• Title/Summary/Keyword: 우회정보

Search Result 441, Processing Time 0.028 seconds

효율성 관점의 APK 분석 및 안티 디버깅 우회 방법

  • Minsu, Park
    • Review of KIISC
    • /
    • v.32 no.6
    • /
    • pp.47-52
    • /
    • 2022
  • 안드로이드 환경은 디컴파일을 통해 개발자가 작성한 코드를 쉽게 획득할 수 있고, 해당 코드의 분석을 통해 유사 앱을 개발하거나 기능을 변조할 수 있다. 이러한 문제에 대응하기 위해 다양한 난독화, 안티 디버깅 기법을 개발하여 적용하고 있다. 하지만 해당 기법들은 충분한 시간과 노력을 투자한다면 분석 및 우회가 가능하므로 개발자는 분석을 원천적으로 막기보다 분석을 지연하는 목적으로 활용하고 있다. 안티 디버깅을 지원하는 대부분의 상용 SW 또한 이런 한계를 크게 벗어나지 않고 있으며 적용하는 안티 디버깅 기법의 종류와 수의 차이만 있다. 특히 기존의 연구는 안티 디버깅 기법의 우회에 집중하고 있으며 해당 연구는 분석을 위한 사전 단계의 개념이며 실제 분석 단계에서는 활용하지 못해 분석 효율을 올리지는 못한다. 본 연구에서는 분석의 관점에서 안티 디버깅을 무력화하고, 실제 분석 시 활용할 수 있는 방법을 소개한다.

Establishing detours for Fault-Tolerance Real-Time Communication in K-ary n-cube Networks (k-ary n-cube네트웍에서 결함허용실시간통신을 위한 우회경로 설정)

  • 이경희
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.627-629
    • /
    • 1998
  • 실시간 어플리케이션이 확장되고 복잡해질수록 시스템이나 네트웍에 존재하는 결함에 대응해야 할 필요성은 더 높아진다. 이런 작업의 활용도가 높지는 않더라도 하나의 결함이 시스템 전체에 영향을 미칠 가능성은 항상 있기 때문에 신뢰도 제공면에서 요구되는 작업이다. 전통적인 결함허용 방법은 여분의 하드웨어나 소프트웨어를 중복 사용함으로써 결함에 대처하고자 하였다. 본 논문에서는 네트워크에 대하여 네트웍을 구성하는 요소를 중복하는 것이 아니라 네트웍의 결함발생시 통신경로를 우회함으로써 결함을 허용하는 방법을 제안한다.

  • PDF

Implementation of GIS-based Application Program for Circuity and Accessibility Analysis in Road Network Graph (도로망 그래프의 우회도와 접근도 분석을 위한 GIS 응용 프로그램 개발)

  • Lee, Kiwon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.7 no.1
    • /
    • pp.84-93
    • /
    • 2004
  • Recently, domain-specific demands with respect to practical applications and analysis scheme using spatial thematic information are increasing. Accordingly, in this study, GIS-based application program is implemented to perform spatial analysis in transportation geography with base road layer data. Using this program, quantitative estimation of circuity and accessibility, which can be extracted from nodes composed of the graph-typed network structure, in a arbitrary analysis zone or administrative boundary zone is possible. Circuity is a concept to represent the difference extent between actual nodes and fully connected nodes in the analysis zone. While, accessibility can be used to find out extent of accessibility or connectivity between all nodes contained in the analysis zone, judging from inter-connecting status of the whole nodes. In put data of this program, which was implemented in AVX executable extension using AvenueTM of ArcView, is not transportation database information based on transportation data model, but layer data, directly obtaining from digital map sets. It is thought that computation of circuity and accessibility can be used as kinds of spatial analysis functions for GIS applications in the transportation field.

