Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 4 dokumen yang sesuai dengan query
cover
Hendrik Maulana
Abstrak :
Stylometry merupakan teknik analisa terhadap kepengarangan menggunakan statistik. Melalui stylometry, identitas kepengarangan dari suatu dokumen dapat dianalisis dengan tingkat akurasi yang tinggi. Hal ini menyebabkan adanya ancaman terhadap privasi penulis. Namun terdapat salah satu jenis metode dari stylometry yaitu penghapusan identitas kepengarangan yang dapat memberikan perlindungan privasi bagi penulis. Penelitian ini menggunakan metode penghapusan identitas kepengarangan yang diterapkan pada korpus Federalist Paper. Federalist Paper merupakan korpus terkenal yang telah banyak diteliti terutama pada metode identifikasi kepengarangan karena di dalam korpus tersebut terdapat 12 artikel yang tidak diketahui identitas penulisnya, salah satu metode identifikasinya adalah menggunakan algoritma Support Vector Machine. Melalui algoritma tersebut didapatkan identitas penulis dari artikel yang tidak diketahui pengarangnya dengan tingkat akurasi sebesar 86%. Tantangan dari metode penghapusan identitas kepengarangan adalah harus mampu mengubah gaya penulisan dengan tetap mempertahankan makna. Long-Short Term Memory (LSTM) merupakan algoritma berbasis Deep Learning yang mampu melakukan prediksi kata secara baik. Melalui model yang dibentuk dari algoritma LSTM, artikel-artikel dalam Federalist Paper diubah gaya penulisannya. Hasilnya, 30% dari artikel yang diklasifikasi dapat diubah identitas kepengarangannya dari satu penulis menjadi penulis lainnya. Tingkat kemiripan dokumen hasil ubahan berkisar antara 40-57% menandakan perubahan makna yang tidak signifikan dari dokumen aslinya. Hasil tersebut menyimpulkan bahwa metode yang diajukan mampu melakukan penghapusan identitas kepengarangan dengan baik. ......Stylometry is an authorship analysis technique using statistics. Through stylometry, authorship identity of a document can be analyzed with a high degree of accuracy. This causes a threat to the privacy of the author. But there is one type of method of stylometry, namely the elimination of authorship identity which can provide privacy protection for writers. This study uses the authorship method of eliminating the method applied to the Federalist Paper corpus. Federalist Paper is a well-known corpus that has been extensively studied especially in authorship identification methods because there are 12 disputed texts in the corpus, one of the identification methods is using the Support Vector Machine algorithm. Through this algorithm the author's identity of disputed text is obtained with an accuracy of 86%. The challenge of the authorship identity elimination method is that it must be able to change the writing style while maintaining its meaning. Long-Short Term Memory (LSTM) is a Deep Learning based algorithm that is able to predict words well. Through a model formed from the LSTM algorithm, the disputed articles in the Federalist Paper are changed in their writing style. As a result, 30% of classified articles can be changed from one author identity to another identity. The level of similarity of the changed documents ranges from 40-57%, which indicates a change in meaning that is not significant from the original document. These results conclude that the proposed method is able to perform authorship identity deletion properly.
Jakarta: Fakultas Teknik Universitas Indonesia, 2020
T-Pdf
UI - Tesis Membership  Universitas Indonesia Library
cover
Romi Nur Ismanto
Abstrak :
PHP adalah bahasa pemrograman server-side scripting yang banyak digunakan untuk mengembangkan layanan website. Namun, aplikasi PHP berbasis web didistribusikan dalam bentuk source code sehingga sisi keamanannya rentan dan lemah karena baris source code mudah disalin, dimodifikasi, atau digunakan pada aplikasi lainnya. Penelitian bertujuan untuk mengimplementasikan rancangan teknis obfuskasi pada PHP extension code dengan menggunakan algoritma AES. Algoritma AES dipilih karena direkomendasikan NIST (National Institute of Standard and Technology) untuk melindungi sistem keamanan informasi nasional pemerintah Amerika Serikat. Melalui teknik obfuskasi menggunakan enkripsi diharapkan pemrogram memiliki opsi untuk melindungi source code PHP sehingga hak cipta atau kekayaan intelektual atas program dapat terproteksi. ...... PHP is a server-side scripting programming language that is widely used to develop website services. However, web-based PHP applications are distributed in source code so that the security is vulnerable and weak because the lines of source code can be easily copied, modified, or used in other applications. The research aims to implement obfuscation technique design in PHP extension code using AES algorithm. The AES algorithm recommended by NIST (National Institute of Standards and Technology) to protect the US government's national information security system. Through obfuscation technique using encryption, it is expected that programmers have an option to protect the PHP source code so that the copyright or intellectual property of the program can be protected.
