• Title/Summary/Keyword: Hardware Weakness

Search Result 31, Processing Time 0.023 seconds

The Security Establishment for Cloud Computing through CASE Study

  • Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.6
    • /
    • pp.89-99
    • /
    • 2020
  • Cloud computing is rapidly increasing for achieving comfortable computing. Cloud computing has essentially security vulnerability of software and hardware. For achieving secure cloud computing, the vulnerabilities of cloud computing could be analyzed in a various and systematic approach from perspective of the service designer, service operator, the designer of cloud security and certifiers of cloud systems. The paper investigates the vulnerabilities and security controls from the perspective of administration, and systems. For achieving the secure operation of cloud computing, this paper analyzes technological security vulnerability, operational weakness and the security issues in an enterprise. Based on analysis, the paper suggests secure establishments for cloud computing.

DABC: A dynamic ARX-based lightweight block cipher with high diffusion

  • Wen, Chen;Lang, Li;Ying, Guo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.165-184
    • /
    • 2023
  • The ARX-based lightweight block cipher is widely used in resource-constrained IoT devices due to fast and simple operation of software and hardware platforms. However, there are three weaknesses to ARX-based lightweight block ciphers. Firstly, only half of the data can be changed in one round. Secondly, traditional ARX-based lightweight block ciphers are static structures, which provide limited security. Thirdly, it has poor diffusion when the initial plaintext and key are all 0 or all 1. This paper proposes a new dynamic ARX-based lightweight block cipher to overcome these weaknesses, called DABC. DABC can change all data in one round, which overcomes the first weakness. This paper combines the key and the generalized two-dimensional cat map to construct a dynamic permutation layer P1, which improves the uncertainty between different rounds of DABC. The non-linear component of the round function alternately uses NAND gate and AND gate to increase the complexity of the attack, which overcomes the third weakness. Meanwhile, this paper proposes the round-based architecture of DABC and conducted ASIC and FPGA implementation. The hardware results show that DABC has less hardware resource and high throughput. Finally, the safety evaluation results show that DABC has a good avalanche effect and security.

A Study on the Works of Smart Devices Weakness and Hardware Solution (스마트 디바이스의 취약점 분석과 하드웨어적 해결 방안 연구)

  • Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.705-707
    • /
    • 2011
  • Smart devices have the characteristics of duality of fire and the property of double-sided swords. They also both conveniency and the weakness at a time due to the structure of the devices. Although there have not been a big threat with the smart devices, but they have potential enough to destroy the network society. This is because of the fact that the devices mainly depend on the applications and the applications can abuse the devices' critical hardware sections such as camera, file system, etc.. In this contribution, we analyze the issues and the problems of the weakness of smart devices and discuss a method to solve the issues.

  • PDF

Mandibular Fracture in a Hemifacial Microsomia Patient following Implant Failure and Hardware Infection: A Case Report

  • Ali, Kausar;Dibbs, Rami P.;Maricevich, Renata S.
    • Archives of Plastic Surgery
    • /
    • v.49 no.5
    • /
    • pp.642-647
    • /
    • 2022
  • Hemifacial microsomia (HFM) is a complex congenital condition with heterogeneous malformations of the facial skeleton that almost always involves mandibular hypoplasia. Here we introduce a unique case in which a patient with HFM had initially successful optimization of facial symmetry using a polyetheretherketone implant for mandibular augmentation. However, multiple factors associated with the intraoperative and postoperative course, including hardware failure and infection, led to diminished mechanical strength of the mandible, ultimately resulting in a mandibular fracture. In this unique case presentation of HFM, we discuss the various factors that contributed to mandibular weakness and increased susceptibility to fracture.

Recent Development of Reliability Engineering and Research Trend Analysis in Korea (최근 국내 신뢰성 공학의 발전과 연구 동향 및 분석)

  • Lim, Ik Sung
    • Journal of Applied Reliability
    • /
    • v.13 no.4
    • /
    • pp.253-271
    • /
    • 2013
  • Since The Korean Reliability Society had been founded in 1999, development history of reliability engineering in Korea is reviewed and research outputs and papers from 2008 to current are analyzed in terms of types of industry, product life cycle, hardware vs software, and theory vs application. The purpose of this research is to review the recent reliability engineering research conducted in Korea including development history as well as published papers to identify the weakness and/or deficiencies in order to suggest the future research directions, which would contribute the development of industries in Korea.

