• Title/Summary/Keyword: Information code

Search Result 6,012, Processing Time 0.035 seconds

A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments

  • Choi, Seul-Ki;Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1611-1625
    • /
    • 2019
  • The emergence of new technologies and devices brings a new environment in the field of cyber security. It is not easy to predict possible security threats about new environment every time without special criteria. In other words, most malicious codes often reuse malicious code that has occurred in the past, such as bypassing detection from anti-virus or including additional functions. Therefore, we are predicting the security threats that can arise in a new environment based on the history of repeated malicious code. In this paper, we classify and define not only the internal information obtained from malicious code analysis but also the features that occur during infection and attack. We propose a method to predict and manage security threats in new environment by continuously managing and extending.

QR code-based Mobile Web Platform for Viewing detailed Product Information (상품 정보 열람을 위한 QR 코드 기반의 모바일 웹 플랫폼)

  • Kim, Bong-Han
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.143-148
    • /
    • 2012
  • QR Code is available in many areas(business cards, coupons, advertising, billing, etc) due to the increase in the smart phones. In particular, the company's image and marketing are also available and using the Internet address, personal and corporate PR and publicity are also available. I was implemented the mobile web platform by the case wine information that easily seen but difficult to understand the information. Using QR Code, consumers can get information easily and quickly. In addition, based on the idea of using mobile web platform, variety of services and benefits will be able to expected.

JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking

  • Kim, Hyoung-Chun;Choi, Young-Han;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.766-783
    • /
    • 2012
  • Recently, many malicious users have attacked web browsers using JavaScript code that can execute dynamic actions within the browsers. By forcing the browser to execute malicious JavaScript code, the attackers can steal personal information stored in the system, allow malware program downloads in the client's system, and so on. In order to reduce damage, malicious web pages must be located prior to general users accessing the infected pages. In this paper, a novel framework (JsSandbox) that can monitor and analyze the behavior of malicious JavaScript code using internal function hooking (IFH) is proposed. IFH is defined as the hooking of all functions in the modules using the debug information and extracting the parameter values. The use of IFH enables the monitoring of functions that API hooking cannot. JsSandbox was implemented based on a debugger engine, and some features were applied to detect and analyze malicious JavaScript code: detection of obfuscation, deobfuscation of the obfuscated string, detection of URLs related to redirection, and detection of exploit codes. Then, the proposed framework was analyzed for specific features, and the results demonstrate that JsSandbox can be applied to the analysis of the behavior of malicious web pages.

Challenge-Response Authentication with a Smartphone (스마트폰을 이용한 Challenge-Response 인증)

  • Thiranant, Non;Hui, Yvonne Tan Ying;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.187-190
    • /
    • 2012
  • This paper proposes an one-time authentication system for web applications by making use of the quick-response code, which is widely used nowadays. The process is not time-consuming. It does not require any browser extensions or specific hardware to complete a task. The system uses QR code which is basically a two-dimensional black and white image encoding a piece of digital information. When a user logs into a site, the web server will generate a challenge encoded to form a QR code. The user captures a picture of QR code with a mobile camera which results in decoding the QR code. The challenge shall be sent back to the server; the web server then logs the PC browser in. The authentication using Challenge-Response is easy to understand and the process is fast. The system proposes the improvement of usability and security of online authentication.

  • PDF

On Estimation of Redundancy Information Transmission based on Systematic Erasure code for Realtime Packet Transmission in Bursty Packet Loss Environments. (연속 패킷 손실 환경에서 실시간 패킷 전송을 위한 systematic erasure code의 부가 전송량 추정 방법)

  • 육성원;강민규;김두현;신병철;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10B
    • /
    • pp.1824-1831
    • /
    • 1999
  • In this paper, the data recovery performance of systematic erasure codes in burst loss environments is analyzed and the estimation method of redundant data according to loss characteristics is suggested. The burstness of packet loss is modeled by Gilbert model, and the performance of proposed packet loss recovery method in the case of using systematic erasure code is analyzed based on previous study on the loss recovery in the case of using erasure code. The required redundancy data fitting method for systematic erasure code in the condition of given loss property is suggested in the consideration of packet loss characteristics such as average packet loss rate and average loss length.

