• Title/Summary/Keyword: Tainting

Search Result 4, Processing Time 0.017 seconds

Tainting and Depuration in Fish by Petroleum Hydrocarbon (유류오염이 어체에 미치는 영향과 유성분 제거에 관한 연구)

  • 강석중;최병대
    • Journal of Aquaculture
    • /
    • v.10 no.2
    • /
    • pp.189-197
    • /
    • 1997
  • A series of short (8 hours) and long term (96 hours) exposure studies was conducted on a laboratory scale to evaluation (1) the threshold concentrations of petroleum hydrocarbon in seawater which can lead to tainting problems in yellow tail (Seriola quinqueradiata) and (2) the time to recover (depuration period) once the tainting has occurred. The water-soluble fraction (WSF) of crude oil was prepared by stirring the oil with cold seawater. The main component of the WSF were low-boiling aromatics, although these were only al small proportion of the starting oil. From the sencory evaluation it was concluded that the threshold hydrocarbon levels in seawater which will impart a taint in yellow tail fillets within a 8-hour exposure period (short exposure period) are in the range of 0.4 to 1.0 ppm and within a 96-hour exposure period (long exposure period) are in the range of 0.2 to 0.5 ppm. Depuration trials were carried out with WSF from crude oil. The fish were exposed for 48 hours to concentration of 2.5 ppm hydrocarbons. After 48-hour exposure period, the fish were allowed to depurate in fresh, uncontaminated seawater. Depuration time for these fish was 10 days. The taste panelists were able to detect the contaminated fillets very easily while the depurated fish could not be distiguished from the control.

  • PDF

A Study on Tainting Technique for leaking official certificates Malicious App Detection in Android (공인인증서 유출형 안드로이드 악성앱 탐지를 위한 Tainting 기법 활용 연구)

  • Yoon, Hanj Jae;Lee, Man Hee
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.27-35
    • /
    • 2018
  • The certificate is electronic information issued by an accredited certification body to certify an individual or to prevent forgery and alteration between communications. Certified certificates are stored in PCs and smart phones in the form of encrypted files and are used to prove individuals when using Internet banking and smart banking services. Among the rapidly growing Android-based malicious applications are malicious apps that leak personal information, especially certificates that exist in the form of files. This paper proposes a method for judging whether malicious codes leak certificates by using DroidBox, an Android-based dynamic analysis tool.

  • PDF

Migration of Styrene in Relation to Food-Packaging Materials

  • Seog, Eun -Ju;Lee, Jun-Ho;Rakesh K. Shingh
    • Preventive Nutrition and Food Science
    • /
    • v.4 no.2
    • /
    • pp.152-158
    • /
    • 1999
  • Polystyrene is frequently used for food packaging because of its eaxy processing rigidity , and low cost. Styrene, which is present in detectable amouts in the polymer, is usually considered to be the substance responsible for the possible tainting of a polystyrene-packed food by migration. The contamination of foods and beverages by trace amounts of materials which have migrated from plastics use din packaging is a concern both on the grounds of adversely affecting product quality and of food safety. These lead to increasing attention to the potentional hazards of a large variety of plastic materials and foods. In this paper we reviewed the history of Styrene and various analytical methods of sample preparation and detection to assess the extent to which styrene is present in food-grade polystrene materials and to what extent it leaked into foods and food stimulants.

  • PDF

A Methodology for Security Vulnerability Assessment Process on Binary Code (실행코드 취약점 분석 프로세스 방법론)

  • Hwang, Seong-Oun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.237-242
    • /
    • 2012
  • Cyber attacks have rapidly increased by exploiting the underlying vulnerabilities in the target software. However, identifying and correcting these vulnerabilities are extremely difficult and time consuming tasks. To address these problems efficiently, we propose a systematic methodology for security vulnerability assessment process on binary code in the paper. Specifically, we first classified the existing vulnerabilities based on whether the target software run in a Web environment and features of the software. Based on the classification, we determined the list and scope of the vulnerabilities. As our future research direction, we need to further refine and validate our methodology.