• Title/Summary/Keyword: Database Reverse Engineering

Search Result 28, Processing Time 0.024 seconds

Instagram Users Behavior Analysis in a Digital Forensic Perspective (디지털 포렌식 관점에서의 인스타그램 사용자 행위 분석)

  • Seo, Seunghee;Kim, Yeog;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.407-416
    • /
    • 2018
  • Instagram is a Social Network Service(SNS) that has recently become popular among people of all ages and it makes people to construct social relations and share hobbies, daily routines, and useful information. However, since the uploaded information can be accessed by arbitrary users and it is easily shared with others, frauds, stalking, misrepresentation, impersonation, an infringement of copyright and malware distribution are reported. For this reason, it is necessary to analyze Instagram from a view of digital forensics but the research involved is very insufficient. So in this paper, We performed reverse engineering and dynamic analysis of Instagram from a view of digital forensics in the Android environment. As a result, we checked three database files that contain user behavior analysis data such as chat content, chat targets, posted photos, and cookie information. And we found the path to save 4 files and the xml file to save various data. Also we propose ways to use the above results in digital forensics.

A Study on the Design of Door Module PNL Using CAE and Inverse Compensation for Warpage (휨방지를 위한 CAE와 역보정을 이용한 Door Module PNL설계에 관한 연구)

  • Kim, Doo-Tae;Han, Seong-Ryeol
    • Design & Manufacturing
    • /
    • v.12 no.2
    • /
    • pp.27-33
    • /
    • 2018
  • Korea's automobile industry, which has grown rapidly to become the world's fifth-largest automobile producer, To cope with environmental pollution and energy problems in order to prevail competitive edge in global market We are investing a lot of research personnel and costs. Among them, for realizing alternative light weight It is a part of the automobile module system that has achieved the technological development before the breakthrough in the injection molding process in the press process. Door module PNL was the subject of research. The door module PNL is expected to cause warpage before the mold production due to the thin and flat product characteristics and fiber orientation characteristic of the material. In this paper, CAE analysis and reverse correction tool Design. CAE analysis to obtain the results of weld line position, bending position and deformation value Through the correction tool, think3, the original product was modified before the mold production to improve the completeness of the parts. In fiber orientation, the position and size of the cooling channel in the mold, the position and size of the gate, Temperature, pressure, time, and work environment. Compared with the result of CAE analysis, the product that was reverse-corrected by Think3 was manufactured, and injection molding was performed. Injection molding products were tested 24 hours later. 3.5 mm to 7.0 mm, and under the fixed condition, the deviation was from 1.1 mm to 1.5 mm. Unlike the CAE analysis, the deviation of the actual injection pressure and the cooling temperature, the fiber orientation of the material, In order to solve this problem, it is necessary to compare the injection conditions with the database, I knew I had to catch the standard.

Determinants of Re-Subscription Period of Early Termination Subscribers of Reverse Mortgage (주택연금 중도해지자의 재가입 소요기간 결정요인 분석)

  • Ryou, Ki Yun;Choi, Yeol
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.6
    • /
    • pp.869-877
    • /
    • 2022
  • This study aims to analyze the factors affecting the re-subscription period upon initial termination of the reverse mortgage subscription. The study utilized the Korea Housing Finance Corporation's database to extract the information regarding re-subscribers of the reverse mortgage from July 2007 to June 2021. The ordered logit model was employed and found that a set of user (subscriber) characteristics are influential towards the re-subscription period. Among the individual characteristics, changes in age group, marital status from married to single-living, maintaining single-living, and the initial subscription period were found statistically significant, highlighting that the increase in the initial subscription period decreased the re-subscription period. Among the housing (home equity) characteristics, changes in housing price and ownership type (single and partial ownership) were statistically significant, indicating that the change in ownership type decreases the re-subscription period. Lastly, the variables related to loan terms were found significant, revealing that changes in payout method and schedule were both increasing factors of the re-subscription period. Based on the findings, necessary policy implications can be considered to secure the returning subscribers of the reverse mortgage effectively.