  • PDF

A Study on Developing Discriminant Model for VMS installation Considering Human Factors (고속도로 유출지점 경로안내용 도로전광표지의 설치위치 산정방안에 관한 연구)

  • Kim, Tae-Ho;Lee, Yong-Taeck;Do, Hwa-Yong;Won, Jai-Moo
    • International Journal of Highway Engineering
    • /
    • v.10 no.2
    • /
    • pp.101-113
    • /
    • 2008
  • VMS are installed in many Korean highways in oder to give drivers informations such as travel time to destination, congestion and Incident situation. However, some guidelines for install VMS are restricted in only geometric factors although human factors considering driver behavior are very important to affect the VMS installation. Therefore, this paper are focusing on developing and verifying the discriminant model for VMS installation considering human factors. As a result, following outputs are obtained ; (1) developing the discriminant model using human factors of driving simulation experiments in oder to predict driver reading VMS messages safely detour highway. (2) proving that driving experiences in highway, personal driving history, vehicle speed orderly affects VMS installation (3) verifying predictability of developed model by comparing the real values with predicted values. (4) suggesting that VMS should be installed off 3.2Km from the I.C. of rural highway.

  • PDF

Development of Detour Route and Evacuation Route Guidance System Using Disaster Information (재해정보를 이용한 우회경로 및 대피경로 안내시스템 개발)

  • Kwon, Won-Seok;Kim, Chang-Soo;Kim, Young-Seup
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.15 no.1
    • /
    • pp.34-42
    • /
    • 2012
  • Life and Property damage has increased during traffic congestion and isolation because natural disasters such as flood and landslide have occurred every year. When disaster occurs, if there is insufficient information in advance when entering the flooding areas which subsequently cause confusion. In this paper, we developed the system that could provide display of detour route using disaster information and evacuation route in disaster areas. User will receive result of analysis using smart phone application to prevent additional damages when disaster areas were entered by manager.

Energy-efficient Data Dissemination Protocol for Detouring Routing Holes in Wireless Sensor Networks (무선 센서 네트워크에서 라우팅 홀을 우회하기 위한 에너지 효율적 데이타 전달 프로토콜)

  • Ye, Tian;Yu, Fucai;Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Jin, Min-Sook;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.321-325
    • /
    • 2008
  • Void areas(holes) as an inevitable phenomenon exist in geographic routing of wireless sensor networks, because the unpredictable and harsh nature application environment or uneven energy consumption. Most of the existing schemes for the issue tend to construct a static detour path to bypass a hole. The static detour path may lead to uneven energy consumption of the nodes on the perimeter of the hole; thus it may enlarge the hole. At the same time, traffic would concentrate on the peripheral node of the hole; thus the nodes on the perimeter of the hole tend to be depleted quietly. In previous work, we have proposed a hole geometric model to reduce the energy consumption and packet collisions of the nodes on the hole boundary. This scheme, however, still has the static detour path problem. Therefore, we extend the previous work by constructing a dynamic detour path hole geometric model for wireless sensor networks in this paper. The location of hole detour anchors is dynamically shifted according to Gaussian function, just generating dynamic hole detour paths.

Relative Service Differentiation with Dynamic Wavelength Allocations and Preemptions in JET based Optical Burst-Switched Networks with Deflection Routing (JET 기반 우회 경로 방식의 광 버스트 스위치 네트워크에서 동적 파장 할당과 선취권 방식에 의한 상대적 서비스 차별화 방안)

  • Paik, Jung-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1906-1914
    • /
    • 2012
  • In this paper, relative service differentiation in JET based optical burst-switched networks with deflection routing is presented. It differs from conventional schemes in that it tries to make the loss rate of high class bursts as low as possible while maintaining the desired proportional ratio between the high class bursts and low class bursts. Strategies applied to it are dynamic wavelength allocation and the preemption which are combined to deflection routing. With dynamic wavelength allocation, the number of wavelengths allocated to high class bursts are dynamically changed. Preemption which gives more preference to high class bursts is also applied to decrease its loss rate. To lower the loss rate, deflection routing is applied for any kind of traffic. With those strategies, the suggested scheme shows desired properties that the loss rate of high class traffic is as lowered as possible. A queueing model for the scheme is developed to approximate loss ratio and the numerical results show that the proposed scheme provisions relative service differentiation.

