• Title/Summary/Keyword: Hijacking Problem

Search Result 8, Processing Time 0.028 seconds

MRF Particle filter-based Multi-Touch Tracking and Gesture Likelihood Estimation (MRF 입자필터 멀티터치 추적 및 제스처 우도 측정)

  • Oh, Chi-Min;Shin, Bok-Suk;Klette, Reinhard;Lee, Chil-Woo
    • Smart Media Journal
    • /
    • v.4 no.1
    • /
    • pp.16-24
    • /
    • 2015
  • In this paper, we propose a method for multi-touch tracking using MRF-based particle filters and gesture likelihood estimation Each touch (of one finger) is considered to be one object. One of frequently occurring issues is the hijacking problem which means that an object tracker can be hijacked by neighboring object. If a predicted particle is close to an adjacent object then the particle's weight should be lowered by analysing the influence of neighboring objects for avoiding hijacking problem. We define a penalty function to lower the weights of those particles. MRF is a graph representation where a node is the location of a target object and an edge describes the adjacent relation of target object. It is easy to utilize MRF as data structure of adjacent objects. Moreover, since MRF graph representation is helpful to analyze multi-touch gestures, we describe how to define gesture likelihoods based on MRF. The experimental results show that the proposed method can avoid the occurrence of hijacking problems and is able to estimate gesture likelihoods with high accuracy.

Design of watermark trace-back system to supplement connection maintenance problem

  • Kim, Hwan-Kuk;Han, Seung-Wan;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2151-2154
    • /
    • 2003
  • Internet is deeply rooted in everyday life and many things are performed using internet in real-world, therefore internet users increased because of convenience. Also internet accident is on the increase rapidly. The security vendor developed security system to protect network and system from intruder. Many hackings can be prevented and detected by using these security solutions. However, the new hacking methods and tools that can detour or defeat these solutions have been emerging and even script kids using these methods and tools can easily hack the systems. In consequence, system has gone through various difficulties. So, Necessity of intruder trace-back technology is increased gradually. Trace-back technology is tracing back a malicious hacker to his real location. trace-back technology is largely divided into TCP connection trace-back and IP packet trace-back to trace spoofed IP of form denial-of-service attacks. TCP connection trace-back technology that autonomously traces back the real location of hacker who attacks system using stepping stone at real time. In this paper, We will describe watermark trace-back system using TCP hijacking technique to supplement difficult problem of connection maintenance happened at watermark insertion. Through proposed result, we may search attacker's real location which attempt attack through multiple connection by real time.

  • PDF

Threats of MANPADS and Its Counter-Measures

  • Choi, Jin-Tai
    • International Journal of Contents
    • /
    • v.6 no.3
    • /
    • pp.89-96
    • /
    • 2010
  • The International air transportation industry provides a vital communication link which brings prosperity to many states in our modern age. This invaluable link has been threatened by terrorism. Airlines have been one of the most attractive targets in the eyes of terrorists for several reasons, including particularly the international and symbolic nature of aviation, and the potential of multigovernmental involvement which can inevitably generate wide publicity. Terrorist attacks against civil aviation have been committed since the earliest days of civil aviation history. The first attack against civil aircraft dates back to the early 1930s. Since then, aircraft hijacking and other forms of attack against air transport operations have become one of the most serious challenges to the safety of flying. In recent years, a new form of threats against civil aviation has appeared. Man-portable air defense systems (MANPADS) in the hands of criminals, terrorists, and other non-state actors pose a serious potential threat to passenger air travel, the commercial aviation industry, and military aircraft around the world. The purpose of this study is to provide some countermeasures against such attacks. In order to foster a better understanding of the problem, an introduction of MANPADS and a brief history of attacks using MANPADS are presented. It also examines the level of threats, trends of attacks using MANPADS and the possible countermeasures to be taken by the international community.

