• Title/Summary/Keyword: memory space

Search Result 848, Processing Time 0.024 seconds

Hiding Shellcode in the 24Bit BMP Image (24Bit BMP 이미지를 이용한 쉘코드 은닉 기법)

  • Kum, Young-Jun;Choi, Hwa-Jae;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.691-705
    • /
    • 2012
  • Buffer overflow vulnerability is the most representative one that an attack method and its countermeasure is frequently developed and changed. This vulnerability is still one of the most critical threat since it was firstly introduced in middle of 1990s. Shellcode is a machine code which can be used in buffer overflow attack. Attackers make the shellcode for their own purposes and insert it into target host's memory space, then manipulate EIP(Extended Instruction Pointer) to intercept control flow of the target host system. Therefore, a lot of research to defend have been studied, and attackers also have done many research to bypass security measures designed for the shellcode defense. In this paper, we investigate shellcode defense and attack techniques briefly and we propose our new methodology which can hide shellcode in the 24bit BMP image. With this proposed technique, we can easily hide any shellcode executable and we can bypass the current detection and prevention techniques.

Correlation Power Analysis Attacks on the Software based Salsa20/12 Stream Cipher (소프트웨어 기반 스트림 암호 Salsa20/12에 대한 상관도 전력분석 공격)

  • Park, Young-Goo;Bae, Ki-Seok;Moon, Sang-Jae;Lee, Hoon-Jae;Ha, Jae-Cheul;Ahn, Mahn-Ki
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.35-45
    • /
    • 2011
  • The Salsa20/12 stream cipher selected for the final eSTREAM portfolio has a better performance than software implementation of AES using an 8-bit microprocessor with restricted memory space, In the theoretical approach, the evaluation of exploitable timing vulnerability was 'none' and the complexity of side-channel analysis was 'low', but there is no literature of the practical result of power analysis attack. Thus we propose the correlation power analysis attack method and prove the feasibility of our proposed method by practical experiments, We used an 8-bit RISC AVR microprocessor (ATmegal128L chip) to implement Salsa20/12 stream cipher without any countermeasures, and performed the experiments of power analysis based on Hamming weight model.

A Study about the Changes in Movie Theater Work after the COVID-19 : Focusing on the Cinema Industry of Korea (코로나 19시대 이후 극장체재 변화에 관한 연구 :한국 영화 산업을 중심으로)

  • Suh, Jung-In
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.4
    • /
    • pp.447-453
    • /
    • 2021
  • The whole world was confused, unintended "COVID-19". It has become a constant phenomenon, not a temporary one, and people are getting used to this era. Among them, We are combating the form of "the film" which is playing a role of a multiplex in Korean film industry. Now we have studied the development of the future korean industry based on the movie theater form through our cultural industry, New platform OTT. As a result for the research, the OTT platform, which is located in one genre today, should be regarded as an opportunity to develop films, and the movie theater, which is a part of the development of the film industry, differs from the OTT platform. with "memory of space", the result was that "The audience's footsteps can move again." The crisis of "COVID-19" should bring about the consequences of turning into opportunity.

Protective effects of Populus tomentiglandulosa against cognitive impairment by regulating oxidative stress in an amyloid beta25-35-induced Alzheimer's disease mouse model

  • Kwon, Yu Ri;Kim, Ji-Hyun;Lee, Sanghyun;Kim, Hyun Young;Cho, Eun Ju
    • Nutrition Research and Practice
    • /
    • v.16 no.2
    • /
    • pp.173-193
    • /
    • 2022
  • BACKGROUND/OBJECTIVES: Alzheimer's disease (AD) is one of the most representative neurodegenerative disease mainly caused by the excessive production of amyloid beta (Aβ). Several studies on the antioxidant activity and protective effects of Populus tomentiglandulosa (PT) against cerebral ischemia-induced neuronal damage have been reported. Based on this background, the present study investigated the protective effects of PT against cognitive impairment in AD. MATERIALS/METHODS: We orally administered PT (50 and 100 mg/kg/day) for 14 days in an Aβ25-35-induced mouse model and conducted behavioral experiments to test cognitive ability. In addition, we evaluated the levels of aspartate aminotransferase (AST) and alanine aminotransferase (ALT) in serum and measured the production of lipid peroxide, nitric oxide (NO), and reactive oxygen species (ROS) in tissues. RESULTS: PT treatment improved the space perceptive ability in the T-maze test, object cognitive ability in the novel object recognition test, and spatial learning/long-term memory in the Morris water-maze test. Moreover, the levels of AST and ALT were not significantly different among the groups, indicating that PT did not show liver toxicity. Furthermore, administration of PT significantly inhibited the production of lipid peroxide, NO, and ROS in the brain, liver, and kidney, suggesting that PT protected against oxidative stress. CONCLUSIONS: Our study demonstrated that administration of PT improved Aβ25-35-induced cognitive impairment by regulating oxidative stress. Therefore, we propose that PT could be used as a natural agent for AD improvement.

