• Title/Summary/Keyword: Integrity Protection

Search Result 260, Processing Time 0.034 seconds

SEAndroid Policy Protection Architecture Design and Implementation in Android (안드로이드 시스템 하에서의 SEAndroid 정책 보호 기법 설계 및 구현)

  • Yoo, Seok-man;Park, Jin-Hyung;Lee, Dong-hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1105-1119
    • /
    • 2016
  • Android includes SEAndroid as a core security feature. SELinux is applied to Android OS as a SEAndroid, because there exists structural differences between Linux and Android. Since the security of SEAndroid depends on the reliable policy if the policy is tampered by the attacker, the serious security problems can be occurred. So we must protect policies which are the most important thing in SEAndoroid. In this paper, we analyze the process of SEAndroid policy updating to find out vulnerabilities and study the attack points on policy tampering. And we propose the SPPA to detect whether the policy is modified by an attacker. Moreover, we prove the performance and the effect of our proposed method on mobile device.

A lightweight detection mechanism of control flow modification for IoT devices (IoT 기기를 위한 경량의 소프트웨어 제어 변조 탐지 기법)

  • Pak, Dohyun;Lee, JongHyup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1449-1453
    • /
    • 2015
  • Constrained IoT devices cannot achieve full coverage of software attestation even though the integrity of software is critical. The limited modification attacks on control flow of software aim at the shadow area uncovered in software attestation processes. In this paper, we propose a light-weight protection system that detects modification by injecting markers to program code.

PGP Certification System in Blockchain Environments (블록체인 환경에서의 PGP 인증 시스템)

  • Kim, Daehan;Seo, Kyungryong
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.658-666
    • /
    • 2020
  • PGP is an encryption software designed to provide information protection, security and authentication services for online communication systems. The characteristic of behavior done on the Internet is that you don't know the other person. It is very important to protect information from someone you cannot trust. So identification of the other person is an important task. PGP uses an digital signature algorithm to verify the identity of the other party. However, it is not accurate to check the other party's credibility. PGP increases trust as other users sign more on public keys of user. In other words, credibility is not perfect. In this paper, PGP certification system that key management in Ethereum blockchain, one of the blockchain platforms, is proposed. Key management in blockchain ensures data integrity, transparency and reliability.

A Study on the Present Issues and Future of the Pharmaceutical Packaging (의약품 패키징의 문제점과 향후 전망)

  • Kim, Jai-Neung
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.10 no.1
    • /
    • pp.15-26
    • /
    • 2004
  • Pharmaceuticals require more detailed packaging than do other sensitive products, such as foods, although there are several similarities in their requirements. Because the required action of a medication can be nullified by any deterioration in its active principles the protection required from its packaging is at least an order of magnitude greater than that needed by foods. Therefore, security and integrity of the package are more important and are controlled by licensing arrangements. To achieve levels of safety, reliability, and quality, pharmaceutical firms must identify and correct potential problems with packaging functions. Purpose of this study is to identify the present issues pharmaceutical packaging and to forecast their future for the development of pharmaceutical packaging.

  • PDF

The Active Dissolved Wafer Process (ADWP) for Integrating single Crystal Si MEMS with CMOS Circuits

  • Karl J. Ma;Yogesh B. Glanchandani;Khalil Najafi
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.2 no.4
    • /
    • pp.273-279
    • /
    • 2002
  • This paper presents a fabrication technology for the integration of single crystal Si microstructures with on-chip circuitry. It is a dissolved wafer technique that combines an electro-chemical etch-stop for the protection of circuitry with an impurity-based etch-stop for the microstructures, both of which are defined in an n-epi layer on a p-type Si wafer. A CMOS op. amp. has been integrated with $p^{++}$ Si accelerometers using this process. It has a gain of 68 dB and an output swing within 0.2 V of its power supplies, unaffected by the wafer dissolution. The accelerometers have $3{\;}\mu\textrm{m}$ thick suspension beams and $15{\;}\mu\textrm{m}$ thick proof masses. The structural and electrical integrity of the fabricated devices demonstrates the success of the fabrication process. A variety of lead transfer methods are shown, and process details are discussed.

