• Title/Summary/Keyword: WhiteList

Search Result 64, Processing Time 0.029 seconds

A Method to Collect Trusted Processes for Application Whitelisting in macOS (macOS 운영체제에서 화이트리스트 구축을 위한 신뢰 프로세스 수집 연구)

  • Youn, Jung-moo;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.397-405
    • /
    • 2018
  • Blacklist-based tools are most commonly used to effectively detect suspected malicious processes. The blacklist-based tool compares the malicious code extracted from the existing malicious code with the malicious code. Therefore, it is most effective to detect known malicious codes, but there is a limit to detecting malicious code variants. In order to solve this problem, the necessity of a white list-based tool, which is the opposite of black list, has emerged. Whitelist-based tools do not extract features of malicious code processes, but rather collect reliable processes and verify that the process that checks them is a trusted process. In other words, if malicious code is created using a new vulnerability or if variant malicious code appears, it is not in the list of trusted processes, so it can effectively detect malicious code. In this paper, we propose a method for effectively building a whitelist through research that collects reliable processes in the macOS operating system.

Countermeasure against Social Technologic Attack using Privacy Input-Detection (개인정보 입력 감지를 이용한 사회공학적 공격 대응방안)

  • Park, Ki-Hong;Lee, Jun-Hwan;Cho, Han-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.5
    • /
    • pp.32-39
    • /
    • 2012
  • When you want to be given the on-line service, their homepage requires sign-up with detail personal information. This collected private information lead to mass data spill by hacking. Especially, this makes terrible social problems that the users who sign up their site are persistingly attacked and damaged by hackers using this information. As methods of the social technologic attacks are simple but based upon human psychology, it is easy that people become a victim in the majority of cases. There is a strategy blocking fishing sites by using the black list for defending these attacks. This tactic, however, has some problems that it isn't possible to handle new fishing sites having a short life-cycle. In this paper, we suggest two solutions to minimize data spill. One marks existing sites with the sign of a reliability measured by a comparison between black list and the white list; therefore, the user check the authenticity about the homepage. The other shut off previously the leaking of private information by sensing a entry of personal information into new sites.

A Study on the Preference of Old Women for the Higher Usability of u-Health Life Support Appliances (재가노인 유헬스 생활지원기기의 실용화를 위한 여성노인의 선호)

  • Kim, Sun-Joong;Park, Kyoung-Ok
    • Journal of the Korean housing association
    • /
    • v.20 no.1
    • /
    • pp.101-112
    • /
    • 2009
  • The purpose of this study is to find out the preference and the needs of old womens on the life support appliances i.e. medication dispenser, video phone, activity monitor and sleep monitor. The appliances may be improved reflecting the result of the questionnaire asking about the preferred functions and designs. The respondents were 141 female seniors of 65 years and older, living in Ulsan city or Cheongju city, Korea. Following is the list of results. (1) The medication dispenser, responded as highly preferred, met some worries over the troubles by power stoppage especially while one is out, letting her forget the medication time. (2) The video phone was worried over the cases of hearing failure by small sound, and watching failure by weakening sight. (3) The activity monitor, like the medication dispenser, was worried about the troubles while one is out or out of the monitoring scope, its expense, and the privacy, (4) The sleep monitor met the worries over the inadequacy for the sleeping mat on the floor and the emission of electromagnetic waves. (5) The preferred designs were (1) white or red standing medication dispenser, (2) wall-mounted video phone working by voice, (3) metal activity monitor sensor with white or yellow bracelet.

PSMS Design and Implementation for a Phishing Attack Intercept (피싱공격 차단을 위한 PSMS 설계 및 구현)

  • Yoo, Jae-Hyung;Lee, Dong-Hwi;Yang, Jae-Su;Park, Sang-Min;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.49-56
    • /
    • 2008
  • Recently, Phising attack uses trick of URL and sites, and technical concealment method which infiltrates sophisticated malicious code. However, sometimes Phising security technology cannot cover all of Phising methods. Consequently, this research proposes inspection to solve this problem. First, we can install Proxy server for a strong open information exchange of web environment between web servers and clients. Therefore, it compares and analyzes harmful site and Phising URL with White domain list, and filters them. Finally, designs for stable web based information so that we can block Phising with least regulation and active control. So the purpose of this paper is introducing this design system and structure, and inspect them.

