• Title/Summary/Keyword: Reverse Engineering Technique

Search Result 210, Processing Time 0.028 seconds

A Technique for Protecting Android Applications using Executable Code Encryption and Integrity Verification (실행코드 암호화 및 무결성 검증을 적용한 안드로이드앱 보호 기법)

  • Shim, HyungJoon;Cho, Sangwook;Jeong, Younsik;Lee, Chanhee;Han, Sangchul;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.10 no.1
    • /
    • pp.19-26
    • /
    • 2014
  • In this paper, we propose a method for protecting Android applications against reverse engineering attacks. In this method, the server encrypts the original executable code (DEX) included in an APK file, inserts into the APK file a stub code that decrypts the encrypted DEX later at run-time, and distributes the modified APK file. The stub code includes an integrity validation code to detect attacks on itself. When a user installs and executes the APK file, the stub code verifies the integrity of itself, decrypts the encrypted DEX, and loads it dynamically to execute. Since the original DEX is distributed as an encrypted one, we can effectively protect the intellectual property. Further, by verifying the integrity of the stub code, we can prevent malicious users from bypassing our method. We applied the method to 15 Android apps, and evaluated its effectiveness. We confirmed that 13 out of them operates normally.

Computational Chemistry Study on Gas Hydrate Formation Using HFC & HCFC Refrigerants (R-134a, R-227ea, R-236fa, R-141b) (수소불화탄소 및 수소염화불화탄소 냉매(R-134a, R-227ea, R-236fa, R-141b)를 이용한 가스 하이드레이트 형성에 관한 계산화학적 해석)

  • Kim, Kyung Min;An, Hye Young;Lim, Jun-Heok;Lee, Jea-Keun;Won, Yong Sun
    • Korean Chemical Engineering Research
    • /
    • v.55 no.5
    • /
    • pp.704-710
    • /
    • 2017
  • Although the desalination technique using gas hydrate formation is at a development stage compared to the commercially well-established reverse osmosis (RO), it still draws attention because of its simplicity and moderate operational conditions especially when using refrigerants for guest gases. In this study, DFT (density functional theory)-based molecular modeling was employed to explain the energetics of the gas hydrate formation using HFC (hydrofluorocarbon) and HCFC (hydrochlorofluorocarbon) refrigerants. For guest gases, R-134a, R-227ea, R-236fa, and R-141b were selected and three cavity structures ($5^{12}$, $5^{12}6^2$, and $5^{12}6^4$) composed of water molecules were constructed. The geometries of guest gas, cavity, and cavity encapsulating guest gas were optimized by molecular modeling respectively and their located energies were then used for the calculation of binding energy between the guest gas and cavity. Finally, the comparison of binding energies was used to propose which refrigerant is more favorable for the gas hydrate formation energetically. In conclusion, R-236fa was the best choice in terms of thermodynamic spontaneity, less toxicity, and low solubility in water.

A Study on the Accelerated Life Test of BLDC Motor in Ceiling Mounted Digital Signage Rotating System (천정 거치형 디지털 사이니지 회전 시스템의 BLDC모터 가속수명시험에 관한 연구)

  • Kim, Ki-Hong;Kwon, Soon-Hong;Kwon, Soon-Gu;Park, Jong-Min;Kim, Jong-Soon;Jung, Sung-Won;Choi, Won-Sik
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.21 no.3
    • /
    • pp.141-147
    • /
    • 2018
  • In a time when product development cycles are getting shorter and shorter, many companies are making efforts to develop products with high reliability in a short period of time, accelerated life test is widely used as a method to quickly evaluate reliability. Accelerated life test reduces the test life or the life of the product from the observed data by shortening the lifetime of the product or abruptly lowering the performance under the worse condition than the actual condition in order to shorten the test cost or the test time. In this paper, BL3640A-06P+RB35, DC12V model, which is used in the support device of an automatic rotation type digital signage, which display various information such as textures and images on a display screen in a public place or a commercial space, BLDC motors were subjected to a constant stress test and at the rotational speed of 1rpm, $180^{\circ}$ rotation and reverse rotation under actual use conditions, the stress was imposed on the rotating speed of 2rpm and the weight of the actual installed product from 22.2kgf to 10kgf were installed. The lifetime of the actual use environment condition is 23,545 hours and the rotation speed is accelerated. The life time of the acceleration condition with the additional weight is 1,380 hours. The acceleration factor is calculated as 17.06, the one year guarantee test day is 235 days to 14 days, of the period from 470 days to 28 days, and the third year from 704 days to 42 days. The test date of the BLDC motor was tested on the shortened test date, and the rotational speed and the current value were measured. It is found that there is no defect even if it operates as the test date corresponding to the specified one year warranty period and the 3 year accelerated life test which is experimented. Using the statistical technique of the regression analysis the expected time for the motor to defect to #4 samples was 20 years.