분쟁사례를 통해 본 DC 법률문제 4

  • Son, Seung-U
    • Digital Contents
    • /
    • no.4 s.143
    • /
    • pp.108-111
    • /
    • 2005
  • 이 세상에 완전히 새로운 창작물이 있을까? 현존하는 대부분의 창작물은 그 이전의 창작물을 학습하고 분석해서 그 토대 위에 보다 발전적으로 또는 개성 있게 표현한 것들이다. 지난 호에서 설명한 바와 같이, 저작권법은 특허법과 달리 창작성이 있는 표현(expression)을 보호하고 아이디어(idea) 자체는 보호하지 않는다. 그 이유로서, Idea는 창작이라는 빌딩을 지을 때 가장 기초가 되는 벽돌(building blocks)의 역할을 하는 것으로 그 도구를 특정인의 독점하에 두지 않고 만인(public)이 자유롭게 이용함으로써 문화, 예술 및 과학의 발전을 도모할 수 있기 때문이다. 영화나 음악과 같은 문학저작물과 달리 소프트웨어나 게임은 기능성이 강한 저작물로서, 개발자가 소스코드(source code)를 공개하지 않으면 그것의 구조나 운용원리 및 아이디어를 쉽게 이해할 수 없다. 이러한 비공개 소프트웨어의 기능적 구성요소를 이해하기 위해 산업계에서는 역분석(reverse engineering)이란 공정을 활용해 오고 있다. 그런데 아이디어를 얻기 위해 수행된 프로그램역분석 과정은 필연적으로 원프로그램(original program)의 복제를 수반 하게 되므로 그것의 저작권 침해여부가 미국과 유럽 등을 중심으로 뜨겁게 논의돼 왔다. 이에 SW 역분석이 무엇인지 그리고 역분석 을 하면 타인의 저작권을 침해하게 되는 것인지 여부를 소니 플레이스테이션 사건을 중심으로 검토해 봤다. 또한 역분석은 영업비밀을 밝혀내는데 중요한 수단으로서도 사용될 수 있는데, 그것의 법률관계도 함께 살펴봤다.

  • PDF

Metaproteomic analysis of harmful algal bloom in the Daechung reservoir, Korea

  • Choi, Jong-Soon;Park, Yun Hwan;Kim, Soo Hyeon;Park, Ju Seong;Choi, Yoon-E
    • Korean Journal of Environmental Biology
    • /
    • v.38 no.3
    • /
    • pp.424-432
    • /
    • 2020
  • The present study aimed to analyze the metaproteome of the microbial community comprising harmful algal bloom (HAB) in the Daechung reservoir, Korea. HAB samples located at GPS coordinates of 36°29'N latitude and 127°28'E longitude were harvested in October 2013. Microscopic observation of the HAB samples revealed red signals that were presumably caused by the autofluorescence of chlorophyll and phycocyanin in viable cyanobacteria. Metaproteomic analysis was performed by a gelbased shotgun proteomic method. Protein identification was conducted through a two-step analysis including a forward search strategy (FSS) (random search with the National Center for Biotechnology Information (NCBI), Cyanobase, and Phytozome), and a subsequent reverse search strategy (RSS) (additional Cyanobase search with a decoy database). The total number of proteins identified by the two-step analysis (FSS and RSS) was 1.8-fold higher than that by one-step analysis (FSS only). A total of 194 proteins were assigned to 12 cyanobacterial species (99 mol%) and one green algae species (1 mol%). Among the species identified, the toxic microcystin-producing Microcystis aeruginosa NIES-843 (62.3%) species was the most dominant. The largest functional category was proteins belonging to the energy category (39%), followed by metabolism (15%), and translation (12%). This study will be a good reference for monitoring ecological variations at the meta-protein level of aquatic microalgae for understanding HAB.

