• 제목/요약/키워드: extracting methods

검색결과 947건 처리시간 0.032초

윈도우 환경에서의 메모리 인젝션 기술과 인젝션 된 DLL 분석 기술 (Memory Injection Technique and Injected DLL Analysis Technique in Windows Environment)

  • 황현욱;채종호;윤영태
    • 융합보안논문지
    • /
    • 제6권3호
    • /
    • pp.59-67
    • /
    • 2006
  • 최근 개인 PC 해킹과 경제적 이익을 목적으로 하는 게임 해킹이 급증하면서 윈도우즈 시스템을 대상으로 하는 특정 목적의 악성코드들이 늘어나고 있다. 악성코드가 은닉 채널 사용이나 개인 방화벽과 같은 보안 제품 우회, 시스템 내 특정 정보를 획득하기 위한 기술로 대상 프로세스의 메모리 내에 코드나 DLL을 삽입하는 기술이 보편화되었다. 본 논문에서는 대상 프로세스의 메모리 영역에 코드를 삽입하여 실행시키는 기술에 대해 분석한다. 또한 피해 시스템에서 실행중인 프로세스 내에 인젝션 된 DLL을 추출하기 위해 파일의 PE 포맷을 분석하여 IMPORT 테이블을 분석하고, 실행중인 프로세스에서 로딩중인 DLL을 추출하여 명시적으로 로딩된 DLL을 추출하고 분석하는 기법에 대해 설명하였다. 인젝션 기술 분석과 이를 추출하는 기술을 통해 피해시스템 분석시 감염된 프로세스를 찾고 분석하는 시발점이 되는 도구로 사용하고자 한다.

  • PDF

Optimising the Extraction of Bacteria, Heterotrophic Protists and Diatoms, and Estimating Their Abundance and Biomass from Intertidal Sandy Sediments

  • Lee, Won-Je;Patterson, David J.
    • Journal of the korean society of oceanography
    • /
    • 제37권2호
    • /
    • pp.58-65
    • /
    • 2002
  • The study of microbial communities in sediments is impaired by the lack of reliable extraction methods. This study reports on the efficiency of recovery of a method for extracting bacteria, protists and diatoms from sandy sediments using a modified decant/fix method. The best extractions were achieved after fixation with a microtubule stabilising fixative and subsequent sonication for 80 seconds. We estimate that the efficiencies of recovery of bacteria and mixed heterotrophic flagellates were $96.4{\pm}3.5\%$ and $96.9{\pm}4.6\%$, respectively. Diatoms were recovered with an efficiency of 38-83% and varied considerably from species to species. This study suggests that the decant/fix method is effective in extracting small cells such as bacteria and heterotrophic flagellates, and that the efficiency of recovery of the method varies due to cell length and different types of organisms. When microbial carbon biomass had been underestimated by up to 32%, with much of that relating to larger cells such as microalgae and ciliates. We note that the corrected abundances may be still a subset of the total numbers present.

Multiscale features and information extraction of online strain for long-span bridges

  • Wu, Baijian;Li, Zhaoxia;Chan, Tommy H.T.;Wang, Ying
    • Smart Structures and Systems
    • /
    • 제14권4호
    • /
    • pp.679-697
    • /
    • 2014
  • The strain data acquired from structural health monitoring (SHM) systems play an important role in the state monitoring and damage identification of bridges. Due to the environmental complexity of civil structures, a better understanding of the actual strain data will help filling the gap between theoretical/laboratorial results and practical application. In the study, the multi-scale features of strain response are first revealed after abundant investigations on the actual data from two typical long-span bridges. Results show that, strain types at the three typical temporal scales of $10^5$, $10^2$ and $10^0$ sec are caused by temperature change, trains and heavy trucks, and have their respective cut-off frequency in the order of $10^{-2}$, $10^{-1}$ and $10^0$ Hz. Multi-resolution analysis and wavelet shrinkage are applied for separating and extracting these strain types. During the above process, two methods for determining thresholds are introduced. The excellent ability of wavelet transform on simultaneously time-frequency analysis leads to an effective information extraction. After extraction, the strain data will be compressed at an attractive ratio. This research may contribute to a further understanding of actual strain data of long-span bridges; also, the proposed extracting methodology is applicable on actual SHM systems.

