• Title/Summary/Keyword: Application Integrity

Search Result 528, Processing Time 0.024 seconds

A study on the vulnerability of integrity verification functions of android-based smartphone banking applications (안드로이드 스마트폰 뱅킹 앱 무결성 검증 기능의 취약점 연구)

  • Kim, Soonil;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.743-755
    • /
    • 2013
  • In recent years, the malicious apps with malicious code in normal apps are increasingly redistributed in Android market, which may incur various problems such as the leakage of authentication information and transaction information and fraudulent transactions when banking apps to process the financial transactions are exposed to such attacks. Thus the financial authorities established the laws and regulations as an countermeasures against those problems and domestic banks provide the integrity verification functions in their banking apps, yet its reliability has not been verified because the studies of the safety of the corresponding functions have seldom been conducted. Thus this study suggests the vulnerabilities of the integrity verification functions of banking apps by using Android reverse engineering analysis techniques. In case the suggested vulnerabilities are exploited, the integrity verification functions of banking apps are likely to be bypassed, which will facilitate malicious code inserting attacks through repackaging and its risk is very high as proved in a test of this study. Furthermore this study suggests the specific solutions to those vulnerabilities, which will contribute to improving the security level of smartphone financial transaction environment against the application forgery attacks.

Update Application of Membrane Technology in Water Environment

  • Okazak, Minoru;Nishida, Takaharu
    • Proceedings of the Membrane Society of Korea Conference
    • /
    • 1998.06a
    • /
    • pp.25-48
    • /
    • 1998
  • Current topics related to membrane technology under the recent water environment are as follows: - Cryptosporidum Outbreak - Integrity Control System - Water re-use - Recycle Society - Biotreatment and Membrane - Slurry or Sludge Treatment I would like to introduce the actual examples regarding water re-use. mainly on the above 5 topics.

  • PDF

Smart and Secure Point of Sale Framework with Threat Modeling and Formal Verification

  • Mona faraj Nasser alwahabi;Shaik Shakeel Ahamad
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.41-48
    • /
    • 2024
  • Existing PoS (Point of Sale) based payment frameworks are vulnerable as the Payment Application's integrity in the smart phone and PoS are compromised, vulnerable to reverse engineering attacks. In addition to these existing PoS (Point of Sale) based payment frameworks do not perform point-to-point encryption and do not ensure communication security. We propose a Smart and Secure PoS (SSPoS) Framework which overcomes these attacks. Our proposed SSPoS framework ensures point-to-point encryption (P2PE), Application hardening and Application wrapping. SSPoS framework overcomes repackaging attacks. SSPoS framework has very less communication and computation cost. SSPoS framework also addresses Heartbleed vulnerability. SSPoS protocol is successfully verified using Burrows-Abadi-Needham (BAN) logic, so it ensures all the security properties. SSPoS is threat modeled and implemented successfully.

Estimation of damage area on membrane surface by application of fluorescent particles as a surrogate (형광입자를 이용한 분리막 표면 검측과 손상 면적 추정 오차에 대한 연구)

  • Choi, Yunkyeong;Kim, Choah;Kim, Heejun;Cho, Jinwoo
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.28 no.2
    • /
    • pp.171-179
    • /
    • 2014
  • In this study, a novel method was proposed to test the integrity of water treatment system specifically equipped with membrane filtration process. We applied the silica particles coated with a fluorescent agent (rhodamine B isothiocyanate) as a surrogate to detect a membrane process integrity and evaluate the reliability of effluent quality in the system. Additionally, a series of experiments was conducted to evaluate the sensitivity of the method through the laboratory scale experiment. The laboratory scale experiments showed that the feasibility of application of proposed method to detect a breach or damaged part on the membrane surface. However, the sensitivity on predicting the area of a breach was significantly influenced by the testing conditions such as a concentration of surrogate, filtration flux, and detection time. The lowest error of predicting the area of breach was 3.5% at the testing condition of surrogate concentration of 80 mg/L injected with flux of $20L/m^2/hr$ for 10 minutes of detection time for the breach having the actual area of $7.069mm^2$. However, the error of estimation was increased at the small breach with area less than $0.785mm^2$. A future study will be conducted to estimate a damaged area with more accuracy and precision.