Depok: Fakultas Teknik Universitas Indonesia, 2017
T47970
UI - Tesis Membership  Universitas Indonesia Library
cover
Charles Lim
Abstrak :
ABSTRAK Pengemas kode biner umumnya digunakan untuk melindungi kode asli di dalam kode biner yang dapat dieksekusi sehingga terdeteksi sebagai kode berbahaya oleh perangkat lunak anti-malware. Berbagai metode unpacking packed binary executable telah dipelajari secara ekstensif, beberapa pendekatan unpacking telah diajukan. Beberapa solusi ini tergantung pada berbagai asumsi, yang dapat membatasi keefektifannya. Metode baru teknik analisis memori berbasis flux diusulkan untuk menentukan akhir fungsi pembongkaran untuk memungkinkan ekstraksi kode tersembunyi dari kode biner yang dapat dikemas. Hasil penelitian menunjukkan bahwa metode kami memberikan kinerja yang lebih baik daripada metoda sebelumnya dalam mengekstrak kode tersembunyi dari packed binary executable. Khususnya pada packed benign executable menghasilkan nilai similarity rata-rata mencapai 92% bila dibandingkan dengan benign executable original sedangkan 70% sampel malware berhasil diekstraksi dan terdeteksi sebagai unpacked.
ABSTRACT Binary packer has been commonly used to protect the original code inside the binary executables being detected as malicious code by anti-malware software. Various methods of unpacking packed binary executables have been extensively studied, several unpacking approaches have been proposed. Some of these solutions depends on various assumptions, which may limit their effectiveness. A new method of flux-based memory analysis technique is proposed to determine the end of unpacking routine to allow hidden code extraction from the packed binary executables. Our experiments show that our method provides better performance than previous works in extracting the hidden code from the packed binary executable. In particular, experiments on packed benign executable exhibit an average of 92% on similarity compared with the original benign executable while 70% of extracted hidden code from malware samples detected as unpacked.
Depok: Fakultas Teknik Universitas Indonesia, 2019
D2551
UI - Disertasi Membership  Universitas Indonesia Library
cover
Ray, Sandip
Abstrak :
This book offers readers comprehensive coverage of security policy specification using new policy languages, implementation of security policies in Systems-on-Chip (SoC) designs – current industrial practice, as well as emerging approaches to architecting SoC security policies and security policy verification. The authors focus on a promising security architecture for implementing security policies, which satisfies the goals of flexibility, verification, and upgradability from the ground up, including a plug-and-play hardware block in which all policy implementations are enclosed. Using this architecture, they discuss the ramifications of designing SoC security policies, including effects on non-functional properties (power/performance), debug, validation, and upgrade. The authors also describe a systematic approach for “hardware patching”, i.e., upgrading hardware implementations of security requirements safely, reliably, and securely in the field, meeting a critical need for diverse Internet of Things (IoT) devices. - Provides comprehensive coverage of SoC security requirements, security policies, languages, and security architecture for current and emerging computing devices; - Explodes myths and ambiguities in SoC security policy implementations, and provide a rigorous treatment of the subject; - Demonstrates a rigorous, step-by-step approach to developing a diversity of SoC security policies; - Introduces a rigorous, disciplined approach to “hardware patching”, i.e., secure technique for updating hardware functionality of computing devices in-field; - Includes discussion of current and emerging approaches for security policy verification.
Switzerland: Springer Cham, 2019
e20502835
eBooks  Universitas Indonesia Library