자바 프로그램의 재사용을 위한 자바 빈즈 컴포넌트의 추출 및 명세화 기법 (Extraction and Specification Technique of Java Components for Reuse of Java Programs)

  • 이성은;김영익;류성열
    • 한국정보처리학회논문지
    • /
    • 제7권5호
    • /
    • pp.1388-1400
    • /
    • 2000
  • An important technical issue in recent software development is to make needed software by the composition of components that are assemblable, and configurable, and independently extracted. The main advantage of component-based software development is reducing development time and cost. It is more cost-effective in development time to use components that are already developed than developing from scratch. There are two ways of component-based software development: one is to compose self-developed components, and the other is to by the components developed by third-parties and compose them. In the second case, existing non component programs must can be used for reuse in the component development. In this paper, we approach two methods for increase of reusability of Java program. First, we suggest the technique of extracting the elements suitable for the Beans component model from Java program, and then we show a process and a guideline of converting the extract elements into the Beans component model. Second, we suggest a technique of automatically extracting component information from the Java Beans component, expressing them in XML, its is possible to reuse the efficient component environment.

  • PDF

Aerial Triangulation with 3D Linear Features and Arc-Length Parameterization

  • Lee, Won-Hee
    • 대한공간정보학회지
    • /
    • 제17권3호
    • /
    • pp.115-120
    • /
    • 2009
  • 기존의 도화사 수작업에 의한 기준점기반 항공삼각측량 기법은 전통적인 사진측량에서 유용하게 이용되어 왔으나, 자동화된 수치사진측량 기법이 확산되면서 기존방법의 문제점이 대두되었다. 따라서 본 논문은 보다 발전된 자동화 기술 개발을 위하여 상위 레벨인 선형객체들을 이용한 항공삼각측량 가능성을 제시하고 검증하고자 하였다. 최근에 발달된 선형 객체 추출기법 알고리즘은 보다 정확한 선형 객체 추출기법을 제공하였지만, 포인트 추출기법에 비하여 추출하기 어려운 단점이 존재한다. 따라서 본 논문은 이를 극복하기 위하여 수동 디지타이징이나 에지 연산자를 통하여 쉽게 획득되는 포인트를 이용하여 상위레벨 선형객체를 생성하고, 이를 통해 지형공간정보 이용 가능성을 높이고자 하였다. 본 연구 결과를 통해 진화하고 있는 컴퓨터 환경에 적합한 선형객체를 이용한 항공삼각측량 기법을 발전시킬 것으로 기대된다.

  • PDF

병렬 계산을 위한 프로시저 전환 (Interprocedural Transformations for Parallel Computing)

  • 장유숙;박두순
    • 인터넷정보학회논문지
    • /
    • 제2권4호
    • /
    • pp.91-99
    • /
    • 2001
  • 프로그램 수행시간의 대부분이 루프 구조에서 소비되고 있기 때문에 루프 구조를 가진 순차 프로그램에서 병렬성을 추출하는 연구들이 많이 행해지고 있고 그 연구들은 하나의 프로시저 내 루프 구조의 변환에 치중되고 있다. 그러나 대부분의 프로그램들은 프로시저 간 잠재된 병렬성을 가지고 있다. 본 논문에서는 프로시저 호출을 가진 루프에서 병렬성 추출 방식을 제안한다. 프로시저 호출을 포함하는 루프의 병렬화는 대부분 자료종속거리가 uniform 형태의 코드에서만 집중되었다. 본 논문에서는 자료종속거리가 uniform 코드, nonuniform 코드 그리고 복합된(complex) 코드를 가진 프로그램에서 적용 가능한 알고리즘을 제시하였으며, 제안된 알고리즘과 loop extraction, loop embedding 그리고 procedure cloning변환 방법을 CRAY-T3E로 성능 평가하였다. 성능평가 결과는 제안된 알고리즘이 효율적이라는 것을 보여준다.

  • PDF

구멍갈파래(Ulva pertusa)로부터 Dimethyl-$\beta$-propiothetin 최적추출조건 (Optimal Extracting Conditions Dimethyl-$\beta$-propiothetin from Ulva pertusa)

