• 제목/요약/키워드: Application Integrity

검색결과 528건 처리시간 0.025초

A Car Black Box Video Data Integrity Assurance Scheme Using Cyclic Data Block Chaining (순환형 데이터 블록 체이닝을 이용한 차량용 블랙박스의 영상 데이터 무결성 보장 기법)

  • Yi, Kang;Kim, Kyung-Mi;Cho, Yong Jun
    • Journal of KIISE
    • /
    • 제41권11호
    • /
    • pp.982-991
    • /
    • 2014
  • The integrity assurance of recorded video by car black boxes are necessary as the car black box is becoming more popular. In this paper, we propose a video data integrity assurance scheme reflecting the features of car black box. The proposed method can detect any kind of deletion, insertion, modification of frames by cyclic chaining using inter block relation. And, it provides the integrity assurance function consistently even in cases of file overwriting because of no more free space in storage, partial file data lost. And non-repudiation is supported. Experimental results with a car black box embedded system with A8 application processor show that our method has a feasible computational overhead to process full HD resolution video at 30 frames per second in a real time.

A Study on the Verification of Integrity of Message Structure in Naval Combat Management System

  • Jung, Yong-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • 제27권12호
    • /
    • pp.209-217
    • /
    • 2022
  • Naval CMS(Combat Management System) is linked to various sensors and weapon equipment and use DDS(Data Distribution Service) for efficient data communication between ICU(Interface Control Unit) Node and IPN(Information Processing Node). In order to use DDS, software in the system communicates in an PUB/SUB(Publication/Subscribe) based on DDS topic. If the DDS messages structure in this PUB/SUB method does not match, problems such as incorrect command processing and wrong information delivery occur in sending and receiving application software. To improve this, this paper proposes a DDS message structure integrity verification method. To improve this, this paper proposes a DDS message structure integrity verification method using a hash tree. To verify the applicability of the proposed method to Naval CMS, the message integrity verification rate of the proposed method was measured, and the integrity verification method was applied to CMS and the initialization time of the existing combat management system was compared and the hash tree generation time of the message structures was measured to understand the effect on the operation and development process of CMS. Through this test, It was confirmed that the message structure verification method for system stability proposed in this paper can be applied to the Naval CMS.

Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors

  • Heo, Ingoo;Jang, Daehee;Moon, Hyungon;Cho, Hansu;Lee, Seungwook;Kang, Brent Byunghoon;Paek, Yunheung
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제15권1호
    • /
    • pp.48-59
    • /
    • 2015
  • In recent years, there are increasing threats of rootkits that undermine the integrity of a system by manipulating OS kernel. To cope with the rootkits, in Vigilare, the snoop-based monitoring which snoops the memory traffics of the host system was proposed. Although the previous work shows its detection capability and negligible performance loss, the problem is that the proposed design is not acceptable in recent commodity mobile application processors (APs) which have become de facto the standard computing platforms of smart devices. To mend this problem and adopt the idea of snoop-based monitoring in commercial products, in this paper, we propose a snoop-based monitor design called S-Mon, which is designed for the AP platforms. In designing S-Mon, we especially consider two design constraints in the APs which were not addressed in Vigilare; the unified memory model and the crossbar switch interconnect. Taking into account those, we derive a more realistic architecture for the snoop-based monitoring and a new hardware module, called the region controller, is also proposed. In our experiments on a simulation framework modeling a productionquality device, it is shown that our S-Mon can detect the rootkit attacks while the runtime overhead is also negligible.

