• Title/Summary/Keyword: downloader

Search Result 8, Processing Time 0.024 seconds

Biological Object Downloader (BOD) Service for Easy Download and Management of Biological Databases

  • Park, Dae-Ui;Lee, Jung-Woo;Yoon, Gi-Seok;Gong, Sung-Sam;Bhak, Jong
    • Genomics & Informatics
    • /
    • v.5 no.4
    • /
    • pp.196-199
    • /
    • 2007
  • BOD is an FTP service management tool on the Internet. It was developed for biological researchers in South Korea. It enables easier and faster access of bioinformation without having to go through foreign FTP sites. BOD includes an automatic downloader with a management and email alert service from which the user can easily select and schedule any biological database. Once listed in BOD, the user can check and modify the download status and data from an additional email alert service.

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.

Implementation of Software Downloading and Installing for upgrading Digital TV Settop Box (디지털 방송 TV수신기의 기능 업그레이드를 위한 소프트웨어 다운로드와 설치 기능 구현)

  • Ryu Yll-Kwon;Jung Moon-Ryul;Kim Jung-Hwan;Choi Jin-Su;Bang Gun
    • Journal of Broadcast Engineering
    • /
    • v.11 no.1 s.30
    • /
    • pp.66-79
    • /
    • 2006
  • As constant development of digital broadcasting and data broadcasting system, new technology will be introduced to digital broadcasting and new broadcasting service will be appeared. These services need to be changed and processed to suit each services and the software of the receiver need to be upgraded. Though, generally the digital broadcasting receivers are not getting updated once it's delivered to home for long time and it need to be done by hand or collected each one of them with trouble. Therefore this paper suggests a way to overcome these difficulties via broadcasting stream. This research is to describe how three modules-namely (1) Downloader, downloads new software from data carrousel stream, (2) Update Loader, installs the software received by downloader; and (3) Recoverer, recovers the former version of the software if some serious problem has been occurred during downloading and installing the software. This paper tries to realize the accommodation of terrestrial STB based on the new technique and service following ATSC A-97 agreement.

A Study of Development and Real Time Control of Small Size Robot by Cable Reduction (케이블 감속을 이용한 소형 로봇의 개발과 실시간 제어에 관한 연구)

  • Hong, Jong-Sung;Lee, Jung-Wan
    • Journal of Industrial Technology
    • /
    • v.22 no.B
    • /
    • pp.251-260
    • /
    • 2002
  • In this thesis, a three degrees of freedom robot, which is able to provide sufficient precision for various robot researches, has been developed. The cable mechanism is used as a basic transmission of robot joints. Based on an optimal design strategy, link and joint parameters are determined and then overall geometry of the robot is designed. As an architecture of robot control, real time control system using real time linux and RtiC-Lab(Real Time Controls Laboratory) is developed. This system, written in C and based on Linux O/S, includes text editor, compiler, downloader, and real time plotter running in host computer for developing control purpose. Using these hardware and software, simple PD position control is implemented, the results shows the effectiveness of the system.

  • PDF

Development of a Firmware Downloader for Educational Purposes (MCU 교육을 위한 펌웨어 다운로더 개발)

  • Moon, Jungho;Jo, Myung-Suk;Lee, Sangmin
    • Annual Conference of KIPS
    • /
    • 2018.10a
    • /
    • pp.309-312
    • /
    • 2018
  • 이 논문은 MCU 교육 목적으로 개발한 AVR MCU용 부트로더 및 이와 통신 프로토콜을 공유하는 PC용 펌웨어 다운로더 프로그램에 소개한다. 저자들의 학과에서는 학생들의 MCU 교육을 위해 학과의 수업 내용에 적합한 MCU 실습보드를 직접 설계하여 사용하고 있다. 이 실습보드는 학생들이 휴대할 수 있도록 제작하였기 ?문에, 별도의 ISP 장비 없이 직렬 통신 인터페이스를 통해 PC에서 펌웨어를 다운로드 할 수 있도록 하고 있다. 이를 위해 AVR MCY용 부트로더와 펌웨어를 다운로드 할 수 있는 PC용 프로그램도 자체 개발하였다. 펌웨어 다운로도 프로그램은 다운로드 모드와 터미널 모드에서 동작하는데 현재의 상황에 맞게 모드 전환이 자동으로 이루어 지므로 직렬 포트를 열고 닫거나 모드를 전환할 필요가 없기 때문에 개발자에게 더욱 편리한 개발 환경을 제공한다.

