• Title/Summary/Keyword: C2 공격

Search Result 173, Processing Time 0.024 seconds

The Predatory Behavior of Green Mirid Bug, Cytorhinus lividipennis Reuter, on Brown Planthopper Eggs in Different Temperature Conditions (온도에 따른 등검은황록장님노린재 (Cyrtorhinus lividipennis Reuter)의 벼멸구 알에 대한 포식습성)

  • ;;;K.L. Heong
    • Korean journal of applied entomology
    • /
    • v.34 no.3
    • /
    • pp.234-242
    • /
    • 1995
  • The functional responses of the female Cyrtorhinus lividipennis on brown planthopper (BPH), Nilaparvata lugens, eggs and their predation behavior were investigated at six temperature conditions; 20, 23, 26, 29, 32, and $35^{\circ}C$. C. lividipennis was found to prefer young BPH eggs, especially 3-day-old eggs the most. The functional responses for female C. lividipennis on BPH eggs fitted the Holling's Type-I true predator-prey Rogers' (1972) model at all temperatures tested except $35^{\circ}C$ at which the negative Th value was produced. With the temperature increased up to 32$^{\circ}C$, the instantaneous attacking rate(a) increased from 0.1923 at $20^{\circ}C$ to 0.5085 at $32^{\circ}C$, while the handling time (Th) was gradually decreased as low as 0.0151 at $32^{\circ}C$. C. lividipenis preferred the BPH eggs laid on the upper part of rice stem when the BPH egg density was high, but there was no significant difference in the preference when the egg density was low. The preference was more obvious in high temperature conditions such as above 29$^{\circ}C$.

  • PDF

A Development of Analysis Tool and the Analysis of Vulnerabilities on the Program Source Code (프로그램 소스코드 취약성 분석 및 분석도구의 개발)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.27-34
    • /
    • 2004
  • The recent explosive use of the Internet and the development of computer communication technologies reveal serious computer security problem. Inspite of many studies on secure access to the system, generally, the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the Program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.

An Anonymous Authentication Scheme for Health Information Push Service Based on Indoor Location in Hospital (병원 실내 위치기반 의료정보 푸쉬 서비스를 위한 익명 인증 스킴)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5C
    • /
    • pp.410-419
    • /
    • 2012
  • This paper proposes a secure and efficient anonymous authentication scheme for health information push service based on indoor location in hospital. The proposed scheme has the following benefits: (1)It is just based on a secure one-way hash function for avoiding complex computations for both health care operations users and health care centers. (2)It does not require sensitive verification table which may cause health care centers to become an attractive target for numerous attacks(e.g., insertion attacks and stolen-verifier attacks), (3)It provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As result, the proposed scheme is very suitable for various location-based medical information service environments using lightweight-device(e.g., smartphone) because of very low computation overload on the part of both health care operations users and health care centers.

Host based Feature Description Method for Detecting APT Attack (APT 공격 탐지를 위한 호스트 기반 특징 표현 방법)

  • Moon, Daesung;Lee, Hansung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.839-850
    • /
    • 2014
  • As the social and financial damages caused by APT attack such as 3.20 cyber terror are increased, the technical solution against APT attack is required. It is, however, difficult to protect APT attack with existing security equipments because the attack use a zero-day malware persistingly. In this paper, we propose a host based anomaly detection method to overcome the limitation of the conventional signature-based intrusion detection system. First, we defined 39 features to identify between normal and abnormal behavior, and then collected 8.7 million feature data set that are occurred during running both malware and normal executable file. Further, each process is represented as 83-dimensional vector that profiles the frequency of appearance of features. the vector also includes the frequency of features generated in the child processes of each process. Therefore, it is possible to represent the whole behavior information of the process while the process is running. In the experimental results which is applying C4.5 decision tree algorithm, we have confirmed 2.0% and 5.8% for the false positive and the false negative, respectively.

