• Title/Summary/Keyword: computer files

Search Result 548, Processing Time 0.025 seconds

Reliability Analysis of Privacy Policies Using Android Static Analysis (안드로이드 정적 분석을 활용한 개인정보 처리방침의 신뢰성 분석)

  • Yoonkyo, Jung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.1
    • /
    • pp.17-24
    • /
    • 2023
  • Mobile apps frequently request permission to access sensitive data for user convenience. However, while using mobile applications, sensitive and personal data has been leaked even if users do not allow it. To deal with this problem, Google App Store has required developers to disclose how the mobile app handles user data in a privacy policy. However, users are not certain that the privacy policy describes all the app's behavior. They have no choice but to rely on the privacy policy to confirm how the app uses data. This study designed a system that checks the reliability of privacy policies by analyzing the privacy policy texts and mobile apps. First, the system extracts and analyzes the privacy policy texts to check which personal data the privacy policy discloses that the mobile apps can collect. After analyzing which data apps can access using android static analysis, we compare both results to analyze the reliability of privacy policies. For the experiment, we collected the APK files and metadata of about 13K android apps registered in the Google Play Store and preprocessed the apps by four conditions. According to the comparison between privacy policies and mobile app behavior, many apps can access more personal data than disclosed in the privacy policy.

A Study on Ransomware Detection Methods in Actual Cases of Public Institutions (공공기관 실제 사례로 보는 랜섬웨어 탐지 방안에 대한 연구)

  • Yong Ju Park;Huy Kang Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.499-510
    • /
    • 2023
  • Recently, an intelligent and advanced cyber attack attacks a computer network of a public institution using a file containing malicious code or leaks information, and the damage is increasing. Even in public institutions with various information protection systems, known attacks can be detected, but unknown dynamic and encryption attacks can be detected when existing signature-based or static analysis-based malware and ransomware file detection methods are used. vulnerable to The detection method proposed in this study extracts the detection result data of the system that can detect malicious code and ransomware among the information protection systems actually used by public institutions, derives various attributes by combining them, and uses a machine learning classification algorithm. Results are derived through experiments on how the derived properties are classified and which properties have a significant effect on the classification result and accuracy improvement. In the experimental results of this paper, although it is different for each algorithm when a specific attribute is included or not, the learning with a specific attribute shows an increase in accuracy, and later detects malicious code and ransomware files and abnormal behavior in the information protection system. It is expected that it can be used for property selection when creating algorithms.

A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS (NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계)

  • Jong-Hwa Song;Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.23-28
    • /
    • 2023
  • Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay investigations or lead to the failure of obtaining crucial digital evidence. Therefore, various techniques have been developed to detect timestamp tampering. However, there is a limitation in detection if a suspect is aware of timestamp patterns and manipulates timestamps skillfully or alters system artifacts used in timestamp tampering detection. In this paper, a method is designed to detect changes in timestamps, even if a suspect alters the timestamp of a file on a storage device, it is challenging to do so with precision beyond millisecond order. In the proposed detection method, the first step involves verifying the timestamp of a file suspected of tampering to determine its write time. Subsequently, the confirmed time is compared with the file size recorded within that time, taking into consideration the performance of the storage device. Finally, the total capacity of files written at a specific time is calculated, and this is compared with the maximum input and output performance of the storage device to detect any potential file tampering.

Performance Evaluation of Smartphone Camera App with Multi-Focus Shooting and Focus Post-processing Functions (다초점 촬영과 초점후처리 기능을 가진 스마트폰 카메라 앱의 성능평가)

  • Chae-Won Park;Kyung-Mi Kim;Song-Yeon Yoo;Yu-Jin Kim;Kitae Hwang;In-Hwang Jung;Jae-Moon Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.35-40
    • /
    • 2024
  • In this paper, we validate the practicality of the OnePIC app implemented in the previous study by analyzing the execution and storage performance. The OnePIC app is a camera app that allows you to get a photo with a desired focus after taking photos focused on various places. To evaluate performance, we analyzed distance focus shooting time and object focus shooting time in detail. The performance evaluation was measured on actual smartphone. Distance focus shooting time for 5 photos was around 0.84 seconds, the object detection time was around 0.19 seconds regardless of the number of objects and object focus shooting time for 5 photos was around 4.84 seconds. When we compared the size of a single All-in-JPEG file that stores multi-focus photos to the size of the JPEG files stored individually, there was no significant benefit in storage space because the All-in-JPEG file size was subtly reduced. However, All-in-JPEG has the great advantage of managing multi-focus photos. Finally, we conclude that the OnePIC app is practical in terms of shooting time, photo storage size, and management.

