• Title/Summary/Keyword: Analysis on Vulnerability

Search Result 964, Processing Time 0.033 seconds

Deformation-based vulnerability functions for RC bridges

  • Elnashai, A.S.;Borzi, B.;Vlachos, S.
    • Structural Engineering and Mechanics
    • /
    • v.17 no.2
    • /
    • pp.215-244
    • /
    • 2004
  • There is an ever-increasing demand for assessment of earthquake effects on transportation structures, emphasised by the crippling consequences of recent earthquakes hitting developed countries reliant on road transportation. In this work, vulnerability functions for RC bridges are derived analytically using advanced material characterisation, high quality earthquake records and adaptive inelastic dynamic analysis techniques. Four limit states are employed, all based on deformational quantities, in line with recent development of deformation-based seismic assessment. The analytically-derived vulnerability functions are then compared to a data set comprising observational damage data from the Northridge (California 1994) and Hyogo-ken Nanbu (Kobe 1995) earthquakes. The good agreement gives some confidence in the derived formulation that is recommended for use in seismic risk assessment. Furthermore, by varying the dimensions of the prototype bridge used in the study, and the span lengths supported by piers, three more bridges are obtained with different overstrength ratios (ratio of design-to-available base shear). The process of derivation of vulnerability functions is repeated and the ensuing relationships compared. The results point towards the feasibility of deriving scaling factors that may be used to obtain the set of vulnerability functions for a bridge with the knowledge of a 'generic' function and the overstrength ratio. It is demonstrated that this simple procedure gives satisfactory results for the case considered and may be used in the future to facilitate the process of deriving analytical vulnerability functions for classes of bridges once a generic relationship is established.

A study on Dirty Pipe Linux vulnerability

  • Tanwar, Saurav;Kim, Hee Wan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.17-21
    • /
    • 2022
  • In this study, we wanted to examine the new vulnerability 'Dirty Pipe' that is founded in Linux kernel. how it's exploited and what is the limitation, where it's existed, and overcome techniques and analysis of the Linux kernel package. The study of the method used the hmark[1] program to check the vulnerabilities. Hmark is a whitebox testing tool that helps to analyze the vulnerability based on static whitebox testing and automated verification. For this purpose of our study, we analyzed Linux kernel code that is downloaded from an open-source website. Then by analyzing the hmark tool results, we identified in which file of the kernel it exists, cvss level, statistically depicted vulnerabilities on graph which is easy to understand. Furthermore, we will talk about some software we can use to analyze a vulnerability and how hmark software works. In the case of the Dirty Pipe vulnerability in Linux allows non-privileged users to execute malicious code capable of a host of destructive actions including installing backdoors into the system, injecting code into scripts, altering binaries used by elevated programs, and creating unauthorized user profiles. This bug is being tracked as CVE-2022-0847 and has been termed "Dirty Pipe"[2] since it bears a close resemblance to Dirty Cow[3], and easily exploitable Linux vulnerability from 2016 which granted a bad actor an identical level of privileges and powers.

The Impact of Environmental Health Factors on Extreme-heat Vulnerability Assessment in a Metropolitan City (환경보건적 요소가 도시 내 폭염 취약성 평가 결과에 미치는 영향 분석)

  • Lee, Won-Jung;Kang, Jae-Eun;Kim, Yoo-Keun
    • Journal of Environmental Health Sciences
    • /
    • v.39 no.6
    • /
    • pp.492-504
    • /
    • 2013
  • Objectives: This analysis seeks to evaluate the impact of environmental health factors (EHF; e.g. hospital beds per capita, employees of medical institutions) on extreme-heat vulnerability assessment in Busan Metropolitan City during 2006-2010. Methods: According to the vulnerability concept suggested by the Intergovernmental Panel on Climate Change (IPCC), extreme-heat vulnerability is comprised of the categories of Exposure, Sensitivity, and Adaptive Capacity (including EHF). The indexes of the Exposure and Sensitivity categories indicate positive effects, while the Adaptive capacity index indicates a negative effect on extreme-heat vulnerability. Variables of each category were standardized by the re-scaling method, and then each regional relative vulnerability was computed with the vulnerability index calculation formula. Results: The extreme-heat vulnerability index (EVI) excepting EHF was much higher in urban areas than in suburban areas within the metropolitan area. When EHF was considered, the difference in the EVI between the two areas was reduced due to the increase of the Adaptive capacity index in urban areas. The low EVI in suburban areas was induced by a dominant effect of natural environmental factors (e.g. green area) within the Adaptive capacity category. Conclusions: To reduce the vulnerability to extreme heat in urban areas, which were more frequently exposed to extreme heat than others areas, public health and natural environments need to be improved in sensitive areas.