Towards the Application of Safety Integrity Level for Improving Process Safety (공정안전향상을 위한 Safety Integrity Level의 적용 방향)

  • Kwon, Hyuck-Myun;Park, Hee-Chul;Chun, Young-Woo;Park, Jin-Hyung
    • Journal of the Korean Society of Safety
    • /
    • 제27권5호
    • /
    • pp.64-69
    • /
    • 2012
  • The concept of SIL is applied in the most of all standards relating to functional system safety. However there are problems for the people to apply SIL to their plants. as these standards don't include sufficient informations. In this regards, this paper will suggest the direction of SIL application and concept based on IEC 61508 and IEC 61511. A Safety Integrity Level(SIL) is the discrete level(one out of possible fours), corresponding to a range of the probability of an E/E/PE (Electric/Electrical/Programmable Electrical) safety-related system satisfactorily performing the specific safety functions under all the stated conditions within a stated period of time. SIL can be divided into the target SIL(or required SIL) and the result SIL. The target SIL is determined by the risk analysis at the analysis phase of safety lifecycle and the result SIL is calculated during SIL verification at the realization phase of safety lifecycle. The target SIL is determined by the risk analysis like LOPA(Layer Of Protection Analysis), Risk Graph, Risk Matrix and the result SIL is calculated by HFT(Hardware Fault Tolerance), SFF(Safe Failure Fraction) and PFDavg(average Probability of dangerous Failure on Demand). SIL is applied to various areas such as process safety, machinery(road vehicles, railway application, rotating equipment, etc), nuclear sector which functional safety is applied. The functional safety is the part of the overall safety relating to the EUC and the EUC control system that depends on the correct functioning of the E/E/PE safety-related systems and other risk reduction measures. SIL is applied only to the functional safety of SIS(Safety Instrumented System) in safety. EUC is the abbreviation of Equipment Under Control and is the equipment, machinery, apparatus or plant used for manufacturing, process, transportation, medical or other activities.

A Study of Attacks to Bypass CFI on Android Application Environment (안드로이드 애플리케이션 환경에서 CFI 우회 공격기법 연구)

  • Lee, Ju-yeop;Choi, Hyoung-kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제30권5호
    • /
    • pp.881-893
    • /
    • 2020
  • CFI(Control Flow Integrity) is a mitigation mechanism that protects programs by verifying control flows. IFCC(Indirect Function Call Checks) and SCS(Shadow Call Stack), CFI supported by LLVM Clang compiler, were introduced to protect applications in Android. IFCC protects function calls and SCS protects function returns. In this paper, we propose attacks to bypass CFI on the application environment with IFCC and SCS. Even if IFCC and SCS were applied to user applications, it was confirmed that there were many code segments not protected by IFCC and SCS in the application memory. We execute code in CFI unprotected segments to construct 1) bypassing IFCC to call a protected function, 2) modulating return address via SCS bypass. We identify code segments not protected by IFCC and SCS in Android10 QP1A. 191005.007.A3. We also implement proof-of-concept exploits to demonstrate that modulation of control flow is possible in an environment where IFCC and SCS are applied.

A PKI-based Secure Multiagent Engine (PKI 기반의 보안 다중 에이전트 엔진)

  • 장혜진
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제3권4호
    • /
    • pp.319-324
    • /
    • 2002
  • The Integration of agent technology and security technology is needed to many application areas like electronic commerce. This paper suggests a model of extended multi-agent engine which supports privacy, integrity, authentication and non-repudiation on agent communication. Each agent which is developed with the agent engine is composed of agent engine layer and agent application layer. We describe and use the concepts self-to-self messages, secure communication channel, and distinction of KQML messages in agent application layer and messages in agent engine layer. The suggested agent engine provides an agent communication language which is extended to enable secure communication between agents without any modifications or restrictions to content layer and message layer of KQML. Also, in the model of our multi-agent engine, secure communication is expressed and processed transparently on the agent communication language.