  • PDF

The Style and Cultural Significance of Film Color White (영화색채 하양의 활용 양상과 문화적 의미)

  • Kim, Jong-Guk
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.4
    • /
    • pp.187-198
    • /
    • 2020
  • With the cultural background of whiteness I did examine the universal meaning of absolute good, the special of psychosis, and the fantastic of femininity and memory/record. As an example I analyzed the symbolic meaning of white used in Korean films. Unconditional goodness, white as a generality: White color in all the films of good-evil confrontation falls into this category. The most obvious and the simplest configuration are the black-white dichotomy. In Nameless Gangster: Rules of Time(2011), The Merciless(2016), Asura: The City of Madness(2016) and The Bad Guys: Reign of Chaos(2019), white is the absolute good but it is not limited to a fair key figure. Paradoxically, black is not given only to the side of absolute evil. White is used to be a flexible visual device that reflects the socio-political situation without changing the meaning of the general good. Psychosis and pills, white as a peculiarity: The visual function that emphasizes sado-masochism in the absolute good and the universal symbol of white extends to psychotic specificities such as hysteria. In all the films creating horror, white symbolizes the mentally disabled and the pill for healing. Femininity and haunted white: White of absolute good is expressed by the socio-cultural tendency of femininity and the black-white contrast of vision is applied to the gender difference. In general the women's sexuality is emphasized in color red, but white is arranged in the background. In TaeGukGi: Brotherhood Of War(2004), 71: Into The Fire(2010), My Way(2011), The Front Line(2011), Roaring Currents(2014), Northern Limit Line(2015), The Battle: Roar to Victory(2019) and Battle of Jangsari(2019), white given to female figures sticks to the traditional femininity such as motherhood, sacrifice and weakness. The concept of specters is applied to desires, memories/records, history, fantasy, virtual/reality and social media images. The film history capturing to list memories and moments brings up the specters of socio-political genealogy. Most of films aiming for socio-political change are its examples and white constituting Mise-en-scene records to remember a historical event in Peppermint Candy(2000), The Attorney(2013) and A Taxi Driver(2017).

The Scientific Name of Aquilariae Lignum based on distribution of Aquilaria spp. (Aquilaria 속 식물 분포도에 근거한 심향(沈香)의 학명)

  • Kim, In-Rak
    • The Korea Journal of Herbology
    • /
    • v.28 no.5
    • /
    • pp.13-19
    • /
    • 2013
  • Objectives : The purpose of this study is correct the scientific name of Aquilariae Lignum in Korean Herbal Pharmacoepia. Methods : The production areas of Aquilariae Lignum and its trading status with China in Chinese history, Sanscrit-Chinese Translation Sutra, Naming year and the discovered district in main Aquilaria spp., Several nation's Pharmacoepia, The Plant List(TPL), Convention on International Trade in Endangered Species of Wild fauna and flora(CITES) and The International Union for Conservation of Nature(IUCN) were cross-checked. Results : The records in the Jiaozhouyiwuzhi written in the early 2nd century said that Aquilariae Lignum was produced in Vietnam. NanfangCaomuZhuang written in 304 said that Agarwood in Vietnam had white flowers. Vietnam had led production and trading of Aquilariae Lignum until Qing Dynasty. Aquilariae Lignum from Malaysia and Indonesia was not traded with China. In Sanscrit-Chinese Translation Sutra, India Aquilariae Lignum was translated as Vietnam Aquilariae Lignum. Aquilaria malaccensis was discovered from Malay-Peninsular in 1783, and has green or dirty yellow flowers. A. agallocha from North-Eastern India in 1814, white flowers. A. crasssna from Vietnam in 1914, white flowers. A. crassna is different from A. malaccensis in several ways, such as flower, fruit, seed and disribution. In several Nation's Pharmacoepia, A. crassna was a synonym of A. agallocha. But in TPL, CITES and IUCN, A. malaccensis was an accepted name, and A. agallocha was a synonym of A. malaccensis. Conclusions : These results show that the original species of Aquilariae Lignum in Korea Herbal Pharmacoepia should be reversed from A. agallocha to A. crassna Pierre ex Lacomte.