Vulnerability Case Analysis of Wireless Moving Vehicle (무선이동체의 취약점 사례 분석)

  • Oh, Sangyun;Hong, Jinkeun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.8
    • /
    • pp.41-46
    • /
    • 2018
  • As the industry related to drones has been activated, the public interest in drones has increased explosively, and many cases of drone-using are increasing. In the case of military drones, the security problem is the level of defense of the aircraft or cruise missiles, but commercial small and low cost drones are often released and utilized without security count-measure. This makes it possible for an attacker to easily gain access to the root of the drones, access internal files, or send fake packets. However, this droning problem can lead to another dangerous attack. In this regard, this paper has identified the vulnerabilities inherent in the commercial drones by analyzing the attack cases in the communication process of the specific drones. In this paper, we analyze and test the vulnerability in terms of scanning attack, meson attack, authentication revocation attack, packet stop command attack, packet retransmission attack, signal manipulation and de-compile attack. This study is useful for the analysis of drones attack and vulnerability.

A Study on Jurisdiction under the International Aviation Terrorism Conventions (국제항공테러협약의 관할권 연구)

  • Kim, Han-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.1
    • /
    • pp.59-89
    • /
    • 2009
  • The objectives of the 1963 Tokyo Convention cover a variety of subjects, with the intention of providing safety in aircraft, protection of life and property on board, and promoting the security of civil aviation. These objectives will be treated as follows: first, the unification of rules on jurisdiction; second, the question of filling the gap in jurisdiction; third, the scheme of maintaining law and order on board aircraft; fourth, the protection of persons acting in accordance with the Convention; fifth, the protection of the interests of disembarked persons; sixth, the question of hijacking of aircraft; and finally some general remarks on the objectives of the Convention. The Tokyo Convention mainly deals with general crimes such as murder, violence, robbery on board aircraft rather than aviation terrorism. The Article 11 of the Convention deals with hijacking in a simple way. As far as aviation terrorism is concerned 1970 Hague Convention and 1971 Montreal Convention cover the hijacking and sabotage respectively. The Problem of national jurisdiction over the offence and the offender was as tangled at the Hague and Montreal Convention, as under the Tokyo Convention. Under the Tokyo Convention the prime base of jurisdiction is the law of the flag (Article 3), but concurrent jurisdiction is also allowed on grounds of: territorial principle, active nationality and passive personality principle, security of the state, breach of flight rules, and exercise of jurisdiction necessary for the performance of obligations under multilateral agreements (Article 4). No Criminal jurisdiction exercised in accordance with national law is excluded [Article 3(2)]. However, Article 4 of the Hague Convention(hereafter Hague Article 4) and Article 5 of the Montreal Convention(hereafter Montreal Article 5), dealing with jurisdiction have moved a step further, inasmuch as the opening part of both paragraphs 1 and 2 of the Hague Article 4 and the Montreal Article 5 impose an obligation on all contracting states to take measures to establish jurisdiction over the offence (i.e., to ensure that their law is such that their courts will have jurisdiction to try offender in all the circumstances covered by Hague Article 4 and Montreal Article 5). The state of registration and the state where the aircraft lands with the hijacker still on board will have the most interest, and would be in the best position to prosecute him; the paragraphs 1(a) and (b) of the Hague Article 4 and paragraphs 1(b) and (c) of the Montreal Article 5 deal with it, respectively. However, paragraph 1(b) of the Hague Article 4 and paragraph 1(c) of the Montreal Article 5 do not specify if the aircraft is still under the control of the hijacker or if the hijacker has been overpowered by the aircraft commander, or if the offence has at all occurred in the airspace of the state of landing. The language of the paragraph would probably cover all these cases. The weaknesses of Hague Article 4 and Montreal Article 5 are however, patent. The Jurisdictions of the state of registration, the state of landing, the state of the lessee and the state where the offender is present, are concurrent. No priorities have been fixed despite a proposal to this effect in the Legal Committee and the Diplomatic Conference, and despite the fact that it was pointed out that the difficulty in accepting the Tokyo Convention has been the question of multiple jurisdiction, for the reason that it would be too difficult to determine the priorities. Disputes over the exercise of jurisdiction can be endemic, more so when Article 8(4) of the Hague Convention and the Montreal Convention give every state mentioned in Hague Article 4(1) and Montreal Article 5(1) the right to seek extradition of the offender. A solution to the problem should not have been given up only because it was difficult. Hague Article 4(3) and Montreal Article 5(3) provide that they do not exclude any criminal jurisdiction exercised in accordance with national law. Thus the provisions of the two Conventions create additional obligations on the state, and do not exclude those already existing under national laws. Although the two Conventions do not require a state to establish jurisdiction over, for example, hijacking or sabotage committed by its own nationals in a foreign aircraft anywhere in the world, they do not preclude any contracting state from doing so. However, it has be noted that any jurisdiction established merely under the national law would not make the offence an extraditable one under Article 8 of the Hague and Montreal Convention. As far as international aviation terrorism is concerned 1988 Montreal Protocol and 1991 Convention on Marking of Plastic Explosives for the Purpose of Detention are added. The former deals with airport terrorism and the latter plastic explosives. Compared to the other International Terrorism Conventions, the International Aviation Terrorism Conventions do not have clauses of the passive personality principle. If the International Aviation Terrorism Conventions need to be revised in the future, those clauses containing the passive personality principle have to be inserted for the suppression of the international aviation terrorism more effectively. Article 3 of the 1973 Convention on the Prevention and Punishment of Crimes Against Internationally Protected Persons, Including Diplomatic Agents, Article 5 of the 1979 International Convention against the Taking of Hostages and Article 6 of the 1988 Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation would be models that the revised International Aviation Terrorism Conventions could follow in the future.

