• Title/Summary/Keyword: and variety identification

Search Result 442, Processing Time 0.027 seconds

Mepelyzer : Malicious App Identification Mechanism based on Method & Permission Similarity Analysis of Server-Side Polymorphic Mobile Apps (Mepelyzer : 서버 기반 다형상 모바일 앱에 대한 메소드 및 퍼미션 유사도 기반 악성앱 판별)

  • Lee, Han Seong;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.49-61
    • /
    • 2017
  • Recently, convenience and usability are increasing with the development and deployment of various mobile applications on the Android platform. However, important information stored in the smartphone is leaked to the outside without knowing the user since the malicious mobile application is continuously increasing. A variety of mobile vaccines have been developed for the Android platform to detect malicious apps. Recently discovered server-based polymorphic(SSP) malicious mobile apps include obfuscation techniques. Therefore, it is not easy to detect existing mobile vaccines because some other form of malicious app is newly created by using SSP mechanism. In this paper, we analyze the correlation between the similarity of the method in the DEX file constituting the core malicious code and the permission similarity measure through APK de-compiling process for the SSP malicious app. According to the analysis results of DEX method similarity and permission similarity, we could extract the characteristics of SSP malicious apps and found the difference that can be distinguished from the normal app.

A simulation technique to create dataset of RFID business events (RFID 비즈니스 이벤트 데이터셋의 생성을 위한 시뮬레이션 기법)

  • Ryu, Wooseok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.289-291
    • /
    • 2013
  • As an wireless identification technology, RFID is now extending its application area including logistics, medicine, and healthcare. Adoption of RFID demands high cost such as h/w, s/w, and so on. To adopt RFID, we need to evaluate validity of application area and feasibility of RFID S/W such as EPC Information Service (EPCIS), which demands a variety of RFID test datasets. In this paper, I propose a novel method for generating RFID business events dataset by means of the simulation of RFID application environment. Proposed method can generate near-real RFID event dataset by means of representing various RFID application environment into abstract network model based on petri-net. In addition, it can also be useful when determining adoption of RFID as well as when evaluating RFID system.

  • PDF

Cloud Computing : An Analysis of Security Vulnerabilities in managerial aspect (클라우드 컴퓨팅 : 관리적 측면에서의 보안 취약점 분석)

  • Choi, Chang-Ho;Lee, Young Sil;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.291-294
    • /
    • 2014
  • By building an environment that can utilize big data, many companies are interested in the cloud computing technology that has increased its popularity recently. By developing cloud environments from existing virtual environments, in the process, we discovered a variety of security vulnerabilities such as management, virtual machines, hypervisors, hardware etc. The security techniques from administrative aspects in the cloud environment provide the environment which can securely store data by the identification and control of security threats. In this paper, we investigate a list of companies which supports the cloud services and the types of services, and analyze the security threats according to the administrative aspects in the cloud environment. In addition, we suggest the direction for future improvements by investigating accidents or incidents which occurred recently.

  • PDF

A study on the revitalization of the professional sports league based on the analysis of professional sports business environment (프로스포츠리그 경영환경 분석을 통한 프로스포츠 활성화 방안 연구)

  • Kim, Chong;Cho, Seong-Sik;Yum, Ji-Hwan;Jung, Hee-Yun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.12
    • /
    • pp.3839-3847
    • /
    • 2009
  • This study presents a revitalization of the professional leagues through the identification of the problem based on analyzing the domestic professional sports business environment. The development plan for emerging problem is present along with guidelines that are appropriate for local environment and situation for league revitalization. First, the creation of a variety of marketing opportunity and integrated marketing strategy must be accompanied by the development for generating of the professional sports league's revenue. Second, Marketing of a player's potential should be developed. and utilized. Third, the domestic players and foreign players salary cap celery cap placed on the proportion of salary should be lower. Finally, Youth Club, based on the activation of a growing base should be made.

A Novel Circle Detection Algorithm for Iris Segmentation (홍채 영역 분할을 위한 새로운 원 검출 알고리즘)

  • Yoon, Woong-Bae;Kim, Tae-Yun;Oh, Ji-Eun;Kim, Kwang Gi
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.12
    • /
    • pp.1385-1392
    • /
    • 2013
  • There is a variety of researches about recognition system using biometric data these days. In this study, we propose a new algorithm, uses simultaneous equation that made of the edge of objects, to segment an iris region without threshold values from an anterior eye image. The algorithm attempts to find a center area through calculated outskirts information of an iris, and decides the area where the most points are accumulated. To verify the proposed algorithm, we conducted comparative experiments to Hough transform and Daugman's method, based on 50 images anterior eye images. It was found that proposed algorithm is 5 and 75 times faster than on each algorithm, and showed high accuracy of detecting a center point (95.36%) more than Hough transform (92.43%). In foreseeable future, this study is expected to useful application in diverse department of human's life, such as, identification system using an iris, diagnosis a disease using an anterior image.

