• Title/Summary/Keyword: file

Search Result 4,407, Processing Time 0.036 seconds

Method for Finding Related Object File for a Computer Forensics in a Log Record of $LogFile of NTFS File System (NTFS 파일시스템의 $LogFile의 로그레코드에 연관된 컴퓨터 포렌식 대상 파일을 찾기 위한 방법)

  • Cho, Gyu-Sang
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.1-8
    • /
    • 2012
  • The NTFS journaling file($LogFile) is used to keep the file system clean in the event of a system crash or power failure. The operation on files leaves large amounts of information in the $LogFile. Despite the importance of a journal file as a forensic evidence repository, its structure is not well documented. The researchers used reverse engineering in order to gain a better understanding of the log record structures of address parts, and utilized the address for identifying object files to gain forensic information.

A Comparison of Three Stainless Steel Instruments in the Preparation of Curved Root Canals in vitro (세 종류의 Stainless Steel File을 이용한 만곡근관 형성 후 근관형태 변화에 관한 비교 연구)

  • Young-Tae Kim;Seung-Ho Baek;Kwang-Sik Bae;Sung-Sam Lim;Soo-Han Yoon
    • Restorative Dentistry and Endodontics
    • /
    • v.26 no.1
    • /
    • pp.9-15
    • /
    • 2001
  • 통상적인 근관형성 과정에서 근관형태의 직선화 경향을 발견할 수 있으며, 그 결과 만곡이 심한 근관에서 이상적인 근관형태를 얻기가 어렵다. 이를 극복하기 위한 많은 기구들과 근관 성형법들이 개선되고 소개되었다. 본 연구에서는 최근에 개발된 직사각형의 단면을 가지는 stainless steel file인 RT file과 Flex-R file, K-file을 이용하여 만곡근관 형성 후 최종 근관형태를 비교하여 각 file을 평가하고자 한다. 본 실험은 Bramante등의 방법을 변형하여 술 전의 근관형태와 술 후의 근관형태를 비교하였다. Schneider의 방법을 변형하여 3차원적 만곡을 계산하여 12도에서 36도 이내에 만곡도를 가진 근관을 선택하였다. 49개의 발거된 상악대구치 협측근관이나 하악대구치 근심근관을 3개의 군으로 나누고 레진과 플라스틱으로 제작된 mold에 투명한 교정용 레진으로 매몰하였다. 근첨에서 2.5, 5, 8mm지점에서 절단하여 각 mold에서 재조립한 후 다음과 같이 근관형성을 시행하였다. 제 1군은 SS K-file을 이용하여 step-back 방법 ; 제 2군은 Flex-R file을 이용하여 balanced force 방법 ; 제 3군은 RT file을 이용하여 step-back 방법으로 근관 형성하였다. 술 전과 술 후에 각 시편들을 체현미경으로 사진촬영하여 근관 중심 위치 이동률, 근관형성으로 삭제된 상아질양, 근관형성 후 모양을 Sigma scan/ image software program으로 계산하고 One way ANOVA로 통계적 유의성을 검증하여 다음과 같은 결론을 얻었다. 1. RT file이 치근단에서 K-file보다 유의성 있게 근관의 중심을 유지하는 것으로 보였다. 치아 중앙부에서는 RT file과 Flex-R file이 K-file에 대해 유의성 있게 우수한 것으로 나타났다. 2. 근관형성 후 삭제된 상아질양에서는 치근단에서 RT file이 적게 나왔으나 유의성은 없었다. 3. 근관형성 후 절단면 모양은 원형, 타원형, 불규칙한 형태들이 다양하게 나타났고 각 군간에 유의성 있는 차이는 없었다.

