• Title/Summary/Keyword: 탈코드화

Search Result 10, Processing Time 0.028 seconds

악성코드 동향으로 살펴본 스마트 기기의 보안 위협

  • Choi, Eun-Hyeog
    • Review of KIISC
    • /
    • v.21 no.3
    • /
    • pp.7-11
    • /
    • 2011
  • 2009년 아이폰 출시로 시작된 국내 스마트폰은 트워터, 페이스북과 같은 SNS와 더불어 급속하게 보급되어 1,000만 사용자 시대를 맞이하고 있으며, 스마트폰의 경험을 그대로 활용할 수 있는 태블릿의 출연으로 인해 개인적인 활용에서 업무의 효율성과 형태에 대한 변화도 가져오고 있다. 모바일 오피스, 스마트워크 등 정부와 기업의 업무 효율화에 대한 관심과 녹색 성장 정책에 따라 스마트 기기의 확산과 활용은 더 급물살을 탈 것으로 보인다. 스마트 기기는 PC와 많은 부분이 닮아 있지만 이동성과 개인화된 기기라는 점에서 개인정보 유출이나 금전적인 피해에 노출되기 쉬워 이에 대한 대책 수립이 필요하다. 본 고에서는 스마트 기기로 인한 패러다임의 변화와 보안 위협과 보안 위협의 대표적인 모바일 악성코드의 트렌드를 알아보고자 한다.

Detection Model based on Deeplearning through the Characteristics Image of Malware (악성코드의 특성 이미지화를 통한 딥러닝 기반의 탐지 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.137-142
    • /
    • 2021
  • Although the internet has gained many conveniences and benefits, it is causing economic and social damage to users due to intelligent malware. Most of the signature-based anti-virus programs are used to detect and defend this, but it is insufficient to prevent malware variants becoming more intelligent. Therefore, we proposes a model that detects and defends the intelligent malware that is pouring out in the paper. The proposed model learns by imaging the characteristics of malware based on deeplearning, and detects newly detected malware variants using the learned model. It was shown that the proposed model detects not only the existing malware but also most of the variants that transform the existing malware.

Design of Lab Framework for Effective Blockchain Education (효율적인 블록체인 교육을 위한 실습프레임워크 설계)

  • Kim, Do-Kyu
    • Journal of Industrial Convergence
    • /
    • v.18 no.6
    • /
    • pp.147-154
    • /
    • 2020
  • It is difficult to educate the overall operation of public and private blockchains with different characteristics. Recently, most education for blockchain is targeted at public blockchains such as Bitcoin and Ethereum. However, in an actual business environment, a private blockchain such as HyperLedger Fabric is used because access to corporate data is controlled through user authentication. In the case of HLF-based education, it is necessary to understand various components that are not in the public blockchain, such as peers, orderers, and channels. In this paper, a lab framework for HLF is designed for an efficient and systematic understanding of the functions and operations. The framework consists of HLF network, chaincode, and decentralized software control functions. Through the framework, the network configuration, distribution and activation of chaincode, and dApp execution process were checked step by step, and it was very easy to understand the overall flow for blockchain services. In addition, it is expected that a systematic understanding of the overall flow will be possible even in future network expansion.

A Study on the Expression Techniques and Characteristic of Hybrid Aesthetics in Contemporary Interior Design (현대 실내디자인의 하이브리드 미학적 표현기법과 특성에 관한 연구)

  • Kim, Eun-Ji;Lee, Jeong-Wook
    • Korean Institute of Interior Design Journal
    • /
    • v.16 no.1 s.60
    • /
    • pp.39-47
    • /
    • 2007
  • In comtemporary interior design, hybrid form causes cognitive turnovers of aesthetics. Especially it offers much possibility to expression techniques in interior design and works as compound system, symbolic aggregate that makes and expands various meanings. The aesthetic ideology of hybrid design can be interpreted through the philosphic concept of art, sublime, reception, representation and explains expression techniques and characteristic in interior design through various transformation and meaning conversion. The expression techinique that is a form of openness, transcendental interpretation that exceed a dupilicate of meaning. can be classified as oxymoron, defamiliarization and interface. The characteristic that is based on those expressions appears as use of complex codes of visual images, decoding strategy, intertextuality of meaning. This research attitude can explain the thinking method of interior design by defining the epistemological scheme that is basically involved in expressional styles with characteristics of hybrid aesthetics. In order to be recognized as the object of aesthetics, hybrid has to be approached by interpretational methods of expression techniques. Consequently the characters of expression techniques in hybrid design can be investigated as one of the methodology in interior design plan.

A Structure of Generating the Fan-made Works in Korean Idol (한국 아이돌 팬 창작물의 생성 구조)

  • Chung, Eun-hye;Han, Hye-won
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.9
    • /
    • pp.158-168
    • /
    • 2020
  • This paper analyzed the process of text generation of the fan-made works in Korean idol. The subjects of the study adopted the fan-made works of 'BTS' and 'EXO'. This is applied the concepts of 'Apparatus-Operator' and 'Technical form' in Vilém Flusser. Idol contents build a database of fan-made works and create the storyworld through separation and integration of fan's interpretations. By decontextualizing and recontextualizing the idol contents, fans reinforce and extend the original texts.

