• 제목/요약/키워드: computer files

검색결과 549건 처리시간 0.028초

윈도우 API 후킹 탐지 방법에 대한 연구 (Study on the API Hooking Method Based on the Windows)

  • 김완경;소우영;성경
    • 한국항행학회논문지
    • /
    • 제13권6호
    • /
    • pp.884-893
    • /
    • 2009
  • 최근 윈도우 운영체제를 대상으로 하는 악의적인 공격은 윈도우 커널 단에서 동작하는 API를 후킹하여 이루어지고 있다. 본 논문에서는 윈도우 커널 단에서 동작하는 API 후킹 탐지를 위해 여러 후킹 기술과 방어 기술에 대해 연구, 분석한다. 이를 통해 커널 단에서 동작하는 dll파일들을 대상으로 현 시스템에서 동작하고 있는 API들을 탐지하는 윈도우 API 후킹 탐지 도구를 설계 및 개발한다. 제안하는 탐지 도구는 kernel32.dll, snmpai.dll, ntdll.dll 그리고 advapi.dll 등을 대상으로 import와 export 하는 동작을 탐지한다. 해당 도구를 이용한 탐지 결과 현 시스템의 커널 단에서 동작하고 API의 메모리상의 위치와 행위 등을 탐지 할 수 있다.

  • PDF

Parsing KEGG XML Files to Find Shared and Duplicate Compounds Contained in Metabolic Pathway Maps: A Graph-Theoretical Perspective

  • Kang, Sung-Hui;Jang, Myung-Ha;Whang, Ji-Young;Park, Hyun-Seok
    • Genomics & Informatics
    • /
    • 제6권3호
    • /
    • pp.147-152
    • /
    • 2008
  • The basic graph layout technique, one of many visualization techniques, deals with the problem of positioning vertices in a way to maximize some measure of desirability in a graph. The technique is becoming critically important for further development of the field of systems biology. However, applying the appropriate automatic graph layout techniques to the genomic scale flow of metabolism requires an understanding of the characteristics and patterns of duplicate and shared vertices, which is crucial for bioinformatics software developers. In this paper, we provide the results of parsing KEGG XML files from a graph-theoretical perspective, for future research in the area of automatic layout techniques in biological pathway domains.

Secure Data Sharing in The Cloud Through Enhanced RSA

  • Islam abdalla mohamed;Loay F. Hussein;Anis Ben Aissa;Tarak kallel
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.89-95
    • /
    • 2023
  • Cloud computing today provides huge computational resources, storage capacity, and many kinds of data services. Data sharing in the cloud is the practice of exchanging files between various users via cloud technology. The main difficulty with file sharing in the public cloud is maintaining privacy and integrity through data encryption. To address this issue, this paper proposes an Enhanced RSA encryption schema (ERSA) for data sharing in the public cloud that protects privacy and strengthens data integrity. The data owners store their files in the cloud after encrypting the data using the ERSA which combines the RSA algorithm, XOR operation, and SHA-512. This approach can preserve the confidentiality and integrity of a file in any cloud system while data owners are authorized with their unique identities for data access. Furthermore, analysis and experimental results are presented to verify the efficiency and security of the proposed schema.

실행파일 헤더내 문서화되지 않은 정보의 비교를 통한 실행파일 분류 방법 (A Classification Method for Executable Files based on Comparison of Undocumented Information in the PE Header)

  • 김정순;강정민;김강산;신욱
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제2권1호
    • /
    • pp.43-50
    • /
    • 2013
  • 파일 식별과 분석은 컴퓨터 포렌식 수사과정에서 디지털증거 획득 및 증거분석에 중요한 요소이며 지금까지 많은 연구가 진행되었다. 그러나 실행파일의 식별과 분석은 주로 악성코드에 대해 연구되어 왔기 때문에, 저작권침해 사고와 같은 일반적인 실행파일을 세부적으로 분류하고 탐지해야 할 경우에는 기존의 악성코드 분류 방법은 적용되기 어렵다. 따라서, 본 논문에서는 실행파일 헤더내 문서화되지 않은 정보의 유사도 측정에 근거한 비교를 통해 실행파일을 세부적으로 분류할 수 있는 방법을 제시한다. 제안한 방법은 실행파일의 헤더에 포함된 정보를 이용하기 때문에 일반적인 실행파일뿐만 아니라 기존의 악성코드 및 새로운 악성코드와 변종 그리고 실행압축, 코드변형, 가상화 및 난독화된 실행파일 분류에도 활용이 가능하다.

