• Title/Summary/Keyword: Vault Application

Search Result 12, Processing Time 0.022 seconds

A Study on the Feature Point Extraction Methodology based on XML for Searching Hidden Vault Anti-Forensics Apps (은닉형 Vault 안티포렌식 앱 탐색을 위한 XML 기반 특징점 추출 방법론 연구)

  • Kim, Dae-gyu;Kim, Chang-soo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.61-70
    • /
    • 2022
  • General users who use smartphone apps often use the Vault app to protect personal information such as photos and videos owned by individuals. However, there are increasing cases of criminals using the Vault app function for anti-forensic purposes to hide illegal videos. These apps are one of the apps registered on Google Play. This paper proposes a methodology for extracting feature points through XML-based keyword frequency analysis to explore Vault apps used by criminals, and text mining techniques are applied to extract feature points. In this paper, XML syntax was compared and analyzed using strings.xml files included in the app for 15 hidden Vault anti-forensics apps and non-hidden Vault apps, respectively. In hidden Vault anti-forensics apps, more hidden-related words are found at a higher frequency in the first and second rounds of terminology processing. Unlike most conventional methods of static analysis of APK files from an engineering point of view, this paper is meaningful in that it approached from a humanities and sociological point of view to find a feature of classifying anti-forensics apps. In conclusion, applying text mining techniques through XML parsing can be used as basic data for exploring hidden Vault anti-forensics apps.

Enhancing Accuracy Performance of Fuzzy Vault Non-Random Chaff Point Generator for Mobile Payment Authentication

  • Arrahmah, Annisa Istiqomah;Gondokaryono, Yudi Satria;Rhee, Kyung-Hyune
    • Journal of Multimedia Information System
    • /
    • v.3 no.2
    • /
    • pp.13-20
    • /
    • 2016
  • Biometric authentication for account-based mobile payment continues to gain attention because of improvements on sensors that can collect biometric information. We propose an enhanced method for mobile payment security based on biometric authentication. In this mobile payment system, the communication between the user and the relying party is based on public key infrastructure. This method secures both the key and the biometric template in the user side using fuzzy vault biometric cryptosystems, which is based on non-random chaff point generator. In this paper, we consider an important process for the common fuzzy vault system, that is, the feature extraction method. We evaluate various feature extraction methods to enhance the accurate performance of the system.

Vulnerability analysis for AppLock Application (AppLock 정보 은닉 앱에 대한 취약점 분석)

  • Hong, Pyo-gil;Kim, Dohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.845-853
    • /
    • 2022
  • As the memory capacity of smartphone increases, the type and amount of privacy stored in the smartphone is also increasing. but recently there is an increasing possibility that various personal information such as photos and videos of smartphones may be leaked due to malicious apps by malicious attackers or other people such as repair technicians. This paper analyzed and studied the security and vulnerability of these vault apps by analyzing the cryptography algorithm and data protection function. We analyzed 5.3.7(June 13, 2022) and 3.3.2(December 30, 2020) versions of AppLock, the most downloaded information-hidding apps registered with Google Play, and found various vulnerabilities. In the case of access control, there was a vulnerability in that values for encrypting patterns entered by users were hardcoded into plain text in the source code, and encrypted pattern values were stored in xml files. In addition, in the case of the vault function, there was a vulnerability in that the files and log files for storing in the vault were not encrypted.

The Application and Seismic Design Method of Electrical Facility Installed in the Building (건축물에 시설되는 수변전설비의 내진설계 검토사항 및 설계 방안에 대한 고찰)

  • Kim, Gi-Hyun;Lee, Sang-Ick;Bae, Suk-Myong;Cho, Sung-Gook
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.8
    • /
    • pp.74-79
    • /
    • 2009
  • In the case of that not considered seismic design at transformer vault which is equipped with many important electrical facilities, the facility is damaged, electrical fire breaks out and another damage may be caused due to earthquake. But seismic design has not yet applied to transformer vault in the country. Regard to seismic design method of electrical facility installed inside the building, the seismic design procedures for electrical facility is presented in this parer, which has been developed by referring "Building design standard" of domestic code and "Manual of seismic design and construction for building electrical facility" in japan. This paper may help engineers perform detail seismic design, construction and reliability inspection of electrical pipes and facilities.

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF

The usefulness of intermolar traction wiring for restoration of maxillary & mandibular dental arch in facial bone fracture (안면골 골절에서 상하악 치열궁 복원을 위한 양측 대구치간 철사견인술의 유용성)

  • Jeong, Jae Ho;Shin, Seung Kyu;Lee, Jun Ho;Kim, Yong Ha
    • Archives of Plastic Surgery
    • /
    • v.36 no.1
    • /
    • pp.56-60
    • /
    • 2009
  • Purpose: Palatal fracture and mandible fracture result in instability of dental arch. Because they divide the maxillary and mandibular alveolus sagittally and / or transversely and comminute the dentition, they permit rotation of dental alveolar segments and significantly increase the potential for fracture malalignment, complicating fracture treatment. Previous treatment of palatal fracture consisted of palatal splint application and rigid palatal vault stabilization. This procedure result in patient's oral discomfort and removal of palate and screw. Mandible fracture often results in malocclusion due to widening of posterior aspect of dental arch. So we introduce more simple method using intermolar traction wiring, which can protect the widening of dental arch and rotation of dental alveolar segment. Methods: Arch bar and intermolar traction wiring with wire 1 - 0, or 2 - 0 was applied. After exposure of fracture line, neutrooclusion was maintained with intermaxillary fixation. And then open reduction & internal fixation on maxillary fracture line, commonly maxillary buttress, alveolar ridge, pyriform aperture except palatal vault or mandibular fracture line. After 1 week, intermolar traction wiring was removed. We checked occlusion and postoperative radiologic finding. Results: From June of 2007 to October of 2007, 10 patient, who have maxillary fracture with palatal fracture and mandible fracture, underwent open reduction & internal fixation with intermolar traction wiring. All have satisfactory occlusion and there were no complication, like gingiva disease, mouth opening impairment and nonunion. Conclusion: The intermolar traction wiring accompany open reduction and internal fixation can be alternative method for restoration of dental arch in facial bone fracture.

