Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717822
Eunhoe Kim, Sungmin Kim, Jaeyoung Choi
As the copyright for apps in smartphones is not protected properly, a number of illegally-copied apps are widely used. This gives rises to the degradation of the app market's transparency and reliability. In this paper, we propose a method detecting illegally-copied apps on the Android devices in order to solve the aforementioned problem. The illegally-copied app detector allows the user not to know whether it is running and offers a concealment function, which the user can't access or remove forcibly from outside. In addition, the proposed detector uses signature-based forensic marking techniques, which determines whether the app is illegally copied or not. The illegally-copied app detector can effectively prevent the use of the illegally-copied app installed or stored in internal/external memory on Android Devices.
{"title":"Detecting Illegally-Copied Apps on Android Devices","authors":"Eunhoe Kim, Sungmin Kim, Jaeyoung Choi","doi":"10.1109/ICITCS.2013.6717822","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717822","url":null,"abstract":"As the copyright for apps in smartphones is not protected properly, a number of illegally-copied apps are widely used. This gives rises to the degradation of the app market's transparency and reliability. In this paper, we propose a method detecting illegally-copied apps on the Android devices in order to solve the aforementioned problem. The illegally-copied app detector allows the user not to know whether it is running and offers a concealment function, which the user can't access or remove forcibly from outside. In addition, the proposed detector uses signature-based forensic marking techniques, which determines whether the app is illegally copied or not. The illegally-copied app detector can effectively prevent the use of the illegally-copied app installed or stored in internal/external memory on Android Devices.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121716436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717785
Do-Heon Lee, Su-Kyoung Yoon, Cheong-Ghil Kim, Shin-Dug Kim, Jung-Geun Kim
As new non-volatile memories are emerging, it is the right time to re-evaluate the conventional memory hierarchy by considering the potential of utilizing new non-volatile memory components. This research is to design a new PRAM-based main memory structure, supporting the advantages of PRAM while providing performance similar to that of conventional DRAM main memory. To replace conventional DRAMs with non- volatile PRAMs as the main memory components, comparable memory access latency and memory cell endurance should be supported. For these goals, we propose a space effective DRAM adapter for PRAM based main memory system. The DRAM adapter consists of two page-block buffers to assure better use of spatial locality and two filtering buffers for better use of temporal locality. The proposed structure is evaluated by a trace-driven simulator using SPEC CPU 2006 traces. Experimental results show that the proposed DRAM adapter can reduce the access latency by around 60% and can increase lifetime of PRAM by around 20 times in comparison with the PRAM-based main memory without any adapter. Thus, our proposed memory architecture can be used to replace the current DRAM-based main memory system.
{"title":"A Space Effective DRAM Adapter for PRAM-Based Main Memory System","authors":"Do-Heon Lee, Su-Kyoung Yoon, Cheong-Ghil Kim, Shin-Dug Kim, Jung-Geun Kim","doi":"10.1109/ICITCS.2013.6717785","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717785","url":null,"abstract":"As new non-volatile memories are emerging, it is the right time to re-evaluate the conventional memory hierarchy by considering the potential of utilizing new non-volatile memory components. This research is to design a new PRAM-based main memory structure, supporting the advantages of PRAM while providing performance similar to that of conventional DRAM main memory. To replace conventional DRAMs with non- volatile PRAMs as the main memory components, comparable memory access latency and memory cell endurance should be supported. For these goals, we propose a space effective DRAM adapter for PRAM based main memory system. The DRAM adapter consists of two page-block buffers to assure better use of spatial locality and two filtering buffers for better use of temporal locality. The proposed structure is evaluated by a trace-driven simulator using SPEC CPU 2006 traces. Experimental results show that the proposed DRAM adapter can reduce the access latency by around 60% and can increase lifetime of PRAM by around 20 times in comparison with the PRAM-based main memory without any adapter. Thus, our proposed memory architecture can be used to replace the current DRAM-based main memory system.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130619994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717791
Eun Kim, Yun-Seok Lee, Seong-Yun Kim, Jung-Won Choi, Min-soo Jung
In recent years, there are also actively being studied the applicable applications based on NFC that can apply as the form of convergence of the application. Typically, there are mobile payment services. This is because of technologies that it can ensure the efficiency of user's side and the safety of the important personal payment information. However, various problems have also been pointed out as like unsupported of the personal information, exposure of payment information. Therefore, in this paper, we analyze the security threats, security requirements and security modules in as you proceed the payment using the NFC-based mobile.