  • PDF

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

The Need for Modernization of the Tokyo Convention(1963) on the Issue of Unruly Passengers and the Inadequacy of Korean Domestic Legal Approaches (기내 난동승객관련 도쿄협약의 개정필요성과 한국국내법적 접근의 한계)

  • Bae, Jong-In;Lee, Jae-Woon
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.1
    • /
    • pp.3-27
    • /
    • 2012
  • Although aviation safety and security have been improving, which has made air transportation more reliable, the international aviation community has witnessed a steady increase in the number of unruly passenger incidents. Under international law, the Tokyo Convention (The Convention on Offences and Certain Other Acts Committed on Board Aircraft of 1963) is applicable to unruly passenger issues. While the Tokyo Convention has been a successful convention which 185 member states have ratified, it has its shortcomings. Three major shortcomings are related to definition, jurisdiction, and enforcement. Firstly, the Tokyo Convention does not provide for a definition of unruly passengers, thereby resulting in a situation where conduct that may be considered to be a criminal offence in the country of embarkation may not be a criminal offence in the country where the aircraft lands. Having different definitions may lead to ineffective action on the part of air carriers. Secondly, the fact that the state of landing does not bear jurisdiction produces circumstances in which it is impossible to punish an unruly passenger who clearly committed an offence on board. Thirdly, the Tokyo Convention only recognizes the competence of the state of registry to exercise criminal jurisdiction but does not impose the duty to actually use that competence in any specific case. Along with ratifying the Tokyo Convention, Korea enacted the Aviation Navigation Safety Act in 1974 as a domestic legal approach to dealing with the problem of unruly passengers. Partially reflecting the ICAO's model legislation, Circular 288, the Aviation Safety and Security Act was enacted in 2002. Although the Korean Aviation Safety and Security Act is a comprehensive act which has been constantly updated, there is no provision with respect to jurisdiction and only the Korean criminal code is applicable to jurisdiction. The Korean criminal code establishes its jurisdiction in connection with territoriality, nationality and registration, which is essentially the same as the jurisdictional principles of the Tokyo Convention. Thus, the domestic legal regime cannot close the jurisdictional gap either. Similarly, Korean case law would not take an active posture to jurisdiction unless the offence in question is a serious one, such as hijacking. A Special Sub Committee of the ICAO Legal Committee (LCSC) was established to examine the feasibility of introducing amendments to the Convention on Offences and Certain Other Acts Committed on Board Aircraft of 1963 with particular reference to the issue of unruly passengers. The result of the ICAO's findings should lead to the modernization of the Tokyo Convention, thereby reducing the number of incidents caused by unruly passengers and enabling all parties concerned to respond to unruly passengers more effectively.

  • PDF