摘要:
A system and method for managing a network by value-based estimation is provided. A network device requesting communication is defined as an active point and a network device receiving a request for communication is defined as a passive point. A value of a network device is determined according to the number of active points connected to the corresponding network device, and a value of a network device that is in a path of communication between network devices is determined based on a value of a network device passing through the corresponding network device. When a policy for changing a network environment is transferred in a state where the values of the network devices have been estimated, a policy conflict test is performed on the basis of the estimated values of the network devices, thereby determining application of the policy in due consideration of the values and significance of the network devices.
摘要:
Provided are a fuzzing system and method of a distributed computing environment (DCE) remote procedure call (RPC) object. The fuzzing system includes a file manager, a random data generator, a RPC packet, and a packet injector. The file manager obtains necessary information by parsing and analyzing an idl file for a target object for fuzzing and a file having information about a Named Pipe file. The random data generator generates a random value using a system clock as a factor. The RPC packet creator embodies protocols used for RPC communication by functions and generating a RPC packet for RPC communication. The packet injector inserts the necessary information and the random value into the generated RPC packet and transmits the generated RPC packet to the target object for fuzzing.
摘要:
The present application discloses a pharmaceutical composition for treating Parkinson's disease and psychotropic intoxication/abusive potential, which contains a morphinan compound.
摘要:
An apparatus and method for detecting altered Uniform Resource Locators (URLs) are provided. The apparatus includes a Uniform Resource Locator (URL) information collection unit, a URL HTTP header analysis unit, a URL alteration determination unit, and a control unit. The URL information collection unit collects linked URL information in a web page selected by a user, from a web site. The URL HTTP header analysis unit analyzes the HTTP header information of the URL information. If, as a result of the analysis of the HTTP header information, information about redirection from the URL of the URL information to another URL exists, the URL alteration determination unit determines that the URL is an altered URL. If it is determined that the URL is an altered URL, the control unit extracts the URL information of the URL prior to the alteration and then provides the URL information to the user.
摘要:
The present application discloses a pharmaceutical composition for treating Parkinson's disease and psychotropic intoxication/abusive potential, which contains a morphinan compound.
摘要:
Provided is a method and apparatus for analyzing an exploit code included in a nonexecutable file using a target program with vulnerability in a virtual environment. The method includes the steps of: loading a nonexecutable file including the exploit code by a target program, the target program being executed in a virtual environment and includes vulnerability; analyzing a register value of the target program and determining if the register value of the target program indicates a normal code region; storing log information on operation of the target program when the register value indicates a region other than the normal code region; and extracting and analyzing the exploit code included in the nonexecutable file based on the stored log information. In this method, the exploit code is analyzed in the virtual environment, thereby preventing damage caused by execution of the exploit code.
摘要:
A system and method for analyzing a file format to perform a software security test are provided. The system includes a file scanner for monitoring a program that loads an unknown file on a memory and parsing function parameters of the loaded file, and a file analyzer for receiving the parsing data from the file scanner and extracting a field location and a data type of the unknown file format.
摘要:
A method and an apparatus for authorizing online financial transactions are provided. The apparatus for authorizing online financial transactions includes: randomly selecting, using an apparatus for authorizing online financial transactions, a portion of main transaction information corresponding to a user and combining the selected information to create authorization information; converting the authorization information into a form displayed to the user through a specific process; providing the main transaction information and the converted authorization information to the user; receiving user select information, which is recognized by the user and is part of the main transaction information, and the converted authorization information provided to the user; and comparing the user select information with the authorization information and determining whether the user recognizes the authorization information based on the comparison results.
摘要:
An apparatus and method for preventing falsification of a client screen is provided, in which a web server dynamically generates URIs and provides them to clients, thus preventing the falsification of client screens due to a web injection attack or a memory hacking attack. The apparatus includes a random web generation unit for converting an identical web page into random URIs that are randomly generated, at a request of a plurality of clients, generating different random web sources, and providing the different random web sources to the respective clients. A web falsification determination unit compares display web source eigenvalues respectively generated by the clients with respect to any one of the random web sources with a generative web source eigenvalue for the one of the random web sources, thus determining whether screens corresponding to the random web sources displayed on the respective clients have been falsified.
摘要:
An apparatus for defending a Distributed Denial of Service (DDoS) attack from a mobile terminal is provided. The apparatus includes a monitoring unit, a transmission/non-transmission inquiry unit, and a critical file management unit. The monitoring unit monitors all network data transmitted from a mobile terminal to the outside based on the current mode of the mobile terminal. The transmission/non-transmission inquiry unit asks a user whether to transmit corresponding network data to the outside based on the results of monitoring. The critical file management unit manages a critical file which includes information about at least one protocol used by the mobile terminal and at least one service provided using the protocol.