{"title":"A Study on the Information Protection Modules for Secure Mobile Payments","authors":"Eun Kim, Yun-Seok Lee, Seong-Yun Kim, Jung-Won Choi, Min-soo Jung","doi":"10.1109/ICITCS.2013.6717791","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717791","url":null,"abstract":"In recent years, there are also actively being studied the applicable applications based on NFC that can apply as the form of convergence of the application. Typically, there are mobile payment services. This is because of technologies that it can ensure the efficiency of user's side and the safety of the important personal payment information. However, various problems have also been pointed out as like unsupported of the personal information, exposure of payment information. Therefore, in this paper, we analyze the security threats, security requirements and security modules in as you proceed the payment using the NFC-based mobile.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122785287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717773
Jeong-Seok Jang, Min Soo Kang, Kyounghak Lee
By using radio propagation predictions of Rec. ITU-R P.1546 combined with geographic information, formulations for field calculation and interference analysis are presented in the VHF and UHF bands. To illustrate some computational results for given system parameters, virtual geographic information data are taken into account.
{"title":"A Development of Prediction Program for Electric Field Strength Using the ITU-R. P.1546 Recommendation with Geographic Information","authors":"Jeong-Seok Jang, Min Soo Kang, Kyounghak Lee","doi":"10.1109/ICITCS.2013.6717773","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717773","url":null,"abstract":"By using radio propagation predictions of Rec. ITU-R P.1546 combined with geographic information, formulations for field calculation and interference analysis are presented in the VHF and UHF bands. To illustrate some computational results for given system parameters, virtual geographic information data are taken into account.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126235773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717798
Shwu-Huey Yen, Chun-Hui Wang
In this paper a simple and effective crowd behavior normality method is proposed. We use the histogram of oriented social force (HOSF) as the feature vector to encode the observed events of a surveillance video. A dictionary of codewords is trained to include typical HOSFs. To detect whether an event is normal is accomplished by comparing how similar to the closest codeword via z-value. The proposed method includes the following characteristic: (1) the training is automatic without human labeling; (2) instead of object tracking, the method integrates particles and social force as feature descriptors; (3) z-score is used in measuring the normality of events. The method is testified by the UMN dataset with promising results.
{"title":"Abnormal Event Detection Using HOSF","authors":"Shwu-Huey Yen, Chun-Hui Wang","doi":"10.1109/ICITCS.2013.6717798","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717798","url":null,"abstract":"In this paper a simple and effective crowd behavior normality method is proposed. We use the histogram of oriented social force (HOSF) as the feature vector to encode the observed events of a surveillance video. A dictionary of codewords is trained to include typical HOSFs. To detect whether an event is normal is accomplished by comparing how similar to the closest codeword via z-value. The proposed method includes the following characteristic: (1) the training is automatic without human labeling; (2) instead of object tracking, the method integrates particles and social force as feature descriptors; (3) z-score is used in measuring the normality of events. The method is testified by the UMN dataset with promising results.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"59 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120922633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717859
Kazuaki Aihara, T. Aoki
In this paper, we propose the motion dense sampling (MDS) for video classification, which detects very informative interest points from video frames. MDS has two advantages compared to other existing methods. The first advantage is that MDS detects only interest points which belong to foreground regions of all regions of a video frame. Also it can detect the constant number of points even when the size of foreground region in an image drastically changes. The Second one is that MDS enable to describe scale invariable features by computing sampling scale for each frame based on the size of foreground regions. Thus, our method detects much more informative interest points from videos than other methods. Experimental results show a significant improvement over existing methods on YouTube dataset. Our method achieves 86.8% accuracy for video classification by using only one descriptor.
