http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Development of a novel high throughput selection method for proteins with improved solubility
Chakhee KIM,Jonghyeok SHIN,Myungseo PARK,Yunjeong PARK,Hooyeon KIM,Hye Rin KIM,Joon-Bum PARK,Byoungjae KONG,Young-Hun JUNG,Choongjin BAN,Seokoh MOON,Yuna KIM,Seok-Hyeon YU,Sora CHO,Won-Ki MIN,Dae-Hyuk 한국생물공학회 2018 한국생물공학회 학술대회 Vol.2018 No.4
김소람(Soram Kim),김지훈(Jihun Kim),박명서(Myungseo Park),김대운(Daeun Kim),김종성(Jongsung Kim) 한국정보보호학회 2018 정보보호학회논문지 Vol.28 No.2
랜섬웨어는 데이터를 암호화하여 금전을 요구하는 악성프로그램이다. 전 세계적으로 랜섬웨어에 대한 피해가 증가하고 있으며 기업, 공공기관, 병원을 대상으로 하는 타깃형 공격이 늘어나고 있다. 또한 랜섬웨어가 서비스화 되어 유포되기 때문에 하나의 랜섬웨어가 발견되면 이후에 해당 랜섬웨어와 유사한 변종이 많이 발견된다. 이에 따라 랜섬웨어에 대한 정확한 분석이 해당 랜섬웨어뿐만 아니라 변종 랜섬웨어 복호화 방안 모색에 기반이 될 수 있다. 본 논문에서는 2017년 6월에 발견된 Erebus 랜섬웨어에 대해 암호학적 요소와 암호화 과정을 분석하였으며, 해당 결과를 기반으로 암호학적 취약점 및 메모리 분석 연구를 진행하였다. Ransomware is a malicious program that requires money by encrypting data. The damage to ransomware is increasing worldwide, and targeted attacks for corporations, public institutions and hospitals are increasing. As a ransomware is serviced and distributed, its various usually emerge. Therefore, the accurate analysis of ransomware can be a decryption solution not only for that ransomware but also for its variants. In this paper, we analyze a cryptographic elements and encryption process for Erebus found in June, 2017, and investigate its cryptographic vulnerability and memory analysis.
Fumarate-Mediated Persistence of <i>Escherichia coli</i> against Antibiotics
Kim, Jun-Seob,Cho, Da-Hyeong,Heo, Paul,Jung, Suk-Chae,Park, Myungseo,Oh, Eun-Joong,Sung, Jaeyun,Kim, Pan-Jun,Lee, Suk-Chan,Lee, Dae-Hee,Lee, Sarah,Lee, Choong Hwan,Shin, Dongwoo,Jin, Yong-Su,Kweon, Da American Society for Microbiology 2016 Antimicrobial agents and chemotherapy Vol.60 No.4
<P>Bacterial persisters are a small fraction of quiescent cells that survive in the presence of lethal concentrations of antibiotics. They can regrow to give rise to a new population that has the same vulnerability to the antibiotics as did the parental population. Although formation of bacterial persisters in the presence of various antibiotics has been documented, the molecular mechanisms by which these persisters tolerate the antibiotics are still controversial. We found that amplification of the fumarate reductase operon (FRD) in Escherichia coli led to a higher frequency of persister formation. The persister frequency of E. coli was increased when the cells contained elevated levels of intracellular fumarate. Genetic perturbations of the electron transport chain (ETC), a metabolite supplementation assay, and even the toxin-antitoxin-related hipA7 mutation indicated that surplus fumarate markedly elevated the E. coli persister frequency. An E. coli strain lacking succinate dehydrogenase (SDH), thereby showing a lower intracellular fumarate concentration, was killed similar to 1,000-fold more effectively than the wild-type strain in the stationary phase. It appears that SDH and FRD represent a paired system that gives rise to and maintains E. coli persisters by producing and utilizing fumarate, respectively.</P>
패딩 오라클 공격에 따른 다양한 패딩방법의 안전성 분석
김기문(Kim-Kimoon),박명서(Park-Myungseo),김종성(Kim-Jongsung),이창훈(Lee-Changhoon),문덕재(Moon-Dukjae),홍석희(Hong-Seokhee) 한국정보보호학회 2015 정보보호학회논문지 Vol.25 No.2
인터넷 뱅킹이나 전자상거래 같은 응용 환경에서 개인정보 및 민감한 정보를 보호하기 위해서 다양한 암호 알고리즘들을 사용한다. 하지만 안전성이 검증된 암호 알고리즘을 사용하여 중요 정보를 암호화 하더라도 운영모드, 패딩방법 등 암호화를 적용하는 방법이 올바르지 못하면 암호화된 중요 정보들이 노출 된다는 연구결과와 방법들이 소개되고 있다. 이러한 공격방법 중 대표적인 사례가 패딩 오라클 공격(Padding Oracle Attack)이다. 본 논문에서는 블록암호의 CBC(Cipher Block Chainning) 운영모드에 적용 가능한 12가지 패딩방법에 대하여 패딩오라클 공격의 가능성을 분석하였다. 그 결과, 3가지의 안전한 패딩방법과 9가지의 안전하지 않은 패딩방법으로 분류할 수 있다. 3가지의 안전한 패딩방법 분석을 통해 패딩 오라클 공격에 내성을 가질 수 있도록 안전한 패딩방법 설계 시 고려해야 할 5가지 사항에 대하여 제안하고자 한다. We use various types of cryptographic algorithms for the protection of personal and sensitive informations in the application environments, such as an internet banking and an electronic commerce. However, recent researches were introduced that if we implement modes of operation, padding method and other cryptographic implementations in a wrong way, then the critical information can be leaked even though the underlying cryptographic algorithms are secure. Among these attacking techniques, the padding oracle attack is representative. In this paper, we analyze the possibility of padding oracle attacks of 12 kinds of padding techniques that can be applied to the CBC operation mode of a block cipher. As a result, we discovered that 3 kinds were safe padding techniques and 9 kinds were unsafe padding techniques. We propose 5 considerations when designing a safe padding techniques to have a resistance to the padding oracle attack through the analysis of three kinds of safe padding techniques.
How to decrypt PIN-Based encrypted backup data of Samsung smartphones
Park, Myungseo,Kim, Hangi,Kim, Jongsung Elsevier 2018 Digital investigation Vol.26 No.-
<P>In this paper, we propose a method to decrypt the Samsung smartphone backup data which is encrypted by a user input called PIN (Personal Identification Number) and a Samsung backup program called Smart Switch. In particular, we develop algorithms to recover the PIN and to decrypt the PIN-based encrypted backup data as well. We have experimentally verified the PIN recovery backup data decryption up to 9 digits of PIN. Our implementation using a precomputed PIN-table with memory 30.51 GB takes about 11 min to recover a 9-digit PIN. To the best of our knowledge, this is the first result of decrypting PIN-based encrypted backup data of Samsung smartphones. (C) 2018 Elsevier Ltd. All rights reserved.</P>