• 제목/요약/키워드: Platform Risks

검색결과 109건 처리시간 0.027초

DroidSecure: 안드로이드 어플리케이션 권한 상승 완화를 위한 기술에 대한 연구 (DroidSecure: A Technique to Mitigate Privilege Escalation in Android Application)

  • 응웬부렁;정수환
    • 정보보호학회논문지
    • /
    • 제26권1호
    • /
    • pp.169-176
    • /
    • 2016
  • 안드로이드 플랫폼은 사용자 친화적으로 설계되어 있다. 하지만 이러한 친화적 설계는 취약점이 쉽게 발생할 수 있고, 일반적인 사용자는 쉽게 탐지가 어렵다는 단점을 가지고 있다. 따라서, 본 논문에서는 안드로이드 어플리케이션 분석을 위한 유명한 오픈 소스 분석 도구를 설명하고, 현재 구글의 권한 그룹에 대한 정책의 위험성을 설명한 후 공격자의 권한 상승에 대한 위험을 완화하기 위한 기법을 제안한다. 또한, 21,064의 악성코드 샘플을 조사하여 제안한 기술이 안전하지 않은 응용 프로그램 업데이트 탐지에 대한 증명을 하였을 뿐 아니라 보안 위협에 대한 인식을 고취시키고자 하였다.

항공기와 유사한 게임 개발환경 구축을 위한 소프트웨어 설계 (The software design for the aircraft and the similar game environment construction)

  • 김효관;한규석;장원;최민형;최영규
    • 한국정보전자통신기술학회논문지
    • /
    • 제6권2호
    • /
    • pp.101-104
    • /
    • 2013
  • 실제 항공기에 탑승하여 교육을 수행 할 수 있으나 초등 비행 시 숙련도가 떨어지는 조종사를 교육하기 위한 비용과 위험이 만만치 않다. 또한 상당한 기술을 필요로 하는 고등 비행 훈련 시 따르는 위험도 마찬가지이다. 이러한 것들을 모의 소프트웨어를 통해 훈련에 따르는 위험과 비용을 줄일 수 있으며 예상되는 위험 상황을 가상으로 하여 실제 상황처럼 전개해 볼 수 있는 장점이 있다. 본 논문은 실제 항공기의 비행 역학 특성 및 무장 탄도학이 고려된 게임 개발을 위한 소프트웨어 플랫폼 기반을 설계함으로써 조종사가 되고 싶은 학생들의 항공기에 대한 이해를 돕기 위함이다.

Unified approach to predict the dynamic performance of transportation system considering wind effects

  • Chen, S.R.;Cai, C.S.
    • Structural Engineering and Mechanics
    • /
    • 제23권3호
    • /
    • pp.279-292
    • /
    • 2006
  • Natural hazards, including the wind hazard and others, threaten the integrity of the modern society. A transportation system usually consists of roadways, bridges and related vehicles. Harsh environmental conditions, caused by such as wind, exist in the real world frequently and affect the dynamic performance of the transportation system through their interactions. Long-span bridges are usually the backbones of transportation lines. In windy conditions, the information about the dynamic performance of bridges and vehicles considering full interactions of environmental factors is very essential for people to assess the overall operational conditions and safety risks of the transportation lines. Most of existent approaches target specifically at several isolated tasks considering partial interaction effects. In order to improve the understanding of these related-in-nature problems integrally as well as the consistency of different approaches, a unified approach to integrally predict the dynamic performance of long-span bridges and vehicles under wind is introduced. Such an approach can be used as a general platform to predict the dynamic responses of vehicles and bridges under various situations through adopting both commercial and in-house software. Dynamic interaction effects can be fully considered automatically for each situation. An example of a prototype bridge in US is given for the purpose of demonstration.