흉부외과환자 임상정보의 전산화 방법에 대한 고찰;데이터베이스 파일(DBF) 구조의 표준화및 코딩화 방안에 대하여 (The Evaluation of Method for Computerization of Clinical Informations of the Patients of the Department of Thoracic and Cardiovascular Surgery - About the practical method of coding and standardization of the structure of the database file(DBF) -)

  • 송우철;김병주;홍기우
    • Journal of Chest Surgery
    • /
    • 제25권10호
    • /
    • pp.989-1000
    • /
    • 1992
  • The concepts of modern type computer are so called "General purpose, stored program and digital computer" that is proposed by Charles Babbage. ENIAC, the initial operational electronic digital computer model, was produced in 1946. During the last 50 years, an epoch-making development of the personal computer was marked. The computerization of all levels of society is going on and also computerization of the general hospital and medical college is developing. But patient data management system for clinician is not used generally. We suggest the use of computer aided data management application programs for the clinical informations of the patients of the Department of Thoracic and Cardiovascular Surgery for better management and to make best of medical informations, to co-operate with the current of this times, and to prepare against the Hospital Information Systems[HIS], actively. Also, we suggest to standardize the format and structure of database files to store the clinical data of the patients By standardization of the database files, we can integrate and relate the data of the individual department or hospital, build up the regional or national statistics of the patients easily, and promote the generation of application programs. The medical network by the communication and computer would be utilized to collect the database files. And finally, we suggest the use of code system to input and search the informations about the diagnosis and operation such as the code system of International Classfication of Disease[WHO] and the table of the classfication of operation of the Ministry of Health and Social Affairs, Korea. In this article, we tried to show the new standards, the essential items for computerization of clinical informations of the patients of the Department of Thoracic and Cardiovascular Surgery.r Surgery.

  • PDF

Improvement of Computer-Aided Manufacturing (CAM) Software for Laser Machining

  • Bayesteh, Abdoleza;Ko, Junghyuk;Ahmad, Farid;Jun, Martin B.G.
    • 한국생산제조학회지
    • /
    • 제24권4호
    • /
    • pp.374-385
    • /
    • 2015
  • In this paper, effective and user friendly CAM software is presented that automatically generates any three dimensional complex toolpaths according to a CAD drawing. In advanced manufacturing, often it is essential to scan the sample following a complex trajectory which consists of short (few microns) and multidirectional moves. The reported CAM software offers constant velocity for all short trajectory elements and provides an efficient shift of tool path direction in sharp corners of a tool trajectory, which is vital for any laser, based precision machining. The software also provides fast modification of tool path, automatic and efficient sequencing of path elements in a complicated tool trajectory, location of reference point and automatic fixing of geometrical errors in imported drawing exchange files (DXF) or DWG format files.

A Study on Variant Malware Detection Techniques Using Static and Dynamic Features

  • Kang, Jinsu;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • 제16권4호
    • /
    • pp.882-895
    • /
    • 2020
  • The amount of malware increases exponentially every day and poses a threat to networks and operating systems. Most new malware is a variant of existing malware. It is difficult to deal with numerous malware variants since they bypass the existing signature-based malware detection method. Thus, research on automated methods of detecting and processing variant malware has been continuously conducted. This report proposes a method of extracting feature data from files and detecting malware using machine learning. Feature data were extracted from 7,000 malware and 3,000 benign files using static and dynamic malware analysis tools. A malware classification model was constructed using multiple DNN, XGBoost, and RandomForest layers and the performance was analyzed. The proposed method achieved up to 96.3% accuracy.

