• Title/Summary/Keyword: 주소정보

Search Result 1,330, Processing Time 0.024 seconds

Efficient Stack Smashing Attack Detection Method Using DSLR (DSLR을 이용한 효율적인 스택스매싱 공격탐지 방법)

  • Do Yeong Hwang;Dong-Young Yoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.9
    • /
    • pp.283-290
    • /
    • 2023
  • With the recent steady development of IoT technology, it is widely used in medical systems and smart TV watches. 66% of software development is developed through language C, which is vulnerable to memory attacks, and acts as a threat to IoT devices using language C. A stack-smashing overflow attack inserts a value larger than the user-defined buffer size, overwriting the area where the return address is stored, preventing the program from operating normally. IoT devices with low memory capacity are vulnerable to stack smashing overflow attacks. In addition, if the existing vaccine program is applied as it is, the IoT device will not operate normally. In order to defend against stack smashing overflow attacks on IoT devices, we used canaries among several detection methods to set conditions with random values, checksum, and DSLR (random storage locations), respectively. Two canaries were placed within the buffer, one in front of the return address, which is the end of the buffer, and the other was stored in a random location in-buffer. This makes it difficult for an attacker to guess the location of a canary stored in a fixed location by storing the canary in a random location because it is easy for an attacker to predict its location. After executing the detection program, after a stack smashing overflow attack occurs, if each condition is satisfied, the program is terminated. The set conditions were combined to create a number of eight cases and tested. Through this, it was found that it is more efficient to use a detection method using DSLR than a detection method using multiple conditions for IoT devices.

AN EPIDEMIOLOGIC STUDY ON THE PEDIATRIC PATIENTS IN DEPARTMENT-OF PEDIATRIC DENTISTRY, CHOSUN UNIVERSITY DENTAL HOSPITAL FOR LAST 10 YEARS(1990-1999) (최근 10년간 조선대학교 치과병원 소아치과에 내원한 신환에 관한 역학적 연구(1990-1999))

  • Ryu, Hyun-Seop;Kim, Hyo-Suck;Lee, Chang-Seop;Lee, Sang-Ho
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.28 no.3
    • /
    • pp.345-354
    • /
    • 2001
  • The purpose of this study was to make public oral health plan more effective and the improvement of the hospital management system for better clinical dental practice. Distribution and trends were examined in all patients who had been examined and diagnosed at Department of Pedodontics, Dental Hospital, Chosun University over 10 year-period from 1990 to 1999 Results were as follows, 1. The number of patients per year was increasing trend after 1996 and higher visiting rate in male(55.9%) than in female(44.1%). 2. Age distribution had shown $3\sim4$ year-old cup being the largest (23.4%) and each percentage of $5\sim6,\;7\sim8,\;0\sim2,\;9\sim10,\;11\sim12,\;13\sim14,\;above\sim15$ year-old group was 19.9%, 17.7%, 14.6%, 12.6%, 8.0%, 3.3%. 0.5%. 3. Geographic distribution showed a majority of patients in Kwang-Ju (83.0%). Group in the suburbs of Kwang-Ju(Jang-Sung group) was 5.4%. 4. Dental caries showed the highest percentage(40.5%) in chief complaints and percentage of oral exam, orthodontic problem, oral pain, trauma, supernumerary teeth, swelling was 13.9% 12.6%, 8.8%, 7.4%, 5.5%, 4.9%. 5. In all patients with traumatic problem, crown fracture showed the highest percentage(41.4%) and percentage of subluxation was 19.4%. 6. Majority(78.7%) of patients were not refered, and percentage of patients refered from local clinic was 20.5%. 7. Patients who had periodic check-up comprised 19.6%, and percentage of after 3, 6, 9, 12, 18, 24month was 36.7%, 22.2%, 13.5%, 11.3%, 5.4%, 11.0%.

