• Title/Summary/Keyword: 스파이웨어

Search Result 30, Processing Time 0.022 seconds

A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone (정보보안이 안드로이드와 iOS 기반 스마트폰 소비자 선호에 미치는 영향)

  • Park, Jong-jin;Choi, Min-kyong;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.105-119
    • /
    • 2017
  • Smartphone users hit over eighty-five percentage of Korean populations and personal private items and various information are stored in each user's smartphone. There are so many cases to propagate malicious codes or spywares for the purpose of catching illegally these kinds of information and earning pecuniary gains. Thus, need of information security is outstanding for using smartphone but also user's security perception is important. In this paper, we investigate about how information security affects smartphone operating system choices by users. For statistical analysis, the online survey with questionnaires for users of smartphones is conducted and effective 218 subjects are collected. We test hypotheses via communalities analysis using factor analysis, reliability analysis, independent sample t-test, and linear regression analysis by IBM SPSS statistical package. As a result, it is found that hardware environment influences on perceived ease of use. Brand power affects both perceived usefulness and perceived ease of use and degree of personal risk-accepting influences on perception of smartphone spy-ware risk. In addition, it is found that perceived usefulness, perceived ease of use, degree of personal risk-accepting, and spy-ware risk of smartphone influence significantly on intention to purchase smartphone. However, results of independent sample t-test for each operating system users of Android or iOS do not present statistically significant differences among two OS user groups. In addition, each result of OS user group testing for hypotheses is different from the results of total sample testing. These results can give important suggestions to organizations and managers related to smartphone ecology and contribute to the sphere of information systems (IS) study through a new perspective.

Model Optimization for Supporting Spiking Neural Networks on FPGA Hardware (FPGA상에서 스파이킹 뉴럴 네트워크 지원을 위한 모델 최적화)

  • Kim, Seoyeon;Yun, Young-Sun;Hong, Jiman;Kim, Bongjae;Lee, Keon Myung;Jung, Jinman
    • Smart Media Journal
    • /
    • v.11 no.2
    • /
    • pp.70-76
    • /
    • 2022
  • IoT application development using a cloud server causes problems such as data transmission and reception delay, network traffic, and cost for real-time processing support in network connected hardware. To solve this problem, edge cloud-based platforms can use neuromorphic hardware to enable fast data transfer. In this paper, we propose a model optimization method for supporting spiking neural networks on FPGA hardware. We focused on auto-adjusting network model parameters optimized for neuromorphic hardware. The proposed method performs optimization to show higher performance based on user requirements for accuracy. As a result of performance analysis, it satisfies all requirements of accuracy and showed higher performance in terms of expected execution time, unlike the naive method supported by the existing open source framework.

Automatic Generation Tool for Open Platform-compatible Intelligent IoT Components (오픈 플랫폼 호환 지능형 IoT 컴포넌트 자동 생성 도구)

  • Seoyeon Kim;Jinman Jung;Bongjae Kim;Young-Sun Yoon;Joonhyouk Jang
    • Smart Media Journal
    • /
    • v.11 no.11
    • /
    • pp.32-39
    • /
    • 2022
  • As IoT applications that provide AI services increase, various hardware and software that support autonomous learning and inference are being developed. However, as the characteristics and constraints of each hardware increase difficulties in developing IoT applications, the development of an integrated platform is required. In this paper, we propose a tool for automatically generating components based on artificial neural networks and spiking neural networks as well as IoT technologies to be compatible with open platforms. The proposed component automatic generation tool supports the creation of components considering the characteristics of various hardware devices through the virtual component layer of IoT and AI and enables automatic application to open platforms.

A Study on Implementation of Vulnerability Assessment Tool on the Web (웹 환경을 이용한 보안 취약점 점검 도구 개발에 관한 연구)

  • Jang, Seung-Ju;Choi, Eun-Seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.427-430
    • /
    • 2007
  • 우리나라가 IT 강국으로 성장할 수 있었던 배경은 여러 이유가 있지만, 그 이유들 중에서 "Web"의 탄생을 생각하지 않을 수가 없다. "Web"이라는 매개체는 서비스를 제공자들 사이에서 상호연결을 쉽게 해주고, 새로운 직업과 기회를 주었다. 하지만 접근하기 쉬운 Application과 Application들 간의 통합이 됨에 따라 보안에 대한 문제가 발생한다. 이러한 보안상의 취약점을 점검하는 도구들이 존재하고 있다. 보안상의 취약점을 예방하는 차원에서 개발되어 졌지만, 악의적인 용도로 사용되어 질 수도 있다. 악성코드의 경우 전년도 동기 대비 50.9%, 스파이웨어의 경우 9.7%정도 증가했다고 밝혔다. 본 논문은 보안 취약점 점검 도구들을 이용하여 웹 상에서 사용자의 컴퓨터 시스템에 대한 점검을 통해서 결과를 보여주는 환경을 개발한다. 또한 공개된 보안 취약점 점검 도구의 융합을 통한 통합된 보안 취약점 점검 기능을 점검하는 웹 환경을 개발한다.