User verification system for improving blockchain node reliability (블록체인 노드 신뢰성 향상을 위한 사용자 검증 시스템)

  • An, Kyuhwang;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.9
    • /
    • pp.1264-1270
    • /
    • 2018
  • Blockchain is a technology that directly connects each node to P2P method, except for the central server. A public blockchain is one of the blockchain types, anyone can participate without any restriction. If some node find nonce, which node can broadcasted data to all nodes. At this time, if a node that finds a nonce hides malicious code in the block, all nodes participating in the chain may be infected with malicious code due to the characteristics of the decentralization system of the blockchain. In this paper, to solve the problem that hackers can participate as an any node, we propose that a user with malicious intent can not participate as a node through a firewall with AI technology. This will improve the reliability of the propagated data over existing data.

Package Modeling Change in Age of Feeling -Based on Solid Chocolate Package Structure by -√3 Proportion- (Feeling 시대의 Package 조형 변화 -√3 비례에 의한 판 초콜릿 Package 구조를 중심으로-)

  • Kwon, Il-Hyun;Nam, Young-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.8
    • /
    • pp.163-173
    • /
    • 2007
  • As present generation live in the age of feeling after been through age of need or age of want, we analyzed Signification based on consumer psychology, sociocultural variation. Based on above, we first built basic modeling from a regular triangle by $\sqrt{3}$ proportion and then approached to substantial modeling of products that enable us to distribute and sell. Furthermore, we built recycle modeling which enables us to create a variety of forms with joy after using products. This means a lot to us in terms of package modeling creation from sans code. Besides, we studied on not only materialistic or functional value of package modeling, but also appropriate semiotics that enable psychological and sociocultural function of package modeling to respond to consumer identity.

Performance Prediction of Liquid Rocket Thrust Chambers with Nonuniform Propellant Mixing (추진제의 비균일 혼합분포를 고려한 액체로켓 추력실의 성능 예측기법 개발)

  • 김성구;최환석;한영민;이광진
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.9
    • /
    • pp.82-88
    • /
    • 2006
  • In order to effectively reduce thermal loads on regenerative cooled walls, fuel cooling injectors and film cooling devices have often been employed. The present study has established a numerical methodology for prediction of performance and near-wall temperature distribution taking into account the nonuniform mixing due to these additional cooling devices. A correction procedure for main propulsive parameters has also been proposed based on comparison between prediction and experimental data. Under the computational framework of this study, the predicted results were in good agreement with hot-firing test data for a 30 tonf-class full-scale combustor at the design and off-design conditions. As a consequence, the present numerical method is expected to be useful for design and evaluation of regenerative cooled liquid rocket thrust chambers.

Distributed Identity Authentication System based on DID Technology (DID 기술에 기반 한 분산 신원 인증 시스템)

  • Chai Ting;Seung-Soon Shin;Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.17-22
    • /
    • 2023
  • Traditional authentication systems typically involve users entering their username and password into a centralized identity management system. To address the inconvenience of such authentication methods, a decentralized identity authentication system based on Distributed Identifiers(DID) is proposed, utilizing decentralized identity technology. The proposed system employs QR code scanning for login, enhancing security through the use of blockchain technology to ensure the uniqueness and safety of user identities during the login process. This system utilizes DIDs and integrates the InterPlanetary File System(IPFS) to securely manage organizational members' identity information while keeping it private. Using the distributed identity authentication system proposed in this study, it is possible to effectively manage the security and personal identity of organization members. To improve the usability of the system proposed in this study, research is needed to expand it into a solution.

Extraction and Taxonomy of Ransomware Features for Proactive Detection and Prevention (사전 탐지와 예방을 위한 랜섬웨어 특성 추출 및 분류)

  • Yoon-Cheol Hwang
    • Journal of Industrial Convergence
    • /
    • v.21 no.9
    • /
    • pp.41-48
    • /
    • 2023
  • Recently, there has been a sharp increase in the damages caused by ransomware across various sectors of society, including individuals, businesses, and nations. Ransomware is a malicious software that infiltrates user computer systems, encrypts important files, and demands a ransom in exchange for restoring access to the files. Due to its diverse and sophisticated attack techniques, ransomware is more challenging to detect than other types of malware, and its impact is significant. Therefore, there is a critical need for accurate detection and mitigation methods. To achieve precise ransomware detection, an inference engine of a detection system must possess knowledge of ransomware features. In this paper, we propose a model to extract and classify the characteristics of ransomware for accurate detection of ransomware, calculate the similarity of the extracted characteristics, reduce the dimension of the characteristics, group the reduced characteristics, and classify the characteristics of ransomware into attack tools, inflow paths, installation files, command and control, executable files, acquisition rights, circumvention techniques, collected information, leakage techniques, and state changes of the target system. The classified characteristics were applied to the existing ransomware to prove the validity of the classification, and later, if the inference engine learned using this classification technique is installed in the detection system, most of the newly emerging and variant ransomware can be detected.