Strong Yoking Proof Protocols for RFID Tags (RFID tag를 위한 강력한 Yoking Proof Protocols)

  • Cho, Jung-Sik;Yeo, Sang-Soo;Kim, Sung-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3A
    • /
    • pp.310-318
    • /
    • 2007
  • The RFID system is a non-contact automatic identification system that identifies tags through a reading device by attaching small, inexpensive tags on goods. This system is expected to supplant barcodes, the contactless reading technique that is most widely used at present. The RFID system can be applied in a variety of areas. Among those, Ari Juels proposed an environment to prove that a pair of tags has been scanned simultaneously And he presented a yoking proof protocol for this. But the yoking-proof protocol is vulnerable to replay attack. Although modified yoking-proof protocols for alleviating this drawback have been proposed, they are not immune to replay attack, either. In this paper, we analyze problems of existing yoking-proof protocols and present a new protocol, which will make replay attack difficult, based on this analysis. We have also extend this protocol so that it can provide yoking proofs for n tags.

Basic Social Work Practice Skills: Its Empirical Identification and Classification in Korean Practice Fields (한국 사회복지실천 현장 내 기본 실천기술의 실증적 확인 및 분류)

  • Um, Myung-Yong
    • Korean Journal of Social Welfare
    • /
    • v.57 no.1
    • /
    • pp.61-91
    • /
    • 2005
  • This study aimed to explore empirically social work practice skills that are being used most frequently in a variety of social work settings in Korea. Out of 669 questionnaire sent, 361 were returned. Exploratory factor analysis revealed 7 underlying axes from 132 most frequently used practice skills. They were named as: casework skills, group work skills, family work skills, community work skills, volunteer managing skills, program development and evaluation skills, and agency managing skills. Second factor analysis explored underlying sub-factors from each of the seven axes. Researcher identified 42 principal skills that can represent the underlying sub-factors explored in the previous stage. Finally, research checked if the different work settings use different practice skill axes. Study results can be used to connect social work education settings and practice fields in Korea. There has been an argument that Korean social work education has been teaching improper practice skills to the to-be-social workers.

  • PDF

The Influence of Consumer Characteristics' on Store Patronage Intention (패션소매점 애고의도에 미치는 소비자 특성에 관한 연구)

  • Nam, Mi-Woo
    • Fashion & Textile Research Journal
    • /
    • v.7 no.5
    • /
    • pp.509-518
    • /
    • 2005
  • In recent years retail competition has intensified, generally as a consequence of technologies, more sophisticated management practices and industry consolidation. An understanding of current customers' loyalty intentions and their determinants is an important basis for the identification of optimal retailer actions. The focus of this study is to examine the links between patronage intention and the effects of various antecedents of current customers' store loyalty intentions in fashion store. 340 female universities students living in Seoul were analyzed by utilizing multiple regressions to investigate the predictability of each of the 4 different sets of variables(consumer value, source of information, clothing benefits, importance of store attributes) on four patronage intentions of apparel shopping(discount store, speciality store, conventional market, Fashion shopping mall). Four factors were significant in predicting conventional market patronage intention. Brand had a negative coefficient, while price, social affiliation, store fashion service/promotion had positive coefficients. Fashion shopping mall were predicted by five factors:brand had a negative coefficient, while media, social affiliation, price, uniqueness had positive coefficients. For specialty store, four factors were significant: brand had a negative coefficient, while store fashion service/promotion, personal sources, uniqueness had positive coefficients. Four factors were significant in predicting discount store patronage intention :price, store fashion service/promotion, social affiliation, variety of price & product had positive coefficients. Despite the relatively low $r^2s$, all four variables appeared to have, to some degree, predictability of choosing among four different types of store for apparel shopping. Based on the results, patronage intention profiles for four retail stores were developed. Marketing implications are discussed.

Performance Evaluation of Authentication Protocol for Mobile RFID Privacy (모바일 RFID 프라이버시를 위한 인증 프로토콜 성능 평가)

  • Eom, Tae-Yang;Yi, Jeong-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.618-630
    • /
    • 2011
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. Although the users can get the information about a certain product anytime anywhere, there is high probability that their privacy may be violated because their belongings with RFID tags can be scanned by other mobile readers at any time. Several RFID authentication schemes have been proposed to deal with these privacy issues. However, since the existing solutions require heavy computation on the tag side, most of them is not applicable to the general low-cost passive tags which do not have any processing unit. In this paper, we propose the efficient authentication scheme for mobile RFID system applicable to the passive tags as well as the active ones by the best use of computing capability of mobile devices. The proposed scheme satisfies the import security issues such as tag protection, untraceability, anti-traffic analysis. We also implement the proposed scheme on top of real smartphone for feasibility and show the experimental results from it.

Expression of the red sea bream iridovirus (RSIV) capsid protein using a yeast surface display method (효모표면표출(YSD) 기법을 이용한 참돔 이리도바이러스(RSIV) 외피단백질의 발현)

  • Suh, Sung-Suk;Park, Mirye;Hwang, Jinik;Lee, Taek-Kyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.8
    • /
    • pp.5412-5418
    • /
    • 2014
  • The red seabream iridovirus (RSIV), which belongs to the iridoviridae, causes infectious fish diseases in many Asian countries, leading to considerable economic losses to the aquaculture industry. Using the yeast surface display (YSD) technique, a new experimental system was recently developed for the detection and identification of a variety of marine viruses. In this study, a coat protein gene of RSIV was synthesized based on the nucleotide sequence database and subcloned into the yeast expression vector, pCTCON2. The expression of viral coat proteins in the yeast strain, EBY100, was detected by flow cytometry and Western blot analysis. Finally, they were isolated from the yeast surface through a treatment with ${\beta}$-mercaptoethanol. The data suggests that the YSD system can be a useful method for acquiring coating proteins of marine viruses.