  • PDF

The IPS using DNSBL to Protect Rapidly Changing Threats (급변하는 위협에 대응하기 위한 DNSBL을 이용한 IPS)

  • Wang, Jeong-Seok;Kwon, Hui-Ung;Kwak, Hu-Keun;Chung, Kyu-Sik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.122-126
    • /
    • 2007
  • 최근 개인 정보 취득에 대해 가장 널리 사용되는 방법 중 하나는 특정 사이트의 모조를 통해 사용자를 혼란 시켜 개인 아이디, 계좌 정보 등을 입력하도록 하여 개인 정보를 취득하거나, 일반적으로 많이 사용되는 신뢰된 인터넷 상의 공간(Portal BBS, 카페, 블로그 등)에 특정한 스파이웨어 등을 숨겨놓아 사용자 컴퓨터에 설치되도록 유도 한 후 개인 정보를 취득하는 등의 지능적이고 기존의 방법으로는 차단하기 어려운 방식을 사용하고 있다. 최근 더욱 그 기세를 넓히고 있는 다양하고, 빠르게 변화하는 위험들로부터 사용자 정보 및 네트워크를 안전하게 보호하기 위한 다양하고 적극적인 방법이 필요하다. 이를 위해 보안 장비와 계층적 RBL DNS를 이용한 근본적인 위협원 접근 차단 방법을 통해 급변하는 위협으로부터 사용자의 정보와 네트워크를 안전하게 보호할 수 있는 방법을 제안한다.

  • PDF

A Study on Unified Security Management System for remote data acquisition of New and Renewable Energy Facilities (신.재생에너지 발전설비의 원격 데이터 수집을 위한 통합 보안 관리시스템에 관한 연구)

  • Kim, Hyoung-Ju;Lim, Jung-Yol
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.186-193
    • /
    • 2009
  • Development and diffusion of a new and renewable energy are acutely required at domestic energy actualities to be inferior as industrialization is accelerated, and use of information electric appliance is increased rapidly. For the diessemination and practical use of new and renewable energy, this paper presents an unified security management system that is efficiently able to acquire operational status date and control distributed generation facilities. Also, the unified security management system is suggested to protect gathered operational status date from unpredictable problems such as computer virus, spy ware, and any other network problems.

  • PDF

Practical Malware Development And Analysis Method (실전 악성코드 개발 및 분석 방법)

  • Kim, Kyung-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.434-437
    • /
    • 2017
  • After the first malware, the brain virus, was founded in 1986, various types of malwares have been created Including worm, dropper, trojan, backdoor, rootkit and downloader. Especially in recent years, driver-type malware have made then more difficult to analyze. therefore, malware analyst require competitive skills. To analyze malware well, you need to know how it works and have to do it by yourself. So in this paper, we develop the dropper, backdoor, trojan, rootkit and driver similar to malware distributed in the real world. It shows the execution behavior on the virtual environment system We propose a method to analyze malware quickly and effectively with static analysis and dynamic analysis.

  • PDF

QoS-Aware Optimal SNN Model Parameter Generation Method in Neuromorphic Environment (뉴로모픽 환경에서 QoS를 고려한 최적의 SNN 모델 파라미터 생성 기법)

  • Seoyeon Kim;Bongjae Kim;Jinman Jung
    • Smart Media Journal
    • /
    • v.12 no.4
    • /
    • pp.19-26
    • /
    • 2023
  • IoT edge services utilizing neuromorphic hardware architectures are suitable for autonomous IoT applications as they perform intelligent processing on the device itself. However, spiking neural networks applied to neuromorphic hardware are difficult for IoT developers to comprehend due to their complex structures and various hyper-parameters. In this paper, we propose a method for generating spiking neural network (SNN) models that satisfy user performance requirements while considering the constraints of neuromorphic hardware. Our proposed method utilizes previously trained models from pre-processed data to find optimal SNN model parameters from profiling data. Comparing our method to a naive search method, both methods satisfy user requirements, but our proposed method shows better performance in terms of runtime. Additionally, even if the constraints of new hardware are not clearly known, the proposed method can provide high scalability by utilizing the profiled data of the hardware.

Test Cases Generation Method for GUI Testing with Automatic Scenario Generation (시나리오의 자동 생성을 통한 GUI 테스트 케이스 생성 방법)

  • Lee, Jung-Gyw;Kuk, Seung-Hak;Kim, Hyeon-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.1
    • /
    • pp.45-53
    • /
    • 2009
  • In these days GUI components are recognized as the important driving elements to the successful software development. Thus they must be verified. In practice, however, GUI testing for verifying the GUI components needs lots of time and high costs. Test automation for GUI testing is a promising solution to save those expenses. In this paper, we discuss some issues considered to perform GUI testing and suggest a new method that improve the GUI test case generation method based on our previous 'record & playback' approach. For this, we suggest the event generation method using the 'spy' technique and the scenario generation method that generates effectively a lot of scenarios with the generated events. In turn we describe how to create GUI test cases from the generated scenarios.

Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction (특정 트랜잭션용 추가 인증을 제공하는 휴대폰 상의 일회용 암호 생성기 설계)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.552-557
    • /
    • 2009
  • One-time passwords are used just once and discarded, which makes it more secure than the repeatedly used conventional passwords. This paper proposes a challenge-response based one-time password generator on a user's mobile phone always carried with the user. The generator can provide an additional authentication for a user to issue a money transfer request within his Internet banking session on a PC. A currently used device for Internet banking generates a password that changes every 30 seconds or so, which allows a man-in-the-middle to use it for stealing money within the 30 seconds. Unlike such a device, the proposed generator resists against the man-in-the-middle attack by a novel challenge-response scheme, provides better accessability and protection against stolen devices. As the currently used devices do, it prevents any unauthorized transfer even if the victim's all other credentials are revealed through his PC infected with spyware such as a keyboard logger.