• Title/Summary/Keyword: 임의참조

Search Result 74, Processing Time 0.024 seconds

A Study on the Detection of Malware That Extracts Account IDs and Passwords on Game Sites and Possible Countermeasures Through Analysis (게임 사이트의 계정과 비밀번호 유출 악성코드 분석을 통한 탐지 및 대응방안 연구)

  • Lee, Seung-Won;Roh, Young-Sup;Kim, Woo-Suk;Lee, Mi-Hwa;Han, Kook-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.283-293
    • /
    • 2012
  • A new type of malware that extracts personal and account data over an extended period of time and that apparently is resistant to detection by vaccines has been identified. Generally, a malware is installed on a computer through network-to-network connections by utilizing Web vulnerabilities that contain injection, XSS, broken authentication and session management, or insecure direct-object references, among others. After the malware executes registration of an arbitrary service and an arbitrary process on a computer, it then periodically communicates the collected confidential information to a hacker. This paper is a systematic approach to analyzing a new type of malware called "winweng," a kind of worm that frequently made appearances during the first half of 2011. The research describes how the malware came to be in circulation, how it infects computers, how its operations expose its existence and suggests improvements in responses and countermeasures. Keywords: Malware, Worm, Winweng, SNORT.

Design and Implementation of a ML-based Detection System for Malicious Script Hidden Corrupted Digital Files (머신러닝 기반 손상된 디지털 파일 내부 은닉 악성 스크립트 판별 시스템 설계 및 구현)

  • Hyung-Woo Lee;Sangwon Na
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.1-9
    • /
    • 2023
  • Malware files containing concealed malicious scripts have recently been identified within MS Office documents frequently. In response, this paper describes the design and implementation of a system that automatically detects malicious digital files using machine learning techniques. The system is proficient in identifying malicious scripts within MS Office files that exploit the OLE VBA macro functionality, detecting malicious scripts embedded within the CDH/LFH/ECDR internal field values through OOXML structure analysis, and recognizing abnormal CDH/LFH information introduced within the OOXML structure, which is not conventionally referenced. Furthermore, this paper presents a mechanism for utilizing the VirusTotal malicious script detection feature to autonomously determine instances of malicious tampering within MS Office files. This leads to the design and implementation of a machine learning-based integrated software. Experimental results confirm the software's capacity to autonomously assess MS Office file's integrity and provide enhanced detection performance for arbitrary MS Office files when employing the optimal machine learning model.

Research on Methods of Developing Quadrangular Culm of Bamboos (사각죽조성(四角竹造成)에 관(關)한 연구(硏究))

  • Chong, Hyon-Pae
    • Journal of Korean Society of Forest Science
    • /
    • v.10 no.1
    • /
    • pp.7-16
    • /
    • 1970
  • There are 19 species of bamboo in Korea, among which few are of commercial value. The Phyllostachys has wide range of utilization, for sea weed production, industrial production of various bamboo wares, etc. The total export from Chenla-Namdo to some more than ten countries was recorded 204,000,000 won worth in 1969. As civilization develops so does the techniques of bamboo works, and they in turn accelerate the demand for bamboo wood of better quality. In the light of this trend, the author attempted to make bamboo plants to develope a quadragular culm with elaborate design as disired instead of the original round one, with the expectation that it might be widely welcomed by hand workers, interior decorators. Here are some facts found out in this experiment: 1). The greater the diameter of the shoot at the eye level was, the better result was brought, and as shown in Fig. 5 the rate of success was 72% with the shoots of 7.5 cm thick. 2). The shoots of 30 cm in length showed 100% of success, developing into a desired quadrangular culms without fail(See Fig. 6). 3). The intensity of wood fiber increased as time lapsed, without receiving any influence by the weather (See Fig. 7, 8). 4). During the growing, the culm proved to be flexible enough to bend up to 90 degree (See Fig. 9). 5). In an attempt to promote the value of bamboo by decoration, the author tried to impress rectangular indents on the culm. The indention using a qudangular board 1cm smaller in width than the shoot diameter gave 100% success (See Fig. 10). 6). Design experiment was also successful both in coloration and impressing and the resulting designs delicately depended on the kinds of chemicals used and their combination (Table 2) (See Fig. 12, 13, 14). With the above mentioned findings, the author concludes that the mass production of quadrangular bamboo culm is quite a promissing as an new industry to develope bamboo works to a more valuable one. This research was carried out with the research fund provided by the Ministry of Education in 1969.

