• Title/Summary/Keyword: Attack potential

Search Result 252, Processing Time 0.036 seconds

Adversarial Wall: Physical Adversarial Attack on Cityscape Pretrained Segmentation Model (도시 환경에서의 이미지 분할 모델 대상 적대적 물리 공격 기법)

  • Suryanto, Naufal;Larasati, Harashta Tatimma;Kim, Yongsu;Kim, Howon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.402-404
    • /
    • 2022
  • Recent research has shown that deep learning models are vulnerable to adversarial attacks not only in the digital but also in the physical domain. This becomes very critical for applications that have a very high safety concern, such as self-driving cars. In this study, we propose a physical adversarial attack technique for one of the common tasks in self-driving cars, namely segmentation of the urban scene. Our method can create a texture on a wall so that it can be misclassified as a road. The demonstration of the technique on a state-of-the-art cityscape pretrained model shows a fairly high success rate, which should raise awareness of more potential attacks in self-driving cars.

Effect of Adding Scoria as Cement Replacement on Durability-Related Properties

  • al-Swaidani, Aref Mohamad;Aliyan, Samira Dib
    • International Journal of Concrete Structures and Materials
    • /
    • v.9 no.2
    • /
    • pp.241-254
    • /
    • 2015
  • A lot of reinforced concrete (RC) structures in Syria went out of service after a few years of construction. This was mainly due to reinforcement corrosion or chemical attack on concrete. The use of blended cements is growing rapidly in the construction industry due to economical, ecological and technical benefits. Syria is relatively rich in scoria. In the study, mortar/concrete specimens were produced with seven types of cement: one plain Portland cement (control) and six blended cements with replacement levels ranging from 10 to 35 %. Rapid chloride penetration test was carried in accordance with ASTM C 1202 after two curing times of 28 and 90 days. The effect on the resistance of concrete against damage caused by corrosion of the embedded steel has been investigated using an accelerated corrosion test by impressing a constant anodic potential. The variation of current with time and time to failure of RC specimens were determined at 28 and 90 days curing. In addition, effects of aggressive acidic environments on mortars were investigated through 100 days of exposure to 5 % $H_2SO_4$, 10 % HCl, 5 % $HNO_3$ and 10 % $CH_3COOH$ solutions. Evaluation of sulfate resistance of mortars was also performed by immersing in 5 % $Na_2SO_4$ solution for 52 weeks. Test results reveal that the resistance to chloride penetration of concrete improves substantially with the increase of replacement level, and the concretes containing scoria based-blended cements, especially CEM II/B-P, exhibited corrosion initiation periods several times longer than the control mix. Further, an increase in scoria addition improves the acid resistance of mortar, especially in the early days of exposure, whereas after a long period of continuous exposure all specimens show the same behavior against the acid attack. According to results of sulfate resistance, CEM II/B-P can be used instead of SRPC in sulfate-bearing environments.

A Study on the Vulnerability of Security Keypads in Android Mobile Using Accessibility Features (안드로이드 접근성(Accessibility) 기능을 이용한 보안키패드의 취약점 공격 및 대응 방안)

  • Lee, Jung-Woong;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.177-185
    • /
    • 2016
  • As the fintech industry is growing at an incredible rate, mobile phones are positioned as the most important tool for financial transaction. However, with a rising number of malware applications, the types of attack and illegal access to mobile device are becoming more diverse and sophisticated. This paper studies the potential keylogger attack by exploiting the Accessibility Service in Android framework. This type of attack allows the malicious individual to use keylogger on the victim's Android mobile phone to steal passwords during mobile financial transaction regardless of security keypad setting. Lastly the paper proposes solutions to counter these types of attack by verifying the accessibility usage and amending the application guideline for accessibility.

Development of a String Injection Vulnerability Analyzer for Web Application Programs (웹 응용 프로그램의 문자열 삽입 보안 취약성 분석기 개발)

  • Ahn, Joon-Seon;Kim, Yeong-Min;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.3
    • /
    • pp.181-188
    • /
    • 2008
  • Nowadays, most web sites are developed using dynamic web pages where web pages are generated and transmitted by web application programs. Therefore, the ratio of attacks injecting malevolent strings to vulnerable web applications is increasing. In this paper, we present a static program analyzer which analyzes whether a web application program has vulnerabilities to the SQL injection attack and the cross site scripting(XSS) attack. To analyze programs using abstract interpretation framework, we designed an abstract domain which models potential string set along with excluded strings and developed an abstract interpreter for the PHP language. Also, based on them, we implemented a static analyzer. According to our experiments, our analyzer has competitive analysis speed and accuracy compared with related research results.