Milk and Beverage Preference of College Students (대학생들에 대한 우유와 음료수의 기호성)

  • Kim, Hyun-Dae;Kim, Dong-Soo;Kim, Song-Suk
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.23 no.3
    • /
    • pp.420-428
    • /
    • 1994
  • The purpose of this study was to determine relationship among the observed frequencies of 12 beverages selected by college men and women according to sex, age, race and academic classification and to estimate consumption of milk according to sex, age, race and academic classification. The instrument consisted of a check list and four questions. The sample of 282 subjects, 149 college men and 133 college women, was made by the accidental choice method. Observations occurred in the university center cafeteria at the dinner meal. The significant relationship s were sex and race in association with beverage selections by all subjects. The proportion of men in the distribution who selected regular , carbonated soft drinks and the proportion of white students who selected any of the carobnated soft drinks were the influencies. The result of the study indicated that carbonated soft drinks were the most preferred items followed by milk, water, iced tea, fruit juices, coffee, cocoa, and tea.

  • PDF

Design of Voice Conferenfe System using Reliable Multicast (신뢰성 있는 멀티캐스트를 이용한 음성 회의 시스템의 설계)

  • Song, Gi-Pyeong;Gu, Gyeong-Cheol;Park, Chi-Hang;Kim, Gwang-Hyeon;Lee, Tae-Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5
    • /
    • pp.1525-1535
    • /
    • 2000
  • Multicast is the multiparty communication that allows one-to-many communications. There are some multicast applications which are the ways of multiparty communications such as video conference system and white board. This paper proposes a dynamic allocation mechanism of designated receiver by using designated receiver list and a retransmission mechanism with designated receiver for the effective multicasting dta transmission. We designed voice conference system with multicast based on RTP/RTCP. This voice conference system increases the effect of standardization work and enables to exchange reliable standard dta with real time.

  • PDF

The Method for Managing Apps of Android Systems Using White List. (화이트리스트를 이용한 안드로이드 앱 관리 방안)

  • Jee, Gyeong-Bae;Lim, Hyung-Min;Kim, Pill-Jung;Jyun, Mun-Suk
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.981-983
    • /
    • 2012
  • 많은 사용자 들이 스마트폰을 사용하고 있으며 다양한 앱을 국 내외 앱 스토어를 통해 다운로드하여 사용하고 있다. 앱 스토어를 이용하여 배포되는 앱들은 개별 앱 스토어의 검증 체계를 통해 검증을 받고 있으나, 그 방법이 공통적이지 않다. 심지어 앱 스토어가 아닌 다른 방법을 통하여 앱을 설치 사용하고 있어, 다양한 악성 앱으로 인한 위협에 노출되어 있다. 본 논문에서는 검증된 앱을 화이트리스트에 등록, 관리하여 사용자들에게 검증된 앱을 설치 사용하게 하기 위한 방법을 제시한다.

Threats and response measures according to the type of software updates (소프트웨어 업데이트 유형별 위협요소 및 대응방안)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.277-279
    • /
    • 2014
  • In case of APT attacks, the update server is being used as a means of dissemination, the update program is running malicious code or data in applications such as anti-virus signature is vulnerable to manipulation, SW Update threat identification and prevention measures are urgently required. This paper presents a natiional and international SW update structure, update process exploits and response measures to examine, Through the extraction/analysis of a domestic famous SW update log, we are willing to select the necessary component of the normal program update to identify a white list.

  • PDF