• Title/Summary/Keyword: Attack Potential

Search Result 256, Processing Time 0.024 seconds

Europium-driven Alloy 709 corrosion in static FLiNaK molten salt at 700 ℃

  • Taiqi Yin;Amanda Leong;Jinsuo Zhang
    • Nuclear Engineering and Technology
    • /
    • v.56 no.5
    • /
    • pp.1738-1746
    • /
    • 2024
  • The effect of europium-driven corrosion behavior of Alloy 709 in FLiNaK molten salt was investigated by static immersion tests at 700 ℃. It was found that the corrosion of Alloy 709 increased after the addition of EuF3, even though the standard reduction potential of Eu(III)/Eu(II) was negative than those of Fe(II)/Fe, Ni(II)/Ni and Cr (II)/Cr. The presence of Eu(III) led to deeper corrosion attack layers and more pits on the steel surface in comparison with corrosion in blank FLiNaK. However, the addition of Eu(III) seemed to have a role in reducing surface cracking that was explored in corrosion by blank FLiNaK, which depended on Eu(III) concentration.

Analysis of Crash Potential by Vehicle Interactions Using Driving Simulations (주행 시뮬레이션을 이용한 차량간 상호작용에 따른 사고발생가능성 분석)

  • Kim, Yunjong;Oh, Cheol;Park, Subin;Choi, Saerona
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.2
    • /
    • pp.98-112
    • /
    • 2018
  • Intentional aggressive driving (IAD) is a very dangerous driving behavior that threatens to attack the adjacent vehicles. Most existing studies have focused on the independent driving characteristics of attack drivers. However, the identification of interactions between the offender and the victim is necessary for the traffic safety analysis. This study established multi-agent driving simulation environments to systematically analyze vehicle interactions in terms of traffic safety. Time-to-collision (TTC) was adopted to quantify vehicle interactions in terms of traffic safety. In addition, a exponential decay function was further applied to compare the overall pattern of change in crash potentials when IAD events occurred. The outcome of this study would be useful in developing policy-making activities to enhance traffic safety by reducing dangerous driving events including intentional aggressive driving.

Tracking Application Behaviors Using User Interactions on Android Smartphones (안드로이드 스마트폰에서 사용자 상호작용을 이용한 앱 행위 추적 기법)

  • Ahn, Woo Hyun;Joun, Young Nam
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.61-71
    • /
    • 2014
  • In recent years, malwares in Android smartphones are becoming increased explosively. Since a great deal of appsare deployed day after day, detecting the malwares requires commercial anti-virus companies to spend much time and resources. Such a situation causes malwares to be detected after they have become already spread. We propose a scheme called TAU that dynamically tracks application behaviors to specify apps with potential security risks. TAU keeps track of how a user's interactions to smartphones incurs the app installation, the route of app spread, and the behavior of app execution. This tracking specifies apps that have the possibility of attacking the smartphones using the drive-by download and update attack schemes. Moreover, the tracked behaviors are used to decide whether apps are repackaged or not. Therefore, TAU allows anti-virus companies to detect malwares efficiently and rapidly by guiding to preferentially analyze apps with potential security risks.

The characteristics of AlW thin film for TFT-LCD bus line (TFT-LCD bus line을 위한 Al-W 박막 특성에 관한 연구)

  • Dong-Sik Kim;Chong Ho Yi;Kwan Soo Chung
    • Journal of the Korean Vacuum Society
    • /
    • v.9 no.3
    • /
    • pp.233-236
    • /
    • 2000
  • The structural, electrical and chemical characteristics of Al alloy thin film with low impurity concentrations AlW deposited by using dc magnetron sputtering deposition are investigated for the applications as data bus line in the TFT-LCD panel. The deposited thin films show the decrease of resistivity and the increase of grain size after the RTA at $300^{\circ}C$ for 20 min.. Moreover, the resistivity of AlW does not show appreciable grain size dependence after RTA. It is concluded that the decrease of resistivity after RTA is due to the increase of grain size. The annealed AlW is found to be hillock free. And for investigating chemical attack in TFT-LCD etching processing the electric potential of AlW alloy for Ag/AgCl were investigated by cyclic voltammetry. When W wt.% of AlW alloy was higher than about 3%, the electric potential of AlW was more positive than ITO's. Therefore AlW alloy thin film can be propose to use for data bus line.

