• Title/Summary/Keyword: tool trace

Search Result 138, Processing Time 0.035 seconds

Tracking of cryptocurrency moved through blockchain Bridge (블록체인 브릿지를 통해 이동한 가상자산의 추적 및 검증)

  • Donghyun Ha;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.32-44
    • /
    • 2023
  • A blockchain bridge (hereinafter referred to as "bridge") is a service that enables the transfer of assets between blockchains. A bridge accepts virtual assets from users and delivers the same virtual assets to users on other blockchains. Users use bridges because they cannot transfer assets to other blockchains in the usual way because each blockchain environment is independent. Therefore, the movement of assets through bridges is not traceable in the usual way. If a malicious actor moves funds through a bridge, existing asset tracking tools are limited in their ability to trace it. Therefore, this paper proposes a method to obtain information on bridge usage by identifying the structure of the bridge and analyzing the event logs of bridge requests. First, to understand the structure of bridges, we analyzed bridges operating on Ethereum Virtual Machine(EVM) based blockchains. Based on the analysis, we applied the method to arbitrary bridge events. Furthermore, we created an automated tool that continuously collects and stores bridge usage information so that it can be used for actual tracking. We also validated the automated tool and tracking method based on an asset transfer scenario. By extracting the usage information through the tool after using the bridge, we were able to check important information for tracking, such as the sending blockchain, the receiving blockchain, the receiving wallet address, and the type and quantity of tokens transferred. This showed that it is possible to overcome the limitations of tracking asset movements using blockchain bridges.

  • PDF

Trace element concentrations profiles in the hair of normal children living in the northern area of Seoul (서울 북부지역에 거주하는 정상 아동의 모발 미네랄 함량)

  • Kwon, Ji Won;Kim, Byung Eui;Park, Mi Jung;Kim, Sang Woo
    • Clinical and Experimental Pediatrics
    • /
    • v.49 no.1
    • /
    • pp.18-23
    • /
    • 2006
  • Purpose : The reliability of hair mineral analyses regarding nutritional status, environmental exposure or diseases is controversial. The aim of this study was to determine the normal reference range of hair mineral concentration of Korean children. Methods : We examined hair mineral concentrations of 223 children(3-12 yrs old, 110 boys, 113 girls, mean age $8.8{\pm}2.2$ yrs old) living in the northern area of Seoul. The trace elements including six toxic elements(Al, As, Cd, Ba, Hg, Pb) and 11 nutritional elements(Na, Mg, P, K, Ca, Cr, Mn, Fe, Cu, Zn, Se) were analyzed by inductive coupled plasma mass spectrometry(ICP-MS). Results : The mean concentrations of Ca and Mg were higher in girls than in boys. The mean concentrations of Cd, Pb and Cr were higher in boys than girls. The Zn, Ca, Mg, Cu and Hg levels in hair samples were positively correlated with increasing age. The Zn levels of the Korean children's hair samples appear to be lower than that of other countries' reference values. Conclusion : There are considerable differences in hair mineral concentrations by age, sex and race. Additional research is needed to establish Korean reference values, and to evaluate the usefulness of hair mineral analyses as a screening tool for nutrition- and environment-related childhood diseases.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

Detecting Security Vulnerabilities in TypeScript Code with Static Taint Analysis (정적 오염 분석을 활용한 타입스크립트 코드의 보안 취약점 탐지)

  • Moon, Taegeun;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.2
    • /
    • pp.263-277
    • /
    • 2021
  • Taint analysis techniques are popularly used to detect web vulnerabilities originating from unverified user input data, such as Cross-Site Scripting (XSS) and SQL Injection, in web applications written in JavaScript. To detect such vulnerabilities, it would be necessary to trace variables affected by user-submitted inputs. However, because of the dynamic nature of JavaScript, it has been a challenging issue to identify those variables without running the web application code. Therefore, most existing taint analysis tools have been developed based on dynamic taint analysis, which requires the overhead of running the target application. In this paper, we propose a novel static taint analysis technique using symbol information obtained from the TypeScript (a superset of JavaScript) compiler to accurately track data flow and detect security vulnerabilities in TypeScript code. Our proposed technique allows developers to annotate variables that can contain unverified user input data, and uses the annotation information to trace variables and data affected by user input data. Since our proposed technique can seamlessly be incorporated into the TypeScript compiler, developers can find vulnerabilities during the development process, unlike existing analysis tools performed as a separate tool. To show the feasibility of the proposed method, we implemented a prototype and evaluated its performance with 8 web applications with known security vulnerabilities. We found that our prototype implementation could detect all known security vulnerabilities correctly.