Nonlinear analysis of contemporary and historic masonry vaulted elements externally strengthened by FRP

  • Hamdy, Gehan A.;Kamal, Osama A.;El-Hariri, Mohamed O.R.;El-Salakawy, Tarik S.
    • Structural Engineering and Mechanics
    • /
    • v.65 no.5
    • /
    • pp.611-619
    • /
    • 2018
  • This paper addresses numerical modeling and nonlinear analysis of unreinforced masonry walls and vaults externally strengthened using fiber reinforced polymers (FRP). The aim of the research is to provide a simple method for design of strengthening interventions for masonry arched structures while considering the nonlinear behavior. Several brick masonry walls and vaults externally strengthened by FRP which have been previously tested experimentally are modeled using finite elements. Numerical modeling and nonlinear analysis are performed using commercial software. Description of the modeling, material characterization and solution parameters are given. The obtained numerical results demonstrate that externally applied FRP strengthening increased the ultimate capacity of the walls and vaults and improved their failure mode. The numerical results are in good agreement with the experimentally obtained ultimate failure load, maximum displacement and crack pattern; which demonstrates the capability of the proposed modeling scheme to simulate efficiently the actual behavior of FRP-strengthened masonry elements. Application is made on a historic masonry dome and the numerical analysis managed to explain its structural behavior before and after strengthening. The modeling approach may thus be regarded a practical and valid tool for design of strengthening interventions for contemporary or historic unreinforced masonry elements using externally bonded FRP.

Development of a Computer Code for Low-and Intermediate-Level Radioactive Waste Disposal Safety Assessment

  • Park, J.W.;Kim, C.L.;Lee, E.Y.;Lee, Y.M.;Kang, C.H.;Zhou, W.;Kozak, M.W.
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.1
    • /
    • pp.41-48
    • /
    • 2004
  • A safety assessment code, called SAGE (Safety Assessment Groundwater Evaluation), has been developed to describe post-closure radionuclide releases and potential radiological doses for low- and intermediate-level radioactive waste (LILW) disposal in an engineered vault facility in Korea. The conceptual model implemented in the code is focused on the release of radionuclide from a gradually degrading engineered barrier system to an underlying unsaturated zone, thence to a saturated groundwater zone. The radionuclide transport equations are solved by spatially discretizing the disposal system into a series of compartments. Mass transfer between compartments is by diffusion/dispersion and advection. In all compartments, radionuclides ate decayed either as a single-member chain or as multi-member chains. The biosphere is represented as a set of steady-state, radionuclide-specific pathway dose conversion factors that are multiplied by the appropriate release rate from the far field for each pathway. The code has the capability to treat input parameters either deterministically or probabilistically. Parameter input is achieved through a user-friendly Graphical User Interface. An application is presented, which is compared against safety assessment results from the other computer codes, to benchmark the reliability of system-level conceptual modeling of the code.

Neural Network Model for Partial Discharge Pattern Analysis of XLPE/EPR Interface (XLPE/EPR 계면의 부분방전 패턴 분석을 위한 신경망 모형)

  • Cho, Kyung-Soon
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.2
    • /
    • pp.357-364
    • /
    • 2005
  • The prefabricated type used generally in Korea to join cable runs on new installations or to repair broken Cable runs on existing installations, because installation is very simple and save time. This type is a permanent, shielded and submersible cable joint for direct burial or vault application. It confirms to the requirements of IEEE std. 404-1993 by factory testing, but many problems of insulated cable systems are caused by internal defects of the joint part which have to be mounted ensile. Faults arise from impurities or voids. A suitable solution for a monitoring of cable joints during the after-laying test and service is partial discharge detection. Specimen obtained 1mm thickness from the insulation of real power cable and cable joint. <중략>The partial discharges are measured to determine their time dependence for 60 minutes and the influence of applied electrical stress under 30kV. $\Phi-q-n$ properties were measured using detection impedance, high pass filter and computerized data acquisition system. Statistic Value like maximum charge, repetition rate, average charge, etc. are calculated. It is possible to quantitative analysis of $\Phi-q-n$ properties from this statistic value and pattern analysis.

  • PDF

Neural Network Model for Partial Discharge Pattern Analysis of XLPE/EPR Interface (XLPE/EPR 계면의 부분방전 패턴 분석을 위한 신경망 모형)

  • Cho Kyung-Soon
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.2
    • /
    • pp.279-286
    • /
    • 2005
  • The prefabricated type used generally in Korea to join cable runs on new installations or to repair broken Cable runs on existing installations, because installation is very simple and save time. This type is a permanent, shielded and submersible cable joint for direct burial or vault application. It confirms to the requirements of IEEE std. 404-1993 by factory testing, but many problems of insulated cable systems are caused by internal defects of the joint part which have to be mounted ensile. Faults arise from impurities or voids. A suitable solution for a monitoring of cable joints during the after-laying test and service is partial discharge detection. <중략> $\Phi-q-n$ properties were measured using detection impedance, high pass filter and computerized data acquisition system. Statistic Value like maximum charge, repetition rate, average charge, etc. are calculated. It is possible to quantitative analysis of $\Phi-q-n$ properties from this statistic value and pattern analysis.

  • PDF