• Title/Summary/Keyword: CALL application

Search Result 340, Processing Time 0.036 seconds

A Study on Daemon Process Protection System Using Linux Based Resource Access Control Module(LPM) (리눅스 기반 자원 접근제어 모듈(LPM)을 이용한 데몬 프로세스 보호 시스템에 관한 연구)

  • 나형준;이병호
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1593-1596
    • /
    • 2003
  • In this paper, we propose mechanism of system call control, monitor, and manage by user level, and for this purpose we propose the mechanism using system call intercept and a logging system. Proposed mechanism is more convenient in that there is no necessity for modification of linux source code, so general users can actively apply and modify. As an application model for the mechanism, we can explain for the Daemon Process Protection System which can have a complete control on system daemon processes.

  • PDF

Android Application Call Relationship Analysis Based on DEX and ELF Binary Reverse Engineering (DEX와 ELF 바이너리 역공학 기반 안드로이드 어플리케이션 호출 관계 분석에 대한 연구)

  • Ahn, Jinung;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.45-55
    • /
    • 2019
  • DEX file and share objects (also known as the SO file) are important components that define the behaviors of an Android application. DEX file is implemented in Java code, whereas SO file under ELF file format is implemented in native code(C/C++). The two layers - Java and native can communicate with each other at runtime. Malicious applications have become more and more prevalent in mobile world, they are equipped with different evasion techniques to avoid being detected by anti-malware product. To avoid static analysis, some applications may perform malicious behavior in native code that is difficult to analyze. Existing researches fail to extract the call relationship which includes both Java code and native code, or can not analyze multi-DEX application. In this study, we design and implement a system that effectively extracts the call relationship between Java code and native code by analyzing DEX file and SO file of Android application.

A Two-Step Call Admission Control Scheme using Priority Queue in Cellular Networks (셀룰러 이동망에서의 우선순위 큐 기반의 2단계 호 수락 제어 기법)

  • 김명일;김성조
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.461-473
    • /
    • 2003
  • Multimedia applications are much more sensitive to QoS(Quality of Service) than text based ones due to their data continuity. In order to provide a fast moving MH(Mobil Host) using multimedia application with a consistent QoS,an efficient call admission mechanism is in need. This paper proposes the 2SCA(2-Step Call Admission) scheme based on cal admission scheme using pripority to guarantee the consistent QoS for mobile multimedia applications. A calls of MH are classified new calls, hand-off calls, and QoS upgrading calls. The 2SCA is composed of the basic call admission and advanced call admission; the former determines the call admission based on bandwidth available in each cell and the latter determines the call admission by applying DTT(Delay Tolerance Time), PQeueu(Priority Queue), and UpQueue(Upgrade Queue) algorithm according to the type of each call blocked at the basic call admission stage. In order to evaluate the performance of our mechanism, we measure the metrics such as the dropping probability of new calls, dropping probability of hand-off calls, and bandwidth utilization. The result shows that the performance of our mechanism is superior to that of existing mechanisms such as CSP(Complete Sharing Policy), GCP(Guard Channel Policy) and AGCP(Adaptive Guard Channel Policy).

Voice Message System Supporting Massive Outbound Call (대량의 발신 호를 지원하는 음성 메시지 시스템)

  • Kim Jeonggon
    • MALSORI
    • /
    • no.49
    • /
    • pp.77-94
    • /
    • 2004
  • In this paper, new voice message system supporting massive outbound call is proposed. Basic idea of the proposed system is to pre-process all the text-to-speech conversion process, mixing of text and attached music file and to store the results of pre-process in the cache server which is connected to the IVR. New voice message system is optimized for the voice message system supporting massive outbound call by distributing the load of the web server caused by server-side script implementation which is accessing database and generating dynamic Voice XML document over client module and server module of web server. The proposed voice message system was test-deployed in one domestic voice message application service provider and it is shown that proposed voice message system reduced the response latency problem of test-bed voice message system.

  • PDF

Service Profile Replication Scheme with Local Anchor for Next Generation Personal Communication Networks

  • Jinkyung Hwang;Bae, Eun-Shil;Park, Myong-Soon
    • Journal of Communications and Networks
    • /
    • v.5 no.3
    • /
    • pp.215-221
    • /
    • 2003
  • It is expected that per-user customized services are widely used in next generation Personal Communication Network. To provide personalized services for each call, per-user service profiles are frequently referenced and signaling traffic is considerably large. Since the service calls are requested from the places where user stays, we can expect that the traffic is localized. In this paper, we propose a new service profile replication scheme, named Follow-Me Replication with local Anchor (FMRA). By replicating user's service profile in a user-specific location area, local anchor of each region, the signaling traffic for call and mobility can be distributed to local network. We compared the performance of the FMRA with two typical schemes: Intelligent Network-based !Central scheme and IMT-2000 based full replication scheme, as we refer it to Follow-Me Replication Unconditional (FMRU). Performance results indicate that FMRA lies between Central and FMRU schemes according to call to mobility ratio, and we identified the efficient ranges of CMR for FMRA depending on the various network parameters.