Novel Vulnerability against Dummy Based Side-Channel Countermeasures - Case Study: XMEGA (더미 기반 부채널 분석 대응기법 신규 취약점 - Case Study: XMEGA)

  • Lee, JongHyeok;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.287-297
    • /
    • 2019
  • When cryptographic algorithms are implemented to provide countermeasures against the side-channel analysis, designers frequently employ the combined countermeasures between the first-order masking scheme and hiding schemes. Their combination can be enough to offer security and efficiency. However, if dummy operations can be distinguished from real operations, an attacker can extract the secret key with lower complexity than the intended attack complexity by the designer inserting the dummy operations. In this paper, we categorize types of variables used in a dummy operation when C language is employed. Then, we present the novel vulnerability that can distinguish dummy operations for all cases where the hiding schemes are applied using different types of variables. Moreover, the countermeasure is provided to prevent the novel vulnerability.

An Adversarial Attack Type Classification Method Using Linear Discriminant Analysis and k-means Algorithm (선형 판별 분석 및 k-means 알고리즘을 이용한 적대적 공격 유형 분류 방안)

  • Choi, Seok-Hwan;Kim, Hyeong-Geon;Choi, Yoon-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1215-1225
    • /
    • 2021
  • Although Artificial Intelligence (AI) techniques have shown impressive performance in various fields, they are vulnerable to adversarial examples which induce misclassification by adding human-imperceptible perturbations to the input. Previous studies to defend the adversarial examples can be classified into three categories: (1) model retraining methods; (2) input transformation methods; and (3) adversarial examples detection methods. However, even though the defense methods against adversarial examples have constantly been proposed, there is no research to classify the type of adversarial attack. In this paper, we proposed an adversarial attack family classification method based on dimensionality reduction and clustering. Specifically, after extracting adversarial perturbation from adversarial example, we performed Linear Discriminant Analysis (LDA) to reduce the dimensionality of adversarial perturbation and performed K-means algorithm to classify the type of adversarial attack family. From the experimental results using MNIST dataset and CIFAR-10 dataset, we show that the proposed method can efficiently classify five tyeps of adversarial attack(FGSM, BIM, PGD, DeepFool, C&W). We also show that the proposed method provides good classification performance even in a situation where the legitimate input to the adversarial example is unknown.

Side-Channel Attack of Android Pattern Screen Lock Exploiting Cache-Coherent Interface in ARM Processors (ARM 캐시 일관성 인터페이스를 이용한 안드로이드 OS의 스크린 잠금 기능 부채널 공격)

  • Kim, Youngpil;Lee, Kyungwoon;Yoo, Seehwan;Yoo, Chuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.227-242
    • /
    • 2022
  • This paper presents a Cache-Coherency Interconnect(CCI)-based Android pattern screen lock(PSL) attack on modern ARM processors. CCI has been introduced to maintain the cache coherency between the big core cluster and the little core cluster. That is, CCI is the central interconnect inside SoC that maintains cache coherency and shares data. In this paper, we reveal that CCI can be a side channel in security, that an adversary can observe security-sensitive operations. We design and implement a technique to compromise Android PSL within only a few attempts using the information of CCI in user-level applications on Android Nougat. Further, we analyzed the relationship between the pattern complexity and security. Our evaluation results show that complex and simple patterns would have similar security strengths against the proposed technique.

학술자료-II - 모기매개 바이러스에 의해 유발되는 번식장애 (소 츄잔병, 아까바네병, 아이노병)

