• Title/Summary/Keyword: file recovery

Search Result 115, Processing Time 0.028 seconds

Analysis and Recovery of CIH virus (CIH 바이러스 분석 및 대책)

  • 김광조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.49-60
    • /
    • 1999
  • In this paper we introduce the definition and historical overviews of computer virus program and review their side-effect and ways of infections. We describe the feature of CIH virus which damaged lots of PC systems in Asian countries recently and propose new methods how to rescue against destruction under the operating system of the Microsoft's Windows 95/98. Our experiment results can fix hard disk having FAT32 file system structure and show some popular program cases of having recovered by commercial vaccine program.

Design and Implementation of Transactional Write Buffer Cache with Storage Class Memory (트랜잭션 단위 쓰기를 보장하는 스토리지 클래스 메모리 쓰기 버퍼캐시의 설계 및 구현)

  • Kim, Young-Jin;Doh, In-Hwan;Kim, Eun-Sam;Choi, Jong-Moo;Lee, Dong-Hee;Noh, Sam-H.
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.2
    • /
    • pp.247-251
    • /
    • 2010
  • Using SCM in storage systems introduce new potentials for improving I/O performance and reliability. In this paper, we study the use of SCM as a buffer cache that guarantees transactional unit writes. Our proposed method can improve storage system reliability and performance at the same time and can recover the storage system immediately upon a system crash. The Proposed method is based on the LINUX JBD(Journaling Block Device), thus reliability is equivalent to JBD. In our experiments, the file system that adopts our method shows better I/O performance even while guaranteeing high reliability and shows fast file system recovery time (about 0.2 seconds).

Comparison of Remaining Data According to Deletion Events on Microsoft SQL Server (Microsoft SQL Server 삭제 이벤트의 데이터 잔존 비교)

  • Shin, Jiho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.223-232
    • /
    • 2017
  • Previous research on data recovery in Microsoft SQL Server has focused on restoring data based on in the transaction log that might have deleted records exist. However, there was a limit that was not applicable if the related transaction log did not exist or the physical database file was not connected to Server. Since the suspect in the crime scene may delete the data records using a different deletion statements besides "delete", we need to check the remaining data and a recovery possibility of the deleted record. In this paper, we examined the changes "Page Allocation information" of the table, "Unallocation deleted data", "Row Offset Array" in the page according to "delete", "truncate" and "drop" events. Finally it confirmed the possibility of data recovery and availability of management tools in Microsoft SQL Server digital forensic investigation.

A Design of 16-bit Adiabatic Low-Power Microprocessor (단열회로를 이용한 16-bit 저전력 마이크로프로세서의 설계)

  • Shin, Young-Joon;Lee, Byung-Hoon;Lee, Chan-Ho;Moon, Yong
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.40 no.6
    • /
    • pp.31-38
    • /
    • 2003
  • A 16-bit adiabatic low-power Microprocessor is designed. The processor consists of control block, multi-port register file, program counter, and ALU. An efficient four-phase clock generator is also designed to provide power clocks for adiabatic processor. Adiabatic circuits based on efficient charge recovery logic(ECRL), are designed 0.35,${\mu}{\textrm}{m}$ CMOS technology. Conventional CMOS processor is also designed to compare the energy consumption of microprocessors. Simulation results show that the power consumption of the adiabatic microprocessor is reduced by a factor of 2.9∼3.1 compared to that of conventional CMOS microprocessor.

Characteristics of Near Wake Behind a Circular Cylinder with Serrated Fins (III) - Mechanism of Velocity Recovery - (톱니형 휜이 부착된 원주의 근접후류특성 연구 (III) - 속도회복 메카니즘에 관하여 -)

  • Ryu, Byong-Nam;Kim, Kyung-Chun;Boo, Jung-Sook
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.27 no.3
    • /
    • pp.347-356
    • /
    • 2003
  • The characteristics of near wakes of circular cylinders with serrated fins are investigated experimentally using a hot-wire anemometer for various freestream velocities. Near wake structures of the fin tubes are observed using a phase average technique. With increasing fin height and decreasing fin pitch. oscillation of streamwise velocity increases. It file oscillation of lateral velocity decreases. The time averaged V-component velocity distribution of the finned tube is contrary to that of the circular cylinder due to the different strength of entrainment flow. This strength is affected by the distance of (equation omitted) = 1.0 contour lines. (equation omitted) = 1.0 contour line approaches to the wake center line when the fin density is increased. When the distance between (equation omitted) = 1.0 contour lines comes close the shear force should be increased and the flow toward the wake center line can be more strengthened because of the shear force. Factors related to the velocity recovery in the near wake of the finned tube are attributed to tile turbulent intensity, the boundary layer thickness. the position and strength of entrainment process.