  • PDF

Perception of Privacy and Sensitivity of Personal Information among University Students (대학생들의 개인정보보호의 인식과 개인정보의 민감도에 대한 연구)

  • Boo, Yoo-Kyung;Noh, Jin-Won;Kim, Yun-Mi;Kim, Sung-Soo;Rha, Young-Ah
    • Culinary science and hospitality research
    • /
    • v.21 no.5
    • /
    • pp.25-37
    • /
    • 2015
  • By studying the awareness level of students, for the need to protect personal information, and also by studying students' level of perception as to which information needs protection, this study aims to show that increased education is beneficial, and necessary, across all university majors. This increased education is necessary to improve information security, and increase the responsible sharing of private data which has many benefits, specifically in the Healthcare field. Utilizing student volunteers across multiple majors at a university in South Korea. These questionnaires measured the students' awareness of private information, their perception of private information and also the students' experience in receiving university level education regarding private information and the need for its protection. This study shows that, when compared to students in other fields, students in the field of public health had a higher level of awareness regarding the consequences of personal information disclosure for both public purposes and medical research. Within the parameters of this study, this outcome can be explained as the result of exposure to educational curriculum which contained information related to personal information protection. This increased education raised the student's awareness of which information is considered private, as well as, which information is valuable when responsibly shared. As a result, this study shows that an increase in education regarding information privacy, should be included in all university majors, and gives us evidence to support that this additional education is valuable to students at all levels and should be encouraged.

An Interface Sharing Service based on Jini (Jini 기반의 인터페이스 공유 서비스)

  • 문창주;문석현;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.227-240
    • /
    • 2003
  • When we develop and use the java-based distributed object system, the system developer must deploy distributed object, which is implemented to predefined interface, to network and the system user acquires reference about distributed object and changes reference to interface type. Sharing of interface is essential for these works In this paper, we propose the IRSJ(interface repository service based on jim) to improve efficiency of interface sharing at the JINI system development. the IRSJ is consisted of the java classes for JINI system and interface sharing service. If development teams perform collaborative work in short distance, the IRSJ can search interface file without information of lookup server or interface writer If development teams perform collaborative work in long distance, the IRJS can search interface with only an address of server that executes lookup service. Although the interface object not requires additional search, the interface object that failed search interface can download interface and use interface using remote event model. When the message service fails in interface search, the message service sends interface request message to a development team member who use the IRSJ automatically, so that interface sharing may be possible in short time.

Garbage Collection Technique for Non-volatile Memory by Using Tree Data Structure (트리 자료구조를 이용한 비 휘발성 메모리의 가비지 수집 기법)

  • Lee, Dokeun;Won, Youjip
    • Journal of KIISE
    • /
    • v.43 no.2
    • /
    • pp.152-162
    • /
    • 2016
  • Most traditional garbage collectors commonly use the language level metadata, which is designed for pointer type searching. However, because it is difficult to use this metadata in non-volatile memory allocation platforms, a new garbage collection technique is essential for non-volatile memory utilization. In this paper, we design new metadata for managing information regarding non-volatile memory allocation called "Allocation Tree". This metadata is comprised of tree data structure for fast information lookup and a node that holds an allocation address and an object ID pair in key-value form. The Garbage Collector starts collecting when there are insufficient non-volatile memory spaces, and it compares user data and the allocation tree for garbage detection. We develop this algorithm in a persistent heap based non-volatile memory allocation platform called "HEAPO" for demonstration.

A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme (익명 인증기법을 이용한 모바일 기반 차세대 본인확인수단에 관한 연구)

  • Park, Jeong Hyo;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.511-516
    • /
    • 2013
  • The cases of identification forgery and counterfeiting are increasing under the current identification system, which was established based on social conditions and administrative environments over 20 years ago. This leads to an increase of various criminal acts including illegal loan using fake ID and a number of damages caused out of good intentions that result in interference with the operations of public organizations. In addition, according to the advancement of information society, privacy protection has emerged as an important issue. However, ID card exposes individuals' personal information, such as names, resident registration numbers, photos, addresses and fingerprints, and thus the incidents associated with illegal use of personal information are increasing continuously. Accordingly, this study aimed at examining the issues of ID card forgery/counterfeiting and privacy protection and at proposing a next-generation identification system to supplement such weaknesses. The top priority has been set as prevention of forgery/counterfeiting and privacy protection in order to ensure the most important function of national identification system, which is user identification.