Fabrication and Characteristics of a Varactor Diode for UHF TV Tuner Operated within Low Tuning Voltage (저전압 UHF TV 튜너용 바렉터 다이오드의 제작 및 특성)

  • Kim, Hyun-Sik;Moon, Young-Soon;Son, Won-Ho;Choi, Sie-Young
    • Journal of Sensor Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.185-191
    • /
    • 2014
  • The width of depletion region in a varactor diode can be modulated by varying a reverse bias voltage. Thus, the preferred characteristics of depletion capacitance can obtained by the change in the width of depletion region so that it can select only the desirable frequencies. In this paper, the TV tuner varactor diode fabricated by hyper-abrupt profile control technique is presented. This diode can be operated within 3.3 V of driving voltage with capability of UHF band tuning. To form the hyperabrupt profile, firstly, p+ high concentration shallow junction with $0.2{\mu}m$ of junction depth and $1E+20ions/cm^3$ of surface concentration was formed using $BF_2$ implantation source. Simulation results optimized important factors such as epitaxial thickness and dose quality, diffusion time of n+ layer. To form steep hyper-abrupt profile, Formed n+ profile implanted the $PH_3$ source at Si(100) n-type epitaxial layer that has resistivity of $1.4{\Omega}cm$ and thickness of $2.4{\mu}m$ using p+ high concentration Shallow junction. Aluminum containing to 1% of Si was used as a electrode metal. Area of electrode was $30,200{\mu}m^2$. The C-V and Q-V electric characteristics were investigated by using impedance Analyzer (HP4291B). By controlling of concentration profile by n+ dosage at p+ high concentration shallow junction, the device with maximum $L_F$ at -1.5 V and 21.5~3.47 pF at 0.3~3.3 V was fabricated. We got the appropriate device in driving voltage 3.3 V having hyper-abrupt junction that profile order (m factor) is about -3/2. The deviation of capacitance by hyper-abrupt junction with C0.3 V of initial capacitance is due to the deviation of thermal process, ion implantation and diffusion. The deviation of initial capacitance at 0.3 V can be reduced by control of thermal process tolerance using RTP on wafer.

Extraction of Important Areas Using Feature Feedback Based on PCA (PCA 기반 특징 되먹임을 이용한 중요 영역 추출)

  • Lee, Seung-Hyeon;Kim, Do-Yun;Choi, Sang-Il;Jeong, Gu-Min
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.461-469
    • /
    • 2020
  • In this paper, we propose a PCA-based feature feedback method for extracting important areas of handwritten numeric data sets and face data sets. A PCA-based feature feedback method is proposed by extending the previous LDA-based feature feedback method. In the proposed method, the data is reduced to important feature dimensions by applying the PCA technique, one of the dimension reduction machine learning algorithms. Through the weights derived during the dimensional reduction process, the important points of data in each reduced dimensional axis are identified. Each dimension axis has a different weight in the total data according to the size of the eigenvalue of the axis. Accordingly, a weight proportional to the size of the eigenvalues of each dimension axis is given, and an operation process is performed to add important points of data in each dimension axis. The critical area of the data is calculated by applying a threshold to the data obtained through the calculation process. After that, induces reverse mapping to the original data in the important area of the derived data, and selects the important area in the original data space. The results of the experiment on the MNIST dataset are checked, and the effectiveness and possibility of the pattern recognition method based on PCA-based feature feedback are verified by comparing the results with the existing LDA-based feature feedback method.