  • PDF

Interference Suppression Based on Code Grouping and Groupwise Decorrelation in W-CDMA Downlink (코드그룹화와 그룹단위 역상관을 이용한 W-CDMA 하향링크에서의 다중사용자 간섭억압기법)

  • Ha, Won;Bae, Jung-Hwa;Lim, Byun-Chun;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6A
    • /
    • pp.631-639
    • /
    • 2004
  • In this paper, we presented a new interference suppression method based on code grouping and groupwise decorrelation for multirate DS-CDMA downlink. The code grouping is accomplished according to the correlation property between the mother code and the child codes in OVSF code tree. Using groupwise decorrelation, the proposed receiver has relatively low computational complexity and does not require any information about interference users, such as code, data, and amplitude. From the simulation results in multipath channels, the proposed receiver is to provide significant performance enhancement.

The Robust Derivative Code for Object Recognition

  • Wang, Hainan;Zhang, Baochang;Zheng, Hong;Cao, Yao;Guo, Zhenhua;Qian, Chengshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.272-287
    • /
    • 2017
  • This paper proposes new methods, named Derivative Code (DerivativeCode) and Derivative Code Pattern (DCP), for object recognition. The discriminative derivative code is used to capture the local relationship in the input image by concatenating binary results of the mathematical derivative value. Gabor based DerivativeCode is directly used to solve the palmprint recognition problem, which achieves a much better performance than the state-of-art results on the PolyU palmprint database. A new local pattern method, named Derivative Code Pattern (DCP), is further introduced to calculate the local pattern feature based on Dervativecode for object recognition. Similar to local binary pattern (LBP), DCP can be further combined with Gabor features and modeled by spatial histogram. To evaluate the performance of DCP and Gabor-DCP, we test them on the FERET and PolyU infrared face databases, and experimental results show that the proposed method achieves a better result than LBP and some state-of-the-arts.

A Study of QR-Code Security Method for Smart Phone (스마트폰에서의 QR-Code 보안기법에 대한 연구)

  • Byeon, Jin-Young;Ahn, Yo-Han;Lee, Jae-Woong;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.699-700
    • /
    • 2011
  • This paper shows the way to prevent the leaking of private information due to malicious codes or connections of invalid URL in QR-Codes, which is used in the present smart-phone. It is difficult to filter out the connections directly with decoding the QR-Codes, so before connecting, we construct servers which compare results of decoding the QR-Codes to a valid URL. The server notifies warning to Smart-phone users if the results were uncertain URLs which did not registered in the server. This paper would help the Smart-phone users to protect their privacy.

  • PDF

An Exploratory Study of QR Code Utilization for Retailers' Multichannel Strategy (소매업체의 멀티채널 전략을 위한 QR코드 활용의 탐색적 연구)

  • Yoon, Namhee;Kim, Eun Young
    • Fashion & Textile Research Journal
    • /
    • v.16 no.5
    • /
    • pp.730-744
    • /
    • 2014
  • With advances in QR code, mobile is becoming one of important channels in the fashion retail industries. This study attempts to understand the importance of QR code utilization in creating multi-channel business model. Study objectives are to classify types of multi-channel retailing by QR code utilization and to explore the role of QR code technology in strategic marketing elements for types of multichannel retailer. As an exploratory approach, a total of 78 news articles regarding QR code issues were reviewed and analyzed by focusing on 48retailers seleted in this study. The results found seven dimensions of QR code marketing strategies: abundant product information, additional information contents, transaction accessibility, connectedness to channels, location based service, loyalty program and multimedia advertising. Based a combination of channels and level of mobile apps' activation, multichannel retailers utilizing QR code technology were classified into four types; bricks-click-active mobile model, bricks-click-inactive mobile model, bricks-click model, and click-active mobile model. There were differences of using QR code marketing strategies among multichannel models. According to results, for bricks-and-mortar retailers, QR code was critical to integrate shopping experience with merchandise or sales promotions across channels. In addition, for non-store retailers, the QR code utilization was successful in expanding mobile channels, which can promote retail sales by a two-way interaction with customers via the mobile apps.

Smart-phone Malicious Code Countermeasure System (스마트폰 악성코드 대응 시스템)

  • Song, Jong-Gun;Lee, HoonJae;Kim, TaeYong;Jang, WonTae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.223-226
    • /
    • 2013
  • Information security breaches caused by malicious code is arising in various forms with exponential growth. The latest information security threats on computers are increasing, especially on smartphone, which has enabled malicious code to quickly surge. As a result, the leakage of personal information, such as billing information, is under threat. Meanwhile the attack vector o smartphone malware is difficult to detect. In this paper, we propose a smartphone security system to respond to the spread of malicious code by iPhone and Android OS-based malware analysis.

  • PDF