RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
          펼치기
        • 주제분류
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • S-OpenSGX: A system-level platform for exploring SGX enclave-based computing

        Choi, C.,Kwak, N.,Jang, J.,Jang, D.,Oh, K.,Kwag, K.,Kang, B.B. North-Holland ; Elsevier Science Ltd 2017 Computers & security Vol.70 No.-

        <P>Intel recently introduced Software Guard Extensions (SGX) to enable applications to protect their selected code and data from privileged platform software. As it draws wider attention from the security research community, an open-source emulator for SGX (OpenSGX) has been developed to allow researchers to explore the SGX environment. To the best of our knowledge, OpenSGX is currently the only publicly available SGX emulation platform; however, its system-level support is largely limited owing to its user-mode emulation. In particular, experiments that require system functionalities or device emulation cannot be conducted with the current OpenSGX. To solve this problem, we propose System-OpenSGX (S-OpenSGX), which leverages QEMU's system emulation to provide researchers with full system-level support for exploring SGX enclave-based programming. In this paper, we show the design of S-OpenSGX, including system functionalities such as scheduling, multithreading, page table handling, and SGX paging. Non-trivial issues derived from the difference between user-mode and system emulation, and our approaches to addressing them are also described. Lastly, we utilize S-OpenSGX to experiment with a new mitigation method against the data leaking attack on enclave threads and an APIC (Advanced Programmable Interrupt Controller) device modification to reduce SGX's mode switch overhead. (C) 2017 Elsevier Ltd. All rights reserved.</P>

      • SCIESCOPUS

        A survey on touch dynamics authentication in mobile devices

        Teh, P.S.,Zhang, N.,Teoh, A.B.J.,Chen, K. North-Holland ; Elsevier Science Ltd 2016 Computers & security Vol.59 No.-

        <P>There have been research activities in the area of keystroke dynamics biometrics on physical keyboards (desktop computers or conventional mobile phones) undertaken in the past three decades. However, in terms of touch dynamics biometrics on virtual keyboards (modem touchscreen mobile devices), there has been little published work. Particularly, there is a lack of an extensive survey and evaluation of the methodologies adopted in the area. Owing to the widespread use of touchscreen mobile devices, it is necessary for us to examine the techniques and their effectiveness in the domain of touch dynamics biometrics. The aim of this paper is to provide some insights and comparative analysis of the current state of the art in the topic area, including data acquisition protocols, feature data representations, decision making techniques, as well as experimental settings and evaluations. With such a survey, we can gain a better understanding of the current state of the art, thus identifying challenging issues and knowledge gaps for further research. (C) 2016 Elsevier Ltd. All rights reserved.</P>

      • Secure bimodal PIN-entry method using audio signals

        Lee, M.K.,Nam, H.,Kim, D.K. North-Holland ; Elsevier Science Ltd 2016 Computers & security Vol.56 No.-

        <P>A Personal Identification Number (PIN) is a multiple-digit sequence widely used for user authentication. It is desirable for a PIN-entry method to be secure against two main security threats, random guessing attacks and recording attacks. Although there have been many proposals for challenge-response-based PIN-entry methods, it is well known that the only way to prevent both attacks is to physically prevent attackers from observing the challenge response pairs, which motivates the development of PIN-entry methods that use secure secondary channels such as audio signals. To provide a guideline for designing an audio based PIN-entry method, we propose a simple framework to transform a non-audio-based method into an audio-based one. We also present a new PIN-entry method that improves the performance of this simple transformation. Most audio-based methods in the literature are unimodal methods, that is, they transmit almost all required information through an audio channel because it was believed that this approach maximized the user's performance. In this paper, however, we show that a carefully designed bimodal system may be more usable than a unimodal one. We present a new PIN-entry method whose audio channel only transmits the minimal required data while most of the challenge information is transmitted through the efficient visual channel. Our user study shows that the PIN-entry time of the proposed method is shorter than those of the previous audio-based methods, while its error rate is kept as low as that of the previous methods. (C) 2015 Elsevier Ltd. All rights reserved.</P>

      • Analyzing research trends in personal information privacy using topic modeling

        Choi, H.S.,Lee, W.S.,Sohn, S.Y. North-Holland ; Elsevier Science Ltd 2017 Computers & security Vol.67 No.-

        <P>This study examines trends in academic research on personal information privacy. Using Scopus DB, we extracted 2356 documents covering journal articles, reviews, book chapters, conference papers, and working papers published between 1972 and August 2015. Latent Dirichlet allocation (LDA) is applied to the abstracts of those extracted documents to identify topics. Topics discovered from all documents focus mainly on technology, and the findings indicate that algorithms, Facebook privacy, and online social networks have become prominent topics. In contrast, it was observed that journal articles put more emphasis on both the e-business and healthcare. These results identify a research gap in the area of personal information privacy and offer a direction for future research. (C) 2017 Elsevier Ltd. All rights reserved.</P>