Android App Birthmarking Technique Resilient to Code Obfuscation (난독화에 강인한 안드로이드 앱 버스마킹 기법)

  • Kim, Dongjin;Cho, Seong-Je;Chung, Youngki;Woo, Jinwoon;Ko, Jeonguk;Yang, Soo-Mi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.700-708
    • /
    • 2015
  • A software birthmark is the set of characteristics of a program which can be used to identify the program. Many researchers have studied on detecting theft of java programs using some birthmarks. In case of Android apps, code obfuscation techniques are used to protect the apps against reverse-engineering and tampering. However, attackers can also use the obfuscation techniques in order to conceal a stolen program. A birthmark (feature) of an app can be alterable by code obfuscations. Therefore, it is necessary to detect Android app theft based on the birthmark which is resilient to code obfuscation. In this paper, we propose an effective Android app birthmark and app theft detection through the proposed birthmark. By analyzing some obfuscation tools, we have first selected parameter and the return types of methods as an adequate birthmark. Then, we have measured similarity of target apps using the birthmarks extracted from the apps, where some target apps are not obfuscated and the others obfuscated. The measurement results show that our proposed birthmark is effective for detecting Android app theft even though the apps are obfuscated.

A Study on the 3D Precise Modeling of Old Structures Using Merged Point Cloud from Drone Images and LiDAR Scanning Data (드론 화상 및 LiDAR 스캐닝의 정합처리 자료를 활용한 노후 구조물 3차원 정밀 모델링에 관한 연구)

  • Chan-hwi, Shin;Gyeong-jo, Min;Gyeong-Gyu, Kim;PuReun, Jeon;Hoon, Park;Sang-Ho, Cho
    • Explosives and Blasting
    • /
    • v.40 no.4
    • /
    • pp.15-26
    • /
    • 2022
  • With the recent increase in old and dangerous buildings, the demand for technology in the field of structure demolition is rapidly increasing. In particular, in the case of structures with severe deformation of damage, there is a risk of deterioration in stability and disaster due to changes in the load distribution characteristics in the structure, so rapid structure demolition technology that can be efficiently dismantled in a short period of time is drawing attention. However, structural deformation such as unauthorized extension or illegal remodeling occurs frequently in many old structures, which is not reflected in structural information such as building drawings, and acts as an obstacle in the demolition design process. In this study, as an effective way to overcome the discrepancy between the structural information of old structures and the actual structure, access to actual structures through 3D modeling was considered. 3D point cloud data inside and outside the building were obtained through LiDAR and drone photography for buildings scheduled to be blasting demolition, and precision matching between the two spatial data groups was performed using an open-source based spatial information construction system. The 3D structure model was completed by importing point cloud data matched with 3D modeling software to create structural drawings for each layer and forming each member along the structure slab, pillar, beam, and ceiling boundary. In addition, the modeling technique proposed in this study was verified by comparing it with the actual measurement value for selected structure member.

Improved Original Entry Point Detection Method Based on PinDemonium (PinDemonium 기반 Original Entry Point 탐지 방법 개선)

  • Kim, Gyeong Min;Park, Yong Su
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.6
    • /
    • pp.155-164
    • /
    • 2018
  • Many malicious programs have been compressed or encrypted using various commercial packers to prevent reverse engineering, So malicious code analysts must decompress or decrypt them first. The OEP (Original Entry Point) is the address of the first instruction executed after returning the encrypted or compressed executable file back to the original binary state. Several unpackers, including PinDemonium, execute the packed file and keep tracks of the addresses until the OEP appears and find the OEP among the addresses. However, instead of finding exact one OEP, unpackers provide a relatively large set of OEP candidates and sometimes OEP is missing among candidates. In other words, existing unpackers have difficulty in finding the correct OEP. We have developed new tool which provides fewer OEP candidate sets by adding two methods based on the property of the OEP. In this paper, we propose two methods to provide fewer OEP candidate sets by using the property that the function call sequence and parameters are same between packed program and original program. First way is based on a function call. Programs written in the C/C++ language are compiled to translate languages into binary code. Compiler-specific system functions are added to the compiled program. After examining these functions, we have added a method that we suggest to PinDemonium to detect the unpacking work by matching the patterns of system functions that are called in packed programs and unpacked programs. Second way is based on parameters. The parameters include not only the user-entered inputs, but also the system inputs. We have added a method that we suggest to PinDemonium to find the OEP using the system parameters of a particular function in stack memory. OEP detection experiments were performed on sample programs packed by 16 commercial packers. We can reduce the OEP candidate by more than 40% on average compared to PinDemonium except 2 commercial packers which are can not be executed due to the anti-debugging technique.