A Study on the Measures against Suicide Terrorism (자살테러에 대한 대책 연구)

  • Choi, Jin-Tai
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.139-155
    • /
    • 2006
  • Over the past two decades suicide terrorism has become an ever-widening phenomenon. When suicide terrorism was first introduced in the Middle East it seemed that this new phenomenon was invincible and that it might change the innate imbalance between terror groups and their rivalry governments. This did not in fact occur. Looking at history of terrorism, it can be seen that suicide attacks are in actuality a very old modus operandi. However, contemporary suicide terrorism differs from such historical tactics, just as the whole phenomenon of terrorism differs from ancient modes of warfare. Modern suicide terrorism is aimed at causing devastating physical damage. through which it inflicts profound fear and anxiety. Its goal is to produce a negative psychological effect on an entire population rather than just the victims of the actual attack. The relatively high number of casualties guaranteed in such attacks, which are usually carried out in crowded areas, ensures full media coverage. Thus, suicide terrorism, ranks with other spectacular modus operandi such as blowing up airplanes in mid air or the use of Weapons of Mass Destruction as a sure means to win maximum effect. For the purposes of this paper a suicide terror attack is defined as a politically motivated violent attack perpetrated by a self-aware individual (or individuals) who actively and purposely causes his own death through blowing himself up along with his chosen target. The perpetrator's ensured death is a precondition for the success of his mission. The greatest potential risk suicide terrorism may pose in future is if terrorists carry out operations combined with other spectacular tactics such as blowing up airplanes or the use of Weapons of Mass Destruction. Such a combination will increase immensely the death toll of a single terror attack and will have a shocking psychological effect on public moral. At this level suicide terrorism would constitute a genuine strategic threat and would probably be confronted as such. This study portrays a general overview of the modern history of suicide terror activity worldwide, focusing on its main characteristics and the various aims and motivations of the terror groups involved. In addition, This study provides an overview what is to be done to prevent such terrorist attacks.

  • PDF

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures

  • Bahrami, Pooneh Nikkhah;Dehghantanha, Ali;Dargahi, Tooska;Parizi, Reza M.;Choo, Kim-Kwang Raymond;Javadi, Hamid H.S.
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.865-889
    • /
    • 2019
  • The need for cyber resilience is increasingly important in our technology-dependent society where computing devices and data have been, and will continue to be, the target of cyber-attackers, particularly advanced persistent threat (APT) and nation-state/sponsored actors. APT and nation-state/sponsored actors tend to be more sophisticated, having access to significantly more resources and time to facilitate their attacks, which in most cases are not financially driven (unlike typical cyber-criminals). For example, such threat actors often utilize a broad range of attack vectors, cyber and/or physical, and constantly evolve their attack tactics. Thus, having up-to-date and detailed information of APT's tactics, techniques, and procedures (TTPs) facilitates the design of effective defense strategies as the focus of this paper. Specifically, we posit the importance of taxonomies in categorizing cyber-attacks. Note, however, that existing information about APT attack campaigns is fragmented across practitioner, government (including intelligence/classified), and academic publications, and existing taxonomies generally have a narrow scope (e.g., to a limited number of APT campaigns). Therefore, in this paper, we leverage the Cyber Kill Chain (CKC) model to "decompose" any complex attack and identify the relevant characteristics of such attacks. We then comprehensively analyze more than 40 APT campaigns disclosed before 2018 to build our taxonomy. Such taxonomy can facilitate incident response and cyber threat hunting by aiding in understanding of the potential attacks to organizations as well as which attacks may surface. In addition, the taxonomy can allow national security and intelligence agencies and businesses to share their analysis of ongoing, sensitive APT campaigns without the need to disclose detailed information about the campaigns. It can also notify future security policies and mitigation strategy formulation.

A Fundamental Study on the Several Types of Cements for Placing a Sea Massive Concrete (해양 매스콘크리트 타설을 위한 시멘트 종류별 기초시험)

  • 구교준;송용순;강석화;김상철
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 1998.10b
    • /
    • pp.877-882
    • /
    • 1998
  • Concrete structure placed in marine environment is subject to many different types of potential attack. Therefore the sea water resistance of cement and concrete must be considered when it is used for structure in the ocean. For this purpose, this study was peformed to investigate the properties of several types of cements for a massive concrete placed in marine environment.

  • PDF

The Application of Digital Watermarking in Remote Sensing Image

  • Jin, Peidong;Qin, Xuwen
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1264-1267
    • /
    • 2003
  • To protect the digital image, video and audio from non-authorized use, the digital watermarking technology has received a great attention in the field of multimedia in recent years . An overview of the development of watermark techniques is given in the current paper followed by a discussion of potential application of spatial domain, transform domain watermark techniques in remote sensing images copyright protection and verification in different forms of processed images.

  • PDF

Analysis of Crash Potential by Vehicle Interactions Using Driving Simulations (주행 시뮬레이션을 이용한 차량간 상호작용에 따른 사고발생가능성 분석)

  • Kim, Yunjong;Oh, Cheol;Park, Subin;Choi, Saerona
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.2
    • /
    • pp.98-112
    • /
    • 2018
  • Intentional aggressive driving (IAD) is a very dangerous driving behavior that threatens to attack the adjacent vehicles. Most existing studies have focused on the independent driving characteristics of attack drivers. However, the identification of interactions between the offender and the victim is necessary for the traffic safety analysis. This study established multi-agent driving simulation environments to systematically analyze vehicle interactions in terms of traffic safety. Time-to-collision (TTC) was adopted to quantify vehicle interactions in terms of traffic safety. In addition, a exponential decay function was further applied to compare the overall pattern of change in crash potentials when IAD events occurred. The outcome of this study would be useful in developing policy-making activities to enhance traffic safety by reducing dangerous driving events including intentional aggressive driving.