  • PDF

High-Dimensional Image Indexing based on Adaptive Partitioning ana Vector Approximation (적응 분할과 벡터 근사에 기반한 고차원 이미지 색인 기법)

  • Cha, Gwang-Ho;Jeong, Jin-Wan
    • Journal of KIISE:Databases
    • /
    • v.29 no.2
    • /
    • pp.128-137
    • /
    • 2002
  • In this paper, we propose the LPC+-file for efficient indexing of high-dimensional image data. With the proliferation of multimedia data, there Is an increasing need to support the indexing and retrieval of high-dimensional image data. Recently, the LPC-file (5) that based on vector approximation has been developed for indexing high-dimensional data. The LPC-file gives good performance especially when the dataset is uniformly distributed. However, compared with for the uniformly distributed dataset, its performance degrades when the dataset is clustered. We improve the performance of the LPC-file for the strongly clustered image dataset. The basic idea is to adaptively partition the data space to find subspaces with high-density clusters and to assign more bits to them than others to increase the discriminatory power of the approximation of vectors. The total number of bits used to represent vector approximations is rather less than that of the LPC-file since the partitioned cells in the LPC+-file share the bits. An empirical evaluation shows that the LPC+-file results in significant performance improvements for real image data sets which are strongly clustered.

Research on countermeasures against malicious file upload attacks (악성 파일 업로드 공격 대응방안 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.2
    • /
    • pp.53-59
    • /
    • 2020
  • Malicious file upload attacks mean that the attacker to upload or transfer files of dangerous types that can be automatically processed within the web server's environment. Uploaded file content can include exploits, malware and malicious scripts. An attacker can user malicious content to manipulate the application behavior. As a method of detecting a malicious file upload attack, it is generally used to find a file type by detecting a file extension or a signature of the file. However, this type of file type detection has the disadvantage that it can not detect files that are not encoded with a specific program, such as PHP files. Therefore, in this paper, research was conducted on how to detect and block any program by using essential commands or variable names used in the corresponding program when writing a specific program. The performance evaluation results show that it detected specific files effectively using the suggested method.

Development and Evaluation of Key Recovery System for Secure Recovery of Cryptographic Files in PC (PC상의 암호파일의 안전한 복구를 위한 키복구 시스템의 개발 및 평가)

  • 장수진;고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.167-186
    • /
    • 2002
  • The encryption of a file on a PC before saving can maintain security of the file. However, if the key for the encrypted file is lost or damaged, the encrypted file can not be decrypted, resulting in serious economical loss to the user or the user group. In order to minimize the economical loss a secure and reliable key recovery technology is required. Presented in this paper is the development and evaluation of PKRS (PC based Key Recovery System) which supports encryption and decryption of file and recovery of the encrypted file in emergency. The encapsulating method, which attaches key recovery information to encrypted file, is applied to the PKRS. In addition, the PKRS is developed and evaluated according to the requirements of Requirements for Key Recovery Products proposed by NIST and requirements of Common Criteria 2.0 to prove the safety and reliability of the information security system. This system is applicable to a PC and can be further extended to internet or intranet environment information system where in encryption and recovery of file is possible.

  • PDF

A study on conversion of cross-sectional information form STL file for Stereolithography (Stereolithography를 위한 STL파일로부터 단면정보 변환에 관한 연구)

  • 최홍태;김준안;이석희;백인환
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1995.04b
    • /
    • pp.445-450
    • /
    • 1995
  • This paper deals with conversion from STL file to Slice cross-sectional information for Stereolithography. The STL file consist of three vertices of triangle and normal vectors in order to represent three dimension shape, but It is very difficult to convert STL file intoSlice file directly, because of file size from one Mbyte to tens of Mbytes. So, The system is accomplished data flow such as neutral.dat, .SL1, .SL2, .SL3, and .SLC file. The data processing is as follows: 1. Create a neutral file including common information. 2. Modify STL file within effective scope of SLA. 3. Calculate a point of intersection between plane equation and line equation. 4. Sort z values by increasing order. 5. Search closed loop by method of singlylinked linear list. The system is developed by using Borland C++ 3.1 compiler in the environment of Pentium PC. We get a satisfactory prototype as a result of application about a lot of household electrical appliances.