Distribution and Effect on Organisms of Butyltin Compounds Inside Songsan Harbor of Cheju Island (제주도 성산항내 부틸주석화합물의 분포와 생물체에 미치는 영향)

  • 김상규;안이선;고병철;조은일;이기호
    • Journal of Environmental Science International
    • /
    • v.9 no.4
    • /
    • pp.285-294
    • /
    • 2000
  • Butyltin compounds (BTs) in seawater, sediments and organisms (Thais clavigera, Liolophura japonica and Cellana nigrolineata), were quantitatively determined to evaluate their distribution inside Songsan Harbor of Cheju Island. In addition, imposex in T. clavigera was used to assess the effect on organisms of BTs. Analysis of the samples collected in seawater, sediments (March, June and August) and organisms (May, July and August) in 1998, confirmed the contamination of BTs in the aquatic environment inside Songsan Harbor. The main BTs species in seawater and sediments was monobutyltin (MBT), tributyltin (TBT), respectively, irrespective of survey time. In oranisms, TBT and dibutyltin (DBT) were detected in similar concentrations for T. clavigera and L. japonica, but for C nigrolineata, DBt concentration was the highest. TBT, the most toxic to aquatic organisms among BTs, was found at concentrations which were sufficient to have a serious effect on the sensitive organisms upon chronic exposure, The relatively high correlations (r>0.83) between BTs indicated that DBT and MBT were mainly degraded from TBT based on antifouling paint and their sources were negligible. The sedimentary organic matters did not have influence on the distribution of BTs in marine environment, and lipid content in T. clavigera did not show a correlation with TBT concentrations. The rate of occurrence of imposex in T. clavigera was 100%, and the relative penis length index (RPLI) and the relative penis size index (RPSI) which represent the degree of imposex were 79.7%, 58.1%, respectively. Measurement of imposex in T. clavigera was expected to be a very helpful tool for preliminary survey of BTs prior to trace analysis of BTs.

  • PDF

Acute Toxicity of Cadmium on Gene Expression Profiling of Fleshy Shrimp, Fenneropenaeus Chinensis Postlarvae Using a cDNA Microarray (Microarray 분석을 이용한 대하 (Fenneropenaeus chinensis) 유생의 카드뮴 단기 노출에 따른 유전자변화)

  • Kim, Su-Kyoung;Qiao, Guo;Yoon, Jong-Hwa;Jang, In-Kwon
    • Journal of Environmental Science International
    • /
    • v.24 no.5
    • /
    • pp.623-631
    • /
    • 2015
  • Microarray technology provides a unique tool for the determination of gene expression at the level of messenger RNA (mRNA). This study, the mRNA expression profiles provide insight into the mechanism of action of cadmium in Fleshy shrimp (Fenneropenaeus chinensis). The ability of genomic technologies was contributed decisively to development of new molecular biomarkers and to the determination of new possible gene targets. Also, it can be approach for monitoring of trace metal using oligo-chip microarray-based in potential model marine user level organisms. 15K oligo-chip for F. chinensis that include mostly unique sets of genes from cDNA sequences was developed. A total of 13,971 spots (1,181 mRNAs up- regulated and 996 down regulated) were identified to be significantly expressed on microarray by hierarchical clustering of genes after exposure to cadmium for different conditions (Cd24-5000 and Cd48-1000). Most of the changes of mRNA expression were observed at the long time and low concentration exposure of Cd48-1000. But, gene ontology analysis (GO annotation) were no significant different between experiments groups. It was observed that mRNA expression of main genes involved in metabolism, cell component, molecular binding and catalytic function. It was suggested that cadmium inhibited metabolism and growth of F. chinensis.

Real-time Geometric Correction System for Digital Image Projection onto Deformable Surface (변형 가능한 곡면에서의 디지털 영상 투영을 위한 실시간 기하 보정 시스템)

  • Lee, Young-Bo;Han, Sang-Hun;Kim, Jung-Hoon;Lee, Dong-Hoon;Yun, Tae-Soo
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.39-44
    • /
    • 2008
  • This paper proposes a real-time geometric correction system based on a projector to project digital images onto deformable surface. Markers use to trace lots of corresponding points would spoil the projected image when the projector projects a digital image onto the surface because they leave marks on the surface. In addition, it is difficult to build a real-time geometric correction system since bottlenecks occur through the process of the geometric correction for projecting images. In this paper, we use invisible infrared markers and a vertex shader of GPU using Cg TookKit of NVIDIA in order to eliminate disadvantage and bottlenecks in the process of markers recognition so that it is possible to project natural correction images in real-time. As a result, this system overlays an interactive virtual texture onto the real paper by using the geometric transformation. Therefore, it is possible to develop variation of AR(Augmented Reality) based on digital contents systems.

