• Title/Summary/Keyword: Mobile worm

Search Result 14, Processing Time 0.03 seconds

Epidemics of Wireless Mobile Worms on Smartphones (스마트폰 환경에서 무선 모바일 웜 확산 방식 연구)

  • Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1154-1159
    • /
    • 2013
  • Now we are facing various threats as side effects against the growth of smartphone markets. Malicious codes such as mobile worms may bring about disclosures of personal information and confusions to upset a national wireless backbone. In this paper, we examine the existed spreading models and try to describe the correct spread of mobile worms on smartphones. We also analyze the spreading effects, and simulate bluetooth, MMS and Wi-Fi worms by various experiments.

Inch-Worm Robot with Automatic Pipe Tracking Capability for the Feeder Pipe Inspection of a PHWR (중수형 원자로 급수 배관 검사용 자율 주행형 자벌레 로봇)

  • Choi, Chang-Hwan;Park, Byung-Suk;Jung, Hyun-Kyu;Jung, Seung-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.2
    • /
    • pp.125-132
    • /
    • 2008
  • This paper describes a mobile inspection robot with an automatic pipe tracking system for a feeder pipe inspection in a PHWR. The robot is composed of two inch worm mechanisms. One is for a longitudinal motion along a pipe, and the other is for a rotational motion in a circumferential direction to access all of the outer surfaces of a pipe. The proposed mechanism has a stable gripping capability and is easy to install. An automatic pipe tracking system is proposed based on machine vision techniques to make the mobile robot follow an exact outer circumference of a curved feeder pipe as closely as possible, which is one of the requirements of a thickness measurement system for a feeder pipe. The proposed sensing technique is analyzed to attain its feasibility and to develop a calibration method for an accurate measurement. A mobile robot and control system are developed, and the automatic pipe tracking system is tested in a mockup of a feeder pipe.

A Piezoelectric Lens Actuator for Mobile Information Devices (모바일 기기용 렌즈 구동 압전형 액츄에이터 개발)

  • Lee, Hun-Tae;Lee, Seung-Yop;Park, Young-Phil
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2005.11a
    • /
    • pp.744-749
    • /
    • 2005
  • In this paper, a lens actuator for mobile devices is proposed using stack type piezoelectric materials. In general, the deformation of PZT actuators is not enough for lens motion when the allowed voltage is applied. The small stroke problem can be solved by accumulating a lot of small displacements in high frequency. In this paper, a new inch-worm type model for focusing actuator is suggested based on the interaction of inertial and frictional forces. Theoretical analysis and simulation using ANSYS are performed to verify the feasibility of the inch-worm PZT actuator model. Various types of clamps are considered to determine the effect of frictional force on the motion, and appropriate clamp-actuator models are proposed. The proposed models are experimentally verified and the experimental results show high correspondence with theoretical and simulated values. The inch-worm type focusing actuator enable a large stroke with 7.79 mm/sec with 10kHz and 10V.

  • PDF

Macroscopic Treatment to Unknown Malicious Mobile Codes (알려지지 않은 악성 이동 코드에 대한 거시적 대응)

  • Lee, Kang-San;Kim, Chol-Min;Lee, Seong-Uck;Hong, Man-Pyo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.339-348
    • /
    • 2006
  • Recently, many researches on detecting and responding worms due to the fatal infrastructural damages explosively damaged by automated attack tools, particularly worms. Network service vulnerability exploiting worms have high propagation velocity, exhaust network bandwidth and even disrupt the Internet. Previous worm researches focused on signature-based approaches however these days, approaches based on behavioral features of worms are more highlighted because of their low false positive rate and the attainability of early detection. In this paper, we propose a Distributed Worm Detection Model based on packet marking. The proposed model detects Worm Cycle and Infection Chain among which the behavior features of worms. Moreover, it supports high scalability and feasibility because of its distributed reacting mechanism and low processing overhead. We virtually implement worm propagation environment and evaluate the effectiveness of detecting and responding worm propagation.

Feeder Pipe Inspection Robot with an Inch-Worm Mechanism Using Pneumatic Actuators

  • Choi, Chang-Hwan;Jung, Seung-Ho;Kim, Seung-Ho
    • International Journal of Control, Automation, and Systems
    • /
    • v.4 no.1
    • /
    • pp.87-95
    • /
    • 2006
  • The outlet feeder pipe thinning in a PHWR (Pressurized Heavy Water Reactor) is caused by a high pressure steam flow inside the pipe, which is a well known degradation mechanism called a FAC (Flow Assisted Corrosion). In order to monitor the degradation, the thickness of the outlet bends close to the exit of the pressure tube should be measured and analyzed at every official overhaul. This paper describes a mobile feeder pipe inspection robot that can minimize the irradiation dose to human workers by automating the measurement process. The robot can move by itself on the feeder pipe by using an inch worm mechanism, which is constructed by two gripper bodies that can fix the robot body on to the pipe, one extendable and contractible actuator, and a rotation actuator connected to the two gripper bodies to move forward and backward, and to rotate in a circumferential direction.