{"title":"Motion Dense Sampling for Video Classification","authors":"Kazuaki Aihara, T. Aoki","doi":"10.1109/ICITCS.2013.6717859","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717859","url":null,"abstract":"In this paper, we propose the motion dense sampling (MDS) for video classification, which detects very informative interest points from video frames. MDS has two advantages compared to other existing methods. The first advantage is that MDS detects only interest points which belong to foreground regions of all regions of a video frame. Also it can detect the constant number of points even when the size of foreground region in an image drastically changes. The Second one is that MDS enable to describe scale invariable features by computing sampling scale for each frame based on the size of foreground regions. Thus, our method detects much more informative interest points from videos than other methods. Experimental results show a significant improvement over existing methods on YouTube dataset. Our method achieves 86.8% accuracy for video classification by using only one descriptor.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130077662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717799
Chi-Hun Lim, Seok-Ho Yoon, Seung-Hwan Choi, Kwang-Hyung Lee, Choong-Ho Cho
We propose the adaptive handover parameter adjustment algorithm in order to provide improved end-user experience as well as increased network capacity. This is done by automatically adapting cell parameters to adjust handover boundaries based on feedback of performance indicators. This paper focuses on an adaptation of actual level of cell individual offset according to the position of the user in a cell. Evaluations of proposal in term of efficiency of the redundant Radio Link Failure reduction as well as an impact on the user`s throughput are carried out. The results show significant reduction of RLF while reducing the impact on the throughput.
{"title":"Adaptive Mobility Robustness Adjustment Scheme for LTE-Femto System","authors":"Chi-Hun Lim, Seok-Ho Yoon, Seung-Hwan Choi, Kwang-Hyung Lee, Choong-Ho Cho","doi":"10.1109/ICITCS.2013.6717799","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717799","url":null,"abstract":"We propose the adaptive handover parameter adjustment algorithm in order to provide improved end-user experience as well as increased network capacity. This is done by automatically adapting cell parameters to adjust handover boundaries based on feedback of performance indicators. This paper focuses on an adaptation of actual level of cell individual offset according to the position of the user in a cell. Evaluations of proposal in term of efficiency of the redundant Radio Link Failure reduction as well as an impact on the user`s throughput are carried out. The results show significant reduction of RLF while reducing the impact on the throughput.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121420769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717779
N. Wattanapongsakorn, E. Wonghirunsombat, C. Charnsripinyo, T. Assawaniwed, V. Hanchana, S. Srakaew
Many incidents of network attacks and security threats have been previously reported. Damages caused by network attacks and malware tend to be high. In this paper, we present a network-based Intrusion Detection and Prevention System (IDPS), which can detect network attacks and Internet Worms. The proposed system can immediately classify network attack types (i.e. DoS, Probe) and Internet worm from normal network traffic by using traffic classification technique and selected well-known machine learning algorithms (i.e. Decision TreeC4.5, Random Forest, Ripple Rule, Bayesian Network, Back Propagation Neural Network) in both standalone mode and distributed mode. The proposed IDPS also allows system administrator to update existing rule sets or learn new trained data sets with a user-friendly graphic user interface. In our experiments, we can correctly detect and prevent network attacks with high accuracy, more than 99%.
