Jeongwoo Choi, Yongmin Kim, Jinwoo Lee, Jiman Hong
{"title":"Dynamic code whitelist for efficient analysis of Android code","authors":"Jeongwoo Choi, Yongmin Kim, Jinwoo Lee, Jiman Hong","doi":"10.1145/3264746.3264812","DOIUrl":"https://doi.org/10.1145/3264746.3264812","url":null,"abstract":"Recently, as the number of malicious codes targeting Android platform is increasing, various researches are conducted to analyze them. However, Android applications tend to include various 3rd-party libraries which makes difficult to accurate analysis and takes long time. In this paper, we propose a dynamic code whitelist structure that excludes unnecessary 3rd-party libraries code. By using the proposed structures, we can efficiently analyze the malicious code in Android applications.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124345588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shih-Hao Hung, Yi-Mo Ho, C. Yeh, C. Liu, Chen-Pang Lee
{"title":"Hardware-accelerated cache simulation for multicore by FPGA","authors":"Shih-Hao Hung, Yi-Mo Ho, C. Yeh, C. Liu, Chen-Pang Lee","doi":"10.1145/3264746.3264766","DOIUrl":"https://doi.org/10.1145/3264746.3264766","url":null,"abstract":"Developers often use a virtual platform to develop software before the hardware is available. For software optimization, it is important to profile the cache misses of applications in a realistic operating environment under the virtual platform. In the multicore era, it is hard to simulate the coherence cache miss in a high speed way. In this paper, we propose a hardware-accelerated architecture to simulate the cache misses of a multicore system. We implement the cache miss simulator over a virtual platform with FPGA. Users can profile their software as running over the multicore system. The evaluation shows the throughput achieves 65 MB of trace log per second, when FPGA works in 100 MHz and about 570,000 logic elements are occupied to simulate 4 sets of L1 cache and 1 set of L2 cache in the multicore system with 4 virtual CPUs. The system achieves 1.6 to 2 times of speedup, when comparing with the popular cache miss simulator, Dinero IV. Dinero does less work and does not support coherence cache misses in the multicore system. The evaluation result shows high advantage to speed up the cache miss simulation of the multicore system by the hardware-accelerated architecture as well as FPGA.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126087400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bada Kim, Sangmin Park, Taeyeon Won, Junyoung Heo, Bongjae Kim
{"title":"Deep-learning based web UI automatic programming","authors":"Bada Kim, Sangmin Park, Taeyeon Won, Junyoung Heo, Bongjae Kim","doi":"10.1145/3264746.3264807","DOIUrl":"https://doi.org/10.1145/3264746.3264807","url":null,"abstract":"The GUI building is an important part of web application development. Various studies such as WYSWYG web editor have been conducted to make this job convenient, where the job is composed of sketching of GUI and coding of HTML/CSS from the sketch. In this paper, we propose a novel way of web GUI building with computer vision and deep-learning. The proposed method requires only a hand-drawn sketch to build GUI. It recognizes web layout using computer vision algorithm, and web widgets using Faster R-CNN. With the recognized information, it makes HTML code automatically.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127249509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability analysis of secure USB: based on the fingerprint authentication of product B","authors":"Kyungroul Lee, Byeonggeun Son, Sun-Young Lee, Kangbin Yim","doi":"10.1145/3264746.3264813","DOIUrl":"https://doi.org/10.1145/3264746.3264813","url":null,"abstract":"In order to improve the security of data stored in the USB memory, a secure USB has appeared on the consumer market. The secure USB protects data stored into the device by user authentication, data encryption, and access control. However, in several products, there is a problem in that the data can be stolen due to authentication bypass or key exposure. To solve this problem, a method for enhancing user authentication has been studied, and product B, which typically provides user authentication with biometric authentication, has emerged. In this paper, we analyze the vulnerability of product B that provides a biometric authentication, and we verified the possibility of bypassing the authentication and the incident of potential stealing of the data. Consequently, we consider that it will be possible to develop a more secure USB product based on counteracting analyzed vulnerability as described in this paper.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"140 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129049710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine learning-based colorectal cancer detection","authors":"V. Blanes-Vidal, G. Baatrup, E. Nadimi","doi":"10.1145/3264746.3264785","DOIUrl":"https://doi.org/10.1145/3264746.3264785","url":null,"abstract":"Colorectal capsule endoscopy (CCE) is a potentially valuable patient-friendly technique for colorectal cancer screening in large populations. However, before it can be widely applied, significant research priorities need to be addressed. In this study, we present an innovative machine learning-based algorithm which can considerably improve acquisition and analysis of relevant data on colorectal polyps obtained from capsule endoscopy. The algorithm is to match CCE and colonoscopy polyps, based on objective measures of similarity between polyps. our matching algorithm is able to objectively quantify the similarity between CCE and colonoscopy polyps based on their size, morphology and location, and provides a one-to-one unequivocal match between CCE and colonoscopy polyps.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132309399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seoyeon Kim, Jinmang Jung, T. Son, Chang-Hyoung Ryu, Heesung Woo
