• Title/Summary/Keyword: Leakage information

Search Result 1,513, Processing Time 0.029 seconds

Sub-1.2-V 1-Gb Mobile DRAM with Ultra-low Leakage Current (극저 누설전류를 가지는 1.2V 모바일 DRAM)

  • Park, Sang-Kyun;Seo, Dong-Il;Jun, Young-Hyun;Kong, Bai-Sun
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.433-434
    • /
    • 2007
  • This paper describes a low-voltage dynamic random-access memory (DRAM) focusing on subthreshold leakage reduction during self-refresh (sleep) mode. By sharing a power switch, multiple iterative circuits such as row and column decoders have a significantly reduced subthreshold leakage current. To reduce the leakage current of complex logic gates, dual channel length scheme and input vector control method are used. Because all node voltages during the standby mode are deterministic, zigzag super-cutoff CMOS is used, allowing to Preserve internal data. MTCMOS technique Is also used in the circuits having no need to preserve internal data. Sub-1.2-V 1-Gb mobile DDR DRAM employing all these low-power techniques was designed in a 60 nm CMOS technology and achieved over 77% reduction of overall leakage current during the self-refresh mode.

  • PDF

Simple High Efficiency Full-Bridge DC-DC Converter using a Series Resonant Capacitor

  • Jeong, Gang-Youl;Kwon, Su-Han;Park, Geun-Yong
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.1
    • /
    • pp.100-108
    • /
    • 2016
  • This paper presents a simple high efficiency full-bridge DC-DC converter using a series resonant capacitor. The proposed converter achieves the zero voltage switching of the primary switches under a wide range of load conditions and reduces the high circulating current in the freewheeling mode using the leakage resonant inductance and the series resonant capacitor. Thus, the proposed converter overcomes the drawbacks of the conventional full-bridge DC-DC converter and improves its overall system efficiency. Its structure is simplified by using the leakage inductance of the transformer as the resonant inductance and omitting the DC output filter inductance. Also it can operate over a wide range of input voltages. In this paper, the operational principle, analysis and design example are described in detail. Finally, the experimental results from a 650W (24V/27A) prototype are demonstrated to confirm the operation, validity and features of the proposed converter.

Gate-Induced-Drain-Leakage (GIDL) Current of MOSFETs with Channel Doping and Width Dependence

  • Choi, Byoung-Seon;Choi, Pyung-Ho;Choi, Byoung-Deog
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2012.02a
    • /
    • pp.344-345
    • /
    • 2012
  • The Gate-Induced-Drain-Leakage (GIDL) current with channel doping and width dependence are characterized. The GIDL currents are found to increase in MOSFETs with higher channel doping levels and the observed GIDL current is generated by the band-to-band-tunneling (BTBT) of electron through the reverse-biased channel-to-drain p-n junction. A BTBT model is used to fit the measured GIDL currents under different channel-doping levels. Good agreement is obtained between the modeled results and experimental data. The increase of the GIDL current at narrower widths in mainly caused by the stronger gate field at the edge of the shallow trench isolation (STI). As channel width decreases, a larger portion of the GIDL current is generated at the channel-isolation edge. Therefore, the stronger gate field at the channel-isolation edge causes the total unit-width GIDL current to increases for narrow-width devices.

  • PDF

Information leakage in bi-directional IFD communication system with simultaneously transmitted jamming sequence

  • Ju, Hyungsik;Gwak, Donghyuk;Kim, Tae-Joong
    • ETRI Journal
    • /
    • v.42 no.1
    • /
    • pp.138-149
    • /
    • 2020
  • In this paper, we describe a simultaneously transmitted jamming (ST-jamming) for bi-directional in-band full-duplex (IFD) system to improve information security at the physical layer. By exploiting ST-jamming, each legitimate user transmits data samples and jamming samples together in one orthogonal frequency division multiplexing symbol according to given traffic asymmetry. Regardless of the traffic difference in both directions in IFD communication, eavesdropping of confidential information is prevented in both directions simultaneously without the loss of data rate. We first propose an encoding scheme and the corresponding decoding scheme for ST-jamming to be used by the legitimate users. In addition, we study a transceiver structure of the legitimate users including a baseband modem uniquely designed for the use of ST-jamming. The leakage of confidential information at an eavesdropper is then quantified by studying the mutual information between the confidential transmit signals and the received signals of the eavesdropper. Simulation results show that the proposed ST-jamming significantly reduces the leakage of legitimate information at the eavesdropper.

