• Title/Summary/Keyword: file format

Search Result 528, Processing Time 0.027 seconds

Development of the Integrated Loader/Linker System for the Java Class File and .NET PE File. (자바 클래스 파일과 .NET PE 파일을 위한 통합 로더/링커 시스템의 개발)

  • Ko, Kwang-Man
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.11
    • /
    • pp.1472-1482
    • /
    • 2007
  • The integrated loader/linker plays a very important role in creating all types of information and ensuring information integrity needed for substantial executions by receiving a PE input file, an intermediate representation of a java class file or a .NET environment, thereby allowing for saving information optimized for verification, resolution, initialization, and execution. This paper proposes a loader/linker system for integrating a java class file and .NET-based PE file. As a means of implementing the loader/linker system, a new execution file format(*.evm) and a memory format were designed to save all information of Java class files and .NET-based PE files, and enable the information in those files to be executed in a JVM or .NET environment through the use of saved execution information.

  • PDF

A Risk Assessment Method for the Long-term Preservation of Electronic Records (전자기록의 장기보존을 위한 위험평가 방법의 제안)

  • Cha, Hyun Chul;Choi, Joo Ho
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.1
    • /
    • pp.79-87
    • /
    • 2019
  • Appropriate strategies are needed to ensure long-term preservation of various types of electronic records. For proper preservation of electronic records, it is necessary of decision-making processes for risk assessment, notification and implementation of conservation measures. To do this, the task of assessing various risk factors that impede the long-term preservation and utilization of electronic records should be done first. In this study, since electronic records are mostly stored in file form, risk assessment for electronic records of file type is performed. The risk factors required for the risk assessment of the file format are derived, and the algorithms are developed to devise a calculation method of the weighting factor and the risk factor index for evaluating the risk based on the proposed risk factors. In addition, the proposed methods are applied to the file formats used in Korea and risk assessment is performed and the results are analyzed.

A Recovery Technique of PDF File in the Unit of Page (PDF 파일의 페이지단위 복구 기법)

  • Jang, Jeewon;Bang, Seung Gyu;Han, Jaehyeok;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.25-30
    • /
    • 2017
  • The influence of the data deletion method which is one of anti-forensic techniques is substantial in terms of forensic analysis compared to its simplicity of the act. In academic world, recovery techniques on deleted files have been continuously studied in response to the data deletion method and representatively, the file system-based file recovery technique and file format based recovery technique exist. If there's metadata of deleted file in file system, the file can be easily recovered by using it, but if there's no metadata, the file is recovered by using the signature-based carving technique or the file format based recovery technique has to be applied. At this time, in the file format based recovery technique, the file structure analysis and possible recovery technique should be provided. This paper proposes the page recovery technique on deleted PDF file based on the structural characteristics of PDF file. This technique uses the tag value of page object which constitutes one page of PDF file. Object is extracted by utilizing each tag value as a kind of signature and by analyzing extracted object, the metadata of PDF file is recombined and then it's reconfigured page by page. Recovering by page means that even if deleted PDF file is damaged, even some pages consisting of PDF file can be recovered. Generally, if the file system based file is not recoverable, deleted file is recovered by applying the signature based carving technique. The technique which we proposed in this paper can recover PDF files that are damaged. In the digital forensic perspective, it can be utilized to recover more data than previously.

HFAT: Log-Based FAT File System Using Dynamic Allocation Method

  • Kim, Nam Ho;Yu, Yun Seop
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.405-410
    • /
    • 2012
  • Several attempts have been made to add journaling capability to a traditional file allocation table (FAT) file system. However, they encountered issues such as excessive system load or instability of the journaling data itself. If journaling data is saved as a file format, it can be corrupted by a user application. However, if journaling data is saved in a fixed area such as a reserved area, the storage can be physically corrupted because of excessive system load. To solve this problem, a new method that dynamically allocates journaling data is introduced. In this method, the journaling data is not saved as a file format. Using a reserved area and reserved FAT status entry of the FAT file system specification, the journaling data can be dynamically allocated and cannot be accessed by user applications. The experimental results show that this method is more stable and scalable than other log-based FAT file systems. HFAT was tested with more than 12,000 power failures and was stable.

A Study of File Format-Aware Fuzzing against Smartphone Media Server Daemons (스마트폰 미디어 서버 데몬에 대한 파일 포맷 인식 기반의 퍼징 연구)

  • Shin, MinSik;Yu, JungBeen;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.541-548
    • /
    • 2017
  • The smartphone operates the media server daemon to handle audio service requests. Media server daemons, running with a high privilege in the background, caused many vulnerabilities to applications most frequently used in smart devices including smartphones. Fuzzing is a popularly used methodology to find software vulnerabilities. Unfortunately, fuzzing itself is not much effective in such format-strict environments as media services. In this paper, we propose a file format-aware fuzzing in order to efficiently detect vulnerabilities of media server daemon. We acquired a remote arbitrary code execution vulnerability on iOS/tvOS/MacOS/watchOS, and we verified the effectiveness by comparing our methodology with the fuzzers FileFuzz and ZZUF.