An Efficient Scheme of Performing Pending Actions for the Removal of Datavase Files (데이터베이스 파일의 삭제를 위한 미처리 연산의 효율적 수행 기법)

  • Park, Jun-Hyun;Park, Young-Chul
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.494-511
    • /
    • 2001
  • In the environment that database management systems manage disk spaces for storing databases directly, this paper proposes a correct and efficient scheme of performing pending actions for the removal of database files. As for performing pending actions, upon performing recovery, the recovery process must identify unperformed pending actions of not-yet-terminated transactions and then perform those actions completely. Making the recovery process identify those actions through the analysis of log records in the log file is the basic idea of this paper. This scheme, as an extension of the execution of transactions, fuzzy checkpoint, and recovery of ARIES, uses the following methods: First, to identify not-yet-terminated transactions during recovery, transactions perform pending actions after writing 'pa_start'log records that signify both the commit of transactions and the start of executing pending actions, and then write 'eng'log records. Second, to restore pending-actions-lists of not-yet-terminated transactions during recovery, each transaction records its pending-actions-list in 'pa_start'log record and the checkpoint process records pending-actions-lists of transactions that are decided to be committed in 'end_chkpt'log record. Third, to identify the next pending action to perform during recovery, whenever a page is updated during the execution of pending actions, transactions record the information that identifies the next pending action to perform in the log record that has the redo information against the page.

  • PDF

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.

A Low Power 16-Bit RISC Microprocessor Using ECRL Circuits

  • Shin, Young-Joon;Lee, Chan-Ho;Moon, Yong
    • ETRI Journal
    • /
    • v.26 no.6
    • /
    • pp.513-519
    • /
    • 2004
  • This paper presents a low power 16-bit adiabatic reduced instruction set computer (RISC) microprocessor with efficient charge recovery logic (ECRL) registers. The processor consists of registers, a control block, a register file, a program counter, and an arithmetic and logical unit (ALU). Adiabatic circuits based on ECRL are designed using a $0.35{\mu}m$ CMOS technology. An adiabatic latch based on ECRL is proposed for signal interfaces for the first time, and an efficient four-phase supply clock generator is designed to provide power for the adiabatic processor. A static CMOS processor with the same architecture is designed to compare the energy consumption of adiabatic and non-adiabatic microprocessors. Simulation results show that the power consumption of the adiabatic microprocessor is about 1/3 compared to that of the static CMOS microprocessor.

  • PDF

Design of a Log Structure for Fast Recovery of a File System on NAND Flash Memory (NAND 플래시 파일 시스템의 빠른 복구를 위한 로그 구조 설계)

  • Kim, Tae-Hoon;Lee, Ju-Kyung;Chung, Ki-Dong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.784-786
    • /
    • 2005
  • 본 논문에서는 기존의 플래시 파일 시스템과 차별되는 빠른 복구를 위한 로그 구조를 제안한다. 로그와 메타데이터를 플래시 메모리의 특정 영역에 기록하고, 오류가 발생하게 되면 복구단계에서 이 영역만을 스캔하기 때문에 파일 시스템의 오버헤드를 줄인다. 그리고 로깅연산은 트랜잭션으로 관리되어 다른 연산에 간섭받지 않고 독립적으로 수행이 되므로 동시성을 높이고 로깅에 따른 오버헤드가 크지 않다. 따라서 로깅과 복구에 필요한 시간을 최소화하여 신뢰성 있는 파일 시스템 구성이 가능하다.

  • PDF

Web Server Application in The Operation of Chip Mounter (Chip Mounter 운영에서 Web Server 활용)

  • 임선종;김선호
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.172-175
    • /
    • 2003
  • The enterprise find a solution to the problems such as a reduction of manufacturing period, accurate analysis for customer demand, improvement for customer service and rise of manufacture accomplishment. Internet is a good solution to such problems. Internet offers WWW(World Wide Web), remote control, file transfer and e-mail service. Among the services, WWW takes large portion because of convenient GUI, easy information search and unlimited information registration. Remote Monitoring Server(RMS) system that uses network service is constructed for chip mounter. Hardware base consists of RMS, chip mounter and C/S(Customer Service) server. Software includes DBMS and various modules in server home page. This provide product number, bad product number, trouble code, content and countermeasure in real-time information module, user information in setup module, detailed error information in fault diagnosis module, fault history in fault history module and customer information in customer service management module.

  • PDF