Comparative study of volumetric change in water-stored and dry-stored complete denture base (공기중과 수중에서 보관한 총의치 의치상의 체적변화에 대한 비교연구)

  • Kim, Jinseon;Lee, Younghoo;Hong, Seoung-Jin;Paek, Janghyun;Noh, Kwantae;Pae, Ahran;Kim, Hyeong-Seob;Kwon, Kung-Rock
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.59 no.1
    • /
    • pp.18-26
    • /
    • 2021
  • Purpose: Generally, patients are noticed to store denture in water when removed from the mouth. However, few studies have reported the advantage of volumetric change in underwater storage over dry storage. To be a reference in defining the proper denture storage method, this study aims to evaluate the volumetric change and dimensional deformation in case of underwater and dry storage. Materials and methods: Definitive casts were scanned by a model scanner, and denture bases were designed with computer-aided design (CAD) software. Twelve denture bases (upper 6, lower 6) were printed with 3D printer. Printed denture bases were invested and flasked with heat-curing method. 6 upper and 6 lower dentures were divided into group A and B, and each group contains 3 upper and 3 lower dentures. Group A was stored dry at room temperature, group B was stored underwater. Group B was scanned at every 24 hours for 28 days and scanned data was saved as stereolithography (SLA) file. These SLA files were analyzed to measure the difference in volumetric change of a month and Kruskal-Wallis test were used for statistical analysis. Best-fit algorithm was used to overlap and 3-dimensional color-coded map was used to observe the changing pattern of impression surface. Results: No significant difference was found in volumetric changes regardless of the storage methods. In dry-stored denture base, significant changes were found in the palate of upper jaw and posterior lingual border of lower jaw in direction away from the underlying tissue, maxillary tuberosity of upper jaw and retromolar pad area of lower jaw in direction towards the underlying tissue. Conclusion: Storing the denture underwater shows less volumetric change of impression surface than storing in the dry air.

COMPARISON OF SCREW-IN EFFECT FOR SEVERAL NICKEL-TITANIUM ROTARY INSTRUMENTS IN SIMULATED RESIN ROOT CANAL (모형 레진 근관에서 수종의 전동 니켈-티타늄 파일에 대한 screw-in effect 비교)

  • Ha, Jung-Hong;Jin, Myoung-Uk;Kim, Young-Kyung;Kim, Sung-Kyo
    • Restorative Dentistry and Endodontics
    • /
    • v.35 no.4
    • /
    • pp.267-272
    • /
    • 2010
  • Screw-in effect is one of the unintended phenomena that occurs during the root canal preparation with nickel-titanium rotary files. The aim of this study was to compare the screw-in effect among various nickel-titanium rotary file systems. Six different nickel-titanium rotary instruments (ISO 20/.06 taper) were used: $K3^{TM}$ (SybronEndo, Glendora, CA, USA), $M_{two}$ (VDW GmbH, Munchen, Germany), NRT with safe-tip and with active tip (Mani Inc., Shioya-gun, Japan), ProFile$^{(R)}$ (Dentsply-Maillefer, Ballaigues, Switzerland) and ProTaper$^{(R)}$ (Dentsply-Maillefer, Ballaigues, Switzerland). For ProTaper$^{(R)}$, S2 was selected because it has size 20. Root canal instrumentations were done in sixty simulated single-curved resin root canals with a rotational speed of 300 rpm and single pecking motion. A special device was designed to measure the force of screw-in effect. A dynamometer of the device recorded the screw-in force during simulated canal preparation and the recorded data was stored in a computer with designed software (LCV-USE-VS, Lorenz Messtechnik GmbH, Alfdorf, Germany). The data were subjected to one-way ANOVA and Tukey's multiple range test for post-hoc test. P value of less than 0.05 was regarded significant. ProTaper$^{(R)}$ produced significantly more screw-in effects than any other instruments in the study (p < 0.001). $K3^{TM}$ produced significantly more screw-in effects than $M_{two}$, and ProFile$^{(R)}$ (p < 0.001). There was no significant difference among $M_{two}$, NRT, and ProFile$^{(R)}$ (p > 0.05), and between NRT with active tip and NRT with safe one neither (p > 0.05). From the result of the present study, it was concluded, therefore, that there seems significant differences of screw-in effect among the tested nickel-titanium rotary instruments. The radial lands and rake angle of nickel-titanium rotary instrument might be the cause of the difference.

