• Title/Summary/Keyword: variant detection

Search Result 96, Processing Time 0.026 seconds

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

Automatic Face and Eyes Detection: A Scale and Rotation Invariant Approach based on Log-Polar Mapping (Log-Polar 사상의 크기와 회전 불변 특성을 이용한 얼굴과 눈 검출)

  • Choi, Il;Chien, Sung-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.8
    • /
    • pp.88-100
    • /
    • 1999
  • Detecting human face and facial landmarks automatically in an image is as essential step to a fully automatic face recognition system. In this paper, we present a new approach to detect automatically face and its eyes of input image with scale and rotation variations of faces by using an intensity based template matching with a single log-polar face template. In a template-based matching it is necessary to normalize the scale changes and rotations of an input image to a template ones. The log-polar mapping which simulates space-variant human visual system converts scale changes and rotations of input image into constant horizontal and cyclic vertical shifts in the output plane. Intelligent use of this property allows us to shift of the candidate log-polar faces mapped at various fixation points of an input image to be matched to a template over the log-polar plane. Thus, the proposed method eliminates the need of adapting multitemplate and multiresolution schemes, which inevitably give rise to intensive computation involved to cope with scale and rotation variations of faces. Through this scale and rotation involved to cope with scale and method can lead to detecting face and its eyes simultaneously. Experimental results on a database of 795 images show over 98% detection rate.

  • PDF

An Efficient Face Region Detection for Content-based Video Summarization (내용기반 비디오 요약을 위한 효율적인 얼굴 객체 검출)

  • Kim Jong-Sung;Lee Sun-Ta;Baek Joong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.675-686
    • /
    • 2005
  • In this paper, we propose an efficient face region detection technique for the content-based video summarization. To segment video, shot changes are detected from a video sequence and key frames are selected from the shots. We select one frame that has the least difference between neighboring frames in each shot. The proposed face detection algorithm detects face region from selected key frames. And then, we provide user with summarized frames included face region that has an important meaning in dramas or movies. Using Bayes classification rule and statistical characteristic of the skin pixels, face regions are detected in the frames. After skin detection, we adopt the projection method to segment an image(frame) into face region and non-face region. The segmented regions are candidates of the face object and they include many false detected regions. So, we design a classifier to minimize false lesion using CART. From SGLD matrices, we extract the textual feature values such as Inertial, Inverse Difference, and Correlation. As a result of our experiment, proposed face detection algorithm shows a good performance for the key frames with a complex and variant background. And our system provides key frames included the face region for user as video summarized information.

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.

Targeted Resequencing of 30 Genes Improves the Detection of Deleterious Mutations in South Indian Women with Breast and/or Ovarian Cancers

  • Rajkumar, Thangarajan;Meenakumari, Balaiah;Mani, Samson;Sridevi, Veluswami;Sundersingh, Shirley
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.13
    • /
    • pp.5211-5217
    • /
    • 2015
  • Background: We earlier used PCR-dHPLC for mutation analysis of BRCA1 and BRCA2. In this article we report application of targeted resequencing of 30 genes involved in hereditary cancers. Materials and Methods: A total of 91 patient samples were analysed using a panel of 30 genes in the Illumina HiScan SQ system. CLCBio was used for mapping reads to the reference sequences as well as for quality-based variant detection. All the deleterious mutations were then reconfirmed using Sanger sequencing. Kaplan Meier analysis was conducted to assess the effect of deleterious mutations on disease free and overall survival. Results: Seventy four of the 91 samples had been run earlier using the PCR-dHPLC and no deleterious mutations had been detected while 17 samples were tested for the first time. A total of 24 deleterious mutations were detected, 11 in BRCA1, 4 in BRCA2, 5 in p53, one each in RAD50, RAD52, ATM and TP53BP1. Some 19 deleterious mutations were seen in patients who had been tested earlier with PCR-dHPLC [19/74] and 5/17 in the samples tested for the first time, Together with our earlier detected 21 deleterious mutations in BRCA1 and BRCA2, we now had 45 mutations in 44 patients. BRCA1c.68_69delAG;p.Glu23ValfsX16 mutation was the most common, seen in 10/44 patients. Kaplan Meier survival analysis did not show any difference in disease free and overall survival in the patients with and without deleterious mutations. Conclusions: The NGS platform is more sensitive and cost effective in detecting mutations in genes involved in hereditary breast and/or ovarian cancers.

A new damage identification approach based on impedance-type measurements and 2D error statistics

  • Providakis, Costas;Tsistrakis, Stavros;Voutetaki, Maristella;Tsompanakis, Yiannis;Stavroulaki, Maria;Agadakos, John;Kampianakis, Eleftherios;Pentes, George
    • Structural Monitoring and Maintenance
    • /
    • v.2 no.4
    • /
    • pp.319-338
    • /
    • 2015
  • The electro-mechanical impedance (EMI) technique makes use of surface-bonded lead zirconate titanate (PZT) patches as impedance transducers measuring impedance variations monitored on host structural components. The present experimental work further evaluate an alternative to the conventional EMI technique which performs measurements of the variations in the output voltage of PZT transducers rather than computing electromechanical impedance (or admittance) itself. This paper further evaluates a variant of the EMI approach presented in a previous work of the present authors, suitable, for low-cost concrete structures monitoring applications making use of a credit card-sized Raspberry Pi single board computer as core hardware unit. This monitoring approach is also deployed by introducing a new damage identification index based on the ratio between the area of the 2-D error ellipse of specific probability of EMI-based measurements containment over that of the 2-D error circle of equivalent probability. Experimental results of damages occurring in concrete cubic and beam specimens are investigated under increasing loading conditions. Results illustrate that the proposed technique is an efficient approach for identification and early detection of damage in concrete structures.