Remote speech recognition preprocessing system for intelligent robot in noisy environment (지능로봇에 적합한 잡음 환경에서의 원거리 음성인식 전처리 시스템)

  • Gwon, Se-Do;Jeong, Hong
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.365-366
    • /
    • 2006
  • This paper describes a pre-processing methodology which can apply to remote speech recognition system of service robot in noisy environment. By combining beamforming and blind source separation, we can overcome the weakness of beamforming (reverberation) and blind source separation (distributed noise, permutation ambiguity). As this method is designed to be implemented with hardware, we can achieve real-time execution with FPGA by using systolic array architecture.

  • PDF

Design and Implementation of MDDI Protocol for Mobile System (모바일 시스템을 위한 MDDI 프로토콜 설계 및 구현)

  • Kim, Jong-Moon;Lee, Byung-Kwon;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1089-1094
    • /
    • 2013
  • In this study, we propose how th implement a MDDI(Mobile Display Digital Interface) protocol packet generation method in software. MDDI protocol is widely used in mobile display device. MDDI protocol packets are generated by software within micro processor. This method needs the minimum hardware configuration. In order to implementation of this method, we design a hardware platform with a high performance microprocessor and a FPGA. The packets generated by software within microprocessor are converted into LVDS signals, and transmitted by hardware within FPGA. This study suggests the benefits of the way how software can easily create a variety of packet. But, this proposed method takes more time in packet transmission compared to the traditional method. This weakness remains as a future challenge, which can be soon improved.

The Development of Modularized Post Processing GPS Software Receiving Platform using MATLAB Simulink

  • Kim, Ghang-Ho;So, Hyoung-Min;Jeon, Sang-Hoon;Kee, Chang-Don;Cho, Young-Su;Choi, Wansik
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.9 no.2
    • /
    • pp.121-128
    • /
    • 2008
  • Modularized GPS software defined radio (SDR) has many advantages of applying and modifying algorithm. Hardware based GPS receiver uses many hardware parts (such as RF front, correlators, CPU and other peripherals) that process tracked signal and navigation data to calculate user position, while SDR uses software modules, which run on general purpose CPU platform or embedded DSP. SDR does not have to change hardware part and is not limited by hardware capability when new processing algorithm is applied. The weakness of SDR is that software correlation takes lots of processing time. However, in these days the evolution of processing power of MPU and DSP leads the competitiveness of SDR against the hardware GPS receiver. This paper shows a study of modulization of GPS software platform and it presents development of the GNSS software platform using MATLAB Simulink™. We focus on post processing SDR platform which is usually adapted in research area. The main functions of SDR are GPS signal acquisition, signal tracking, decoding navigation data and calculating stand alone user position from stored data that was down converted and sampled intermediate frequency (IF) data. Each module of SDR platform is categorized by function for applicability for applying for other frequency and GPS signal easily. The developed software platform is tested using stored data which is down-converted and sampled IF data file. The test results present that the software platform calculates user position properly.

Design and Implementation of Web Server Security System using Virtualization (가상화를 이용한 웹 서버 보안시스템 설계 및 구현)

  • Yoo, Jae-Hyung;Kim, Do-Hyung;Kim, Yong-Ho;Ha, Ok-Hyun;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.199-207
    • /
    • 2008
  • Web service has many security weekness because it is exposure to outside and connected with various application. Especially, as new technology developed new type of security weakness has occured consistently. In this paper, we construct webserver and honeyweb by using virtual reality on a basis these weakness. So it cannot be influenced by any attack to the hardware of the system. By using honey web, it disigned and embodied web server secutiry system to collect the data about new attack. Through this, it can provide proper secutiry in a web environment of mutual communication.

  • PDF

Technological Trend and Patents for Modular Smartphone (조립식 스마트폰의 기술 및 특허 동향)

  • Park, Jong-Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1230-1242
    • /
    • 2014
  • There might be still weakness in domestic R&D of DIY based modular smart phone and device to cope effectively with post smartphone era. Currently, it is essential for us to provide technology development and countermeasure way against subversive influence that development and commercial release of Google's modular smartphone can cause in such ecology. This paper focused to suggest binding assignment and technology prospect required in promoting industrialization related with IoT and deducing the global countermeasure ways through investigation and analysis about advanced technology and patents of modular smart phone and devices. Description includes introduction, technology outline, technology and patent trend, conclusion.