      • SCIESCOPUS

        Quality of Private Information (QoPI) model for effective representation and prediction of privacy controls in mobile computing

        Kim, S.H.,Ko, I.Y.,Kim, S.H. North-Holland ; Elsevier Science Ltd 2017 Computers & security Vol.66 No.-

        <P>Most existing privacy-control methods in mobile computing support only binary and static privacy controls; therefore, it is usually difficult for mobile users to make use of effective privacy controls by considering both the necessity of an application and the types and quality of private information to be provided to the application under dynamic usage scenarios. In this paper, we define a quality of private information (QoPI) model to represent various types and quality levels of users' private information required by mobile applications. Using the QoPI model, we can also represent contextual properties that might affect the selection of the types and quality of private information in dynamic mobile computing situations. Users' common privacy-control patterns can be characterized, represented, and managed by using this model, and we can assist users in achieving context-aware and personalized privacy control. We evaluate the effectiveness of using the QoPI model by analyzing the data that we collected from users while allowing them to consider practical mobile computing situations. The analysis results show that the users actively utilized the fine-grained (multilevel) privacy controls supported by using the QoPI model, and their privacy -control patterns could be effectively collected and predicted based on this model. The results also show that consideration of contextual properties is essential for improving the accuracy and time performance of predicting an appropriate QoPI level to be used when a user accesses a mobile application. (C) 2017 Elsevier Ltd. All rights reserved.</P>

      • Invi-server: Reducing the attack surfaces by making protected server invisible on networks

        Park, J.,Noh, J.,Kim, M.,Kang, B.B. North-Holland ; Elsevier Science Ltd 2017 Computers & security Vol.67 No.-

        <P>The advantage of having remote access motivates network administrators to connect mission critical servers (e.g., enterprise management systems) as well as public web servers via the Internet, even though connecting these mission-critical servers to the Internet is not recommended. These mission-critical or public servers are accessible from any host on the Internet, allowing cyber attackers to engage the targeted server as part of a process to discover potential exploits and unpatched vulnerabilities. Although it would be difficult to eradicate all the potential vulnerabilities in advance, accessibility to a server can be controlled to limit or minimize the chance of exposing a vulnerable surface. We aimed to address the accessibility issue by designing and prototyping an Invi-server system, in which the IP and MAC addresses of the protected secret server remain invisible from external scanning and eavesdropping trials and even from compromised internal hosts on the network. This Invi-server system can be used as a way to reduce the attack surface of a protected server while allowing authorized users to send and receive packets via the protected server. We also implemented a prototype of the Invi-server system to demonstrate that our proposed system has the ability to reduce the attack surfaces significantly without increasing network performance overhead to any significant extent. (C) 2017 Published by Elsevier Ltd.</P>

      • On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators

        Kim, Y.,Kwon, O.,Jang, J.,Jin, S.,Baek, H.,Kang, B.B.,Yoon, H. North-Holland ; Elsevier Science Ltd 2016 Computers & security Vol.62 No.-

        <P>General-Purpose computing on a Graphics Processing Unit (GPGPU) involves leveraging commodity GPUs as massively parallel processing units. GPGPU is an emerging computing paradigm for high-performance and data-intensive computations such as cryptographic operations. Although GPGPU is an attractive solution for accelerating modem cryptographic operations, the security challenges that stem from utilizing commodity GPUs remain an unresolved problem. In this paper, we present an On-demand Bootstrapping Mechanism for Isolated cryptographic operations (OBMI). OBMI transforms commodity GPUs into a securely isolated processing core for various cryptographic operations while maintaining cost-effective computations. By leveraging System Management Mode (SMM), a privileged execution mode provided by x86 architectures, OBMI implements a program and a secret key into the GPU such that they are securely isolated during the acceleration of cryptographic operations, even in the presence of compromised kernels. Our approach does not require an additional hardware-abstraction layer such as a hypervisor or micro-kernel, and it does not entail modifying the GPU driver. An evaluation of the proposed OBMI demonstrated that even adversaries with kernel privileges cannot gain access to the secret key, and it also showed that the proposed mechanism incurs negligible performance degradation for both the CPU and GPU. (C) 2016 Elsevier Ltd. All rights reserved.</P>

      • Rosuvastatin inhibits norepinephrine-induced cardiac hypertrophy via suppression of G<sub>h</sub>