Efficient GPU Framework for Adaptive and Continuous Signed Distance Field Construction, and Its Applications

  • Kim, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.63-69
    • /
    • 2022
  • In this paper, we propose a new GPU-based framework for quickly calculating adaptive and continuous SDF(Signed distance fields), and examine cases related to rendering/collision processing using them. The quadtree constructed from the triangle mesh is transferred to the GPU memory, and the Euclidean distance to the triangle is processed in parallel for each thread by using it to find the shortest continuous distance without discontinuity in the adaptive grid space. In this process, it is shown through experiments that the cut-off view of the adaptive distance field, the distance value inquiry at a specific location, real-time raytracing, and collision handling can be performed quickly and efficiently. Using the proposed method, the adaptive sign distance field can be calculated quickly in about 1 second even on a high polygon mesh, so it is a method that can be fully utilized not only for rigid bodies but also for deformable bodies. It shows the stability of the algorithm through various experimental results whether it can accurately sample and represent distance values in various models.

Design of visitor counting system using edge computing method

  • Kim, Jung-Jun;Kim, Min-Gyu;Kim, Ju-Hyun;Lee, Man-Gi;Kim, Da-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.75-82
    • /
    • 2022
  • There are various exhibition halls, shopping malls, theme parks around us and analysis of interest in exhibits or contents is mainly done through questionnaires. These questionnaires are mainly depend on the subjective memory of the person being investigated, resulting in incorrect statistical results. Therefore, it is possible to identify an exhibition space with low interest by tracking the movement and counting the number of visitors. Based on this, it can be used as quantitative data for exhibits that need replacement. In this paper, we use deep learning-based artificial intelligence algorithms to recognize visitors, assign IDs to the recognized visitors, and continuously track them to identify the movement path. When visitors pass the counting line, the system is designed to count the number and transmit data to the server for integrated management.

Importance Analysis of Image Evaluation Items that Recognize Places (장소를 인식하는 이미지 평가항목에 대한 중요도 분석)

  • Lee, Lim-Jung;Kim, Kwang-Soo;Kim, Min-Seok
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.24 no.3
    • /
    • pp.1-11
    • /
    • 2022
  • Purpose: This place, which is currently becoming an issue due to historical preservation and landscape protection, is also a place where urban residents around Taereung actually visit often. Thus, this study aims to analyze the importance of the evaluating factors in creating a relatable image of the city. Methods: Evaluation items were selected by reviewing related books and research literatures and reassessing the reviewed items through an expert group interview (FGI). For the selected evaluation items, the relative importance of the evaluation items for the place image was analyzed by applying the hierarchical analysis technique (AHP) to each user group. Result: A place becomes a memory in people's experiences and time, and it has the image and identity of the region where those experiences and memories are found again as a space called "place". The method of analyzing the importance of evaluation items between place images used in this study quantified the factors recognized as abstract images and identified the degree of influence between elements, but has limitation in that it targeted specific places. However, the analysis method on the place image recognition suggests the use of itemized variables for characteristics between place images, so future research on the identity of other place images can be conducted together. Also, the evaluation method of the image that recognizes the place has an objective meaning in that it can measure the image of the place quantitatively. In the future, it can be applied in creating an image forming factor or urban identity for place recognition in many regions

2D-MELPP: A two dimensional matrix exponential based extension of locality preserving projections for dimensional reduction

