http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Intel VT 기술을 이용한 Xen 기반 동적 악성코드 분석 시스템 구현 및 평가
김태형(Taehyoung Kim),김인혁(Inhyuk Kim),엄영익(Young Ik Eom),김원호(Won Ho Kim) 한국정보과학회 2010 정보과학회논문지 : 시스템 및 이론 Vol.37 No.5
악성코드를 분석하기 위한 기법에는 다양한 방법들이 존재한다. 하지만 기존의 악성코드 분석 기법으로는 악성코드들의 동작들을 정확하게 분석하는 것이 점점 어려워지고 있다. 특히, 분석 시스템들이 악성코드의 안티-디버깅 기술에 의해 감지되기 쉽고, 실행속도 등 여러 가지 한계점을 보임에 따라 이를 해결할 수 있는 분석 기법이 요구되고 있다. 본 논문에서는 동적 코드 분석을 위한 기본 요구사항인 명령어 단위 분석 및 메모리 접근 추적 기능을 제공하는 동적 코드 분석 시스템을 설계 및 구현한다. 그리고 DLL 로딩 추적을 통한 API 호출 정보를 추출하여, 다양한 실행 코드들을 분석 할 수 있는 기반 환경을 구축한다. 제안 시스템은 Intel의 VT 기술을 이용하여 Xen 기반으로 전가상화 환경을 구축하였으며, 게스트에서는 윈도우즈 XP가 동작할 수 있도록 하였다. 제안 시스템을 이용하여 대표적인 악성코드들을 분석해 봄으로써 제안 시스템 각각의 기능들의 활용을 살펴보고, 제안 시스템이 악성코드들을 정확하게 분석및 탐지함을 보여준다. There are several methods for malware analyses. However, it is difficult to detect malware exactly with existing detection methods. Especially, malware with strong anti-debugging facilities can detect analyzer and disturb their analyses. Furthermore, it takes too much time to analyze malware. In order to resolve these problems of current analyzers, more improved analysis scheme is required. This paper suggests a dynamic binary instrumentation which supports the instruction analysis and the memory access tracing. Addtionally, by supporting the API call tracing with the DLL loading analysis, our system establishes the foundation for analyzing various executable codes. Based on Xen, full-virtualization environment is built using Intel's VT technology. Windows XP can be used as a guest. We analyze representative malware using several functions of our system, and show the accuracy and efficiency enhancements in binary analyses capability of our system.
클라우드 컴퓨팅 환경에서 보안성 향상을 위한 로컬 프로세스 실행 기술
김태형(Taehyoung Kim),김인혁(Inhyuk Kim),김정한(Junghan Kim),민창우(Changwoo Min),김지홍(Jee-hong Kim),엄영익(Young Ik Eom) 한국정보보호학회 2010 정보보호학회논문지 Vol.20 No.5
기존 클라우드 환경에서는 어플리케이션의 수행이 원격지 클라우드 서버에서 이루어지며, 해당 어플리케이션이 사용하는 물리 메모리, CPU 등 컴퓨팅 자원 역시 원격지 클라우드 서버에 존재한다. 따라서 원격지 서버가 보안 위협에 노출될 경우, 해당 환경에서 실행되는 모든 어플리케이션들이 보안 위협에 의해 영향 받을 수 있다. 특히, 악의적인 클라우드 서버 관리자에 의한 보안 위협으로 인하여, 비즈니스 모델로 많은 이점이 있음에도 불구하고 개인 및 기업 환경에서 클라우드 서비스를 도입하는데 어려움을 겪고 있다. 본 논문에서는 기존 클라우드 컴퓨팅 환경의 취약점을 근본적으로 해결할 수 있는 로컬 프로세스 실행 기술을 제안한다. 이를 통해, 기밀 데이터를 클라우드 서버가 아닌 로컬에 둘 수 있게 되어, 클라우드 서버에서 발생 가능한 보안 위협으로부터 기밀 데이터를 보호할 수 있게 된다. 즉, 보안 데이터를 사용하는 어플리케이션의 경우, 로컬 프로세스 실행 기술을 이용하여 원격지 서버가 아닌 로컬의 컴퓨팅 자원을 사용하여 실행할 수 있도록 설계한다. 이에 따라 보안 프로세스가 사용하는 자원들이 물리적으로 로컬에 존재하므로 원격지 서버의 취약성 문제를 해결할 수 있다. In the current cloud environments, the applications are executed on the remote cloud server, and they also utilize computing resources of the remote cloud server such as physical memory and CPU. Therefore, if remote server is exposed to security threat, every applications in remote server can be victim by several security-attacks. Especially, despite many advantages, both individuals and businesses often have trouble to start the cloud services according to the malicious administrator of the cloud server. We propose a security-enhanced local process executing scheme resolving vulnerability of current cloud computing environments. Since secret data is stored in the local, we can protect secret data from security threats of the cloud server. By utilizing computing resource of local computer instead of remote server, high-secure processes can be set free from vulnerability of remote server.