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

Evaluation of Reactor Internals Integrity due to 5.5m Concentric Free Fall of KSNP+ Reactor Vessel Closure Head (KSNP+ 원자로덮개 5.5m 수직 낙하 시 원자로내부구조물 건전성 평가)

  • Namgyng, Ihn;Jeong, Seung-Ha;Lee, Dae-Hee;Choi, Taek-Sang
    • Proceedings of the KSME Conference
    • /
    • 2003.11a
    • /
    • pp.1358-1363
    • /
    • 2003
  • Due to the application of Integrated Head Assembly (IHA) in KSNP+ reactor design, an investigation of reactor internals integrity is carried out to assure that the adoption of IHA does not affect the safety of reactor operation. One of the postulated accident events is the R.V. closure head fall from 5.5m high directly above the reactor vessel that may occur during the refueling operation. The analysis model consists of lumped mass elements of the entire reactor vessel and internals. Because of extreme load, separate elastic-plastic analyses are done for the members that undergo plastic deformation. The analysis verified that the stresses of the reactor internals and the fuel assemblies are within the bound of allowable stress limits and the integrity of the fuel assemblies is maintained.

  • PDF

Application of Probabilistic Fracture Mechanics Technique Using Monte Carlo Simulation (몬테카를로 시뮬레이션을 이용한 확률론적 파괴역학 수법의 적용성 검토)

  • Lee, Joon-Seong;Kwak, Sang-Log;Kim, Young-Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.18 no.10
    • /
    • pp.154-160
    • /
    • 2001
  • For major structural components periodic inspections and integrity assessments are needed for the safety. However, many flaws are undetectable because sampling inspection is carried out during in-service inspection. Probabilistic integrity assessment is applied to take into consideration of uncertainty and variance of input parameters arise due to material properties and undetectable cracks. This paper describes a Probabilistic Fracture Mechanics(PFM) analysis based on the Monte Carlo(MC) algorithms. Taking a number of sampling data of probabilistic variables such as fracture toughness value, crack depth and aspect ratio of an initial surface crack, a MC simulation of failure judgement of samples is performed. for the verification of this analysis, a comparison study of the PFM analysis using a commercial code, mathematical method is carried out and a good agreement was observed between those results.

  • PDF

A Study on Intrusion Protection Techniques against Linux Kernel Backdoor (리녹스 커널 백도어 침업에 대한 차단 기법 연구)

  • Kim, Jin-Taek;Kho, Jeong-Ho;Hong, Min-Seok;Son, Choul-Woong;Park, Beom;Lee, Do-Won;Lee, Geuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.201-207
    • /
    • 2009
  • As the existing backdoor worked at user mode, which is application mode, it was possible to check the existence of backdoor by the integrity check of system file. However, for the backdoor using kernel module, it is impossible to check its existence by the integrity check of system file. Even various programs were presented to protect this LKM Kernel backdoor, there is limitation in protection as they examine the changes on the system Call Table. This study, recognizing the danger of invasion through such LKM Kernel backdoor, will provide alternative for the limitation which the existing integrity check couldn't prevent intrusion through Kernel backdoor.

  • PDF

A Study on the Application of Ultrasonic Testing for The Interface Integrity Evaluation between Iron and Cement of Porcelain Insulator Cap (자기애자 캡의 금구-시멘트 계면 건전성 평가를 위한 초음파법 활용에 대한 연구)

  • Yoon, Young Geun;Choi, In Hyuk;Son, Ju Am;Oh, Tae Keun
    • Journal of the Korean Society of Safety
    • /
    • v.33 no.6
    • /
    • pp.58-65
    • /
    • 2018
  • The life span of the porcelain insulator was made to be 30 years, but currently many of the 154kV NGK porcelain insulators using in Korea are found to have passed the production life. Accidents caused by aged mechanical breakdown can lead to disruption of power supply in some areas, large economic losses, and casualties. Therefore, ultrasonic method, which is one of the non - destructive test methods, is applied as a method for evaluating the integrity of porcelain insulators. In this study, the experiment on the interface of cap was conducted and the difference between the energy difference and the attenuation coefficient of the reflected wave was derived according to the interface state of the steel - cement. The results of this study are expected to be used as the basic data of the ultrasonic testing to evaluate the interface condition of the porcelain insulator cap.