Protein Inhibition Precipitation of Calcium Phosphate in Human Saliva (인간 타액내 항 린산칼슘 침전 단백질)

  • Song Han
    • Journal of Oral Medicine and Pain
    • /
    • v.20 no.1
    • /
    • pp.7-18
    • /
    • 1995
  • The Purpose of this article is to describe the biochemical properties and biological functions of several salivary proteins that possess the unusual properties of inhibiting spontaneous and secondary precipitation of calcium phosphate. This function is very important since human salivary secretion is supersaturated with respect to calcium phosphate. Biological function of statherin, proline rich protein (PRP) and histidine rich protein (HRP) is to inhibit precipitation of calcium phosphate in salivary glands, in the oral fluids, and onto tooth surfaces. The resulting supersaturated state of the salivary secretions contributes a protective and reparative environment which is important for the integrity of the tooth. Beneficial consequences of salivary supersaturation with respect to calcium phosphate are selectively expressed in the oral cavity- that is, protection is provided for the dental enamel-while undesirable consequences, for example, precipitation of calcium phosphates in the salivary glands and onto the teeth do not occur. Purification and structural characteristics of these proteins as well as clinical significance of functions of each protein will be discussed.

  • PDF

Sutdy of transaction protection by certificate and OTP (공인인증서와 OTP를 이용한 트렌젝션 보호에 관한 연구)

  • Kim, Nack-Hyun;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.618-620
    • /
    • 2010
  • We are using a certificate, OTP(One Time Password), Security Card etc. for safety on E-commerce. However, These are not perfectly protect Confidentiality, integrity, user authentication, and nonrepudiation. In this paper, we are proposed authentication scheme by certificate and OTP.

  • PDF

The Study on Autonomous State Estimator for Smart Grid (스마트그리드를 위한 자율형 상태관측기 연구)

  • Park, Jong-Chan;Lee, Se-In
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.60 no.1
    • /
    • pp.32-36
    • /
    • 2011
  • In this study, authors have proposed the autonomous state estimation which has been composed with IEC61850, GPS time synchronization and objective model design concept. The proposed method is able to supervise/correct measurement and communication error from SCADA. The major advantages of the proposed autonomous state estimation are that it is possible to evaluate integrity of data measured and transferred from SCADA, to reduce human intervention and to expense national-size applications such as EMS (Energy Management System), WAMS (Wide Area Monitoring System) or WAPS (Wide Area Protection System). This study addresses the issues related to the operation of the smart grid and proposes a new automated approach to achieve this goal. Through applying the proposed system to IEEE 14-bus test electric system, we prove the possibility of the proposed idea.

A Robust and Removable Watermarking Scheme Using Singular Value Decomposition

  • Di, Ya-Feng;Lee, Chin-Feng;Wang, Zhi-Hui;Chang, Chin-Chen;Li, Jianjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5268-5285
    • /
    • 2016
  • Digital watermarking techniques are widely applied to protect the integrity and copyright of digital content. In a majority of the literature for watermarking techniques, the watermarked image often causes some distortions after embedding a watermark. For image-quality-concerned users, the distortions from a watermarked image are unacceptable. In this article, we propose a removable watermarking scheme that can restore an original-like image and resist signal-processing attacks to protect the ownership of an image by utilizing the property of singular value decomposition (SVD). The experimental results reveal that the proposed scheme meets the requirements of watermarking robustness, and also reestablishes an image like the original with average PSNR values of 59.07 dB for reconstructed images.

A Configuration of LINUX router VPN using FreeS/WAN IPSEC (FreeS/WAN IPSEC을 이용한 LINUX 라우터 VPN 구성)

  • 김한철;이계상
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.499-502
    • /
    • 2001
  • FreeS/WAN[l] 은 LINUX 상에서 네트워크 보안 프로토콜표준인 IPSEC을 구현한 공개 S/W이다. 현재 LINUX Project로 수행되고 있으며 1.91 version 까지 나와 있다. 라우터와 라우터간에 IPSEC을 사용하여 통신함으로써 access control, connectionless integrity, data origin authentication, protection against replays, confidentiality의 서비스를 보장받을 수 있고, 또한 이러한 서비스들은 IP 계층에서 제공되기 때문에 IP 계층뿐만 아니라 그 이상의 계층에 대한 보호를 제공한다. [2] 본 논문에서는 LINUX router에 FreeS/WAN IPSEC을 설치하여 Security Gateway를 구성하고, 이 Security Gateway를 통해 전형적인 가상사설망을 구성할 수 있음을 보였다. 양단의 Security Gateway에 설치되어진 FreeS/WAN으로 VPN connection을 설정하고, 인증방법으로 RSA authentication key를 setup 하였다. IPSEC을 통하여 암호화되어진 데이터로 양단의 Gateway 구간에서 보안통신이 이루어짐을 알아본다.

  • PDF