Practical Malware Development And Analysis Method (실전 악성코드 개발 및 분석 방법)

  • Kim, Kyung-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.434-437
    • /
    • 2017
  • After the first malware, the brain virus, was founded in 1986, various types of malwares have been created Including worm, dropper, trojan, backdoor, rootkit and downloader. Especially in recent years, driver-type malware have made then more difficult to analyze. therefore, malware analyst require competitive skills. To analyze malware well, you need to know how it works and have to do it by yourself. So in this paper, we develop the dropper, backdoor, trojan, rootkit and driver similar to malware distributed in the real world. It shows the execution behavior on the virtual environment system We propose a method to analyze malware quickly and effectively with static analysis and dynamic analysis.

  • PDF

Development of high performance universal contrller based on multiprocessor (다중처리기를 갖는 고성능 범용제어기의 개발과 여유자유도 로봇 제어에의 응용)

  • Park, J.Y.;Chang, P.H.
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.10 no.4
    • /
    • pp.227-235
    • /
    • 1993
  • In this paper, the development of a high performance flexible controller is described. The hardware of the controller, based on VME-bus, consists of four M68020 single-board computers (32-bit) with M68881 numerical coprocessors, two M68040 single board donputers, I/O devices (such as A/D and D/A converters, paraller I/O, encoder counters), and bus-to-bus adaptor. This software, written in C and based on X-window environment with Unix operating system, includes : text editor, compiler, downloader, and plotter running in a host computer for developing control program ; device drivers, scheduler, and mathemetical routines for the real time control purpose ; message passing, file server, source level debugger virtural terminal, etc. The hardware and software are structured so that the controller might have both flexibility and extensibility. In papallel to the controller, a three degrees of freedom kinematically redundant robot has been developed at the same time. The development of the same time. The development of the robot was undertaken in order to provide, on the one hand, a computationally intensive plant to which to apply the controller, and on the other hand a research tool in the field of kinematically redundant manipulator, which is, as such, an important area. By using the controller, dynamic control of the redundant manipulator was successfully experimented, showing the effectiveness and flexibility of the controller.

  • PDF

Protecting Multi Ranked Searchable Encryption in Cloud Computing from Honest-but-Curious Trapdoor Generating Center (트랩도어 센터로부터 보호받는 순위 검색 가능한 암호화 다중 지원 클라우드 컴퓨팅 보안 모델)

  • YeEun Kim;Heekuck Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1077-1086
    • /
    • 2023
  • The searchable encryption model allows to selectively search for encrypted data stored on a remote server. In a real-world scenarios, the model must be able to support multiple search keywords, multiple data owners/users. In this paper, these models are referred to as Multi Ranked Searchable Encryption model. However, at the time this paper was written, the proposed models use fully-trusted trapdoor centers, some of which assume that the connection between the user and the trapdoor center is secure, which is unlikely that such assumptions will be kept in real life. In order to improve the practicality and security of these searchable encryption models, this paper proposes a new Multi Ranked Searchable Encryption model which uses random keywords to protect search words requested by the data downloader from an honest-but-curious trapdoor center with an external attacker without the assumptions. The attacker cannot distinguish whether two different search requests contain the same search keywords. In addition, experiments demonstrate that the proposed model achieves reasonable performance, even considering the overhead caused by adding this protection process.