{"title":"Implement of mobile server based on micro-webpage for multi-lingual support menu","authors":"Seoyeon Kim, Jinmang Jung, T. Son, Chang-Hyoung Ryu, Heesung Woo","doi":"10.1145/3264746.3264804","DOIUrl":"https://doi.org/10.1145/3264746.3264804","url":null,"abstract":"Recently, along with the increase in the number of foreign tourists around the world, various tourism services are being provided in each country, although there are difficulties in supporting multiple languages, providing real-time information, etc. In this paper, a micro-webpage-based mobile server is proposed to provide the multi-lingual support to foreign tourists. Internet connection is crucial for the conventional methods, because central servers are inter-operated. However, the proposed method supports multiple languages through Wireless Personal Area Network (WPAN). In the proposed method, a mobile client composes and shows a menu by receiving essential data in the native language from a mobile server through WPAN, such as the Wi-Fi Direct.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131849696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sequence homology in circular RNA detection","authors":"Mohammed Sayed, J. Hwang, J. Park","doi":"10.1145/3264746.3264796","DOIUrl":"https://doi.org/10.1145/3264746.3264796","url":null,"abstract":"Over the past two decades, researchers have shown an increasing interest in a special form of alternative splicing (AS) that produces a circular form of RNA distinct from the canonical linear form of RNA. Although several circular RNA detection tools have been developed, achieving both high sensitivity and high precision has been quite challenging in this area. Homologous coding sequences (exons) in the same transcript can lead to incorrect assignment of a read to a back-splicing junction instead of a linear-splicing junction, producing a source of false-positives in circular RNA detection. Although this problem has been mentioned in previous research articles, there has been no effort made to better understand the extent to which it affects sensitivity and precision. In this paper, we investigate the frequency of exon sequence homology in three different species (human, mouse and rat) and how this issue affects accurate detection of circular RNAs from high-throughput sequencing data.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123767844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tingting Zhang, H. Nefs, Hantao Liu, L. Xia, Xiaofeng Liu, Xiaoli Wu
{"title":"Depth-of-field effect in subjective and objective evaluation of image quality","authors":"Tingting Zhang, H. Nefs, Hantao Liu, L. Xia, Xiaofeng Liu, Xiaoli Wu","doi":"10.1145/3264746.3264757","DOIUrl":"https://doi.org/10.1145/3264746.3264757","url":null,"abstract":"Depth of field, as an important image feature, is always ignored when assessing the quality of photographs. The current study compared the subjective image quality evaluation with three NR image quality algorithms: BIQI, BRISQUE, and NIQE on the performance of scoring photographs with different levels of depth of field. The results showed that a large depth of field led to higher image quality in BRISQUE and depth of field did not influence the performance of the other two objective metrics and human perception. We also concluded that objective metrics such as BRISQUE, NIQE, BIQI underestimated the image quality of photographs compared with human perception.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116140587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology modeling for APT attack detection in an IoT-based power system","authors":"Gihoon Kim, Chang Choi, Junho Choi","doi":"10.1145/3264746.3264786","DOIUrl":"https://doi.org/10.1145/3264746.3264786","url":null,"abstract":"Smart grid technology is the core technology for the next-generation power grid system with enhanced energy efficiency through decision-making communication between suppliers and consumers enabled by integrating the IoT into the existing grid. This open architecture allowing bilateral information exchange makes it vulnerable to various types of cyberattack. APT attacks, one of the most common cyberattacks, are highly tricky and sophisticated attacks that can circumvent the existing detection technology and attack the targeted system after a certain latent period after intrusion. This paper proposes an ontology-based attack detection system capable of early detection of and response to APT attacks by analyzing their attacking patterns.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116473973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Android malware detection using convolutional neural networks and data section images","authors":"Jaemin Jung, Jongmoo Choi, Seong-je Cho, Sangchul Han, Minkyu Park, Young-Sup Hwang","doi":"10.1145/3264746.3264780","DOIUrl":"https://doi.org/10.1145/3264746.3264780","url":null,"abstract":"The paper proposes a new technique to detect Android malware effectively based on converting malware binaries into images and applying machine learning techniques on those images. Existing research converts the whole executable files (e.g., DEX files in Android application package) of target apps into images and uses them for machine learning. However, the entire DEX file (consisting of header section, identifier section, data section, optional link data area, etc.) might contain noisy information for malware detection. In this paper, we convert only data sections of DEX files into grayscale images and apply machine learning on the images with Convolutional Neural Networks (CNN). By using only the data sections for 5,377 malicious and 6,249 benign apps, our technique reduces the storage capacity by 17.5% on average compared to using the whole DEX files. We apply two CNN models, Inception-v3 and Inception-ResNet-v2, which are known to be efficient in image processing, and examine the effectiveness of our technique in terms of accuracy. Experiment results show that the proposed technique achieves better accuracy with smaller storage capacity than the approach using the whole DEX files. Inception-ResNet-v2 with the stochastic gradient descent (SGD) optimization algorithm reaches 98.02% accuracy.","PeriodicalId":186790,"journal":{"name":"Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}