  • 배태진;강동수;최옥수
    • 한국식품영양과학회지
    • /
    • 제29권5호
    • /
    • pp.783-789
    • /
    • 2000
  • This study was focused on the optimal extracting conditions of dimethyl-$\beta$-propiothetin as bioactive substance from green seaweed. Identification and quantification of dimethyl-$\beta$-propiothetin were measured by headspace gas chromatography after conversion to dimethyl sulfide by treatment with saturated NaOH solution. Dimethyl-$\beta$-propiothetin was extracted through various processes (solvent extraction, ultrasonication, boiling and autoclaving) from Ulva pertusa. The content of dimethyl-$\beta$-propiothetin extracted by autoclaving treatment showed higher than that of various extraction methods. Dimethyl-$\beta$-propiothetin content in extract of Ulva pertusa was 325,800 ng/g after autoclaving 121$^{\circ}C$ for 45 min. Dimethyl-$\beta$-propiothetin in exract of Ulva pertusa was comparative stable under low temperature. The retentions of dimethyl-$\beta$-propiothetin content in extract of Ulva pertusa were 76.6~99.8% by incubation at 10~6$0^{\circ}C$ for 2 hours. Chemical decomposition of dimethyl-$\beta$-propiothetin was observed under laboratory conditions at pH values higher than 9.5.

  • PDF

Detecting Android Malware Based on Analyzing Abnormal Behaviors of APK File

  • Xuan, Cho Do
    • International Journal of Computer Science & Network Security
    • /
    • 제21권6호
    • /
    • pp.17-22
    • /
    • 2021
  • The attack trend on end-users via mobile devices is increasing in both the danger level and the number of attacks. Especially, mobile devices using the Android operating system are being recognized as increasingly being exploited and attacked strongly. In addition, one of the recent attack methods on the Android operating system is to take advantage of Android Package Kit (APK) files. Therefore, the problem of early detecting and warning attacks on mobile devices using the Android operating system through the APK file is very necessary today. This paper proposes to use the method of analyzing abnormal behavior of APK files and use it as a basis to conclude about signs of malware attacking the Android operating system. In order to achieve this purpose, we propose 2 main tasks: i) analyzing and extracting abnormal behavior of APK files; ii) detecting malware in APK files based on behavior analysis techniques using machine learning or deep learning algorithms. The difference between our research and other related studies is that instead of focusing on analyzing and extracting typical features of APK files, we will try to analyze and enumerate all the features of the APK file as the basis for classifying malicious APK files and clean APK files.

A Study on the Image Processing of Visual Sensor for Weld Seam Tracking in GMA Welding

  • Kim, J.-W.;Chung, K.-C.
    • International Journal of Korean Welding Society
    • /
    • 제1권2호
    • /
    • pp.23-29
    • /
    • 2001
  • In this study, a preview-sensing visual sensor system is constructed far weld seam tracking in GMA welding. The visual sensor system consists of a CCD camera, a diode laser system with a cylindrical lens, and a band-pass-filter to overcome the degrading of image due to spatters and/or arc light. Among the image processing methods, Hough transform method is compared with the central difference method from a viewpoint of the capability for extracting the accurate feature position. As a result, it was revealed that Hough transform method can more accurately extract the feature positions and it can be applied to real time weld seam tracking. Image processing which includes Hough transform method is carried out to extract straight lines that express laser stripe. After extracting the lines, weld joint position and edge points are determined by intersecting the lines. Even though the image includes a spatter trace on it, it is possible to recognize the position of weld joint. Weld seam tracking was precisely implemented with adopting Hough transform method, and it is possible to track the weld seam in the case of offset angle is in the region of $\pm$ $15^{\circ}$.

  • PDF

Development of human-in-the-loop experiment system to extract evacuation behavioral features: A case of evacuees in nuclear emergencies

  • Younghee Park;Soohyung Park;Jeongsik Kim;Byoung-jik Kim;Namhun Kim
    • Nuclear Engineering and Technology
    • /
    • 제55권6호
    • /
    • pp.2246-2255
    • /
    • 2023
  • Evacuation time estimation (ETE) is crucial for the effective implementation of resident protection measures as well as planning, owing to its applicability to nuclear emergencies. However, as confirmed in the Fukushima case, the ETE performed by nuclear operators does not reflect behavioral features, exposing thus, gaps that are likely to appear in real-world situations. Existing research methods including surveys and interviews have limitations in extracting highly feasible behavioral features. To overcome these limitations, we propose a VR-based immersive experiment system. The VR system realistically simulates nuclear emergencies by structuring existing disasters and human decision processes in response to the disasters. Evacuation behavioral features were quantitatively extracted through the proposed experiment system, and this system was systematically verified by statistical analysis and a comparative study of experimental results based on previous research. In addition, as part of future work, an application method that can simulate multi-level evacuation dynamics was proposed. The proposed experiment system is significant in presenting an innovative methodology for quantitatively extracting human behavioral features that have not been comprehensively studied in evacuation. It is expected that more realistic evacuation behavioral features can be collected through additional experiments and studies of various evacuation factors in the future.