        Choi, E.Y.,Chang, W.,Lim, S.,Song, B.W.,Cha, M.J.,Kim, H.J.,Choi, E.,Jang, Y.,Chung, N.,Hwang, K.C. North-Holland ; Elsevier Science Ltd 2010 european journal of pharmacology Vol.627 No.1

        Statins have recently been shown to produce anti-cardiac hypertrophic effects via the regulation of small GTPases. However, the effects of statins on G protein-mediated cardiac hypertrophy, which is the main pathway of cardiac hypertrophy, have not yet been studied. We sought to evaluate whether statin treatment directly suppresses cardiac hypertrophy through a large G protein-coupled pathway regardless of the regulation of small GTPases. Using neonatal rat cardiomyocytes, we evaluated norepinephrine-induced cardiac hypertrophy for suppressibility of rosuvastatin and the pathways involved by analyzing total protein/DNA content, cell surface area, immunoblotting and RT-PCR for the signal transduction molecule. In a concentration-dependent manner, rosuvastatin inhibited total protein synthesis and downregulated basal and norepinephrine-induced expressions of myosin light chain2 and the c-fos proto-oncogene in cardiomyocytes. Treatment with norepinephrine induced cardiac hypertrophy accompanied by G<SUB>h</SUB> expression and membrane translocation. Rosuvastatin inhibited G<SUB>h</SUB> protein activity in cardiomyocytes by inhibiting basal and norepinephrine-stimulated mRNA transcription, protein expression and membrane translocation; however, norepinephrine-stimulated G<SUB>q</SUB> protein expression was not inhibited. In addition, the norepinephrine-stimulated protein kinase C (PKC)-mitogen-activated protein kinase (MEK 1,2)-extracellular signal-regulated kinases (ERKs) signaling cascade was inhibited by pretreatment with rosuvastatin. Rosuvastatin treatment also helped maintain expression levels of SERCA2a and intracellular calcium concentration. G<SUB>h</SUB> protein is a novel target of statins in myocardial hypertrophy, and statin treatment may directly suppress cardiac hypertrophy through a large G<SUB>h</SUB> protein-coupled pathway regardless of the regulation of small GTPases.

      • SCISCIESCOPUS

        Riordan group involutions and the Δ-sequence

        Cheon, G.S.,Jin, S.T.,Kim, H.,Shapiro, L.W. North Holland ; Elsevier Science Ltd 2009 Discrete Applied Mathematics Vol.157 No.8

        Several important combinatorial arrays, after inserting some minus signs, turn out to be involutions when considered as lower triangular matrices. Among these are the Pascal, RNA, and directed animal matrices. These examples and many others are in the Bell subgroup of the Riordan group. We characterize all such pseudo-involutions by means of a single sequence called the Δ-sequence. Finally we compute the Δ-sequences for the powers of a pseudo-involution in the Bell subgroup.

      • Anticonvulsant effect of wogonin isolated from Scutellaria baicalensis

        Park, H.G.,Yoon, S.Y.,Choi, J.Y.,Lee, G.S.,Choi, J.H.,Shin, C.Y.,Son, K.H.,Lee, Y.S.,Kim, W.K.,Ryu, J.H.,Ko, K.H.,Cheong, J.H. North-Holland ; Elsevier Science Ltd 2007 european journal of pharmacology Vol.574 No.2

        In previous studies, we identified sedative effects of Scutellaria baicalensis extracts and found that these extracts or their constituents may also have anticonvulsive effects. Wogonin is a natural product isolated from S. baicalensis, which possesses central nervous system effects such as anxiolytic and neuroprotective activities. In this study, we investigated the effects of wogonin on convulsion related behaviors, such as myorelaxation, motor coordination, and anticonvulsant effects of wogonin on chemical induced seizure and electroshock seizure in mice or rats. The effect of wogonin on membrane potential was also observed. Wogonin was intraperitoneally injected into mice or rats 30 min prior to testing. Animals treated with wogonin did not change locomotor activities as well as endurance times on the rota-rod, which indicates that wogonin did not cause a sedative and myorelaxation effect. Wogonin significantly blocked convulsion induced by pentylenetetrazole and electroshock but not convulsion induced by strychnine. Wogonin also significantly reduced the electrogenic response score, but flumazenil treatment reversed this decrease to the level of the control group. The wogonin treatment increased Cl<SUP>-</SUP>influx into the intracellular area as dose increased. Flumazenil and bicuculline treatment, however, inhibited the Cl<SUP>-</SUP> influx induced by wogonin. These results indicate that the anticonvulsive effects produced by wogonin were mediated by the GABAergic neuron.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