of switching task spaces in 3D motion using DirectX. The proposed system can provide a computer user with more task spaces and the intuitive UI(User Interlace) such as Compiz of Linux.

A Study on Dynamic Code Analysis Method using 2nd Generation PT(Processor Trace) (2세대 PT(Processor Trace)를 이용한 동적 코드분석 방법 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.97-101
    • /
    • 2019
  • If the operating system's core file contains an Intel PT, the debugger can not only check the program state at the time of the crash, but can also reconfigure the control flow that caused the crash. We can also extend the execution trace scope to the entire system to debug kernel panics and other system hangs. The second-generation PT, the WinIPT library, includes an Intel PT driver with additional code to run process and core-specific traces through the IOCTL and registry mechanisms provided by Windows 10 (RS5). In other words, the PT trace information, which was limited access only by the first generation PT, can be executed by process and core by the IOCTL and registry mechanism provided by the operating system in the second generation PT. In this paper, we compare and describe methods for collecting, storing, decoding and detecting malicious codes of data packets in a window environment using 1/2 generation PT.

Design and Implementation of File Access Control Module for Secure Operating System Using on Windows (윈도우 기반의 보안 운영체제를 위한 와일 접근 제어 모듈 설계 및 구현)

  • 한석재;김완경;소우영
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.131-137
    • /
    • 2004
  • With the rapid development of information sharing through network, If system is exposed to various threatener and security incident are became a social problem. As a countermeasure, various security systems are been using such as IDS, Firewall, VPN etc.. But, expertise or expert is required to handle security system. In this paper, design and implementation of file access control module for secure operation system. The module, implemented in this paper, is based on Windows and has effect integrity and non-repudiation for a file.

  • PDF

Windows 시대의 퍼스널 CAD

  • 광성풍명;김석일
    • CDE review
    • /
    • v.2 no.1
    • /
    • pp.1-6
    • /
    • 1996
  • CG 등의 컴퓨터 지원에 의한 도형처리 시스템 중에서 특히 설계제도를 지원하는 시스템으로서 CAD가 제공되고 있다. CAD에는 대형 컴퓨터를 플랫폼으로 하는 메인프레임(집중형) CAD와 EWS(엔지니어링 워크 스테이션)을 플랫폼으로 하는 EWS/CAD 및 퍼스널 컴퓨터를 베이스로 한 퍼스널 CAD가 있는데 최근에 컴퓨터의 고성능화와 소형화의 흐름에 따라 퍼스널 CAD가 CAD의 주류로 되고 있다. 그 큰 요인으로서 퍼스널 CAD는 하드웨어 및 소프트웨어를 포함한 시스템 가격이 EWS/CAD 등을 비롯한 다른 CAD에 비하여 저렴한 가격대라는 것과 조작성이 우수하다는 점을 들 수 있다. 또한 최근에는 OS(Operating System: 컴퓨터를 움직이기 위한 기본적 소프트웨어)의 주류가 싱글 유저.싱글 태스크인 MS-DOS(이하 DOS라 한다)에서 싱글 유저.의사 멀티 태스크인 MS-Windows(이하 Windows라 한다)에로 이행하고 있으며 퍼스널 CAD도 그에 대응하는 것으로 되고 있다. 여기서는 이 Windows에 대응하는 퍼스널 CAD의 최신의 기술동향 및 OS에 대하여 설명한다.

  • PDF

Design of files and directories with security features within the Windows O.S using Visual C++ (Visual C++을 이용한 윈도우 운영체제 내의 파일 및 디렉토리 보안 기능 설계)

  • Jang, Seung-Ju;Kim, Jun-ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.510-514
    • /
    • 2009
  • This program was developed in Visual C + +, the Windows operating system has security features within the files and directories. File and directory security, encryption / decryption operations yirueojimyeo file security can be round, to know the value of the key and security password I need to know the directory is designed to be decrypted. In addition, ECB, CBC algorithm and 3DES, SEED algorithms and methods, and encryption. De0 can not run that created the file extension, as has been developed to allow for double security.

  • PDF

A 3-D Genetic Algorithm for Finding the Number of Vehicles in VRPTW

  • Paik, Si-Hyun;Ko, Young-Min;Kim, Nae-Heon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.22 no.53
    • /
    • pp.37-44
    • /
    • 1999
  • The problem to be studied here is the minimization of the total travel distance and the number of vehicles used for delivering goods to customers. Vehicle routes must also satisfy a variety of constraints such as fixed vehicle capacity, allowed operating time. Genetic algorithm to solve the VRPTW with heterogeneous fleet is presented. The chromosome of the proposed GA in this study has the 3-dimension. We propose GA that has the cubic-chromosome for VRPTW with heterogeneous fleet. The newly suggested ‘Cubic-GA (or 3-D GA)’ in this paper means the 2-D GA with GLS(Genetic Local Search) algorithms and is quite flexible. To evaluate the performance of the algorithm, we apply it to the Solomon's VRPTW instances. It produces a set of good routes and the reasonable number of vehicles.

  • PDF