  • Jeong, Seong-Dae
    • Journal of the korean veterinary medical association
    • /
    • v.45 no.8
    • /
    • pp.746-757
    • /
    • 2009
  • 국립수의과학검역원과의 공동연구과제(소 아까바네병, 츄잔병, 아이노 바이러스혼합불활화 예방약 산업화)에 의해 실시한 시험을 통하여 소 아까바네병, 츄잔병, 아이노 바이러스병에 대한 예방약인(소 츄잔병, 아까바네병, 아이노병 불활화 혼합오일백신) 면역원성 시험 및 야외에서의 적용시험 등을 실시한 결과를 요약하면 다음과 같다. 1. 혼합오일백신의 기니픽에 대한 면역원성 시험에서 아까바네 바이러스, 아이노 바이러스 및 츄잔 바이러스에 대한 중화항체가는 시험백신을 3주 간격 2회 접종한 시험구가 무접종 대조구에 비하여 높게 나타났다. 2. 혼합오일백신의 야외농장 3곳의 육성우에 대한 면역원성 시험에서 시험백신을 2회 접종 후 아까바네 바이러스의 항체가는 평균 102배, 115배 및 134배이였으며, 아이노 바이러스의 항체가는 평균 8배, 24배 및 27배로 나타났고, 츄잔 바이러스의 경우에는 3곳의 농장에서 평균 30배, 46배 및 172배로 나타났다. 3. 야외농장 2곳에서 혼합오일백신을 임신우에 2회 접종하였을 때, 중화항체가는 아까바네 바이러스가 평균 64배와 93배를 나타내었고, 아이노 바이러스의 중화항체가는 평균 70배와 96배, 츄잔 바이러스의 중화항체가는 평균 20배와 20배로 나타났다. 4. 혼합오일백신은 임신우에 대한 공격접종시험에서 시험백신을 3주 간격으로 2회 접종 후 3주째의 중화항체가는 아까바네 바이러스가 128$\sim$256배이었고, 아이노 바이러스는 64$\sim$256배로 나타났고, 츄잔 바이러스는 8$\sim$32배이었다. 공격 접종 후 부검 전의 중화항체가는 아까바네 바이러스가 16$\sim$128배로 나타났고, 아이노 바이러스는 32$\sim$128배였으며, 츄잔 바이러스는 4$\sim$16배였다. 혼합오일백신을 임신우에 3주 간격 2회 접종한 뒤 공격접종하여 채혈한 혈청의 면역원성이 무접종 대조군에 비하여 방어효과가 우수하였다. 5. 3롯트의 시험백신을 선정하여 2$\sim$7$^{\circ}C$의 냉암소에 보존하면서 보존 기간별(제조당시, 6개월, 12개월, 15개월, 18개월)로 특성시험, 무균시험 및 안전시험을 실시한 결과, 전 보존기간에 마우스 및 기니픽에 대한 안전성이 인정되었으며, 보존기간별로 시험백신의 기니픽에 대한 면역원성 시험을 실시한 결과, 기니픽의 중화항체가는 15개월까지 지속되는 것으로 나타났다.

  • PDF

Isomer Formation in the Chlorination of Highmolecular Paraffinic Hydrocarbons by Various Halogenating Agents (여러 종류의 할로겐 화합물과 고분자량 파라핀계 탄화수소의 염소화에서 생기는 이성질화에 관한 연구)

  • Li-Hoan Kung
    • Journal of the Korean Chemical Society
    • /
    • v.32 no.4
    • /
    • pp.390-405
    • /
    • 1988
  • The chlorination of $C_7H_16,\;C_8H_18,\;C_10H_22,\;and\;(Me_2CH)_2$ with N-Chlorosuccinimide, tert-BuOCl, $CCl_3SO_2Cl,\;CCl_4,\;CCl_3SCl,\; PCl_5,\;and\;Cl_2\;in\;C_6H_6\;or\;CS_2$ which both form loose complexes with $Cl_2$ atoms yielded mixtures of isomeric monochloroalkanes which were analyzed quantitatively. An isomer ratio differing from that known for the substitution of paraffinic hydrocarbons was observed. The isomer distribution observed is the result of the combined effects of the differing C-H dissociation energies of the different types of H atoms of the alkane and of the free energy of the attacking radical with polar effects of the attacking radical as well as of the hydrocarbon.

  • PDF