Development of an Application for Life Safety Continuity Method based on National Point Numbers and NFC (국가지점번호와 NFC 기반의 생활안전 연속성 지원을 위한 APP 개발)

  • Cheung, Chong-Soo
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.2
    • /
    • pp.282-291
    • /
    • 2019
  • Purpose: In recent, mobile technology, as an axis of the fourth industry paradigm, is evolving into our daily life, economic activities and disaster safety management. However, since the location information service is insufficient, it is difficult to response the emergency situation adequately in the golden time. The purpose of this study is to propose a method to fine precisely the location of people who are in need of an emergency in the event of accidents and disasters. Method: This study investigates and compares existing literature and safety apps for national index number NFC application development. In addition, the system structure and the design method through the element technology through analysis of necessary function of the demander were carried out. Results: The results of this study were developed as a design and system that can be implemented in both direction and function to inform the location for emergency situation or disaster reporting in mobile. Conclution: It is possible to provide the disaster safety location service which can be utilized by the citizens in case of crisis by unifying the address system and integrating the location information using NFC.

Secure Quorum-based Location Service for Ad hoc Position-based Routing (애드혹 위치기반 라우팅을 위한 안전한 쿼럼기반 위치 서비스)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.21-35
    • /
    • 2007
  • In ad hoc networks, position-based routing schemes, that use geographical positions of nodes, have been proposed to efficiently route messages. In these routing schemes, the location service is one of the key elements that determines and effects security and efficiency of the protocol. In this paper, we define security threats of location service and propose a new quorum based location service protocol. In our proposed protocol, nodes register their public keys in other nodes during the initialization phase and these registered keys are used to verify locations of other nodes and the messages exchanged. In this paper, we prove that our protocol is robust against traditional attacks and new attacks that may occur due to the use of position-based routing. We also analyze the efficiency of our protocol using various simulations.

McDoT: Multi-Channel Domain Tracking Technology for Illegal Domains Collection

  • Cho, Ho-Mook;Lee, JeongYoung;Jang, JaeHoon;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.127-134
    • /
    • 2020
  • Recently, Harmful sites, including pornographic videos, drugs, personal information and hacking tool distribution sites, have caused serious social problems. However, due to the nature of the Internet environment where anyone can use it freely, it is difficult to control the user effectively. And the site operator operates by changing the domain to bypass the blockage. Therefore, even once identified sites have low persistence. In this paper, we propose multi-channel domain tracking technology, a technique that can effectively track changes in the domain addresses of harmful sites, including the same or similar content, by tracking changes in these harmful sites. Proposed technology is a technology that can continuously track information in a domain using OSINT technology. We tested and verified that the proposed technology was effective for domain tracking with a 90.4% trace rate (sensing 66 changes out of 73 domains).

Public and Experts Perception Analysis about Relative Importance of Address of Things Using AHP (AHP 분석을 이용한 사물주소 부여대상의 상대적 중요도에 대한 전문가와 일반인의 인식 비교분석)

  • Cho, Su-Ji;Bae, Seoung-Hun;Kim, Min-Kwan;Lee, Ki-Kwang
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.1
    • /
    • pp.71-78
    • /
    • 2021
  • Recently the meaning of the road name address is expended as an information through the revision of the Road Name Address Act. As this revision, the address of things (AoT) become more important indicating the possibility for the expansion to the related business. However, recent study about AoT does not concern how the current priority system works from the first research. In this study, we analyze perception about addressable object between AoT experts and public using AHP analysis. We structured the importance of addressable objects as two categories; urgency and value creation. The necessity in emergency or daily, accessibility and welfare conform the urgency index. Meanwhile, public value creation in public domain or profitability in the business area and economics conform value creation index. We conducted survey for total of 89 of experts and public. The results of this study indicate the relative importance of AoT measured by experts and public. Generally, public tend to concern more about accessibility conforming the urgency index than experts. Moreover, the public WiFi and the sports complex scored the high priority among the remain addressable objects, in respect of the urgency and the value creation. This result could be implemented for the activation of the smart city industry base on the geospatial information including AoT.