• Title/Summary/Keyword: computer files

Search Result 548, Processing Time 0.029 seconds

Study on the API Hooking Method Based on the Windows (윈도우 API 후킹 탐지 방법에 대한 연구)

  • Kim, Wan-Kyung;Soh, Woo-Young;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.884-893
    • /
    • 2009
  • Recently, malicious attacks for Windows operate through Window API hooking in the Windows Kernel. This paper presents the API hooking attack and protection techniques based on Windows kernel. Also this paper develops a detection tool for Windows API hooking that enables to detect dll files which are operated in the kernel. Proposed tool can detect behaviors that imports from dll files or exports to dll files such as kernel32.dll, snmpapi.dll, ntdll.dll and advapidll.dll, etc.. Test results show that the tool can check name, location, and behavior of API in testing system.

  • PDF

Parsing KEGG XML Files to Find Shared and Duplicate Compounds Contained in Metabolic Pathway Maps: A Graph-Theoretical Perspective

  • Kang, Sung-Hui;Jang, Myung-Ha;Whang, Ji-Young;Park, Hyun-Seok
    • Genomics & Informatics
    • /
    • v.6 no.3
    • /
    • pp.147-152
    • /
    • 2008
  • The basic graph layout technique, one of many visualization techniques, deals with the problem of positioning vertices in a way to maximize some measure of desirability in a graph. The technique is becoming critically important for further development of the field of systems biology. However, applying the appropriate automatic graph layout techniques to the genomic scale flow of metabolism requires an understanding of the characteristics and patterns of duplicate and shared vertices, which is crucial for bioinformatics software developers. In this paper, we provide the results of parsing KEGG XML files from a graph-theoretical perspective, for future research in the area of automatic layout techniques in biological pathway domains.

Secure Data Sharing in The Cloud Through Enhanced RSA

  • Islam abdalla mohamed;Loay F. Hussein;Anis Ben Aissa;Tarak kallel
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.89-95
    • /
    • 2023
  • Cloud computing today provides huge computational resources, storage capacity, and many kinds of data services. Data sharing in the cloud is the practice of exchanging files between various users via cloud technology. The main difficulty with file sharing in the public cloud is maintaining privacy and integrity through data encryption. To address this issue, this paper proposes an Enhanced RSA encryption schema (ERSA) for data sharing in the public cloud that protects privacy and strengthens data integrity. The data owners store their files in the cloud after encrypting the data using the ERSA which combines the RSA algorithm, XOR operation, and SHA-512. This approach can preserve the confidentiality and integrity of a file in any cloud system while data owners are authorized with their unique identities for data access. Furthermore, analysis and experimental results are presented to verify the efficiency and security of the proposed schema.

A Classification Method for Executable Files based on Comparison of Undocumented Information in the PE Header (실행파일 헤더내 문서화되지 않은 정보의 비교를 통한 실행파일 분류 방법)

  • Kim, Jung-Sun;Kang, Jung-Min;Kim, Kang-San;Shin, Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.43-50
    • /
    • 2013
  • File identification and analysis is an important process of computer forensics, since the process determines which subjects are necessary to be collected and analyzed as digital evidence. An efficient file classification aids in the file identification, especially in case of copyright infringement where we often have huge amounts of files. A lot of file classification methods have been proposed by far, but they have mostly focused on classifying malicious behaviors based on known information. In copyright infringement cases, we need a different approach since our subject includes not only malicious codes, but also vast number of normal files. In this paper, we propose an efficient file classification method that relies on undocumented information in the header of the PE format files. Out method is useful in copyright infringement cases, being applied to any sort of PE format executable file whether the file is malicious, packed, mutated, transformed, virtualized, obfuscated, or not.

The Evaluation of Method for Computerization of Clinical Informations of the Patients of the Department of Thoracic and Cardiovascular Surgery - About the practical method of coding and standardization of the structure of the database file(DBF) - (흉부외과환자 임상정보의 전산화 방법에 대한 고찰;데이터베이스 파일(DBF) 구조의 표준화및 코딩화 방안에 대하여)

  • Song, U-Cheol;Kim, Byeong-Ju;Hong, Gi-U
    • Journal of Chest Surgery
    • /
    • v.25 no.10
    • /
    • pp.989-1000
    • /
    • 1992
  • The concepts of modern type computer are so called "General purpose, stored program and digital computer" that is proposed by Charles Babbage. ENIAC, the initial operational electronic digital computer model, was produced in 1946. During the last 50 years, an epoch-making development of the personal computer was marked. The computerization of all levels of society is going on and also computerization of the general hospital and medical college is developing. But patient data management system for clinician is not used generally. We suggest the use of computer aided data management application programs for the clinical informations of the patients of the Department of Thoracic and Cardiovascular Surgery for better management and to make best of medical informations, to co-operate with the current of this times, and to prepare against the Hospital Information Systems[HIS], actively. Also, we suggest to standardize the format and structure of database files to store the clinical data of the patients By standardization of the database files, we can integrate and relate the data of the individual department or hospital, build up the regional or national statistics of the patients easily, and promote the generation of application programs. The medical network by the communication and computer would be utilized to collect the database files. And finally, we suggest the use of code system to input and search the informations about the diagnosis and operation such as the code system of International Classfication of Disease[WHO] and the table of the classfication of operation of the Ministry of Health and Social Affairs, Korea. In this article, we tried to show the new standards, the essential items for computerization of clinical informations of the patients of the Department of Thoracic and Cardiovascular Surgery.r Surgery.