A Behavior based Detection for Malicious Code Using Obfuscation Technique (우회기법을 이용하는 악성코드 행위기반 탐지 방법)

  • Park Nam-Youl;Kim Yong-Min;Noh Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.17-28
    • /
    • 2006
  • The appearance of variant malicious codes using obfuscation techniques is accelerating the spread of malicious codes around the detection by a vaccine. n a system does not patch detection patterns for vulnerabilities and worms to the vaccine, it can be infected by the worms and malicious codes can be spreaded rapidly to other systems and networks in a few minute. Moreover, It is limited to the conventional pattern based detection and treatment for variants or new malicious codes. In this paper, we propose a method of behavior based detection by the static analysis, the dynamic analysis and the dynamic monitoring to detect a malicious code using obfuscation techniques with the PE compression. Also we show that dynamic monitoring can detect worms with the PE compression which accesses to important resources such as a registry, a cpu, a memory and files with the proposed method for similarity.

Drivers Detour Decision Factor Analysis with Combined Method of Decision Tree and Neural Network Algorithm (의사결정나무와 신경망 모형 결합에 의한 운전자 우회결정요인 분석)

  • Kang, Jin-Woong;Kum, Ki-Jung;Son, Seung-Neo
    • International Journal of Highway Engineering
    • /
    • v.13 no.3
    • /
    • pp.167-176
    • /
    • 2011
  • This study's purpose is to analyse factors of determination about detouring for makinga standard model in regard of unfavorableness and uncertainty when unspecified individual recipients make a decision at the time of course detour. In order to achieve this, we surveyed SP investigation whether making a detour or not for drivers as a target who take a high way and National highway. Based on this result, we analysed detour determination factors of drivers, establishing a combination model of Decision Tree and Neural Network model. The result demonstrates the effected factors on drivers' detour determination are in ordering of the recognition of alternative routevs, reliable and frequency of using traffic information, frequency of transition routes and age. Moreover, from the outcome in comparison with an existing model and prediction through undistributed data, the rate of combination model 8.7% illustrates the most predictable way in contrast with logit model 12.8%, and Individual Model of Decision Tree 13.8% which are existed. This reveals that the analysis of drivers' detour determination factors is valid to apply. Hence, overall study considers as a practical foundation to make effective detour strategies for increasing the utility of route networking and dispersion in the volume of traffic from now on.

Routing Hole Detour Scheme Based on Geographic Routing in Wireless Sensor Networks (무선 센서 망에서 위치 정보 기반 라우팅 홀 우회 방안)

  • Yu, Fu-Cai;Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Tian, Ye;Park, Ho-Sung;Kim, Sang-Ha
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.225-229
    • /
    • 2007
  • 센서 망에서 비어 있는 공간(홀)은 현실의 다양한 지리적인 환경 때문에 회피하는 것이 쉽지 않다. 일반적으로 데이터 패킷이 홀 경계에 마주쳤을 경우, 목적지까지의 다른 길을 찾기 위해 라이트 핸드 법칙(right hand rule) 또는 푸쉬드 백(pushed back)을 이용하여 홀 경계를 따라 패킷을 전달한다. 한편, 라이트 핸드 룰은 홀 경계에 있는 노드들의 에너지를 더 많이 소모하므로 홀이 확장될 것이다. 또한 동시에 여러 통신 세션이 같은 홀의 경계를 공유한다면 데이터 충돌을 초래할 것이다. 이 논문에서 우리는 무선센서 망에서의 홀 문제를 해결하기 위해 라우팅 홀 우회 방안을 제안한다. 우리의 라우팅 홀 우회 방안은 두 가지 목표를 갖는다: 하나는 데이터 패킷이 홀의 경계를 따라 이동하는 것을 방지하는 것이고, 다른 하나는 로컬 미니멈(local minimum) 문제를 피하는 것이다. 시뮬레이션 결과는 우리의 방안이 다른 프로토콜들에 비해 제어 부하와 에너지 소비 면에서 우수하다는 것을 보여준다.

  • PDF