Study of Pre-Filtering Factor for Effectively Improving Dynamic Malware Analysis System (동적 악성코드 분석 시스템 효율성 향상을 위한 사전 필터링 요소 연구)

  • Youn, Kwang-Taek;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.563-577
    • /
    • 2017
  • Due to the Internet and computing capability, new and variant malware are discovered around 1 Million per day. Companies use dynamic analysis such as behavior analysis on virtual machines for unknown malware detection because attackers use unknown malware which is not detected by signature based AV effectively. But growing number of malware types are not only PE(Portable Executable) but also non-PE such as MS word or PDF therefore dynamic analysis must need more resources and computing powers to improve detection effectiveness. This study elicits the pre-filtering system evaluation factor to improve effective dynamic malware analysis system and presents and verifies the decision making model and the formula for solution selection using AHP(Analytics Hierarchy Process)

Systolic Arrays for Lattice-Reduction-Aided MIMO Detection

  • Wang, Ni-Chun;Biglieri, Ezio;Yao, Kung
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.481-493
    • /
    • 2011
  • Multiple-input multiple-output (MIMO) technology provides high data rate and enhanced quality of service for wireless communications. Since the benefits from MIMO result in a heavy computational load in detectors, the design of low-complexity suboptimum receivers is currently an active area of research. Lattice-reduction-aided detection (LRAD) has been shown to be an effective low-complexity method with near-maximum-likelihood performance. In this paper, we advocate the use of systolic array architectures for MIMO receivers, and in particular we exhibit one of them based on LRAD. The "Lenstra-Lenstra-Lov$\acute{a}$sz (LLL) lattice reduction algorithm" and the ensuing linear detections or successive spatial-interference cancellations can be located in the same array, which is considerably hardware-efficient. Since the conventional form of the LLL algorithm is not immediately suitable for parallel processing, two modified LLL algorithms are considered here for the systolic array. LLL algorithm with full-size reduction-LLL is one of the versions more suitable for parallel processing. Another variant is the all-swap lattice-reduction (ASLR) algorithm for complex-valued lattices, which processes all lattice basis vectors simultaneously within one iteration. Our novel systolic array can operate both algorithms with different external logic controls. In order to simplify the systolic array design, we replace the Lov$\acute{a}$sz condition in the definition of LLL-reduced lattice with the looser Siegel condition. Simulation results show that for LR-aided linear detections, the bit-error-rate performance is still maintained with this relaxation. Comparisons between the two algorithms in terms of bit-error-rate performance, and average field-programmable gate array processing time in the systolic array are made, which shows that ASLR is a better choice for a systolic architecture, especially for systems with a large number of antennas.

Automated 3D scoring of fluorescence in situ hybridization (FISH) using a confocal whole slide imaging scanner

  • Ziv Frankenstein;Naohiro Uraoka;Umut Aypar;Ruth Aryeequaye;Mamta Rao;Meera Hameed;Yanming Zhang;Yukako Yagi
    • Applied Microscopy
    • /
    • v.51
    • /
    • pp.4.1-4.12
    • /
    • 2021
  • Fluorescence in situ hybridization (FISH) is a technique to visualize specific DNA/RNA sequences within the cell nuclei and provide the presence, location and structural integrity of genes on chromosomes. A confocal Whole Slide Imaging (WSI) scanner technology has superior depth resolution compared to wide-field fluorescence imaging. Confocal WSI has the ability to perform serial optical sections with specimen imaging, which is critical for 3D tissue reconstruction for volumetric spatial analysis. The standard clinical manual scoring for FISH is labor-intensive, time-consuming and subjective. Application of multi-gene FISH analysis alongside 3D imaging, significantly increase the level of complexity required for an accurate 3D analysis. Therefore, the purpose of this study is to establish automated 3D FISH scoring for z-stack images from confocal WSI scanner. The algorithm and the application we developed, SHIMARIS PAFQ, successfully employs 3D calculations for clear individual cell nuclei segmentation, gene signals detection and distribution of break-apart probes signal patterns, including standard break-apart, and variant patterns due to truncation, and deletion, etc. The analysis was accurate and precise when compared with ground truth clinical manual counting and scoring reported in ten lymphoma and solid tumors cases. The algorithm and the application we developed, SHIMARIS PAFQ, is objective and more efficient than the conventional procedure. It enables the automated counting of more nuclei, precisely detecting additional abnormal signal variations in nuclei patterns and analyzes gigabyte multi-layer stacking imaging data of tissue samples from patients. Currently, we are developing a deep learning algorithm for automated tumor area detection to be integrated with SHIMARIS PAFQ.

A Study of the Design for the Korean Wheeled Armored Command Post Vehicle Using AHP (AHP 기법을 이용한 한국형 차륜형 지휘소차량 디자인에 관한 연구)

  • Kim, Gunkook;Kim, Seokhwan;Lee, Jeongyeob;Kim, Jeongwoo;Choi, Insuk;Lee, Jaewoo;Kim, Uiwhan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.5
    • /
    • pp.717-725
    • /
    • 2017
  • Traditionally, a design has been applied on a various defense area for the improvement of the mobility, reducing the radar detection area and other reasons. In case of Korean Wheeled Armored Vehicle(WAV), a design has been also applied for retaining the agility and threatening feature in the battlefield. However some figures has been changed because of constraints such as assembling and manufacturing in the development stage. Today, the government has planned to develop the Wheeled Armored Command Post Vehicle(CPV), a variant of WAV, and it is necessary to apply the latest design trend, which is suitable for the concept of the CPV, on it.