  • PDF

Improvement of Computer-Aided Manufacturing (CAM) Software for Laser Machining

  • Bayesteh, Abdoleza;Ko, Junghyuk;Ahmad, Farid;Jun, Martin B.G.
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.24 no.4
    • /
    • pp.374-385
    • /
    • 2015
  • In this paper, effective and user friendly CAM software is presented that automatically generates any three dimensional complex toolpaths according to a CAD drawing. In advanced manufacturing, often it is essential to scan the sample following a complex trajectory which consists of short (few microns) and multidirectional moves. The reported CAM software offers constant velocity for all short trajectory elements and provides an efficient shift of tool path direction in sharp corners of a tool trajectory, which is vital for any laser, based precision machining. The software also provides fast modification of tool path, automatic and efficient sequencing of path elements in a complicated tool trajectory, location of reference point and automatic fixing of geometrical errors in imported drawing exchange files (DXF) or DWG format files.

A Study on Variant Malware Detection Techniques Using Static and Dynamic Features

  • Kang, Jinsu;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.882-895
    • /
    • 2020
  • The amount of malware increases exponentially every day and poses a threat to networks and operating systems. Most new malware is a variant of existing malware. It is difficult to deal with numerous malware variants since they bypass the existing signature-based malware detection method. Thus, research on automated methods of detecting and processing variant malware has been continuously conducted. This report proposes a method of extracting feature data from files and detecting malware using machine learning. Feature data were extracted from 7,000 malware and 3,000 benign files using static and dynamic malware analysis tools. A malware classification model was constructed using multiple DNN, XGBoost, and RandomForest layers and the performance was analyzed. The proposed method achieved up to 96.3% accuracy.

File Sharing System Between Heterogeneous System Using Mobile Server (모바일 서버를 이용한 이기종간의 파일 공유 시스템)

  • Park, Sung-hyun;Kim, A-Yong;HE, YILUN;CHU, XUN;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.1041-1043
    • /
    • 2013
  • As the mobile device supply is increasing currently, the era of N mobile devices per person has opened. Types of mobile devices and OS are increasing continuously. Samsung and Intel are developing TIZEN, the OS mobilized by UBUNTU of Linux is going to be released as well as the market share of Google's Android and Apple's IOS remains above 90%. However, it is a reality that there are not specific technologies or systems which can share files between different OS. Despite of technologies such as Bluetooth and WiFi Direct, constraints are shown in device compatibility and file formats. In this paper, we have studied how to share files between OS as well as mobile devices, and to share files in a wireless LAN environment of heterogeneous variety. Future research includes the mobile phone integration server system that provides services such as introduction, management, maintenance, and repair in one-touch Mobile Server that spread and building are easy.

  • PDF

USB security solution using 2 fator authentication (2차 인증방식을 이용한 USB보안 솔루션 (USS Solution))

  • Ko, Sang-Hyun;Han, Seok-Jin;Choi, Yoon-SU;Bae, Jong-Su;Lee, Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.267-270
    • /
    • 2017
  • As IT technology developed, storage media also developed. Among them, USB, which is a removable storage medium, is used not only to have several per person but also to work in various companies. Users store valuable and confidential data within USB. As time went on, the need for security increased. In order to solve this security problem, USB has been introduced to allow users to access internal files by inputting ID and password by embedding a security program in USB. However, the method of storing ID and Password inside is low confidentiality and high risk of information leakage. To solve these problems, we propose a 2 factor authentication system using Radius server in addition to login authentication. The proposed system not only improves the authenticity of the device, but also reduces the risk of infringement of personal information when lost. It also encrypts internal files to increase the confidentiality of internal information.

Trueness and precision of scanning abutment impressions and stone models according to dental CAD/CAM evaluation standards

  • Jeon, Jin-Hun;Hwang, Seong-Sig;Kim, Ji-Hwan;Kim, Woong-Chul
    • The Journal of Advanced Prosthodontics
    • /
    • v.10 no.5
    • /
    • pp.335-339
    • /
    • 2018
  • PURPOSE. The purpose of the present study was to compare scanning trueness and precision between an abutment impression and a stone model according to dental computer-aided design/computer-aided manufacturing (CAD/CAM) evaluation standards. MATERIALS AND METHODS. To evaluate trueness, the abutment impression and stone model were scanned to obtain the first 3-dimensional (3-D) stereolithography (STL) file. Next, the abutment impression or stone model was removed from the scanner and re-fixed on the table; scanning was then repeated so that 11 files were obtained for each scan type. To evaluate precision, the abutment impression or stone model was scanned to obtain the first 3-D STL file. Without moving it, scanning was performed 10 more times, so that 11 files were obtained for each scan type. By superimposing the first scanned STL file onto the other STL files one by one, 10 color-difference maps and reports were obtained; i.e., 10 experimental scans per type. The independent t-test was used to compare root mean square (RMS) data between the groups (${\alpha}=.05$). RESULTS. The $RMS{\pm}SD$ values of scanning trueness of the abutment impression and stone model were $22.4{\pm}4.4$ and $17.4{\pm}3.5{\mu}m$, respectively (P<.012). The $RMS{\pm}SD$ values of scanning precision of the abutment impression and stone model were $16.4{\pm}2.9$ and $14.6{\pm}1.6{\mu}m$, respectively (P=.108). CONCLUSION. There was a significant difference in scanning trueness between the abutment impression and stone model, as evaluated according to dental CAD/CAM standards. However, all scans showed high trueness and precision.