  • PDF

Effect of Ionizing Radiation and Mercury Chloride (II) on Cell Morphology in Yeast Cells Frequently and Temporarily Treated with Both Stressors (방사선과 염화수은의 일시 및 반복 복합 처리된 효모세포의 산화적 스트레스 적응과 형태 변화)

  • Kim, Su-Hyoun;Kim, Jin-Kyu
    • Korean Journal of Environmental Biology
    • /
    • v.28 no.2
    • /
    • pp.101-107
    • /
    • 2010
  • Metal ions are essential to life. However, some metals such as mercury are harmful, even when present at trace amounts. Toxicity of mercury arises mainly from its oxidizing properties. Ionizing radiation (IR) is an active tool for destruction of cancer cells and diagnosis of diseases, etc. IR induces DNA double strand breaks in the nucleus, In addition, it causes lipid peroxidation, ceramide generation, and protein oxidation in the membrane, cytoplasm and nucleus. Yeasts have been a commonly used material in biological research. In yeasts, the physiological response to changing environmental conditions is controlled by the cell types. Growth rate, mutation and environmental conditions affect cell size and shape distributions. In this work, the effect of IR and mercury chloride (II) on the morphology of yeast cells were investigated. Saccharomyces cerevisiae cells were treated with IR, mercury chloride (II) and IR combined with mercury chloride (II). Non-treated cells were used as a control group. Morphological changes were observed by a scanning electron microscope (SEM). The half-lethal condition from the previous experimental results was used to the IR combined with mercury. Yeast cells were exposed to 400 and 800 Gy at dose rates of 400Gy $hr^{-1}$ or 800 Gy $hr^{-1}$, respectively. Yeast cells were treated with 0.05 to 0.15 mM mercury chloride (II). Oxidative stress can damage cellular membranes through a lipidic peroxidation. This effect was detected in this work, after treatment of IR and mercury chloride (II). The cell morphology was modified more at high doses of IR and high concentrations of mercury chloride(II). IR and mercury chloride (II) were of the oxidative stress. Cell morphology was modified differently according to the way of oxidative stress treatment. Moreover, morphological changes in the cell membrane were more observable in the frequently stress treated cells than the temporarily stress treated cells.

A Study on the Emerging Technology Detection in the Field of LED Using Scientometrics (과학계량학적 정보분석을 통한 LED 및 광분야 유망기술 탐색에 관한 연구)

  • Chang, Si-Young;Lee, Byoung-Chul;Kim, Yun-Bae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1213-1222
    • /
    • 2011
  • The aim of this research is to map the intellectual structure of the field of LED and optics during the period of 2000-2009. We utilize the scientometric tool of co-word analysis to reveal patterns and trends in the LED and optics field by measuring the association strengths of keywords (or IPCs). Data were collected from Science Citation Index Expanded (SCIE) and United Stated Patent and Trademark Office (USTPO) for the period of 2000-2009. Keywords were extracted from abstracts and further standardized using thesaurus. In order to trace the dynamic changes of the LED and optics field, the whole 10-year period was separated into two consecutive periods: 2000-2004 and 2005-2009. The results show that the LED and optics field has some established research themes and it also changes to embrace new themes.

A Dynamic Approach to Extract the Original Semantics and Structure of VM-based Obfuscated Binary Executables (가상 머신 기반으로 난독화된 실행파일의 구조 및 원본의미 추출 동적 방법)

  • Lee, Sungho;Han, Taisook
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.859-869
    • /
    • 2014
  • In recent years, the obfuscation techniques are commonly exploited to protect malwares, so obfuscated malwares have become a big threat. Especially, it is extremely hard to analyze virtualization-obfuscated malwares based on unusual virtual machines, because the original program is hidden by the virtual machine as well as its semantics is mixed with the semantics of the virtual machine. To confront this threat, we suggest a framework to analyze virtualization-obfuscated programs based on the dynamic analysis. First, we extract the dynamic execution trace of the virtualization-obfuscated executables. Second, we analyze the traces by translating machine instruction sequences into the intermediate representation and extract the virtual machine architecture by constructing dynamic context flow graphs. Finally, we extract abstract semantics of the original program using the extracted virtual machine architecture. In this paper, we propose a method to extract the information of the original program from a virtualization-obfuscated program by some commercial obfuscation tools. We expect that our tool can be used to understand virtualization-obfuscated programs and integrate other program analysis techniques so that it can be applied to analysis of the semantics of original programs using the abstract semantics.