  • PDF

Inverse characterization method for color gamut extension in multi-color printer (색역 확장을 위한 멀티 칼라 프린터의 역 특성화 방법)

  • Jang, In-Su;Son, Chang-Hwan;Park, Tae-Yong;Ha, Yeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.2 s.314
    • /
    • pp.46-54
    • /
    • 2007
  • In current printer industry, four or more colorants are added for color gamut extension because the gamut of printer is smaller than other devices. However, these additional colorants make a redundancy problem that several combinations of colorants reproduced same color stimulus in colorimetric inverse characterization process. Thus, we propose a method of colorimetric inverse characterization using color correlation between colorant's amount. First, for analyzing the combination of colorants which represent the same color stimulus, we estimate the color stimulus for all combination of colorants by Cellular Yule-Nielsen Spectral Neugebauer printer model. The combination of colorants which has higher color correlation factor comparing combinations of colorant around itself in color space is selected. It can reduced the color difference from the tetrahedral interpolation process which is estimation of the output value(colorants combination) for arbitrary input(color stimulus). The selected combinations of colorants and their color stimulus are stored to the lookup table. In experiment, the CMYKGO printer was used. As a result, the dark region of color gamut was extended and the color tone was more naturally represented.

Robust and Blind Watermarking for DIBR Using a Depth Variation Map (깊이변화지도를 이용한 DIBR 공격의 강인성 블라인드 워터마킹)

  • Lee, Yong-Seok;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.21 no.6
    • /
    • pp.845-860
    • /
    • 2016
  • This paper proposes a digital watermarking scheme to protect the ownership of the freeview 2D or 3D image such that the viewer watches the image(s) by rendering a arbitrary viewpoint image(s) with the received texture image and its depth image. In this case a viewpoint change attack essentially occurs, even if it is not malicious. In addition some malicious attacks should be considered, which is to remove the embedded watermark information. In this paper, we generate a depth variation map (DVM) to find the locations less sensitive to the viewpoint change. For each LH subband after 3-level 2DDWT for the texture image, the watermarking locations are found by referring the DVM. The method to embed a watermark bit to a pixel uses a linear quantizer whose quantization step is determined according to the energy of the subband. To extract the watermark information, all the possible candidates are first extracted from the attacked image by considering the correlation to the original watermark information. For each bit position, the final extracted bit is determined by a statistical treatment with all the candidates corresponding that position. The proposed method is experimented with various test images for the various attacks and compared to the previous methods to show that the proposed one has excellent performance.

Economic Evaluation of ATES Heat Pump System (ATES 열펌프 시스템의 경제성 평가)