도로변 초미세먼지의 실시간 질량농도 및 부피농도 측정을 이용한 시간별 밀도 분석-광흡수 eBC에 대한 OPS 보정 중심
김은영(Eunyoung Kim),서석준(Seokjun Seo),김선문(Sunmoon Kim),정성운(Sungwoon Jung),이용민(Yongmin Lee),오세호(Sea-Ho Oh),박규태(Gyutae Park),김경훈(Kyunghoon Kim),김정화(Jounghwa Kim),홍유덕(Youdeog Hong),이태형(Taehyoung Lee),배민석(Mi 한국대기환경학회 2018 한국대기환경학회지 Vol.34 No.6
Cortical representation of musical pitch in event-related potentials
Taehyoung Kim,Miyoung Chung,Eunju Jeong,Yang Seok Cho,Oh-Sang Kwon,Sung-Phil Kim 대한의용생체공학회 2023 Biomedical Engineering Letters (BMEL) Vol.13 No.3
Neural coding of auditory stimulus frequency is well-documented; however, the cortical signals and perceptual correlates of pitch have not yet been comprehensively investigated. This study examined the temporal patterns of event-related potentials (ERP) in response to single tones of pitch chroma, with an assumption that these patterns would be more prominent in musically-trained individuals than in non-musically-trained individuals. Participants with and without musical training (N = 20) were presented with seven notes on the C major scale (C4, D4, E4, F4, G4, A4, and B4), and whole-brain activities were recorded. A linear regression analysis between the ERP amplitude and the seven notes showed that the ERP amplitude increased or decreased as the frequency of the pitch increased. Remarkably, these linear correlations were anti-symmetric between the hemispheres. Specifically, we found that ERP amplitudes of the left and right frontotemporal areas decreased and increased, respectively, as the pitch frequency increased. Although linear slopes were significant in both groups, the musically-trained group exhibited marginally steeper slope, and their ERP amplitudes were most discriminant for frequency of tone of pitch at earlier latency than in the non-musically-trained group (~ 460 ms vs ~ 630 ms after stimulus onset). Thus, the ERP amplitudes in frontotemporal areas varied according to the pitch frequency, with the musically-trained participants demonstrating a wider range of amplitudes and inter-hemispheric anti-symmetric patterns. Our findings may provide new insights on cortical processing of musical pitch, revealing anti-symmetric processing of musical pitch between hemispheres, which appears to be more pronounced in musically-trained people.
Scaling Laws of Optimal Training Lengths for TDD Massive MIMO Systems
Kim, Taehyoung,Min, Kyungsik,Jung, Minchae,Choi, Sooyong IEEE 2018 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY Vol.67 No.8
<P>In this study, the scaling laws of optimal training lengths were investigated for time-division duplexing massive multiple-input multiple-output systems. First, the generalized asymptotic achievable rate was derived by taking into account both uplink and downlink training. From the general form, the achievable rates of zero-forcing (ZF) and matched filter (MF) precoders are directly obtained by using the mean and variance of the effective channel. Then, we analyzed the rate gaps of ZF and MF with respect to uplink and downlink training, respectively. According to the analysis of rate gaps, it is shown that the achievable rates are more dominated by the uplink training than downlink training for both ZF and MF. The joint optimization problem for training lengths maximizing the spectral efficiency is formulated as a function of rate gaps. To study the scaling of optimal training lengths with the system parameters, we derived the optimal training lengths as a closed-form expression by using an approximation for the logarithm function. From the analysis, it is shown that the optimal training lengths decrease as the number of antennas increases, and increase as the coherence block length increases. In addition, the optimal training lengths increase as the transmit power increases for ZF, whereas it does not change for MF. Finally, we investigated the superior region for noncoherent detection (which means only statistical information is used for demodulation without downlink training) with the system parameters by comparing the spectral efficiency with and without downlink training.</P>
Taehyoung Kim,Sung-Ho Jin,Jongwook Park,Kwon Taek Lim,Sang Youl Kim,Yeong-Soon Gal 한국공업화학회 2020 Journal of Industrial and Engineering Chemistry Vol.87 No.-
A new ionic polyacetylene having perfluorinated benzyl substituent, poly(2-ethynyl-N-heptafluor-obenzylpyridinium iodide), was synthesized via the direct polymerization of the quaterinazed acetylenicpyridinium monomers. The polymerization proceeded homogeneously without any additional initiatoror catalyst to give a moderate yield of polymer. The results of instrumental analyses on the molecularstructure of polymer revealed that the polymer have polyacetylene backbone system with Nheptafluorobenzylicpyridiniumiodide as substituent. The photoluminescence (PL) spectra of polymerexhibited that the PL peak is located at 550 nm, corresponding to a photon energy of 2.26 eV. Theirreversible electrochemical behaviors of polymer between the doped and undoped peaks were observedin the cyclic voltammograms of polymer. The initial oxidation and reduction of poly(EHFBPI) occurred at0.53 V and -0.75 V (vs Ag/AgNO3). HOMO level of poly(EHFBPI) was 5.27 eV.
방열 제약과 온수공급 계통구성을 고려한 PSO 기반 열병합발전기 최적 운전 알고리즘 개발
김태형(Taehyoung Kim),임정택(Jeongtaek Lim),함경선(Kyung Sun Ham),서재완(Jaewan Suh) 대한전기학회 2020 전기학회논문지 Vol.69 No.10
Distributed combined heat and power(CHP) is considered as a solution to the centralized power system congestion and the carbon emission. However, since small-scale CHPs are not economically viable, advanced operation method is needed. This paper proposes particle swarm optimization with adjacency matrix and heat extraction constraint for optimal CHP operation. We made nonlinear CHP output model from demonstration data. Mesh and Non-mesh hot water network case is simulated by MATLAB 2019a for a day operation. Simulation results are compared to case without heat extraction constraint and showed the effectiveness of the proposed method.