Prestack Depth Migration for Gas Hydrate Seismic Data of the East Sea (동해 가스 하이드레이트 탄성파자료의 중합전 심도 구조보정)

  • Jang, Seong-Hyung;Suh, Sang-Yong;Go, Gin-Seok
    • Economic and Environmental Geology
    • /
    • v.39 no.6 s.181
    • /
    • pp.711-717
    • /
    • 2006
  • In order to study gas hydrate, potential future energy resources, Korea Institute of Geoscience and Mineral Resources has conducted seismic reflection survey in the East Sea since 1997. one of evidence for presence of gas hydrate in seismic reflection data is a bottom simulating reflector (BSR). The BSR occurs at the interface between overlaying higher velocity, hydrate-bearing sediment and underlying lower velocity, free gas-bearing sediment. That is often characterized by large reflection coefficient and reflection polarity reverse to that of seafloor reflection. In order to apply depth migration to seismic reflection data. we need high performance computers and a parallelizing technique because of huge data volume and computation. Phase shift plus interpolation (PSPI) is a useful method for migration due to less computing time and computational efficiency. PSPI is intrinsically parallelizing characteristic in the frequency domain. We conducted conventional data processing for the gas hydrate data of the Ease Sea and then applied prestack depth migration using message-passing-interface PSPI (MPI_PSPI) that was parallelized by MPI local-area-multi-computer (MPI_LAM). Velocity model was made using the stack velocities after we had picked horizons on the stack image with in-house processing tool, Geobit. We could find the BSRs on the migrated stack section were about at SP 3555-4162 and two way travel time around 2,950 ms in time domain. In depth domain such BSRs appear at 6-17 km distance and 2.1 km depth from the seafloor. Since energy concentrated subsurface was well imaged we have to choose acquisition parameters suited for transmitting seismic energy to target area.

A Study on the 3D Measurement Data Application: The Detailed Restoration Modeling of Mireuksajiseoktap (미륵사지석탑 정밀복원모형 제작을 중심으로 한 3차원 실측데이터의 활용 연구)

  • Moon, Seang Hyen
    • Korean Journal of Heritage: History & Science
    • /
    • v.44 no.2
    • /
    • pp.76-95
    • /
    • 2011
  • After dismantled, Mireuksajiseoktap(Stone pagoda of Mireuksa Templesite) is being in the stage of restoration design. Now, different ways - producing restoration model, a 3 dimension simulation - have been requested to make more detailed and clearer restoration design prior to confirmation of its restoration design and actual restoration carry-out. This thesis proposes the way to build the detailed model for better restoration plan using extensively-used Reverse Engineering technique and Rapid Prototyping. It also introduces each stage such as a 3-dimension actual measurement, building database, a 3-dimension simulation etc., to build a desirable model. On the top of that, this thesis reveals that after dismantled, MIruksaji stone pagoda's interior and exterior were not constructed into pieces but wholeness, so that its looks can be grasped in more virtually and clearly. Secondly, this thesis makes a 3-dimension study on the 2-dimension design possible by acquiring basic materials about a 3-dimension design. Thirdly, the individual feature of each member like the change of member location can be comprehended, considering comparing analysis and joint condition of member. Lastly, in the structural perspective this thesis can be used as reference materials for structure reinforcement design by grasping destructed aspects of stone pagoda and weak points of the structure. In dismantlement-repair and restoration work of cultural properties that require delicate attention and exactness, there may be evitable errors on time and space in building reinforcement and restoration design based on a 2-dimension plan. Especially, the more complicate and bigger the subject is, the more difficult an analysis about the status quo and its delicate design are. A series of pre-review, based on the 3-dimension data according to actual measurement, can be one of the effective way to minimize the possibility that errors about time - space happen by building more delicate plan and resolving difficulties.