• Title/Summary/Keyword: exploit framework

Search Result 64, Processing Time 0.025 seconds

Camera pose estimation framework for array-structured images

  • Shin, Min-Jung;Park, Woojune;Kim, Jung Hee;Kim, Joonsoo;Yun, Kuk-Jin;Kang, Suk-Ju
    • ETRI Journal
    • /
    • v.44 no.1
    • /
    • pp.10-23
    • /
    • 2022
  • Despite the significant progress in camera pose estimation and structure-from-motion reconstruction from unstructured images, methods that exploit a priori information on camera arrangements have been overlooked. Conventional state-of-the-art methods do not exploit the geometric structure to recover accurate camera poses from a set of patch images in an array for mosaic-based imaging that creates a wide field-of-view image by sewing together a collection of regular images. We propose a camera pose estimation framework that exploits the array-structured image settings in each incremental reconstruction step. It consists of the two-way registration, the 3D point outlier elimination and the bundle adjustment with a constraint term for consistent rotation vectors to reduce reprojection errors during optimization. We demonstrate that by using individual images' connected structures at different camera pose estimation steps, we can estimate camera poses more accurately from all structured mosaic-based image sets, including omnidirectional scenes.

Design of a Vulnerability Exploit Framework for Secure External Hard Disks (보안 외장 하드디스크 취약점 익스플로잇 프레임워크 설계)

  • Sejun Hong;Wonbin Jeong;Sujin Kwon;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2024.01a
    • /
    • pp.117-121
    • /
    • 2024
  • 기존의 외장 하드디스크는 보안 기능의 부재로 인하여, 비인가자로부터 디스크가 탈취되는 경우에는 저장된 데이터가 유출되거나 훼손되는 문제점이 존재한다. 이러한 문제점을 보완하기 위하여, 보안 기능을 제공하는 보안 외장 하드디스크가 등장하였지만, 보안 기능 중 패스워드나 지문 인증과 같은 사용자 인증을 우회하는 취약점이 지속적으로 발견됨으로써, 비인가자가 장치 내부에 안전하게 저장된 데이터에 접근하는 보안위협이 발생하였다. 이러한 보안위협은 국가사이버안보센터에서 공개한 보안 요구사항을 만족하지 못하거나, 만족하더라도 설계나 구현 과정에서 내포된 취약점으로 인하여 발생한다. 본 논문은 이와 같이 보안 외장 하드디스크에서 발생하는 취약점을 점검하기 위한 목적으로 보안 외장 하드디스크 익스플로잇 프레임워크를 설계하였다. 취약점을 점검하기 위한 전체 프레임워크를 설계하였고, 프레임워크에서 제공하는 각 기능 및 유즈케이스 다이어그램을 설계하였으며, 설계된 프레임워크를 활용한다면, 현재 상용화되었거나 추후 개발될 보안 외장 하드디스크를 대상으로 안전성을 평가할 것으로 판단된다. 그뿐만 아니라, 안전성 평가 결과를 기반으로, 보안 외장 하드디스크에 내재된 취약점을 보완함으로써 안전성을 더욱 향상시키고, 수동으로 분석하여야만 하는 보안 외장 하드디스크의 취약점 점검을 자동화함으로써, 안전성을 평가하는 시간과 비용 또한 절감할 것으로 사료된다.

  • PDF

Reconfigurable Multidisciplinary Design Optimization Framework (재구성이 가능한 다분야통합최적설계 프레임웍의 개발)

  • Lee, Jang-Hyo;Lee, Se-Jung
    • Korean Journal of Computational Design and Engineering
    • /
    • v.14 no.3
    • /
    • pp.207-216
    • /
    • 2009
  • Modern engineering design problems involve complexity of disciplinary coupling and difficulty of problem formulation. Multidisciplinary design optimization can overcome the complexity and design optimization software or frameworks can lessen the difficulty. Recently, a growing number of new multidisciplinary design optimization techniques have been proposed. However, each technique has its own pros and cons and it is hard to predict a priori which technique is more efficient than others for a specific problem. In this study, a software system has been developed to directly solve MDO problems with minimal input required. Since the system is based on MATLAB, it can exploit the optimization toolbox which is already developed and proven to be effective and robust. The framework is devised to change an MDO technique to another as the optimization goes on and it is called a reconfigurable MDO framework. Several numerical examples are shown to prove the validity of the reconfiguration idea and its effectiveness.