Context Driven Component Model Supporting Scalability of Context (상황정보의 확장성을 지원하는 상황정보 기반 컴포넌트 모델)

  • Yoon, Hoi-Jin;Choi, Byoung-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.1
    • /
    • pp.24-34
    • /
    • 2007
  • Since Context Driven Component model is based on the idea that a context-aware application consists of the components that are context sensitive and the components that do not depend on the context, it divides the context sensitive part into components according to which context information they are related to. The model supports the scalability of context information by building an application through composing Context Driven Components. Furthermore, it solves the embeddedness of context information inside the application logic. To show the contributions of the model, this paper applies it to Call-forwarding application, and analyses how the model supports the scalability and the embeddedness.

An Application Design for Emergency Medical System: A Software Engineering Approach

  • Choi, In-Lyeol;Huh, Jun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.728-730
    • /
    • 2017
  • The proposed application design for emergency medical system includes the functions that help securing the window of opportunity for the patients in an emergency situation and efficiently link rescue agency, emergency medical treatment center and patients together. First, the treatment time can be saved at the emergency room by understanding the patient's condition by entering his/her health information such as anamnesis, family history, social history and blood type together with an identification number. Also, if the siren function which signals whereabouts of patients to the rescue crew is used, it will be much easier to find the location of the patient in need. The design allows rescue crew to call the patient to check whether he/she is conscious or not. Just by receiving the call, he/she will be deemed conscious.

Comparing the application of social network service with existing method on the efficiency and velocity of spreading mobilization order -Based on the circumstance of Ulchi focus lens training of South Korean military- (기존의 예비군 동원 방식과 소셜네트워크를 응용한 새로운 동원 체계의 효율 및 확산 속도 비교연구 -을지 포커스 렌즈 훈련 상황 전제-)

  • Sung, Ki-Seok;Kang, Sung-Woo
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.3
    • /
    • pp.183-191
    • /
    • 2012
  • Since June 25th 1950, the beginning of the cold war (Korean war), Korean peninsula is still in a state of war. Officially South and North Korean government call a truceafter three years from the beginning day, however both countries are still having several combats in these days. So every Korean citizen male has duty for serving military duty and this lasts even after the serving regular military force, as reserved military. Although South Korea is very small country, the size of military is very large so informing all reserved military takes some time. Since this nation is confronting the enemy and considering the global potential threat, South Korean military needs expedite informing system to call up the reserved military to active duty. In this project, the current informing system has been analyzed and compared with the new method which is using social network service such as Twitter. However mobilization order is very critical. So in our new model there are two ways combined. Using twitter to inform and then use traditional ways to finish the order. This method will provide more efficient and accurate way to cover the call ups.

Design and Implementation of Context-aware Application on Smartphone Using Speech Recognizer

  • Kim, Kyuseok
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.49-59
    • /
    • 2020
  • As technologies have been developing, our lives are getting easier. Today we are surrounded by the new technologies such as AI and IoT. Moreover, the word, "smart" is a very broad one because we are trying to change our daily environment into smart one by using those technologies. For example, the traditional workplaces have changed into smart offices. Since the 3rd industrial revolution, we have used the touch interface to operate the machines. In the 4th industrial revolution, however, we are trying adding the speech recognition module to the machines to operate them by giving voice commands. Today many of the things are communicated with human by voice commands. Many of them are called AI things and they do tasks which users request and do tasks more than what users request. In the 4th industrial revolution, we use smartphones all the time every day from the morning to the night. For this reason, the privacy using phone is not guaranteed sometimes. For example, the caller's voice can be heard through the phone speaker when accepting a call. So, it is needed to protect privacy on smartphone and it should work automatically according to the user context. In this aspect, this paper proposes a method to adjust the voice volume for call to protect privacy on smartphone according to the user context.

A Study on Malware Clustering Technique Using API Call Sequence and Locality Sensitive Hashing (API 콜 시퀀스와 Locality Sensitive Hashing을 이용한 악성코드 클러스터링 기법에 관한 연구)

  • Goh, Dong Woo;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.91-101
    • /
    • 2017
  • API call sequence analysis is a kind of analysis using API call information extracted in target program. Compared to other techniques, this is advantageous as it can characterize the behavior of the target. However, existing API call sequence analysis has an issue of identifying same characteristics to different function during the analysis. To resolve the identification issue and improve performance of analysis, this study includes the method of API abstraction technique in addition to existing analysis. From there on, similarity between target programs is computed and clustered into similar types by applying LSH to abstracted API call sequence from analyzed target. Thus, this study can attribute in improving the accuracy of the malware analysis based on discovered information on the types of malware identified.