Vibration Fatigue Analysis of Automotive Fuel Tank Using Transfer Function Method (Transfer Function Method를 이용한 자동차 연료탱크의 진동 피로 해석에 대한 연구)

  • Ahn, Sang Ho
    • Journal of Auto-vehicle Safety Association
    • /
    • v.12 no.3
    • /
    • pp.27-33
    • /
    • 2020
  • In this paper, the process of predicting efficient durability performance for vibration durability test of automobile parts using vibration test load on automobile fuel tank is presented. First of all, the common standard load that can be applied to the initial development process of the automobile was used for the fuel tank and the vulnerability of the fuel tank to the vibration fatigue load was identified through frequency response analysis. In addition, the vulnerability of the fuel tank was re-enacted through vibration durability test results, and the scale factor was applied to the standard load. In order to predict the vibration durability performance required for detailed design, vibration fatigue analysis was performed on the developed vehicle with the frequency of vibration severity equivalent to the durability test, and the vulnerability and life span of the fuel tank were identified through the process of applying weights to these selected standard loads, thereby reducing the test time of the development vehicle.

The relationship between the stress in college life, vulnerability to depression, and smartphone overuse among undergraduate students majoring in public health (보건계열 학부생의 대학생활 스트레스, 우울 취약성 및 스마트폰 과다사용의 관련성)

  • Kwon, Hay-Ran;Park, Si-Eun;Park, Dae-Sung
    • The Korean Journal of Emergency Medical Services
    • /
    • v.17 no.3
    • /
    • pp.87-100
    • /
    • 2013
  • purpose: This study aims to understand the relationship between stress in college life, vulnerability to depression, and smartphone overuse among undergraduate students majoring in public health. Methods: The subjects of the study were 320 students who were selected through convenience sampling from the department of emergency medical technology, physical therapy, and public health and administration attending G University in Gwangju. The study was carried out from October 22 to 26, 2012. For final analysis, 266 copies were used. Statistical analysis was done using SPSS WIN 12.0. Results: Excessive use of smartphones had a negative effect on stress in college life and vulnerability to depression. The stress of college life had an effect on students' sense of value, their friends of the same sex, and job. Depressive vulnerability had an effect on a students' dependency. Conclusion: For the prevention of smartphone overuse, programs to prevent college life stress and vulnerability to depression should be developed. Counselling programs for the groups should be made available to the students.

A Case Study of Scour Vulnerability Evaluation for Shallow Foundations during Floods (홍수시 얕은기초의 세굴위험도 평가 사례연구)

  • Park, Jae-Hyun;Lee, Ju-Hyung;Chung, Moon-Kyung;Kwak, Ki-Seok
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.59-62
    • /
    • 2008
  • Scour vulnerability evaluation for shallow foundations was performed to assure bridge safety against scour in the national capital region. The case studies for 26 shallow foundations consisted of site investigation including boring test, bridge scour analysis for the design flood, bearing capacity evaluation of the bridge foundation before and after scour, and comprehensive evaluation of bridge scour vulnerability. Bridge scour vulnerability was determined based on the interdisciplinary concept considering predicted scour depth for the design floods and bearing capacity of foundation as well as dimensions of foundation. Nine of 26 shallow foundations showed the potential future vulnerability to scour with significant decrease in the bearing capacity of foundations due to scour and the remaining 17 were expected to maintain their stability against scour.

