• Title/Summary/Keyword: 탈취

Search Result 437, Processing Time 0.023 seconds

Story Structure & Media Traits of Japanese Comic Book -focusing on Shinyashokudo- (일본만화의 이야기구조와 미디어적 속성 -<심야식당>을 중심으로-)

  • Hong, Kyung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.11
    • /
    • pp.162-168
    • /
    • 2010
  • Comic book has a different story structure from western movies, i.e. New Character->reaction->food->master mediation->effect of food->disappearance ->conclusion. Comic book is full of media traits. The master is like a shaman, who console people with food of memory. Food also is a media, which carries message of memory instead of savor itself. Restaurant is a media, in which many events occur and rhetoric of rumor pervade. Foods of memory massage our feeling sense, like a media. In conclusion, comic book has a analogous role to that of Marshal Mcluhan's Media theory.

A study on the photocatalyst filter design using UV-C (UV-C를 이용한 광촉매 필터 디자인에 관한 연구)

  • Han, Sang Yun;Kang, Seung Min
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.29 no.6
    • /
    • pp.276-282
    • /
    • 2019
  • The purpose of this study was to analyze the structure of general filter using ultrafine filter (Profilter), dust collector filter, HEPA (HAPA-High Efficiency Particulate Air) filter, deodorized filters, etc. of air purifiers and to study new types of purified filters that can improve ultrafine dust, harmful gases, and sterilization cleanup performance. The study was also conducted by adding photocatalyst filters to the existing step-by-step filtration filter types, which were proposed in the design three coupling structure filters of the left and right UV-LED installation frames and the photocatalyst coating honeycomb frame. Future research is needed on the effect of photocatalyst filters. This study was to investigate the application and structure of photocatalyst filters to air purifiers.

Study of Hacking Attacks Secure Payment(ISP) with Smishing (스미싱을 이용한 안전결제(ISP) 해킹 공격 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.267-270
    • /
    • 2013
  • Hacking damage is increasing year by year in the Internet payment service credit card applying the digital signature method of PKI-based first domestic, secure payment, was 180 million won in 2012. Revenues have soared for phishing that Smishing using smartphone after entering 2013. Hacking accident to the secure payment system using Smishing has occurred took over personal information and financial direct damage. In this paper, we analyzed for Smishing, to prevent the damage of secure payment using Smishing to study the hacking attack of secure payment. In addition, it would be studies to allow through the smartphone, online payment safer and more convenient.

  • PDF

Implementation of the E-BLP Security Model for Trusted Embedded Systems (안전한 임베디드 시스템을 위한 E-BLP 보안 모델의 구현)

  • Kang Jungmin;Nam Taelliun;Jang Insook;Lee Jinseok
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.10
    • /
    • pp.512-519
    • /
    • 2005
  • E-BLP security model considers the reliability of the processes that are real subjects in systems. This paper deals with the implementation of the E-BLP model for secure embedded systems. Implemented EBSM(E-BLP Based Security Module) consists of three components: identification and authentication, access control and BRC(Dynamic Reliability Check) that checks the process behavior dynamically. Access Control of EBSM ensures unreliable processes not to access the sensitive objects and the DRC detects the buffer overflow attack by normal user. Besides, the performance overhead of the embedded system applying the EBSM is introduced.

Optimization of Polymer Composite Properties Using a Red Clay (황토를 이용한 고분자 복합수지 물성 최적화)

  • Seo, Kyoung-Won;Ji, Ju-Hyeon;Peng, Mei-Mei;Lee, Joo-Bo;Jang, Hyun-Tae
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.05a
    • /
    • pp.332-335
    • /
    • 2011
  • 원적외선, 음이온 방출과 항균, 탈취, 난연등의 효과를 가지는 황토를 합성수지와 혼합하여 복합소재를 연구하여 환경 친화적인 특징과 원적외선, 음이온의 방출을 이룰 수 있는 복합소재 조성을 연구하였다. PP는 MI가 2~60이고, TPE로 Ethylene계을 사용하였으며, 황토와 PP의 혼련을 도와주기 위하여 MA-g-PP를 첨가하였고, 활제, 분산제 및 산화방지제를 첨가하여 compounding 하였다. 또한 황토의 종류에따라 적황토, 호황토, 홍토, 백토, 흑토등으로 구분되고, 각각의 황토 마다 다양한 종류의 입도를 가지고 있으며, 또한 환경 친화적이며 난연성을 부여하기 위하여 다양한 조성으로 compounding 하였다, 황토의 종류에 따른 복합재료의 물성으로부터 기계적 특성치, 원적외선 방사율, 난연성등을 확인하고, 친환경 난연 복합소재 기술을 연구하였다. 적황토의 경우 황토의 함량이 많을수록 인장강도는 작아지는 경향을 나타냈으며, 입도가 작을수록 인장강도가 커지는 경향을 나타냈다. 파단신율의 경우 적황토(#2000)에서 가장 양호하게 나타났으며, 굴곡강도, 충격강도의 경우 적황토(#5000)에서 MI 의 경우 적황토(#325)에서 양호하게 나타났다.