모바일 서버를 이용한 이기종간의 파일 공유 시스템 (File Sharing System Between Heterogeneous System Using Mobile Server)

  • 박성현;김아용;하의륜;저순;정회경
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 추계학술대회
    • /
    • pp.1041-1043
    • /
    • 2013
  • 현재 모바일 디바이스 보급이 증가하면서 1인 N 모바일 디바이스의 시대가 열리고 있다. 모바일 디바이스와 OS의 종류도 지속적으로 늘어나고 있으며, 시장점유율이 90%이상이 되는 Google의 Android나 Apple의 iOS뿐만 아니라 삼성과 인텔이 개발하고 있는 TIZEN, Linux의 UBUNTU를 모바일화 시킨 OS들이 출시를 앞두고 있다. 하지만 서로 다른 OS간의 파일을 공유 할 수 있는 시스템이나 기술은 없는 실정이다. Bluetooth나 WiFi Direct와 같은 기술들은 존재하지만 기기간의 호환성이 낮고, 전송 가능한 파일형식에 따른 제약이 존재한다. 이에 본 논문에서는 OS간의 파일공유 방법에 대해 연구하고, 모바일 디바이스뿐만 아니라 서로 다른 이기종간의 무선랜 환경에서 파일의 공유방법에 대해 연구한다. 향후 연구 과제로는 모바일 서버의 보급과 구축이 용이한 원터치 모바일 서버에서 구축, 관리, 유지, 보수 등의 서비스를 제공하는 모바일 통합 서버 시스템에 대해 연구한다.

  • PDF

2차 인증방식을 이용한 USB보안 솔루션 (USS Solution) (USB security solution using 2 fator authentication)

  • 고상현;한석진;최윤수;배종수;이현
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2017년도 추계학술발표대회
    • /
    • pp.267-270
    • /
    • 2017
  • As IT technology developed, storage media also developed. Among them, USB, which is a removable storage medium, is used not only to have several per person but also to work in various companies. Users store valuable and confidential data within USB. As time went on, the need for security increased. In order to solve this security problem, USB has been introduced to allow users to access internal files by inputting ID and password by embedding a security program in USB. However, the method of storing ID and Password inside is low confidentiality and high risk of information leakage. To solve these problems, we propose a 2 factor authentication system using Radius server in addition to login authentication. The proposed system not only improves the authenticity of the device, but also reduces the risk of infringement of personal information when lost. It also encrypts internal files to increase the confidentiality of internal information.

Trueness and precision of scanning abutment impressions and stone models according to dental CAD/CAM evaluation standards

  • Jeon, Jin-Hun;Hwang, Seong-Sig;Kim, Ji-Hwan;Kim, Woong-Chul
    • The Journal of Advanced Prosthodontics
    • /
    • 제10권5호
    • /
    • pp.335-339
    • /
    • 2018
  • PURPOSE. The purpose of the present study was to compare scanning trueness and precision between an abutment impression and a stone model according to dental computer-aided design/computer-aided manufacturing (CAD/CAM) evaluation standards. MATERIALS AND METHODS. To evaluate trueness, the abutment impression and stone model were scanned to obtain the first 3-dimensional (3-D) stereolithography (STL) file. Next, the abutment impression or stone model was removed from the scanner and re-fixed on the table; scanning was then repeated so that 11 files were obtained for each scan type. To evaluate precision, the abutment impression or stone model was scanned to obtain the first 3-D STL file. Without moving it, scanning was performed 10 more times, so that 11 files were obtained for each scan type. By superimposing the first scanned STL file onto the other STL files one by one, 10 color-difference maps and reports were obtained; i.e., 10 experimental scans per type. The independent t-test was used to compare root mean square (RMS) data between the groups (${\alpha}=.05$). RESULTS. The $RMS{\pm}SD$ values of scanning trueness of the abutment impression and stone model were $22.4{\pm}4.4$ and $17.4{\pm}3.5{\mu}m$, respectively (P<.012). The $RMS{\pm}SD$ values of scanning precision of the abutment impression and stone model were $16.4{\pm}2.9$ and $14.6{\pm}1.6{\mu}m$, respectively (P=.108). CONCLUSION. There was a significant difference in scanning trueness between the abutment impression and stone model, as evaluated according to dental CAD/CAM standards. However, all scans showed high trueness and precision.