http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
SPaRe: Efficient SQLite Recovery Using Database Schema Patterns
( Suchul Lee ),( Sungil Lee ),( Jun-rak Lee ) 한국인터넷정보학회 2017 KSII Transactions on Internet and Information Syst Vol.11 No.3
In recent times, the Internet of Things (IoT) has rapidly emerged as one of the most influential information and communication technologies (ICT). The various constituents of the IoT together offer novel technological opportunities by facilitating the so-called “hyper-connected world.” The fundamental tasks that need to be performed to provide such a function involve the transceiving, storing, and analyzing of digital data. However, it is challenging to handle voluminous data with IoT devices because such devices generally lack sufficient computational capability. In this study, we examine the IoT from the perspective of security and digital forensics. SQLite is a light-weight database management system (DBMS) used in many IoT applications that stores private information. This information can be used in digital forensics as evidence. However, it is difficult to obtain critical evidence from IoT devices because the digital data stored in these devices is frequently deleted or updated. To address this issue, we propose Schema Pattern-based Recovery (SPaRe), an SQLite recovery scheme that leverages the pattern of a database schema. In particular, SPaRe exhaustively explores an SQLite database file and identifies all schematic patterns of a database record. We implemented SPaRe on an iPhone 6 running iOS 7 in order to test its performance. The results confirmed that SPaRe recovers an SQLite record at a high recovery rate.
Frequency Diversity-Aware Wi-Fi Using OFDM-Based Bloom Filters
Suchul Lee,Jaehyuk Choi,Joon Yoo,Chong-Kwon Kim IEEE Computer Society 2015 IEEE Transactions on Mobile Computing Vol. No.
<P>With the increasing move towards wide band operation in recent Wi-Fi networks, the frequency diversity awareness has become critical for throughput optimization. To exploit frequency diversity in Wi-Fi channels, the access point should measure the channel quality and coordinate the channel contention for all the stations. However, there is a tradeoff between achieving the frequency diversity gain and sustaining protocol efficiency because the channel estimation and coordination consume time and frequency resource that ideally should be used for data transfer. In this paper, we present Diversity-aware Wi-Fi (D-Fi), a novel PHY/MAC protocol, that efficiently exploits frequency diversity. In particular, D-Fi leverages an OFDM-based Bloom filter that synergistically integrates two operations: (i) the channel quality estimation and (ii) the contention based channel allocation. D-Fi also employs a machine learning (ML) method to resolve the false-positive ambiguity caused by the Bloom filter. Furthermore, we develop a decentralized algorithm, called Kε-greedy, based on the Multi-Armed Bandit (MAB) framework, so that it achieves sub-optimal performance by studying the gain for exploring new channel quality information. We implement the prototype of D-Fi on the USRP/GNURadio to validate the feasibility of our work. The experiments and trace-driven simulations show that D-Fi provides up to 3 x throughput improvement compared to the existing solutions.</P>
An Oligopoly Spectrum Pricing with Behavior of Primary Users for Cognitive Radio Networks
( Suchul Lee ),( Sangsoon Lim ),( Jun-rak Lee ) 한국인터넷정보학회 2014 KSII Transactions on Internet and Information Syst Vol.8 No.4
Dynamic spectrum sharing is a key technology to improve spectrum utilization in wireless networks. The elastic spectrum management provides a new opportunity for licensed primary users and unlicensed secondary users to efficiently utilize the scarce wireless resource. In this paper, we present a game-theoretic framework for dynamic spectrum allocation where the primary users rent the unutilized spectrum to the secondary users for a monetary profit. In reality, due to the ON-OFF behavior of the primary user, the quantity of spectrum that can be opportunistically shared by the secondary users is limited. We model this situation with the renewal theory and formulate the spectrum pricing scheme with the Bertrand game, taking into account the scarcity of the spectrum. By the Nash-equilibrium pricing scheme, each player in the game continually converges to a strategy that maximizes its own profit. We also investigate the impact of several properties, including channel quality and spectrum substitutability. Based on the equilibrium analysis, we finally propose a decentralized algorithm that leads the primary users to the Nash-equilibrium, called DST. The stability of the proposed algorithm in terms of convergence to the Nash equilibrium is also studied.
Piosk : A Practical Kiosk To Prevent Information Leakage
Suchul Lee,Sungil Lee,Hayoung Oh,Seokmin Han 한국인터넷방송통신학회 2019 Journal of Advanced Smart Convergence Vol.8 No.2
One of important concerns in information security is to control information flow. It is whether to protect confidential information from being leaked, or to protect trusted information from being tainted. In this paper, we present Piosk (Physical blockage of Information flow Kiosk) that addresses both the problems practically. Piosk can forestall and prevent the leakage of information, and defend inner tangible assets against a variety of malwares as well. When a visitor who carries a re-writable portable storage device, must insert the device into Piosk installed next to the security gate. Then, Piosk scans the device at the very moment, and detects & repairs malicious codes that might be exist. After that, Piosk writes the contents (including sanitized ones) on a new read-only portable device such as a compact disk. By doing so, the leakage of internal information through both insiders and outsiders can be prevented physically. We have designed and prototyped Piosk. The experimental verification of the Piosk prototype implementation reveals that, Piosk can accurately detect every malware at the same detection level as Virus Total and effectively prevent the leakage of internal information. In addition, we compare Piosk with the state-of-the-art methods and describe the special advantages of Piosk over existing methods.
Piosk : A Practical Kiosk To Prevent Information Leakage
Lee, Suchul,Lee, Sungil,Oh, Hayoung,Han, Seokmin The Institute of Internet 2019 International journal of advanced smart convergenc Vol.8 No.2
One of important concerns in information security is to control information flow. It is whether to protect confidential information from being leaked, or to protect trusted information from being tainted. In this paper, we present Piosk (Physical blockage of Information flow Kiosk) that addresses both the problems practically. Piosk can forestall and prevent the leakage of information, and defend inner tangible assets against a variety of malwares as well. When a visitor who carries a re-writable portable storage device, must insert the device into Piosk installed next to the security gate. Then, Piosk scans the device at the very moment, and detects & repairs malicious codes that might be exist. After that, Piosk writes the contents (including sanitized ones) on a new read-only portable device such as a compact disk. By doing so, the leakage of internal information through both insiders and outsiders can be prevented physically. We have designed and prototyped Piosk. The experimental verification of the Piosk prototype implementation reveals that, Piosk can accurately detect every malware at the same detection level as Virus Total and effectively prevent the leakage of internal information. In addition, we compare Piosk with the state-of-the-art methods and describe the special advantages of Piosk over existing methods.
Suchul Lee,Jong-yi Hong,Euiho Suh 한국경영정보학회 2014 한국경영정보학회 학술대회논문집 Vol.2014 No.1
The benefits, strategies and guideline of CoP have been investigated based on the various analysis tools in the many research. Although performance evaluation yields information about the current situation and inefficient parts, research relating to performance evaluation of CoP has been limited so far. Therefore, we suggest not only the holistic and systematic methods based on Data Envelopment Analysis (DEA) for understanding and assessing the current position of CoP but also the suggestions for cultivating the CoP. This research provides beneficial information in terms of grasping the whole picture according to efficiency change of the virtual CoP. Furthermore, the suggested framework can guide decisionmaking to evaluate efficiency of CoP and to select the appropriate strategies for cultivating CoP.