  • PDF

Biofiltration of Ammonia Gas from Composting Using Sawdust as Biofilter Media (퇴비화 암모니아 가스의 톱밥 바이오 필터 매체에 의한 생물학적 탈취)

  • Hong Ji Hyung;Park Keum Joo
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.45 no.2
    • /
    • pp.107-115
    • /
    • 2003
  • Dairy manure amended with crop and forest residues (moisture 69% wet basis, C/N 22) was composted in a 605 L pilot-scale vessel using continuous air flow (56 L/min) for 19 days. Three pilot-scale sawdust biofilters (moisture 63%, pH 5.0) were built to clean biological waste gas from the composting process. For each methods, two replicated experiments were monitored over a period of three weeks. The system was evaluated to determine the biofilter media depth that would be adequate for compost odour reduction. The compost air cleaning was measured based on ammonia gas concentration before and after passing through the biofilter. Ammonia gas removal efficiency over 3 weeks was 42, 75 and 87% at sawdust biofilter media depth levels of 202, 400 and 600 mm, respectively. Each sawdust biofilter was operated at a moisture content in the range of 60~62% (wb), a temperature from 15 to $25^{\circ}C$, an average pressure drop from 240 to 340 Pa and a detention time from 60 to 180 seconds during the biofiltration process.

A Phishing Attack using Website Fingerprinting on Android Smartphones (안드로이드 스마트폰에서 웹사이트 핑거프린팅을 통한 피싱 공격)

  • Ahn, Woo Hyun;Oh, Yunseok;Pyo, Sang-Jin;Kim, Tae-Soon;Lim, Seung-Ho;Oh, Jaewon
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.9-19
    • /
    • 2015
  • The Android operating system is exposed to a phishing attack of stealing private information that a user enters into a web page. We have discovered two security vulnerabilities of the phishing attack. First, an always-on-top scheme allows malware to place a transparent user interface (UI) on the current top screen and intercept a user input. Second, the Android provides some APIs that allow malware to obtain the information of a currently visited web page. This paper introduces a phishing that attacks a web page by exploiting the two vulnerabilities. The attack detects a visit to a security-relevant web page and steals private information from the web page. Our experiments on popular web sites reveal that the attack is significantly accurate and dangerous.

Security Vulnerabilities of Client-Server Communications of Password Managers (패스워드 매니저의 클라이언트-서버 통신 취약점 분석)

  • Hong, Seunghui;So, Jaewoo;Jeong, Hyera
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.17-27
    • /
    • 2020
  • Many users are using password managers in order to conveniently manage several usernames and passwords needed to access the web sites. The password manager encrypts and stores several passwords on the server, and the user accesses the server to receive the password information. Thus, if an attacker can sniff a message between the password manager and the server and decrypt the message content, or if an attacker can steal the computer's memory and decrypt the message content, then all the passwords will be exposed to the attacker. In this paper, we analyze the client-server communications and encryption process of password mangers and show there is a serious vulnerability in memory attack.

How to defend against car smart key amplification attacks (자동차 스마트키 증폭 공격을 방어하는 방법)

  • Bae, Dong-ki;Kwon, Yong-gyu;Lee, Dong-hun;Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.467-469
    • /
    • 2016
  • Car smart key system is a technology that allows you to turn activate / deactivate the auto lock through the contact form of electronic keys on the remote control and turn on the ignition by pressing the button. Smart key system is regarded as one of the essential options of the car as it is increasingly convenient to user, but there is no response yet for an attack to this situation. Therefore, in this paper, through an analysis of the amplification attack of a smart key we propose a way to stop the amplification attack and stop the car seized in case the car door opened due to the amplification attack.

  • PDF

Design of Electronic ID System Satisfying Security Requirements of Authentication Certificate Using Fingerprint Recognition (지문 인식을 이용하여 공인인증서의 보안 요건을 만족하는 전자 신분증 시스템의 설계)

  • Lee, Chongho;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.610-616
    • /
    • 2015
  • In this paper, an electronic ID system satisfying security requirements of authentication certificate was designed using fingerprint recognition. The proposed electronic ID system generates a digital signature with forgery prevention, confidentiality, content integrity, and personal identification (=non-repudiation) using fingerprint information, and also encrypts, sends, and verify it. The proposed electronic ID system exploits fingerprint instead of user password, so it avoids leakage and hijacking. And it provides same legal force as conventional authentication certificate. The proposed electronic ID consists of 4 modules, i.e. HSM device, verification server, CA server, and RA client. Prototypes of all modules are designed and verified to have correct operation.