  • PDF

New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing

  • Zhang, Leyou;Hu, Yupu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1343-1356
    • /
    • 2013
  • Cloud computing has emerged as perhaps the hottest development in information technology at present. This new computing technology requires that the users ensure that their infrastructure is safety and that their data and applications are protected. In addition, the customer must ensure that the provider has taken the proper security measures to protect their information. In order to achieve fine-grained and flexible access control for cloud computing, a new construction of hierarchical attribute-based encryption(HABE) with Ciphertext-Policy is proposed in this paper. The proposed scheme inherits flexibility and delegation of hierarchical identity-based cryptography, and achieves scalability due to the hierarchical structure. The new scheme has constant size ciphertexts since it consists of two group elements. In addition, the security of the new construction is achieved in the standard model which avoids the potential defects in the existing works. Under the decision bilinear Diffie-Hellman exponent assumption, the proposed scheme is provable security against Chosen-plaintext Attack(CPA). Furthermore, we also show the proposed scheme can be transferred to a CCA(Chosen-ciphertext Attack) secure scheme.

Possibility of Disclosure of User Information in Internet Explorer (인터넷 익스플로러에서 사용자 정보 유출 가능성)

  • Lee, SangHo;Maeng, YoungJae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.937-943
    • /
    • 2013
  • Internet Explorer is the popular internet browser the most in domestic. In some version of Internet Explorer, user information could be leaked cause CORS(Cross-Origin Resource Sharing) Internet Explorer support. Different before, without setup a malicious program, attacker can get the user information even account information, credit card usage list and user information with SNS or internet portal site logged in regardless of secure program. Not only Internet Explorer but also mobile browser, it could be. In this paper, we make study of the potential disclosure of user information by attack using CORS, second attack and the way to improvement of vulnerability of CORS.

Advanced Indentation Studies on the Effects of Hydrogen Attack on Tensile Property Degradation of Heat-Resistant Steel Heat-Affected Zones

  • Choi, Yeol;Jang, Jae-il;Lee, Yun-Hee;Kwon, Dongil;Kim, Jeong-Tae
    • Corrosion Science and Technology
    • /
    • v.2 no.6
    • /
    • pp.266-271
    • /
    • 2003
  • Safety diagnosis of various structural components and facilities is indispensable for preventing catastrophic failure of material by time-dependent and environment accelerating degradation. Also, this diagnosis of operating components should be done periodically for safe maintenance and economical repair. However, conventional standard methods for mechanical properties have the problems of bulky specimen, destructive procedure and complex procedure of specimen sampling. So, a non-destructive and simple mechanical testing method using small specimen is needed. Therefore, an advanced indentation technique was developed as a potential method for non-destructive testing of in-field structures. This technique measures indentation load-depth curve during indentation and analyzes the mechanical properties related to deformation such as yield strength, tensile strength and work-hardening index. In this paper, we characterized the tensile properties including yield and tensile strengths of the V-modified Cr-Mo steels in petro-chemical and thermo-electrical plants. And also, the effects of hydrogen-assisted degradation of the V-modified Cr-Mo steels were analyzed in terms of work-hardening index and yield ratio.