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF

A Study on Muffler′s Transmission Loss and Backpressure Property (소음기의 투과손실 및 배압특성에 관한 연구)

  • 정경훈;황원걸;이유엽;김기세
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2001.11b
    • /
    • pp.676-681
    • /
    • 2001
  • We usually divide the noise of exhaust system into pulsation noise and flow noise. Pulsation noise is the shock wave to occur when the burning gas of low pressure emits and include harmonic having basic frequency as the exhaust cycle of engine. Flow noise is the noise that is produced when gas flow emits into the atmosphere through the pipe and has the character of frequency like pink noise which has the high level of high frequency component. A muffler is divided into reflective type and absorptive type. We usually use the muffler compounding the property of them. In this study, it is the case of transfer matrix method that a muffler is compounded to analyze the elements of each section according to sound wave's proceed direction. But we use simple model. So, we use finite element method that takes short time to analyze. Acoustic analysis gives us transfer matrix to use FEA of SYSNOISE and we use STAR-CD for fluid analysis. We made database that is based on analytical results about the muffler of expansion type, extended type, offset type, reverse type, and perforated type and developed the muffler design system to perform work efficiently.

  • PDF

Study on MalangMalang Talkafe Database Encryption Process and Recovering Its Deleted Messages on Windows (윈도우에서의 말랑말랑 톡카페 데이터베이스 암호화 프로세스 분석 및 삭제된 메시지 복구 연구)

  • Youn, Byungchul;Kim, Soram;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.397-403
    • /
    • 2020
  • With the convenience of real-time conversation, multimedia file and contact sharing services, most people use instant messenger, and its usage time is increasing. Because the messengers contain a lot of user behavior information data, in the digital forensic investigation, they can be very useful evidence to identify user behavior. However, some of useful data can be difficult to acquire or recognize because they are encrypted or deleted. Thus, in order to use the messenger data as evidence, the study of message decryption process and message recovery is essential. In this paper, we analyze the database encryption process of the instant messenger, MalangMalang Talkafe, and propose the method to decrypt it. In addition, we propose the methods to identify the deleted messages and recover from the volatile memory area.

Optimizing Urban Construction and Demolition Waste Management System Based on 4D-GIS and Internet Plus

  • Wang, Huiyue;Zhang, Tingning;Duan, Huabo;Zheng, Lina;Wang, Xiaohua;Wang, Jiayuan
    • International conference on construction engineering and project management
    • /
    • 2017.10a
    • /
    • pp.321-327
    • /
    • 2017
  • China is experiencing the urbanization at an unprecedented speed and scale in human history. The continuing growth of China's big cities, both in city land and population, has already led to great challenges in China's urban planning and construction activities, such as the continuous increase of construction and demolition (C&D) waste. Therefore, how to characterize cities' construction activities, particularly dynamically quantify the flows of building materials and construction debris, has become a pressing problem to alleviate the current shortage of resources and realize urban sustainable development. Accordingly, this study is designed to employ 4D-GIS (four dimensions-Geographic Information System) and Internet Plus to offer new approach for accurate but dynamic C&D waste management. The present study established a spatio-temporal pattern and material metabolism evolution model to characterize the geo-distribution of C&D waste by combing material flow analysis (MFA) and 4D-GIS. In addition, this study developed a mobile application (APP) for C&D waste trading and information management, which could be more effective for stakeholders to obtain useful information. Moreover, a cloud database was built in the APP to disclose the flows of C&D waste by the monitoring information from vehicles at regional level. To summarize, these findings could provide basic data and management methods for the supply and reverse supply of building materials. Meanwhile, the methodologies are practical to C&D waste management and beyond.

  • PDF

Implementation of Data Monitoring and Acquisition System for Real-time Rotating Machinery based on oneM2M (oneM2M 표준 기반 실시간 회전기기 센싱 데이터 수집 및 모니터링 시스템 구현)

  • Lee, Young-Dong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.1
    • /
    • pp.57-62
    • /
    • 2019
  • In this paper, oneM2M based data monitoring and acquisition system is designed and implemented to measure and transmit the voltage, current, temperature, acceleration and vibration of the motor. The proposed system can detect electrical faults (overcurrent, reverse phase, phase loss, ground fault) and mechanical faults (MC counter, motor operation time, bearing and winding temperature, motor speed, insulation resistance). The system consists of sensor data collection, web server, php, database, wired/wireless communication system. The insulation resistance and the motor speed were measured, and the experimental results were similar for both the test resistance value and the reference input value.