• Title/Summary/Keyword: forensic engineering

Search Result 238, Processing Time 0.222 seconds

Experimental Study on the Self-extinguishing Performance of Extruded Polystyrene Insulation for Buildings and Suggestions on Institutional Management (건축용 압출법 단열판(XPS)의 자기소화성에 대한 실험적 연구 및 제도적 관리에 관한 제언)

  • Kang, Jung Ki;Choi, Don Mook
    • Fire Science and Engineering
    • /
    • v.34 no.3
    • /
    • pp.141-149
    • /
    • 2020
  • The Korea Industrial Standards (KS) stipulates methods and test procedures for measuring the horizontal combustibility of cellular plastics exposed to small flames (KS M ISO 9772:2018) and recommendations regarding the magnetic digestion of extruded polystyrene insulation (XPS) for measurement results (KS M 3808:2020). Although products that are certified to conform to KS standards must have burning characteristics (self-extinguishing), they are incinerated and spread by welds at construction sites, causing significant human and property damages. In this study, XPS produced by five companies, certified by KS, and sold in the market were purchased and tested for ignition and diffusion caused by a weld bullion at a construction site. The results showed that the five products had differences in performance. Three out of the five products were found to be self-saturated, but the other two were easily ignited and diffused, making it difficult for them to be self-extinguishing. Based on the result of this experimental investigation in line with the KS regulations, all the three types of products, including two types of products that were incinerated through weld defects, were found to be non-self-extinguishing, as specified in KS M 3808.

A Study on the Feature Point Extraction Methodology based on XML for Searching Hidden Vault Anti-Forensics Apps (은닉형 Vault 안티포렌식 앱 탐색을 위한 XML 기반 특징점 추출 방법론 연구)

  • Kim, Dae-gyu;Kim, Chang-soo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.61-70
    • /
    • 2022
  • General users who use smartphone apps often use the Vault app to protect personal information such as photos and videos owned by individuals. However, there are increasing cases of criminals using the Vault app function for anti-forensic purposes to hide illegal videos. These apps are one of the apps registered on Google Play. This paper proposes a methodology for extracting feature points through XML-based keyword frequency analysis to explore Vault apps used by criminals, and text mining techniques are applied to extract feature points. In this paper, XML syntax was compared and analyzed using strings.xml files included in the app for 15 hidden Vault anti-forensics apps and non-hidden Vault apps, respectively. In hidden Vault anti-forensics apps, more hidden-related words are found at a higher frequency in the first and second rounds of terminology processing. Unlike most conventional methods of static analysis of APK files from an engineering point of view, this paper is meaningful in that it approached from a humanities and sociological point of view to find a feature of classifying anti-forensics apps. In conclusion, applying text mining techniques through XML parsing can be used as basic data for exploring hidden Vault anti-forensics apps.

An Illegally-copied App Detecting Method by Using Odex File in Android Platform (안드로이드 플랫폼에서 odex 파일을 이용한 불법 복제 앱 탐지 방법)

  • Cho, Dueckyoun;Choi, Jaeyoung;Kim, Eunhoe;Gang, Gi-Du
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.67-75
    • /
    • 2015
  • According to the changes of the mobile environments, the usage and interest of the Android apps have been increased. But the usage of illegally-copied apps has been also increased. And the transparency and dependability of the app markets has been decreased. Therefore there are many cases for the copyright infringement of app developers. Although several methods for preventing illegally-copied apps have been studied, there may exist possible ways to bypass the methods. Since it is difficult to find out the first distributors of the illegally-copied apps, it is not easy to punish them legally. This paper proposes the method of detecting illegally-copied apps. The proposed detector can detect the illegally-copied apps using odex file, which is created when the app is installed. The detector can also find out the information of the first distributors based on forensic watermark technique. Since the illegally-copied app detector is running as a service on the system server, it is granted that the detector hides from the users. As an experiment result, the illegally-copied app detector takes on average within 0.2 seconds to detect and delete an illegally-copied app.

Multidimensional data generation of water distribution systems using adversarially trained autoencoder (적대적 학습 기반 오토인코더(ATAE)를 이용한 다차원 상수도관망 데이터 생성)

  • Kim, Sehyeong;Jun, Sanghoon;Jung, Donghwi
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.7
    • /
    • pp.439-449
    • /
    • 2023
  • Recent advancements in data measuring technology have facilitated the installation of various sensors, such as pressure meters and flow meters, to effectively assess the real-time conditions of water distribution systems (WDSs). However, as cities expand extensively, the factors that impact the reliability of measurements have become increasingly diverse. In particular, demand data, one of the most significant hydraulic variable in WDS, is challenging to be measured directly and is prone to missing values, making the development of accurate data generation models more important. Therefore, this paper proposes an adversarially trained autoencoder (ATAE) model based on generative deep learning techniques to accurately estimate demand data in WDSs. The proposed model utilizes two neural networks: a generative network and a discriminative network. The generative network generates demand data using the information provided from the measured pressure data, while the discriminative network evaluates the generated demand outputs and provides feedback to the generator to learn the distinctive features of the data. To validate its performance, the ATAE model is applied to a real distribution system in Austin, Texas, USA. The study analyzes the impact of data uncertainty by calculating the accuracy of ATAE's prediction results for varying levels of uncertainty in the demand and the pressure time series data. Additionally, the model's performance is evaluated by comparing the results for different data collection periods (low, average, and high demand hours) to assess its ability to generate demand data based on water consumption levels.

Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering (모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술)

  • Lee, Sang-Hyeong;Kim, Dong-Hyun;Oh, Tae-Woo;Kim, Ki-Bom;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.15-22
    • /
    • 2017
  • With the advance of Internet Technology, various social network services are created and used by users. Especially, the use of smart devices makes that multimedia contents can be used and distributed on social network services. However, since the crime rate also is increased by users with illegal purposes, there are needs to protect contents and block illegal usage of contents with multimedia forensics. In this paper, we propose a multimedia forensic technique which is identifying the video source. First, the scheme to acquire the sensor pattern noise (SPN) using morphology filtering is presented, which comes from the imperfection of photon detector. Using this scheme, the SPN of reference videos from the reference device is estimated and the SPN of an unknown video is estimated. Then, the similarity between two SPNs is measured to identify whether the unknown video is acquired using the reference device. For the performance analysis of the proposed technique, 30 devices including DSLR camera, compact camera, camcorder, action cam and smart phone are tested and quantitatively analyzed. Based on the results, the proposed technique can achieve the 96% accuracy in identification.

DNA Yield and PCR Success Rate of the Establishment Time of Wood Annual Ring: A Case Study of Korean Red Pine (Pinus densiflora) (목재의 나이테 생성 시기에 따른 DNA 추출 수율 및 PCR 성공률: 소나무(Pinus densiflora) 목재의 사례)

  • So Hyeon Kim;Byeong-Ju Lee;Ji Young Ahn;Jei-Wan Lee;Hyun-Mi Lee;Soo Hyung Eo
    • Journal of Korean Society of Forest Science
    • /
    • v.112 no.4
    • /
    • pp.554-560
    • /
    • 2023
  • To prevent illegal timber distribution, DNA markers have been used to identify the species and origin. However, extracting high-quality DNA from timber is difficult because of its physical and chemical properties. In this study, we investigated whether the age of timber tissue influences the yield of DNA extraction and the success rate of polymerase chain reaction (PCR) to understand the relationship between the establishment time of the wood annual ring and the extracted DNA concentration (ng/μl), purity (A260/A280), and PCR success rate (%) from pinewood, a major Korean domestic species. According to the results, it was observed that as the distance from the cambium increased, indicating that the tissue was older, the concentration and purity of the extracted DNA decreased significantly. For the trnM-trnV (285 bp) and rpoC1 (298 bp) regions, the PCR success rate was 100%. However, for the rbcL (1.3 kb) region, the PCR success rate was 66.67%. Moreover, PCR amplification of the rbcL region failed at all points older than 30 years. Thus, it is deduced that as time passes, along with the decay of timber cells, DNA is degraded, leading to a decrease in DNA concentration, purity, and PCR success rate. The results of this study are expected to be beneficial for future applications, such as the species identification of timber, providing valuable insights and potential utilization in this field.

A Design of Timestamp Manipulation Detection Method using Storage Performance in NTFS (NTFS에서 저장장치 성능을 활용한 타임스탬프 변조 탐지 기법 설계)

  • Jong-Hwa Song;Hyun-Seob Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.23-28
    • /
    • 2023
  • Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay investigations or lead to the failure of obtaining crucial digital evidence. Therefore, various techniques have been developed to detect timestamp tampering. However, there is a limitation in detection if a suspect is aware of timestamp patterns and manipulates timestamps skillfully or alters system artifacts used in timestamp tampering detection. In this paper, a method is designed to detect changes in timestamps, even if a suspect alters the timestamp of a file on a storage device, it is challenging to do so with precision beyond millisecond order. In the proposed detection method, the first step involves verifying the timestamp of a file suspected of tampering to determine its write time. Subsequently, the confirmed time is compared with the file size recorded within that time, taking into consideration the performance of the storage device. Finally, the total capacity of files written at a specific time is calculated, and this is compared with the maximum input and output performance of the storage device to detect any potential file tampering.

A Study on the Development of Assessment Index for Catastrophic Incident Warning Sign at Refinery and Pertrochemical Plants (정유 및 석유화학플랜트 중대사고 전조신호 평가지표 개발에 관한 연구)

  • Yun, Yong Jin;Park, Dal Jae
    • Korean Chemical Engineering Research
    • /
    • v.57 no.5
    • /
    • pp.637-651
    • /
    • 2019
  • In the event of a major accident such as an explosion in a refinery or a petrochemical plant, it has caused a serious loss of life and property and has had a great impact on the insurance market. In the case of catastrophic incidents occurring in process industries such as refinery and petrochemical plants, only the proximate causes of loss have been drawn and studied from inspectors or claims adjustors responsible for claims of property insurers, incident cause investigators, and national forensic service workers. However, it has not been done well for conducting root cause analysis (RCA) and identifying the factors that contributed to the failure and establishing preventive measures before leading to chemical plant's catastrophic incidents. In this study, the criteria of warning signs on CCPS catastrophic incident waning sign self-assessment tool which was derived through the RCA method and the contribution factor analysis method using the swiss cheese model principle has been reviewed first. Secondly, in order to determine the major incident warning signs in an actual chemical plant, 614 recommendations which have been issued during last the 17 years by loss control engineers of global reinsurers were analyzed. Finally, in order to facilitate the assessment index for catastrophic incident warning signs, the criteria for the catastrophic incident warning sign index at chemical plants were grouped by type and classified into upper category and lower category. Then, a catastrophic incident warning sign index for a chemical plant was developed using the weighted values of each category derived by applying the analytic hierarchy process (pairwise comparison method) through a questionnaire answered by relevant experts of the chemical plant. It is expected that the final 'assessment index for catastrophic incident warning signs' can be utilized by the refinery and petrochemical plant's internal as well as external auditors to assess vulnerability levels related to incident warning signs, and identify the elements of incident warning signs that need to be tracked and managed to prevent the occurrence of serious incidents in the future.