• Title/Summary/Keyword: 식별기술

Search Result 2,107, Processing Time 0.028 seconds

Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain (블록체인을 이용한 위변조 안드로이드 악성 앱 판별)

  • Hwang, Sumin;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.61-68
    • /
    • 2019
  • Although the number of smartphone users is continuously increasing due to the advantage of being able to easily use most of the Internet services, the number of counterfeit applications is rapidly increasing and personal information stored in the smartphone is leaked to the outside. Because Android app was developed with Java language, it is relatively easy to create counterfeit apps if attacker performs the de-compilation process to reverse app by abusing the repackaging vulnerability. Although an obfuscation technique can be applied to prevent this, but most mobile apps are not adopted. Therefore, it is fundamentally impossible to block repackaging attacks on Android mobile apps. In addition, personal information stored in the smartphone is leaked outside because it does not provide a forgery self-verification procedure on installing an app in smartphone. In order to solve this problem, blockchain is used to implement a process of certificated application registration and a fake app identification and detection mechanism is proposed on Hyperledger Fabric framework.

Technology adoption in agriculture: a new entrepreneurial approach is possible?

  • Passarelli, Mariacarmela;Bongiorno, Giuseppe;Cariola, Alfio
    • Agribusiness and Information Management
    • /
    • v.13 no.1
    • /
    • pp.1-25
    • /
    • 2021
  • Technological propensity of agricultural entrepreneurs is becoming necessary to identify and explore new opportunities. Recent studies suggest that the adoption of new technologies is strictly coherent with wider approaches of Entrepreneurial Orientation (EO). Even if the relevance of agriculture is increasing, entrepreneurial research has largely overlooked this challenging sector. Moreover, there is a relative shortage of empirical studies in the literature and there is an enormous potential to be still explored. Stemming from the EO literature, the work proposes for the agricultural sector, the approach of Humane Entrepreneurial Orientation (HEO). The paper proposes an empirical analysis, to verify the effect of the different dimensions of HEO on the propensity of farmers to adopt new technologies. All the results highlight several implications for businesses, for the research system and for public policies.

Analysis of the Effectiveness of Autonomous Unmanned Underwater Vehicle Mine Search Operation by Side Scan Sonar Characteristics (측면주사소나 특성에 따른 자율무인잠수정 기뢰탐색 효과도 분석)

  • Yoo, Tae-Suk;Park, Seok-Joon;Yoon, Seon-Il;Park, Ho-Gyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1077-1085
    • /
    • 2020
  • In order to Mine Countermeasure (MCM), the search is carried out for the expected mine zone. At this time, mine hunting uses Autonomous Unmanned Vehicle(AUV), taking into account the danger of mine and the stability of our forces. Sonar system for identifying buried mines are equipped with Side Scan Sonar(SSS) or Synthetic Aperture Sonar(SAS). This paper describes the analysis of mine hunting effects according to the commercial SSS characteristics. Based on the characteristics of each SSS, the insonified area and recognition probability were modeled, and the analysis was performed according to the search pattern of the AUV. AUV's search pattern defines three patterns depending on the presence or absence of SSS or shaded areas. The analysis results derived search time and detection probability for each search pattern, and finally, the improvement of search depending on the presence or absence of side injection or shaded area.

Development of Apparatus for Pure Roll-Motion Test of Underwater Vehicles (수중운동체의 순수 횡동요 시험 기구 개발)

  • Kim, Dong-Hwi;Baek, Hyung-Min;Lee, Seung-Keon;Kim, Eun-Soo
    • Journal of Navigation and Port Research
    • /
    • v.45 no.1
    • /
    • pp.16-25
    • /
    • 2021
  • Hydrodynamic coefficients should be accurately estimated to predict the maneuverability of underwater vehicles. Various captive model tests have been performed as part of estimation methods for these coefficients. Estimating hydrodynamic coefficients related to roll motion is important because underwater vehicles are sensitive to changes of roll moment. In this research, a pure roll motion equipment was newly designed to simply estimate hydrodynamic coefficients with respect to roll motion. Roll motion was implemented through a brief mechanical mechanism. The principle of operation, application process, and system identification of the equipment are described. An analysis method of the pure roll test is also suggested. Repeated tests of the newly equipment were carried out to check its reproducibility.

A Method for Original IP Detection of VPN Accessor (VPN 접속자의 원점 IP 탐지 방법)

  • Kim, Inhwan;Kim, Dukyun;Cho, Sungkuk;Jeon, Byungkook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • In most hacking attacks, hackers tend to access target systems in a variety of circumvent connection methods to hide their original IP. Therefore, finding the attacker's IP(Internet Protocol) from the defender's point of view is one of important issue to recognize hackers. If an attacker uses a proxy, original IP can be obtained through a program other than web browser in attacker's computer. Unfortunately, this method has no effect on the connection through VPN(Virtual Private Network), because VPN affects all applications. In an academic domain, various IP traceback methods using network equipments such as routers have been studied, but it is very difficult to be realized due to various problems including standardization and privacy. To overcome this limitation, this paper proposes a practical way to use client's network configuration temporarily until it can detect original IP. The proposed method does not only restrict usage of network, but also does not violate any privacy. We implemented and verified the proposed method in real internet with various VPN tools.