File Formats with a Multi-Layer Structure and API Design (다중 레이어 구조로 된 보안 파일 포맷 및 API 설계)

  • Park, Jong-Moon;Yoon, Jeong-Ho;Jo, Hyeon-Tae;Kim, Ki-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.123-127
    • /
    • 2012
  • Since the propagation of computers and Internet along with proliferation of smartphones rise, a large amount of data is being produced and modified daily. As the usage of data soars, a way of securely storing data emerged as a new problem. In this paper, saving big-data by using hierarchical data structure with multi-layer form, to come up with new security file format and API by applying encryption on each layers, is introduced. Moreover, we expect to see shown file format in this paper to be used in various fields.

  • PDF

Data Translation from 2D MEMS Design Data by the Removal of Superposed Entity to the 3D CAD Model (MEMS 설계용 2차원 데이터의 중복요소 제거를 통한 3차원 CAD 모델로의 변환)

  • Kim, Yong-Sik;Kim, Jun-Hwan
    • Korean Journal of Computational Design and Engineering
    • /
    • v.11 no.6
    • /
    • pp.447-454
    • /
    • 2006
  • Although there are many needs to use 3D models in MEMS field, it is not easy to generate 3D models based on MEMS CAD. This is because MEMS CAD is based on 2D and their popular format-GDSII file format- has its own limits and problems. The differences between GDSII file format and 3D CAD system, such as (1) superposed modeling, (2) duplicated entity, (3) restricted of entity type, give rise to several problems in data exchange. These limits and problems in GDSII file format have prevented 3D CAD system from generating 3D models from the MEMS CAD. To remove these limits and solve problems, it is important to extract the silhouette of data in the MEMS CAD. The proposed method has two main processes to extract silhouette; one is to extract the pseudo-silhouette from the original 2D MEMS data and the other is to remove useless objects to complete the silhouette. The paper reports on the experience gained in data exchange between 2D MEMS data and 3D models by the proposed method and a case study is presented, which employs the proposed method using MEMS CAD IntelliMask and Solidworks.

Development of a System to Convert a 3D Mesh Model in STL Format into OBJ Format (STL 3D 형식의 메쉬 모델을 형식으로 OBJ 변환하는 시스템 개발)

  • Yeo, Changmo;Park, Chanseok;Mun, Duhwan
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.17 no.3
    • /
    • pp.78-86
    • /
    • 2018
  • The 3D mesh model is used in various fields, such as virtual reality, shape-based searching, 3D simulation, reverse engineering, 3D printing, and laser scanning. There are various formats for the 3D mesh model, but STL and OBJ are the most typical. Since application systems support different 3D mesh formats, developing technology for converting 3D mesh models from one format into another is necessary to ensure data interoperability among systems. In this paper, we propose a method to convert a 3D mesh model in STL format into the OBJ format. We performed the basic design of the conversion system and developed a prototype, then verified the proposed method by experimentally converting an STL file into an OBJ file for test cases using this prototype.

Development of Spatial Object Converter for a Map Services in Mobile Environment (모바일 환경에서 지도 서비스를 위한 공간 객체 변환기의 개발)

  • Moon, Jin-Yong
    • Journal of Digital Contents Society
    • /
    • v.13 no.1
    • /
    • pp.31-36
    • /
    • 2012
  • Since the national standard topographic map is made by DXF format which is the results of the National Geographic Information System project and lots of CAD data and scanners can be used to acquire the data easily, the imports of existing DXF file will decrease the costs and time for data acquisition process. In addition, the spatial data such as topographic map should be able to convert to the middle file format such as PostScript in order to be exported into other systems. For this purpose, I design and implement three units of modules, which are File Manipulation Module, MVF Import Module, and MVF Export Module. Finally, I verify the actual transformation of topographic map that are DXF file format by conducting the series of tests.

Forensic Analysis of HEIF Files on Android and Apple Devices (스마트폰에서 촬영된 HEIF 파일 특징 분석에 관한 연구)

  • Kwon, Youngjin;Bang, Sumin;Han, Jaehyeok;Lee, Sangjin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.10
    • /
    • pp.421-428
    • /
    • 2021
  • The High Efficiency Image File Format (HEIF) is an MPEG-developed image format that utilizes the video codec H.265 to store still screens in a single image format. The iPhone has been using HEIF since 2017, and Android devices such as the Galaxy S10 have also supported the format since 2019. The format can provide images with good compression rates, but it has a complex internal structure and lacks significant compatibility between devices and software, making it not popular to replace commonly used JPEG (or JPG) files. However, despite the fact that many devices are already using HEIF, digital forensics research regarding it is lacking. This means that we can be exposed to the risk of missing potential evidence due to insufficient understanding of the information contained inside the file during digital forensics investigations. Therefore, in this paper, we analyze the HEIF formatted photo file taken on the iPhone and the motion photo file taken on the Galaxy to find out the information and features contained inside the file. We also investigate whether or not the software we tested support HEIF and present the requirement of forensic tools to analyze HEIF.