A Study on the Structure and Thermal Property of $Co^{2+}$-Exchanged Zeolite A

  • Jong-Yul Park
    • Bulletin of the Korean Chemical Society
    • /
    • v.12 no.3
    • /
    • pp.265-270
    • /
    • 1991
  • Theoretical calculations on the stabilization energies of framework atoms in hydrolyses Co(Ⅱ )-exchanged zeolite A were made using some potential energy functions and optimization program. The protons which are produced by hydrolysis of $[Co(H_2O)_n]^{2+}$ ion in large cavity showed a tendency to attack the framework oxygen atom O(1) preferentially, and the oxygen atom O(4) within OH- ion was coordinated at Al atom. The weakness of bonds between T(Si, Al) and oxygen by attack of proton and too large coordination number around small aluminum atom will make the framework of Co(Ⅱ)-exchanged zeolite A more unstable. The stabilization energy of $Co_4Na_4$-A framework (- 361.57 kcal/mol) was less than that of thermally stable zeolite A($Na_{12-}$A: - 419.68 kcal/mol) and greater than that of extremely unstable Ba(Ⅱ)-exchanged zeolite A($Ba_{6-}$A: - 324.01 kcal/mol). All the data of powder X-ray diffraction, infrared and Raman spectroscopy of Co(Ⅱ)-exchanged zeolite A showed the evidence of instability of its framework in agreement with the theoretical calculation. Three different groups of water molecules are found in hydrated Co(Ⅱ )-exchanged zeolite A; W(Ⅰ) group of water molecules having only hydrogen-bonds, W(Ⅱ) group water coordinated to $Na^+$ ion, ans W(Ⅲ) group water coordinated to Co(Ⅱ) ion. The averaged interaction energy of each water group shows the decreasing order of W(Ⅲ)>W(Ⅱ)>W(Ⅰ).

A Portable IoT-cloud ECG Monitoring System for Healthcare

  • Qtaish, Amjad;Al-Shrouf, Anwar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.269-275
    • /
    • 2022
  • Public healthcare has recently become an issue of great importance due to the exponential growth in the human population, the increase in medical expenses, and the COVID-19 pandemic. Speed is one of the crucial factors in saving life, particularly in case of heart attack. Therefore, a healthcare device is needed to continuously monitor and follow up heart health conditions remotely without the need for the patient to attend a medical center. Therefore, this paper proposes a portable electrocardiogram (ECG) monitoring system to improve healthcare for heart attack patients in both home and ambulance settings. The proposed system receives the ECG signals of the patient and sends the ECG values to a MySQL database on the IoT-cloud via Wi-Fi. The signals are displayed as an ECG data chart on a webpage that can be accessed by the patient's doctor based on the HTTP protocol that is employed in the IoT-cloud. The proposed system detects the ECG data of the patient to calculate the total number of heartbeats, number of normal heartbeats, and the number of abnormal heartbeats, which can help the doctor to evaluate the health status of the patient and decide on a suitable medical intervention. This system therefore has the potential to save time and life, but also cost. This paper highlights the five main advantages of the proposed ECG monitoring system and makes some recommendations to develop the system further.

SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation

  • Kang, Ki-Wan;Seo, Jung Taek;Baek, Sung Hoon;Kim, Chul Woo;Park, Ki-Woong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.1063-1075
    • /
    • 2022
  • In recent years, container techniques have been broadly applied to cloud computing systems to maximize their efficiency, flexibility, and economic feasibility. Concurrently, studies have also been conducted to ensure the security of cloud computing. Among these studies, moving-target defense techniques using the high agility and flexibility of cloud-computing systems are gaining attention. Moving-target defense (MTD) is a technique that prevents various security threats in advance by proactively changing the main attributes of the protected target to confuse the attacker. However, an analysis of existing MTD techniques revealed that, although they are capable of deceiving attackers, MTD techniques have practical limitations when applied to an actual cloud-computing system. These limitations include resource wastage, management complexity caused by additional function implementation and system introduction, and a potential increase in attack complexity. Accordingly, this paper proposes a software-defined MTD system that can flexibly apply and manage existing and future MTD techniques. The proposed software-defined MTD system is designed to correctly define a valid mutation range and cycle for each moving-target technique and monitor system-resource status in a software-defined manner. Consequently, the proposed method can flexibly reflect the requirements of each MTD technique without any additional hardware by using a software-defined approach. Moreover, the increased attack complexity can be resolved by applying multiple MTD techniques.