  • Kim, Namtae;Choi, Jong Min
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.199-199
    • /
    • 2011
  • ATES(Aquifer Thermal Energy Storage) 열펌프 시스템은 기존의 다양한 열원 적용 시스템 대비 효율이 우수한 것으로 알려져 유럽과 미국에서 건물 냉난방 시스템으로 적용되고 있다. 특히, ATES 시스템은 기존의 냉난방 시스템 대비 경제성이 우수한 것으로 알려져 있으나 국내에서는 이에 대한 연구 결과는 전무한 실정이다. 본 연구에서는 ATES 열펌프 시스템의 실증 성능 결과를 분석하였으며, LNG 보일러와 에어컨을 사용하는 기존의 냉난방 시스템을 비교시스템으로 ATES 열펌프 시스템의 경제성 평가를 수행하였다. ATES 시스템의 연간 실증 성능 실험결과 ATES 시스템은 외기온도와 무관하게 연중 안정적인 성능을 나타내었다. 경제성 평가시에 생애주기법(Life Cycle Cost)을 적용하여 ATES 열펌프 시스템의 설치 및 운전에 필요한 총 소요비용을 산정하고, 이 결과를 바탕으로 투자회수기간법을 통해 ATES 시스템의 투자회수 기간을 산정하였다. 생애주기법 적용 시에 현재가치법을 사용하였으며, 현재가치법은 수명주기에 발생하는 모든 투자비용과 절감액을 일정한 시점을 기준으로 등가환산하는 방법을 의미한다. 현재가치법에 사용되는 현재가치는 초기비용과 현재가치계수의 곱으로 나타나는데, 여기에서 현재가치계수는 임의의 이자율로 일정기간 동안 정기적인 할부금액이 적립될 때의 현재금액을 구하기 위해 사용하는 계수를 의미한다. 전기와 LNG는 각각 2009년 7월의 (주)한국전력공사와 (주)한국가스공사의 고시요금을 적용하였다. 본 시스템은 실증 설비용량인 20RT를 대상 건물로 가정하였고, 초기투자비는 크게 공사비와 냉난방 설비 구입비로 구성되어 있으며, 기본적인 물가지표는 (사)한국물가정보(KPI)의 고시 데이터를 참조하였다. 각 시스템의 초기투자비는 ATES 시스템이 비교대상 기존 냉난방 시스템 대비 5.7배 높게 나타났다. 일일 8시간 사용기준으로 계절별 전력요금을 고려한 연간운전 비용은 ATES 시스템이 기존 시스템 대비 냉난방 시에 각각 77%와 16%를 나타내어 운전비용이 연간 절감되었고, 난방 운전 시 절감 비율이 냉방시보다 크게 나타났다. 두 시스템에 대한 생애주기비용을 산정하기 위하여 에어컨과 보일러의 기존시스템과 ATES 시스템의 가용연수를 모두 20년으로 설정하였고, 유지보수 비용은 초기투자비용의 2%로 설정하고, 할인율은 은행 예금이자를 기준으로 5%로 설정하였다. 전기와 LNG의 요금 상승률은 (사)한국물가정보를 바탕으로 각각 2%와 8%로 가정하였다. 이러한 조건에서 생애주기법을 이용한 경제성평가는 ATES 시스템의 경우 생애운전비용이 초기투자비용보다 작게 나타났으며, 기존 냉난방 시스템은 생애운전비용이 초기투자비용에 비하여 높게 나타났다. 본 연구 대상 ATES 열펌프 시스템의 실증 성능 데이터와 기존 문헌으로부터 얻은 냉난방 시스템의 성능 결과를 이용하여 생애주기 비용을 적용한 결과 ATES 시스템의 기존 시스템 대비 투자회수 기간은 6.62년으로 나타났다. 특히, 본 연구에서는 ATES 시스템이 국내 최초로 적용됨에 따라 스크린 등의 부품을 다소 고가의 제품으로 시스템에 적용하였으므로 ATES 시스템의 신뢰성과 안정성이 확보되면 초기 투자비 감소가 가능할 것으로 예상되며, 기존 시스템 대비 투자회수 기간은 더욱 감소될 수 있을 것으로 예상된다.

  • PDF

A Buffer Architecture based on Dynamic Mapping table for Write Performance of Solid State Disk (동적 사상 테이블 기반의 버퍼구조를 통한 Solid State Disk의 쓰기 성능 향상)

  • Cho, In-Pyo;Ko, So-Hyang;Yang, Hoon-Mo;Park, Gi-Ho;Kim, Shin-Dug
    • The KIPS Transactions:PartA
    • /
    • v.18A no.4
    • /
    • pp.135-142
    • /
    • 2011
  • This research is to design an effective buffer structure and its management for flash memory based high performance SSDs (Solid State Disks). Specifically conventional SSDs tend to show asymmetrical performance in read and /write operations, in addition to a limited number of erase operations. To minimize the number of erase operations and write latency, the degree of interleaving levels over multiple flash memory chips should be maximized. Thus, to increase the interleaving effect, an effective buffer structure is proposed for the SSD with a hybrid address mapping scheme and super-block management. The proposed buffer operation is designed to provide performance improvement and enhanced flash memory life cycle. Also its management is based on a new selection scheme to determine random and sequential accesses, depending on execution characteristics, and a method to enhance the size of sequential access unit by aggressive merging. Experiments show that a newly developed mapping table under the MBA is more efficient than the basic simple management in terms of maintenance and performance. The overall performance is increased by around 35% in comparison with the basic simple management.