  • PDF

Two-Failure Gps Raim by Parity Space Approach (패러티 공간을 이용한 2개 GPS 파라미터 고장진단)

  • Yoo, Chang-Sun;Ahn, Iee-Ki;Lee,Sang-Jeong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • 제31권6호
    • /
    • pp.52-60
    • /
    • 2003
  • In aviation navigation using GPS, requirements on availability and integrity must be absolutely satisfied. Current study on accomplishing this integrity includes RAIM(Receiver Autonomous Integrity Monitoring), monitoring integrity internaIly in GPS receiver itself. Parity space technique as one of RAIM techniques has shown the advantages in fault detection and isolation due to each use of its magnitude and direction under the assumption of one fault. ln case of multiple fault, as biases in errors interact decreasing the effect of multiple fault in parity space, the exact fault detection and identification(FDI) may be difficult to be conducted. This paper focuses on FDI study on two faults and explains why parity space techniques applied on single fault is not adequate to the application of multiple fault case and shows that extended parity space technique may improve the performance of RAIM on two faults.

A study on academic integrity in dental education (치의학 교육의 학습윤리에 관한 연구)

  • Kim, Hee-Kyung;Lee, Ji-Hyun;Kim, Sung-Hun;Baek, Jeong-Hwa;Han, Jung-Suk;Rhyu, In-Chul
    • The Journal of the Korean dental association
    • /
    • 제55권3호
    • /
    • pp.215-228
    • /
    • 2017
  • The topic of academic integrity is an important public concern that has emerged in higher education. Recent surveys at U.S. and Canadian dental schools revealed that cheating and plagiarism were significant problems in dental schools. In addition, some schools stated that cheating had increased compared to a decade ago. Various institutional rituals have been implemented to enhance the academic integrity environment of U. S. and Canadian dental schools. Furthermore, the application of honor code which is dealing with ethical issues has been reported to improve the attitudes and behaviors of students. Since there have been no reported studies regarding ethics curricula in Korean dental schools, further studies should be needed to assess academic integrity policies, violations, and the results of the measures in Korean dental schools. Additionally, the challenge to provide professional ethics curricula for dental students must be conducted with respect and humanity for our students and thus, students will be more likely to respond positively to expectations in terms of ethical behaviors. Therefore, the outcome is clearly and undoubtedly link to better care for patients.

  • PDF

Design and Implementation of e2eECC for Automotive On-Chip Bus Data Integrity (차량용 온칩 버스의 데이터 무결성을 위한 종단간 에러 정정 코드(e2eECC)의 설계 및 구현)

  • Eunbae Gil;Chan Park;Juho Kim;Joonho Chung;Joosock Lee;Seongsoo Lee
    • Journal of IKEEE
    • /
    • 제28권1호
    • /
    • pp.116-122
    • /
    • 2024
  • AMBA AHB-Lite bus is widely used in on-chip bus protocol for low-power and cost-effective SoC. However, it lacks built-in error detection and correction for end-to-end data integrity. This can lead to data corruption and system instability, particularly in harsh environments like automotive applications. To mitigate this problem, this paper proposes the application of SEC-DED (Single Error Correction-Double Error Detection) to AMBA AHB-Lite bus. It aims not only to detect errors in real-time but also to correct them, thereby enhancing end-to-end data integrity. Simulation results demonstrate real-time error detection and correction when errors occur, which bolsters end-to-end data integrity of automotive on-chip bus.

Adhesive Performance of Waterproofing System on Concrete Substrate with Moisture Condition (콘크리트 표면 함수비에 따른 교면방수재료의 인장접착성능)

  • 박성기;심재원;이병덕
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 한국콘크리트학회 2001년도 봄 학술발표회 논문집
    • /
    • pp.979-984
    • /
    • 2001
  • Poor water-proofing integrity is related to many factors : site procedure, workmanship, weather. substrate conditions, installation(including asphalt application) conditions. The evaluation of adhesive properties tested by concrete surface moisture and asphalt application was based on laboratory test and observations. This report describes the pull-off test results of waterproofing systems currently used for installing and reparing for concrete bridge decks. The test results showed that the moisture condition fully affected the adhesive properties of sheet membranes and sealer but partially for liquid membranes.

  • PDF