{"title":"A Network-Based Internet Worm Intrusion Detection and Prevention System","authors":"N. Wattanapongsakorn, E. Wonghirunsombat, C. Charnsripinyo, T. Assawaniwed, V. Hanchana, S. Srakaew","doi":"10.1109/ICITCS.2013.6717779","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717779","url":null,"abstract":"Many incidents of network attacks and security threats have been previously reported. Damages caused by network attacks and malware tend to be high. In this paper, we present a network-based Intrusion Detection and Prevention System (IDPS), which can detect network attacks and Internet Worms. The proposed system can immediately classify network attack types (i.e. DoS, Probe) and Internet worm from normal network traffic by using traffic classification technique and selected well-known machine learning algorithms (i.e. Decision TreeC4.5, Random Forest, Ripple Rule, Bayesian Network, Back Propagation Neural Network) in both standalone mode and distributed mode. The proposed IDPS also allows system administrator to update existing rule sets or learn new trained data sets with a user-friendly graphic user interface. In our experiments, we can correctly detect and prevent network attacks with high accuracy, more than 99%.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121426594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717771
Young Chun Kwon, Nakhoon Baek
It is not so easy for amateur astronomers or ordinary persons to find a specific celestial body on the night sky. We represent a celestial map rendering program which reproduces the night sky at the specific time and location. With the OpenGL-based full 3D-graphics features, our system brings a sense of spatial realism. For the more accurate celestial map rendering, we referred to a set of star catalogues including Messier list, Yale Catalog of Bright Stars, and others. Since it is developed on typical PC's, our system can provide accurate celestial maps in an interactive manner, without any special equipment.
对于业余天文学家或普通人来说,要在夜空中找到一个特定的天体并不容易。我们代表了一个天体地图绘制程序,它再现了特定时间和地点的夜空。借助基于opengl的全3d图形功能,我们的系统带来了空间真实感。为了更准确地绘制天体图,我们参考了一套恒星目录,包括Messier list, Yale Catalog of Bright Stars等。由于该系统是在典型的PC上开发的,因此不需要任何特殊的设备,我们的系统可以以交互式的方式提供精确的天体地图。
{"title":"A Celestial Map Renderer Based on 3D Graphics System","authors":"Young Chun Kwon, Nakhoon Baek","doi":"10.1109/ICITCS.2013.6717771","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717771","url":null,"abstract":"It is not so easy for amateur astronomers or ordinary persons to find a specific celestial body on the night sky. We represent a celestial map rendering program which reproduces the night sky at the specific time and location. With the OpenGL-based full 3D-graphics features, our system brings a sense of spatial realism. For the more accurate celestial map rendering, we referred to a set of star catalogues including Messier list, Yale Catalog of Bright Stars, and others. Since it is developed on typical PC's, our system can provide accurate celestial maps in an interactive manner, without any special equipment.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128603437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-01DOI: 10.1109/ICITCS.2013.6717820
Sangwon Bang, Kyeong-Jin Park, Woo-Sung Kim, Geun-Duk Park, Dong-Hyuk Im
Mobile coupon is an electronic ticket and is currently used for a financial discount and rebate. NFC is a short range wireless standard and has an advantage that the communication is very simple. In this paper, we propose a NFC-based mobile coupon for small traders and enterprisers. Since it is expensive for small shops to create and distribute their own coupons, NFC communication is only used to send the customer's identification. Users can receive and check coupon information from their mobile phones. In addition, our platform provides some community service that the small merchants work together.
{"title":"Design and Implementation of NFC-Based Mobile Coupon for Small Traders and Enterprisers","authors":"Sangwon Bang, Kyeong-Jin Park, Woo-Sung Kim, Geun-Duk Park, Dong-Hyuk Im","doi":"10.1109/ICITCS.2013.6717820","DOIUrl":"https://doi.org/10.1109/ICITCS.2013.6717820","url":null,"abstract":"Mobile coupon is an electronic ticket and is currently used for a financial discount and rebate. NFC is a short range wireless standard and has an advantage that the communication is very simple. In this paper, we propose a NFC-based mobile coupon for small traders and enterprisers. Since it is expensive for small shops to create and distribute their own coupons, NFC communication is only used to send the customer's identification. Users can receive and check coupon information from their mobile phones. In addition, our platform provides some community service that the small merchants work together.","PeriodicalId":420227,"journal":{"name":"2013 International Conference on IT Convergence and Security (ICITCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}