LCU-Level Rate Control for HEVC Considering Hierarchical Coding Structure (HEVC의 계층적 부호화 구조를 고려한 LCU 단위의 비트율 제어 기법)

  • Park, Dong-Il;Kim, Jae-Gon;Lim, Sung-Chang;Kim, Jong-Ho;Kim, Hui-Yong
    • Journal of Broadcast Engineering
    • /
    • v.16 no.5
    • /
    • pp.762-772
    • /
    • 2011
  • In this paper, a method of rate control for constant bitrate (CBR) coding of High Efficiency Video Coding (HEVC) is addressed. The existing rate control of H.264/AVC may not provide exact rate control in the case of hierarchical coding structure since it doesn't consider the characteristics of the hierarchical coding structure. It is expected that a rate control is added to the reference software called HM for CBR encoding in the near future. More accurate rate control may be required in a hierarchical structure of random access (RA) mode defined in the common test condition of HM. In this paper, we propose a method of rate control based on quadratic Rate-Distortion (R-D) model considering temporal layers and frame types in hierarchical coding structure for efficient rate control. In the consideration of the trade-off relationship between the bit fluctuation and the average PSNR, both of frame and coding unit (CU) are set as the basic unit of rate control. The performance of the proposed rate control method is verified by simulations along with the trade-off relationships for the both cases of basic unit.

Evaluation Toolkit for K-FPGA Fabric Architectures (K-FPGA 패브릭 구조의 평가 툴킷)

  • Kim, Kyo-Sun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.49 no.4
    • /
    • pp.15-25
    • /
    • 2012
  • The research on the FPGA CAD tools in academia has been lacking practicality due to the underlying FPGA fabric architecture which is too simple and inefficient to be applied for commercial FPGAs. Recently, the database of placement positions and routing graphs on commercial FPGA architectures has been built, and provided for enabling the academic development of placement and routing tools. To extend the limit of academic CAD tools even further, we have developed the evaluation toolkit for the K-FPGA architecture which is under development. By providing interface for exchanging data with a commercial FPGA toolkit at every step of mapping, packing, placement and routing in the tool chain, the toolkit enables individual tools to be developed without waiting for the results of the preceding step, and with no dependency on the quality of the results, and compared in detail with commercial tools at any step. Also, the fabric primitive library is developed by extracting the prototype from a reporting file of a commercial FPGA, restructuring it, and modeling the behavior of basic gates. This library can be used as the benchmarking target, and a reference design for new FPGA architectures. Since the architecture is described in a standard HDL which is familiar with hardware designers, and read in the tools rather than hard coded, the tools are "data-driven", and tolerable with the architectural changes due to the design space exploration. The experiments confirm that the developed library is correct, and the functional correctness of applications implemented on the FPGA fabric can be validated by simulation. The placement and routing tools are under development. The completion of the toolkit will enable the development of practical FPGA architectures which, in return, will synergically animate the research on optimization CAD tools.

Developing the Design Guideline of Auditory User Interface for Digital Appliances (가전제품의 청각 사용자 인터페이스(AUI) 디자인을 위한 가이드라인 개발 사례)

  • Lee, Ju-Hwan;Jeon, Myoung-Hoon;Han, Kwang-Hee
    • Science of Emotion and Sensibility
    • /
    • v.10 no.3
    • /
    • pp.307-320
    • /
    • 2007
  • In this study, we attempted to provide a distinctive cognitive, emotional 'Auditory User Interface (AUI) Design Guideline' according to home appliance groups and their functions. It is an effort to apply a new design method to practical affairs to overcome the limit of GUI centered appliance design and reflect user multimodal properties by presenting a guideline possible to generate auditory signals intuitively associable with the operational functions. The reason why this study is required is because of frequent instances given rise to annoyance as not systematic application of AUI, but arbitrary mapping. This study tried to provide a useful guideline of AUI in home appliances by extracting the relations with cognitive, emotional properties of a certain device or function induced by several properties of auditory signal and showing the empirical data on the basic mechanism of such relations.

  • PDF