  • Xiong, Zixun;Wan, Minghua;Xue, Rui;Yang, Guowei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.2991-3007
    • /
    • 2022
  • Two dimensional locality preserving projections (2D-LPP) is an improved algorithm of 2D image to solve the small sample size (SSS) problems which locality preserving projections (LPP) meets. It's able to find the low dimension manifold mapping that not only preserves local information but also detects manifold embedded in original data spaces. However, 2D-LPP is simple and elegant. So, inspired by the comparison experiments between two dimensional linear discriminant analysis (2D-LDA) and linear discriminant analysis (LDA) which indicated that matrix based methods don't always perform better even when training samples are limited, we surmise 2D-LPP may meet the same limitation as 2D-LDA and propose a novel matrix exponential method to enhance the performance of 2D-LPP. 2D-MELPP is equivalent to employing distance diffusion mapping to transform original images into a new space, and margins between labels are broadened, which is beneficial for solving classification problems. Nonetheless, the computational time complexity of 2D-MELPP is extremely high. In this paper, we replace some of matrix multiplications with multiple multiplications to save the memory cost and provide an efficient way for solving 2D-MELPP. We test it on public databases: random 3D data set, ORL, AR face database and Polyu Palmprint database and compare it with other 2D methods like 2D-LDA, 2D-LPP and 1D methods like LPP and exponential locality preserving projections (ELPP), finding it outperforms than others in recognition accuracy. We also compare different dimensions of projection vector and record the cost time on the ORL, AR face database and Polyu Palmprint database. The experiment results above proves that our advanced algorithm has a better performance on 3 independent public databases.

Data abnormal detection using bidirectional long-short neural network combined with artificial experience

  • Yang, Kang;Jiang, Huachen;Ding, Youliang;Wang, Manya;Wan, Chunfeng
    • Smart Structures and Systems
    • /
    • v.29 no.1
    • /
    • pp.117-127
    • /
    • 2022
  • Data anomalies seriously threaten the reliability of the bridge structural health monitoring system and may trigger system misjudgment. To overcome the above problem, an efficient and accurate data anomaly detection method is desiderated. Traditional anomaly detection methods extract various abnormal features as the key indicators to identify data anomalies. Then set thresholds artificially for various features to identify specific anomalies, which is the artificial experience method. However, limited by the poor generalization ability among sensors, this method often leads to high labor costs. Another approach to anomaly detection is a data-driven approach based on machine learning methods. Among these, the bidirectional long-short memory neural network (BiLSTM), as an effective classification method, excels at finding complex relationships in multivariate time series data. However, training unprocessed original signals often leads to low computation efficiency and poor convergence, for lacking appropriate feature selection. Therefore, this article combines the advantages of the two methods by proposing a deep learning method with manual experience statistical features fed into it. Experimental comparative studies illustrate that the BiLSTM model with appropriate feature input has an accuracy rate of over 87-94%. Meanwhile, this paper provides basic principles of data cleaning and discusses the typical features of various anomalies. Furthermore, the optimization strategies of the feature space selection based on artificial experience are also highlighted.

Design of Interactive Operations using Prefetching in VoD System (VoD 시스템에서 선반입 기법을 이용한 대화식 동작의 설계)

  • Kim, Soon-Cheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.31-39
    • /
    • 2010
  • VoD(Video-on-Demand) servers have to provide timely processing guarantees for continuous media and reduce the storage and bandwidth requirements for continuous media. The compression techniques make the bit rates of compressed video data significantly variable from frame to frame. A VoD system should be able to provide the client with interactive operations such as fast forward and fast rewind in addition to normal playback of movie. However, interactive operations require additional resources such as storage space, disk bandwidth, memory and network bandwidth. In a stored video application such as VoD system, it is possible that a priori disk access patterns can be used to reserve the system resources in advance. In addition, clients of VoD server spend most of their time in playback mode and the period of time spent in interactive mode is relatively small. In this paper, I present the new buffer management scheme that provides efficient support for interactive operations in a VoD server using variable bit rate continuous media. Simulation results show that our strategy achieves 34% increase of the number of accepted clients over the LRU strategy.