A Study on Certificate-based Personal Authentification System for Preventing Private Information Leakage through Internet (개인정보 유출 피해 방지를 위한 공인인증서 기반 인터넷 개인인증체계 개선 모델에 관한 연구)

  • Lee, Jung-Hyun;Kwon, Hun-Young;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.1-11
    • /
    • 2010
  • Recently, We have many private information leakage cases through internet which cause social problems and it is impossible to change or update the leaked information, it is also used to the third crime such as identity theft, internet fraud. Hackers are interested in stealing private information for making money, in this point private information leakage problems are constantly increased hereafter. In this paper, I surveyed the authorization model on site registration which is currently used in Korea, and the problem of collecting personal identification number, I proposed policy model of useless method of private information, especially leaked information can not be used anymore in internet.

Mobile Application Privacy Leak Detection and Security Enhancement Research (모바일 어플리케이션 개인정보 유출탐지 및 보안강화 연구)

  • Kim, Sungjin;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.195-203
    • /
    • 2019
  • Mobile applications stores such as Google Play Store and Apple App Store, are widely used to distribute a variety of applications including finance, shopping, and entertainment. Recently, however, vulnerabilities of the mobile applications are likely to violate users' privacy such as personal information leakage. In this paper, we classify mobile applications that can be download from mobile stores, and analyze the personal information that could be leaked when users are using the mobile applications. As a result of analysis, we found that personal information are leaked in some widely used mobile applications in practice. On the basis of our experiment results, we propose some mitigations to enhance security of the mobile applications and prevent leakage of personal information.

A Study on DLP System for Preventing Internal Information Leakage (내부정보유출방지를 위한 DLP시스템 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.121-126
    • /
    • 2018
  • The development of modern ICT and network technologies has made the business environment smart.and under such circumstances, a great deal of data is being generated, stored and used. The important information that becomes an energy source for corporate management creates economic profit and value and is also utilized as a basis for strong influence. Therefore, important information must ensure its availability and convenience while ensuring confidentiality and integrity, which is the basic objective of information protection. However, most companies are seeing more and more incidents of serious damage due to the leakage of important internal information. In this study, we deal with the Data Loss Prevention (DLP) technologies and solutions to prevent internal information leakage and establish stable data security and information protection management.

  • PDF

Color Reproduction Based on Leakage Effect of LCD (LCD의 Leakage 현상을 고려한 색재현)

  • 허태욱;이상훈;한찬호;송규익
    • Proceedings of the IEEK Conference
    • /
    • 2000.11d
    • /
    • pp.243-246
    • /
    • 2000
  • Recently, PC monitor users have been replacing cathode ray tubes (CRT) with liquid crystal displays (LCD). But the chromaticity of the primaries are dependent on RGB input signals. And the colorimetry of LCD changes with gray scale and has a poor peformance in color reproduction. In this paper we propose the enhanced algorithm of color reproduction considering color leakage error and black subpixel error in LCD. In order to test peformance of this algorithm we use the colors of Macbeth colorcheck. As a result of experiments, it was confirmed that the color difference of the LCD using the proposed algorithm was considerably reduced.

  • PDF

Theoretical Model and Parasitic Parameters Extraction of Leakage Current in InGaN/GaN Light Emitting Diodes (InGaN/GaN 발광다이오드의 누설전류의 이론적 모델과 기생 파라미터 추출)

  • Hwang, Seong-Min;Sim, Jong-In
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2007.07a
    • /
    • pp.289-290
    • /
    • 2007
  • We have theoretically derived a electrical model and extracted a parasitic parameters of leakage current in InGaN/GaN light emitting diodes (LEDs). The parasitic parameters of our LED are $R_p=10^{10}{\Omega}$, $I_{0,2}=10^{-17}A$ and $n_2=3.6$, which provide information of leakage current.

  • PDF

A study on frame transition of personal information leakage, 1984-2014: social network analysis approach (사회연결망 분석을 활용한 개인정보 유출 프레임 변화에 관한 연구: 1984년-2014년을 중심으로)

  • Jeong, Seo Hwa;Cho, Hyun Suk
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.57-68
    • /
    • 2014
  • This article analyses frame transition of personal information leakage in Korea from 1984 to 2014. In order to investigate the transition, we have collected newspaper article's titles. This study adopts classification, text network analysis(by co-occurrence symmetric matrix), and clustering techniques as part of social network analysis. Moreover, we apply definition of centrality in network in order to reveal the main frame formed in each of four periods. As a result, accessibility of personal information is extended from public sector to private sector. The boundary of personal information leakage is expanded to overseas. Therefore it is urgent to institutionalize the protection of personal information from a global perspective.