Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Taejoo Chang"'
Publikováno v:
Sensors, Vol 24, Iss 3, p 840 (2024)
Despite recent remarkable advances in binary code analysis, malware developers still use complex anti-reversing techniques that make analysis difficult. Packers are used to protect malware, which are (commercial) tools that contain diverse anti-rever
Externí odkaz:
https://doaj.org/article/d431dd56e4764feabb58ee4faa3fb8bf
Publikováno v:
IEEE Access, Vol 8, Pp 127939-127953 (2020)
In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult. To protect malware, they use packers, which are (commercial) tools that contain various a
Externí odkaz:
https://doaj.org/article/221510bf4ce646b1b21514a7879bea5c
Publikováno v:
The Journal of Supercomputing. 77:471-497
Malware uses a variety of anti-reverse engineering techniques, which makes its analysis difficult. Dynamic analysis tools, e.g., debuggers, DBI (Dynamic Binary Instrumentation), and CPU emulators, do not provide both accuracy and convenience when ana
Publikováno v:
IEEE Access, Vol 8, Pp 127939-127953 (2020)
In spite of recent remarkable advances in binary code analysis, malware developers are still using complex anti-reversing techniques to make analysis difficult. To protect malware, they use packers, which are (commercial) tools that contain various a
Publikováno v:
Digital Investigation. 14:S68-S76
Android remains the dominant OS in the smartphone market even though the iOS share of the market increased during the iPhone 6 release period. As various types of Android smartphones are being launched in the market, forensic studies are being conduc
Publikováno v:
Digital Investigation. 6:S108-S113
This paper analyzes the National Software Reference Library Reference Data Set (NSRL RDS) and constructs a Korean RDS (KRDS) based on it. The fact that NSRL RDS offers the largest amount of hash data sets has led to its widespread adoption. However,
Publikováno v:
ResearcherID
An efficient implementation of the D-homomorphism for generating de Bruijn (1946) sequences is presented. The number of exclusive-or operations required to generate the next bit for de Bruijn sequences of order n from a de Bruijn function of order k
Publikováno v:
IEEE Transactions on Vehicular Technology. 48:1610-1615
We analyze the combined influence of the interchannel and intersymbol interferences, which result from the time variation and delay spread of mobile channels, on the performance of an orthogonal frequency-division multiplexing (OFDM) system. Both ana
Publikováno v:
ETRI Journal. 29:820-822
ARIA and the Advanced Encryption Standard (AES) are next generation standard block cipher algorithms of Korea and the US, respectively. This letter presents an area- efficient unified hardware architecture of ARIA and AES. Both algorithms have 128-bi
Publikováno v:
Signal Processing. 52:75-82
In this paper, we consider the problem of nonparametric detection of signals in noisy observations, where zero-crossings are used to form the test statistic. We apply zero-crossings to known and random signal detection problems, and investigate the p