http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Anti-angiogenesis is one of therapies which have been high-lightened on the research of cancer treatment. Anti-angiogenesis means that new blood vessels are created from a existing capillary tube and it is a important process on metastasis and permeation when cancer is created or formed. Since angiogenesis have been under research, a complete recovery oriented treatment against cancer have been suggested blocking metastasis, delaying the growth of cancer cell, and blocking the supply of oxygen and nutritive substance through the web of blood vessels. Until now, there are several anti-angiogenesis, which have been known to the public, such as thalidomide, angiostatin, endostatin, 2-methoxyestradiol, TNP-470, and marimastat, etc. Additionally, 17 clinical testing projects about anti-angiogenesis are on the process in NCI(National Cancer Institute). Especially, TNP-470 showed effectiveness against cancer on clinical testing after finishing animal testing. Based on existing researches showing that Yinsamyangwui-tang is effective to strengthening body resistance and Whallakhyolenyng-dan effects cells on the inside of blood vessel because Whallakhyolenyng- dan restrains cell adhesion during the restraining period of a blood vessel, I tried to research the effect of Whalakhyolenyng-dan plus Yinsamyangwui-tang on angiogenesis. I made a conclusion putting into operation through using SK-Hep-1 (KCLB 30052), A549(KCLB 10185), AGS(KCLB 21739), and BCE(Bovine Capillary Endothelial Cell). Followings are the results of my experimental research: Ⅰ. According to the researching results of anti-cancer activation against cancer cell, Whallkhyoleyng-dan plus Yinsamyangwui-tang decreased the number of cancer cells -- While injecting 600 ㎍/㎖, injected groups decreased 3.1% more comparing with the contrastivegroup of SK-Hep-l, 49.7% more comparing with the contrastive group of A549, and 31.0% more comparing with the contrastive group of AGS. Ⅱ. According to the researching results of DNA composition effect between BCE and cancer cell, Whallakhyoleyng-dan plus Yinsamyangwui-tang reduced the rate of SK-Hep-1 synthesis inhibition by 59.1% at 600 ㎍/㎖ intensity comparing with contrastive group; for A549, 72.6%; for AGS, 6.1%, for BCE, 28.9%. Ⅲ. According to the researching results about the effect of BCE cell to angiogenesis, angiogenesis was restrained at 400 ㎍/㎖ intensity during 18 hours observation. Ⅳ. In the case of aortic ring assay, the half level of angiogenesis was reduced comparing with the contrastive group while injecting with 400 ㎍/㎖ intensity; with 800 ㎍/㎖, under 10% comparing with contrastive group; and with 1600 ㎍/㎖, complete restrain. According to the above results, Whallakhyoleyng-dan plus Yinsamyangwui-tang was proved to have an anti-angiogenetic effects.
가상머신 내 mutex 공유 자원을 이용한 은닉 채널 구현
고기완 성균관대학교 일반대학원 2020 국내석사
클라우드 컴퓨팅 환경에서 은닉 채널은 보안 위협 요소이다. 은닉 채널을 이용해 방화벽을 우회하거나 네트워크를 사용할 수 없는 폐쇄된 환경에서 은밀하게 민감한 정보를 추출할 수 있다. 공유 자원 간섭으로 인해 가상머신 간의 격리가 위반되고 은닉 채널 구현이 가능하다. 가상머신 간의 격리는 클라우드 컴퓨팅 환경에서 중요한 보안 요소이다. 본 논문에서는 Hyper-V 하이퍼바이저의 구조를 분석하여 가상머신 간의 은닉 채널을 구현한다. Hyper-V는 가상머신 간의 상호 배제를 위해 mutex(mutual exclusion) 기법을 사용한다. Mutex로 인해 가상머신 간의 간섭이 발생하고 은닉 채널 구현이 가능함을 밝힌다. 구조가 복잡한 Hyper-V에 적용 가능한 mutex 자원 탐색 방안을 고안하여 은닉 채널을 다수 구현하였다. Mutex 기반 은닉 채널은 하드웨어 의존적이지 않다. 하드웨어에 의존적일 경우 시스템 환경에 따라 은닉 채널을 구현하지 못한다. Mutex 기반 은닉 채널은 탐지되거나 방어되는 경우 다수의 은닉 채널 중에서 다른 은닉 채널을 이용하면 방어 기법 회피가 가능하다. In a cloud computing environment, covert channels are a security threat. Isolation between virtual machines in a cloud computing environment is an important security factor. The violation of isolation between virtual machines leads to interferences of shared resources and the implementation of covert channels. In this paper, the structure of Hyper-V hypervisor is analyzed to implement covert channels between virtual machines. Hyper-V uses a mutex technique for mutual exclusion between virtual machines. It indicates that isolation of virtual machines is violated and covert channels can be implemented due to mutex. We implemented several covert channels by designing a method for searching mutex resources applicable to Hyper-V with complex architectures. The mutex-based covert channel is not hardware dependent. Hardware-dependent covert channels are influenced by hardware vendors and models. If the covert channel is detected or defended, the defensive technique can be avoided by using the other covert channel among several covert channels.