  • PDF

A study for system design that guarantees the integrity of computer files based on blockchain and checksum

  • Kim, Minyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.392-401
    • /
    • 2021
  • When a data file is shared through various methods on the Internet, the data file may be damaged in various cases. To prevent this, some websites provide the checksum value of the download target file in text data type. The checksum value provided in this way is then compared with the checksum value of the downloaded file and the published checksum value. If they are the same, the file is regarded as the same. However, the checksum value provided in text form is easily tampered with by an attacker. Because of this, if the correct checksum cannot be verified, the reliability and integrity of the data file cannot be ensured. In this paper, a checksum value is generated to ensure the integrity and reliability of a data file, and this value and related file information are stored in the blockchain. After that, we will introduce the research contents for designing and implementing a system that provides a function to share the checksum value stored in the block chain and compare it with other people's files.

A File/Directory Reconstruction Method of APFS Filesystem for Digital Forensics

  • Cho, Gyu-Sang;Lim, Sooyeon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.8-16
    • /
    • 2022
  • In this paper, we propose a method of reconstructing the file system to obtain digital forensics information from the APFS file system when meta information that can know the structure of the file system is deleted due to partial damage to the disk. This method is to reconstruct the tree structure of the file system by only retrieving the B-tree node where file/directory information is stored. This method is not a method of constructing nodes based on structural information such as Container Superblock (NXSB) and Volume Checkpoint Superblock (APSB), and B-tree root and leaf node information. The entire disk cluster is traversed to find scattered B-tree leaf nodes and to gather all the information in the file system to build information. It is a method of reconstructing a tree structure of a file/directory based on refined essential data by removing duplicate data. We demonstrate that the proposed method is valid through the results of applying the proposed method by generating numbers of user files and directories.

Analysis of File Time Change by File Manipulation of Linux System (리눅스 시스템에서의 파일 조작에 따른 시간변화 분석)

  • Yoo, Byeongyeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.21-28
    • /
    • 2016
  • File Time information has a significant meaning in digital forensic investigation. File time information in Linux Ext4 (Extended File System 4) environment is the Access Time, Modification Time, Inode Change Time, Deletion Time and Creation Time. File time is variously changed by user manipulations such as creation, copy and edit. And, the study of file time change is necessary for evidence analysis. This study analyzes the change in time information of files or folders resulting from user manipulations in Linux operating system and analyzes ways to determine real time of malware infection and whether the file was modulation.

A Social Cultural Approach to Illegal Digital Contents Sharing (디지털콘텐츠 불법 파일공유에 관한 사회문화적 접근)

  • Park, Kyung Ja
    • Knowledge Management Research
    • /
    • v.17 no.1
    • /
    • pp.113-133
    • /
    • 2016
  • Why illegal digital contents sharing happens? This study pays attention to the fact that file sharing is an exchanging behavior between people and it is expanding despite of an illegal behavior and proposes that it is necessary for the phenomenon to be understood from social cultural point of view beyond a personal dimension. Based on the social exchange theory, this study demonstrates effects of file sharing attitudes and continuity, regarding 'group norm', 'popular demand', 'reciprocity' and 'social solidarity' as main factors. The main findings of this study are as followed;- First, it is shown that a tacit agreement of a group on file sharing is a determinant of positive attitude to file sharing and the intent of continual file sharing. Second, it is not found that the social relationship factors that are regarded as potential influential factors on file sharing attitude have effects on file sharing behavior, except for 'group norm'. Unlike previous studies, the results may come from the fact that this study deals with an illegal behavior. The third finding indicates a structural relationship between social relationship factors. When members of a group have more amicable attitude to file sharing including silence or a tacit agreement on file sharing, more people ask illegal sharing of files that they need. Such public demand creates expectation of reciprocity. As reciprocity maintains, social connectedness is strengthened. Then, strong social connectedness escalates the intent to maintain file sharing. It is important to notice that this study promotes understanding of how digital contents sharing happens by structuring and demonstrating influential relationship between characteristic factors of the social relationship.

  • PDF