Location-Based Authentication Mechanism for Server Access Control (서버 접근 통제를 위한 위치기반 인증 기법)

  • Choi, Jung Min;Cho, Kwantae;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1271-1282
    • /
    • 2012
  • Recently, security incidents occur continuously, resulting in the leakages of a large amount of the company's confidential and private information. For these reasons, the security technologies such as the authentication and the access control in order to prevent the information leakage are attracting attention. In particular, location-based authentication that utilizes the user's current location information which is used an authentication factor. And it provides more powerful authentication by controlling the users who attempt to access and blocks internal information leakage path. However, location information must be handled safely since it is the personal information. The location based authentication scheme proposed in this paper enhances the stability of the process location information compared with existing relevant location-based authentication protocol. Also it strengthens the end-user authentication by using one-time password. In addition, the proposed scheme provides authentication to prevent information leakage and employs the concept of the user's physical access control. Resultingly, the proposed scheme can provide higher security than the previous studies, while guarantee to low communication cost.

Shoulder-Surfing Resistant Password Input Method for Mobile Environment (모바일 환경에서 엿보기 공격에 강한 패스워드 입력방법)

  • Kim, Chang-Soon;Youn, Sun-Bum;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.93-104
    • /
    • 2010
  • The advent of various mobile devices and mobile services has caused diversification of information stored in a mobile device, e.g., SMS, photos, movies, addresses, e-mails, digital certificates, and so on. Because mobile devices are lost or stolen easily, user authentication is critical to protect the information stored in mobile devices. However, the current user authentication methods using Personal Identification Numbers (PINs) and passwords are vulnerable to Shoulder Surfing Attacks (SSAs), which enables an attacker to obtain user's information. Although there are already several SSA-resistant authentication methods in the literature, most of these methods lack of usability. Moreover, they are not suitable for use in mobile devices. In this paper, we propose a user friendly password input method for mobile devices which is secure against SSA. We also perform user tests and compare the security and usability of the proposed method with those of the existing password input methods.

Implementation of a face detection algorithm for the identification of persons (동영상에서 인물식별을 위한 얼굴검출 알고리즘 구현)

  • Cho, Mi-Nam;Ji, Yoo-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.85-91
    • /
    • 2011
  • The technique, which is able to detect and recognize characters in videos such as a movie or TV drama, can be used for applications which are database management of a general user's facial images for the suppliers of PVR(personal video recorder), mobile phones, and multimedia, etc. In this paper, we propose a face detection algorithm. It searches the character through cast indexing when the scene is changed in video. It is consisted of three stages. The first step is the detection-step of the scene change after producing a paused image. The second step is the face detection-step using color information. The final step is the detection-step which detects its features by the facial boundary. According to the experimental result, it has detected faces in different conditions successfully and more advanced than the existing other one that are using only color information.

Medical Implementation of Microarray Technology (마이크로어레이 분석기법의 임상적용에 관한 연구)

  • Kang, Ji Un
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.52 no.4
    • /
    • pp.310-316
    • /
    • 2020
  • Microarray technology represents a critical new advance in molecular cytogenetics. The development of this approach has provided fundamental insights into the molecular pathogenesis in clinical cytogenetics and has provided a clue to many unidentified or unexplained diseases. The approach allows a comprehensive investigation of thousands and millions of genomic loci simultaneously and enables the efficient detection of copy number alterations. The application of this technology has shown tremendous fluidity and complexity of the human genome, and has provided accurate diagnosis and appropriate clinical management in a timely and efficient manner for identifying genomic alterations. The clinical impact of the genomic alterations identified by microarrays is evolving into a diagnostic tool to identify high-risk patients better and predict patient outcomes from their genomic profiles. The transformation of conventional cytogenetics into an automated discipline will improve diagnostic yield significantly, leading to accurate diagnosis and genetic counseling. This article reviews cytogenetic technologies used to identify human chromosome alterations and highlights the potential utility of present and future genome microarray technology in the diagnosis.

Flight Routes Establishment Through the Operational Concept Analysis of Urban Air Mobility System (도심항공교통시스템 운용 개념 분석에 따른 운항경로 구축 연구)

  • Lee, Youngjae;Kwag, Tae Ho;Jeong, Gu Moon;Ahn, Jae Hyun;Chung, Bong Cheul;Lee, Jae-Woo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.12
    • /
    • pp.1021-1031
    • /
    • 2020
  • With the advent of industry 4.0 technologies like the artificial intelligence and the autonomous flight, 'Urban Air Mobility (UAM)' is being considered as an effective alternative to resolve the ground urban traffic congestion. Accordingly, many companies in the world including Korea are investigating on the development of UAM vehicles and operation systems. In this study, after identifying and classifying the essential elements of the UAM operation, the UAM system operational concept has been derived, then detailed analyses for each element has been performed. Based on the conceptual analysis of the UAM operation system, UAM flight routes in Seoul and Gyeong-In area have been established and confirmed to be operable through the performance analysis of UAM vehicles. The flight route analysis in this study is expected to be applied to UAM flight routes establishment in various cities in the future.