  • PDF

The Plan and Tools for Vulnerability Testing in Information Software-Based System

  • Kim, In-Jung;Lee, Young-Gyo;Won, Dong-Ho
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.75-78
    • /
    • 2005
  • Although many tests for stabilization of the software have been done, vulnerability test for a system run by combination of the software of various products has not been conducted enough. This has led to increased threats and vulnerability of system. Especially, web-based software system, which is public, has inherent possibility of exposure to attacks and is likely to be seriously damaged by an accident. Consequently, comprehensive and systematic test plans and techniques are required. Moreover, it is necessary to establish a procedure for managing and handling the results of vulnerability test. This paper proposes vulnerability test plans and designs for implementing automated tools, both of which can be complied with on web-based software systems.

Automated Attack Path Enumeration Method based on System Vulnerabilities Analysis (시스템 취약점 분석을 통한 침투 경로 예측 자동화 기법)

  • Kim, Ji Hong;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1079-1090
    • /
    • 2012
  • As the number of information asset and their vulnerabilities are increasing, it becomes more difficult for network security administrators to assess security vulnerability of their system and network. There are several researches for vulnerability analysis based on quantitative approach. However, most of them are based on experts' subjective evaluation or they require a lot of manual input for deriving quantitative assessment results. In this paper, we propose HRMS(Hacking and Response Measurement System) for enumerating attack path using automated vulnerability measurement automatically. HRMS can estimate exploitability of systems or applications based on their known vulnerability assessment metric, and enumerate attack path even though system, network and application's information are not fully given for vulnerability assessment. With this proposed method, system administrators can do proactive security vulnerability assessment.

Seismic performance evaluation of RC bearing wall structures

  • Rashedi, Seyed Hadi;Rahai, Alireza;Tehrani, Payam
    • Computers and Concrete
    • /
    • v.30 no.2
    • /
    • pp.113-126
    • /
    • 2022
  • Reinforced concrete bearing walls (RCBWs) are one of the most applicable structural systems. Therefore, vulnerability analysis and rehabilitation of the RCBW system are of great importance. In the present study, in order to the more precise investigation of the performance of this structural resistant system, pushover and nonlinear time history analyses based on several assumptions drawing upon experimental research were performed on several models with different stories. To validate the nonlinear analysis method, the analytical and experimental results are compared. Vulnerability evaluation was carried out on two seismic hazard levels and three performance levels. Eventually, the need for seismic rehabilitation with the basic safety objective (BSO) was investigated. The obtained results showed that the studied structures satisfied the BSO of the seismic rehabilitation guidelines. Consequently, according to the results of analyses and the desired performance, this structural system, despite its high structural weight and rigid connections and low flexibility, has integrated performance, and it can be a good option for earthquake-resistant constructions.

A Method and Application of Vulnerability Analysis for Combat Systems Considering Threats and Defense Ability : Focused on PKM Model (위협의 특성과 장갑의 방호 성능을 고려한 전투 시스템의 취약성 분석 방법 및 활용 : 고속정 모델을 대상으로)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Kang, Ji-Won;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1623-1631
    • /
    • 2016
  • There are many researches which analyze vulnerability for combat systems, have been progressing, and apply the analyzed result to reflect on design phase. Recently, there have been requirements for integrating the previous module based researches which conducted independently. In this paper, we propose an integrated vulnerability analysis method for the combat system considering characteristics of threats and protection performance of armors through an analysis of the advanced research. In addition, by applying the proposed method improves the existing hit probability analysis program and we are verified based on scenarios for improving survivability of PKM (Petrol Killer Medium) for vulnerability analysis confirmed the results. The proposed method improves reliability of vulnerability analysis by considering threats and defense ability. Also it able to satisfied with the integration requirements. Furthermore, we became buildup for the development of applied system and the method and integrated vulnerability analysis method for combat systems.