A New Method of Profit Maximization Based on the Theory of Constraints (제약이론 기반의 기업이익 최적화 방법론)

  • Moon, Je-Chang;Rim, Suk-Chul
    • IE interfaces
    • /
    • v.14 no.4
    • /
    • pp.356-364
    • /
    • 2001
  • Production Improvement Method in TOC consists of five steps, but it is very difficult for most firms to implement it because it lacks the detailed methods at each step. This paper suggests some of detailed methods to implement the TOC. In the first step, computer simulation is used to identify the constraints in production lines. Subsequently, ASP, AUT, and CM calculation are defined for the second step, which are helpful to exploit the company's constraints. We also suggest the OEE method to effectively exploit the constraints of production lines in the factory. Finally the TOC/OEE procedure is suggested to optimize the investment in the fourth step. As an illustrative example, we introduce a case of a wafer manufacturer to adopt the suggested methods. The benefits of implementating the suggested methods are addressed in the framework of the balanced scorecard.

  • PDF

An Evaluation Framework to find Killer Applications in M-Government

  • Kesavarapu, Srikanth;Choi, Mun-Kee
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.868-874
    • /
    • 2007
  • Mobile Government is one of the new and important developments in e-government. The promise of m-government to provide greater access to government information is progressing in many developed and developing countries. Current Mobile Government does not exploit the full potential of available technology. Research shows there is a lack of a perfect killer application [2][1]. Firstly, this paper begins with an overview of e-gov and m-gov. In this context, this paper aims to present a framework to find killer applications in M-government to which researchers must pay attention and develop suitable way to perform according to different countries' contexts.

  • PDF

PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-Based Systems

  • Lee, Jong-Hyouk;Sohn, Seon-Gyoung;Chang, Beom-Hwan;Chung, Tai-Myoung
    • ETRI Journal
    • /
    • v.31 no.5
    • /
    • pp.554-564
    • /
    • 2009
  • In information security and network management, attacks based on vulnerabilities have grown in importance. Malicious attackers break into hosts using a variety of techniques. The most common method is to exploit known vulnerabilities. Although patches have long been available for vulnerabilities, system administrators have generally been reluctant to patch their hosts immediately because they perceive the patches to be annoying and complex. To solve these problems, we propose a security vulnerability evaluation and patch framework called PKG-VUL, which evaluates the software installed on hosts to decide whether the hosts are vulnerable and then applies patches to vulnerable hosts. All these operations are accomplished by the widely used simple network management protocol (SNMP). Therefore, system administrators can easily manage their vulnerable hosts through PKG-VUL included in the SNMP-based network management systems as a module. The evaluation results demonstrate the applicability of PKG-VUL and its performance in terms of devised criteria.

Energy-efficient Joint Control of Epidemic Routing in Delay Tolerant Networks

  • Wu, Yahui;Deng, Su;Huang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.2
    • /
    • pp.234-252
    • /
    • 2013
  • Due to the uncertain of connections in Delay Tolerant Networks (DTNs), most routing algorithms in DTNs need nodes to forward the message to others based on the opportunistic contact. The contact is related with the beaconing rate. In particular, nodes have more chances to encounter with each other with bigger beaconing rate, but more energy will be used. On the other hand, if the nodes forward the message to every node all the time, the efficiency of the routing algorithm is better, but it needs more energy, too. This paper tries to exploit the optimal beaconing rate and forwarding rate when the total energy is constraint. First, a theoretical framework is proposed, which can be used to evaluate the performance with different forwarding rate and beaconing rate. Then, this paper formulates a joint optimization problem based on the framework. Through Pontryagin's Maximal Principle, this paper obtains the optimal policy and proves that both the optimal forwarding and beaconing rates conform to threshold form. Simulation results show the accuracy of the theoretical framework. Extensive numerical results show that the optimal policy obtained in this paper is the best.

JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking

  • Kim, Hyoung-Chun;Choi, Young-Han;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.766-783
    • /
    • 2012
  • Recently, many malicious users have attacked web browsers using JavaScript code that can execute dynamic actions within the browsers. By forcing the browser to execute malicious JavaScript code, the attackers can steal personal information stored in the system, allow malware program downloads in the client's system, and so on. In order to reduce damage, malicious web pages must be located prior to general users accessing the infected pages. In this paper, a novel framework (JsSandbox) that can monitor and analyze the behavior of malicious JavaScript code using internal function hooking (IFH) is proposed. IFH is defined as the hooking of all functions in the modules using the debug information and extracting the parameter values. The use of IFH enables the monitoring of functions that API hooking cannot. JsSandbox was implemented based on a debugger engine, and some features were applied to detect and analyze malicious JavaScript code: detection of obfuscation, deobfuscation of the obfuscated string, detection of URLs related to redirection, and detection of exploit codes. Then, the proposed framework was analyzed for specific features, and the results demonstrate that JsSandbox can be applied to the analysis of the behavior of malicious web pages.

On Implementing a Hybrid Solver from Constraint Programming and Optimization (제약식프로그래밍과 최적화를 이용한 하이브리드 솔버의 구현)

  • Kim, Hak-Jin
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.203-217
    • /
    • 2003
  • Constraint Programming and Optimization have developed in different fields to solve common problems in real world. In particular, constraint propagation and linear Programming are their own fundamental and complementary techniques with the potential for integration to benefit each other. This intersection has evoked the efforts to combine both for a solution method to combinatorial optimization problems. Attempts to combine them have mainly focused on incorporating either technique into the framework of the other with traditional models left intact. This paper argues that integrating both techniques into an old modeling fame loses advantages from another and the integration should be molded in a new framework to be able to exploit advantages from both. The paper propose a declarative modeling framework in which the structure of the constraints indicates how constraint programming and optimization solvers can interact to solve problems.

A Framework for Analyzing the Effectiveness of a Collaboration Support System for Small and Medium-sized Enterprises (중소제조기업 협업지원 시스템의 도입 및 활용 효과 분석 프레임워크)

  • Kim, Jeong-Yeon;Ahn, Jae-Hyung;Shin, Dong-Min;Moon, Yong-Ma
    • IE interfaces
    • /
    • v.25 no.1
    • /
    • pp.13-20
    • /
    • 2012
  • Recently, the collaboration among small and medium-sized enterprises(SMEs) has been recognized as an effective competitive tool. As several systems have been developed to boost the collaboration, it is necessary to analyze the effectiveness of the systems in terms of their contribution to enhance operational performance of SMEs through objective and quantitative validation. In particular, the analysis for SMEs rather than large-scaled enterprises has not received much attention due to lack of relevant information and difficulty of collecting data. This paper presents a framework for analyzing the effectiveness of the collaboration support system, called i-manufacturing hub, which has been implemented by Korean government. Identification of influential factors to the effectiveness of collaboration hub, and constructing necessary hypotheses are proposed. To overcome the difficulty in data collection only by means of surveys through subjective questionnaires, we exploit system log data that are generated while SMEs use the system. As an initial phase to analyze the effectiveness through hypothesis validation, we discuss several interesting observations and challenges in the direction of enhancing collaboration among SMEs for better operational performance improvement and more participation in the collaboration hub.