Pipe Inspection Robot Using an Inch-Worm Mechanism with Embedded Pneumatic Actuators

  • Choi, Chang-Hwan;Jung, Seung-Ho;Kim, Seung-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.346-351
    • /
    • 2005
  • The outlet feeder pipe thinning in a PHWR (Pressurized Heavy Water Reactor) is caused by high pressure steam flow inside the pipe, which is a well known degradation mechanism called FAC (Flow Assisted Corrosion). In order to monitor the degradation, the thickness of the outlet bends closed to the exit of the pressure tube should be measured and analyzed at every official overhaul. This paper develops a mobile feeder pipe inspection robot that can minimize the irradiation dose of human workers by automating the measurement process. The robot can move by itself on the feeder pipe by using an inch worm mechanism, which is constructed by two gripper bodies that can fix the robot body on the pipe, one extendable and contractable actuator, and a rotation actuator connected the two gripper bodies to move forward and backward, and to rotate in the circumferential direction

  • PDF

Threat Analysis of Mobile Environment (모바일 환경에서의 보안위협 분석)

  • Jeong Youn-Seo;Kim Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.749-753
    • /
    • 2006
  • Since the appearance of the first computer virus in 1986, a significant number of new viruses has appeared every year. Recently, there has been a marked increase in the number of mobile malicious code(virus, worm, trojan) in Mobile devices(smart phone, PDA). As a growing number of people use mobile device, we have to prepare for coming mobile attacks. In this paper, we study trends and characteristics of mobile malicious code. And, we describe considerations of on-device and network security in mobile environment.

  • PDF

The Study of Improvement of Personal Information Leakage Prevention in Mobile Environment (모바일 환경에서 개인정보 유출 방지를 위한 개선 연구)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.3
    • /
    • pp.53-62
    • /
    • 2015
  • Recently, number of tablet or Smartphone users increased significantly in domestic and around the world. But violation of personal information such as leakage, misuse and abuse are constantly occurring by using mobile devices which is very useful in our society. Therefore, in this paper it will talk about the problems in the network environment of the mobile environment such as tablet and Smartphone, Mobile Malware, hacking of the public key certificate, which could be potential threat to mobile environment. This thesis will research for people to use their mobile devices more reliable and safer in mobile environment from invasion and leakage of personal information. In order to use Smartphone safely, users have to use Wi-Fi and Bluetooth carefully in the public area. This paper will research how to use App safely and characteristic of risk of worm and Malware spreading. Because of security vulnerabilities of the public key certificate, it will suggest new type of security certification. In order to prevent from the information leakage and infect from Malware in mobile environment without knowing, this thesis will analyze the improved way to manage and use the mobile device.

Architecture for Secure Mobile Agent through STAS System (STAS 시스템을 적용한 안전한 이동 에이전트구조)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1873-1879
    • /
    • 2007
  • As the mobile terminal which uses P2P service increases and it comes to be applied to many fields, mobile agent technology has been applied to P2P and its innovative services has been offered to various fields. However, free mobility of mobile agent technology works like worm, the problem which is contaminated by malicious attacker's attack quickly has appeared and fundamental solution has not been developed yet. This paper proposes STAS (Security Tracking and Auditing Server) system which can offer verification for security of mobile agent in structured P2P environments. Mobile Agent will send data value to STAS via peer so that STAS can verify secure audit and integrity and Mobile agent initiator will obtain the final value of the data from STAS. It can minimize overload of mobile terminal which is occurred by verification of mobile agent and its accomplishment.

Research on Mobile Malicious Code Prediction Modeling Techniques Using Markov Chain (마코프 체인을 이용한 모바일 악성코드 예측 모델링 기법 연구)

  • Kim, JongMin;Kim, MinSu;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.19-26
    • /
    • 2014
  • Mobile malicious code is typically spread by the worm, and although modeling techniques to analyze the dispersion characteristics of the worms have been proposed, only macroscopic analysis was possible while there are limitations in predicting on certain viruses and malicious code. In this paper, prediction methods have been proposed which was based on Markov chain and is able to predict the occurrence of future malicious code by utilizing the past malicious code data. The average value of the malicious code to be applied to the prediction model of Markov chain model was applied by classifying into three categories of the total average, the last year average, and the recent average (6 months), and it was verified that malicious code prediction possibility could be increased by comparing the predicted values obtained through applying, and applying the recent average (6 months).