Design and Implementation of an Execution-Provenance Based Simulation Data Management Framework for Computational Science Engineering Simulation Platform (계산과학공학 플랫폼을 위한 실행-이력 기반의 시뮬레이션 데이터 관리 프레임워크 설계 및 구현)

  • Ma, Jin;Lee, Sik;Cho, Kum-won;Suh, Young-kyoon
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.77-86
    • /
    • 2018
  • For the past few years, KISTI has been servicing an online simulation execution platform, called EDISON, allowing users to conduct simulations on various scientific applications supplied by diverse computational science and engineering disciplines. Typically, these simulations accompany large-scale computation and accordingly produce a huge volume of output data. One critical issue arising when conducting those simulations on an online platform stems from the fact that a number of users simultaneously submit to the platform their simulation requests (or jobs) with the same (or almost unchanging) input parameters or files, resulting in charging a significant burden on the platform. In other words, the same computing jobs lead to duplicate consumption computing and storage resources at an undesirably fast pace. To overcome excessive resource usage by such identical simulation requests, in this paper we introduce a novel framework, called IceSheet, to efficiently manage simulation data based on execution metadata, that is, provenance. The IceSheet framework captures and stores each provenance associated with a conducted simulation. The collected provenance records are utilized for not only inspecting duplicate simulation requests but also performing search on existing simulation results via an open-source search engine, ElasticSearch. In particular, this paper elaborates on the core components in the IceSheet framework to support the search and reuse on the stored simulation results. We implemented as prototype the proposed framework using the engine in conjunction with the online simulation execution platform. Our evaluation of the framework was performed on the real simulation execution-provenance records collected on the platform. Once the prototyped IceSheet framework fully functions with the platform, users can quickly search for past parameter values entered into desired simulation software and receive existing results on the same input parameter values on the software if any. Therefore, we expect that the proposed framework contributes to eliminating duplicate resource consumption and significantly reducing execution time on the same requests as previously-executed simulations.

An Iterative, Interactive and Unified Seismic Velocity Analysis (반복적 대화식 통합 탄성파 속도분석)

  • Suh Sayng-Yong;Chung Bu-Heung;Jang Seong-Hyung
    • Geophysics and Geophysical Exploration
    • /
    • v.2 no.1
    • /
    • pp.26-32
    • /
    • 1999
  • Among the various seismic data processing sequences, the velocity analysis is the most time consuming and man-hour intensive processing steps. For the production seismic data processing, a good velocity analysis tool as well as the high performance computer is required. The tool must give fast and accurate velocity analysis. There are two different approches in the velocity analysis, batch and interactive. In the batch processing, a velocity plot is made at every analysis point. Generally, the plot consisted of a semblance contour, super gather, and a stack pannel. The interpreter chooses the velocity function by analyzing the velocity plot. The technique is highly dependent on the interpreters skill and requires human efforts. As the high speed graphic workstations are becoming more popular, various interactive velocity analysis programs are developed. Although, the programs enabled faster picking of the velocity nodes using mouse, the main improvement of these programs is simply the replacement of the paper plot by the graphic screen. The velocity spectrum is highly sensitive to the presence of the noise, especially the coherent noise often found in the shallow region of the marine seismic data. For the accurate velocity analysis, these noise must be removed before the spectrum is computed. Also, the velocity analysis must be carried out by carefully choosing the location of the analysis point and accuarate computation of the spectrum. The analyzed velocity function must be verified by the mute and stack, and the sequence must be repeated most time. Therefore an iterative, interactive, and unified velocity analysis tool is highly required. An interactive velocity analysis program, xva(X-Window based Velocity Analysis) was invented. The program handles all processes required in the velocity analysis such as composing the super gather, computing the velocity spectrum, NMO correction, mute, and stack. Most of the parameter changes give the final stack via a few mouse clicks thereby enabling the iterative and interactive processing. A simple trace indexing scheme is introduced and a program to nike the index of the Geobit seismic disk file was invented. The index is used to reference the original input, i.e., CDP sort, directly A transformation techinique of the mute function between the T-X domain and NMOC domain is introduced and adopted to the program. The result of the transform is simliar to the remove-NMO technique in suppressing the shallow noise such as direct wave and refracted wave. However, it has two improvements, i.e., no interpolation error and very high speed computing time. By the introduction of the technique, the mute times can be easily designed from the NMOC domain and applied to the super gather in the T-X domain, thereby producing more accurate velocity spectrum interactively. The xva program consists of 28 files, 12,029 lines, 34,990 words and 304,073 characters. The program references Geobit utility libraries and can be installed under Geobit preinstalled environment. The program runs on X-Window/Motif environment. The program menu is designed according to the Motif style guide. A brief usage of the program has been discussed. The program allows fast and accurate seismic velocity analysis, which is necessary computing the AVO (Amplitude Versus Offset) based DHI (Direct Hydrocarn Indicator), and making the high quality seismic sections.

  • PDF