안드로이드 응용 단말기를 위한 SELinux 환경설정 방법 (Solutions for Adjusting SELinux To Android-Powered Devices)

  • 안 두이 부;한재일;김영만
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2011년도 추계학술논문집 2부
    • /
    • pp.565-568
    • /
    • 2011
  • Google Android framework consists of an operating system and software platform for mobile devices. Using a general-purpose Linux operating system in mobile device has some advantages but also security risks. Security-Enhanced Linux (SELinux) is a kernel-based protection approach which can help to reduce potential damage from successful attacks. However, there are some challenges to integrate SELinux in Android. In this research, we do a study on how to do the integration and find out four challenges. The first one is that the Android file system (yaff2) does not support security namespace for extended attribute (xattr) which is required by SELinux. The second one is that it's difficult to apply SELinux policy to Dalvik process on which an Android application runs on. The third one is that Android lacks methods, tools and libraries to interact with SELinux. The last one is how to update the SELinux policy automatically when installing or removing an application. In this paper, we propose solutions for the above limitations that make the SELinux more adaptive and suitable for Android framework.

  • PDF

통합플랫폼 관리체재 기반의 PBBC 시뮬레이터 설계 (Design of the passenger board bridge controller based total solution flatform system)

  • 김휘영;홍정환;정종한;송금영;송우정;정용호;김희제
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 하계학술대회 논문집 D
    • /
    • pp.2289-2291
    • /
    • 2002
  • In maned airport, crews may have risks as they manage passenger control system in IPMS in damage situations such as fire in a airport. So the application of unmanned autonomous system can reduce the number of boarding crews and attribute to safe airplane transportation. PBBC model can be used to obtain control strategy, and airplane and enhance operators' skill by simulating the airport. The paper suggests an intelligent system of the pbbc control using microprocessor in integrated platform management system which can take measures against passenger situation of a airplane excluding unnecessary warnings with undamaged situations. The system here detected the passenger more accurately and adopted more appriate measures according to airplane status compared with conventional systems.

  • PDF

Two Factor Authentication for Cloud Computing

  • Lee, Shirly;Ong, Ivy;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • 제8권4호
    • /
    • pp.427-432
    • /
    • 2010
  • The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services' authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework's security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.

An Overview of Seabed Storage Methods for Pipelines and Other Oil and Gas Equipment

  • Fatah, M.C.;Mills, A.;Darwin, A.;Selman, C.
    • Corrosion Science and Technology
    • /
    • 제16권2호
    • /
    • pp.76-84
    • /
    • 2017
  • In the construction of subsea oil and gas developments, it is increasingly common that subsea oil and gas equipment will be installed in subsea well before final hookup and production. Installation of wellheads, subsea hardware, pipelines, and surface facilities (platforms, FPSO, FLNG, connected terminals, or gas plants) are increasingly driven by independent cost and vessel availability schedules; this gives rise to requirements that the subsea facilities must be stored in the seabed for a specific time. In addition, schedule delays, particularly in the installation or startup of the connected platform, FPSO, FLNG, or onshore plant may cause unexpected extensions of the intended storage period. Currently, there are two methods commonly used for storage subsea facilities in the seabed: dry parking and wet parking. Each method has its own risks, challenges, and implications for the facility life and its integrity. The corrosion management and preservation method selection is a crucial factor to be considered in choosing the appropriate storage method and achieving a successful seabed storage. An overview of those factors is presented, along with a discussion on the internal corrosion threats and assessments.

Spatio-temporal dependent errors of radar rainfall estimate for rainfall-runoff simulation

  • Ko, Dasang;Park, Taewoong;Lee, Taesam;Lee, Dongryul
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2016년도 학술발표회
    • /
    • pp.164-164
    • /
    • 2016
  • Radar rainfall estimates have been widely used in calculating rainfall amount approximately and predicting flood risks. The radar rainfall estimates have a number of error sources such as beam blockage and ground clutter hinder their applications to hydrological flood forecasting. Moreover, it has been reported in paper that those errors are inter-correlated spatially and temporally. Therefore, in the current study, we tested influence about spatio-temporal errors in radar rainfall estimates. Spatio-temporal errors were simulated through a stochastic simulation model, called Multivariate Autoregressive (MAR). For runoff simulation, the Nam River basin in South Korea was used with the distributed rainfall-runoff model, Vflo. The results indicated that spatio-temporal dependent errors caused much higher variations in peak discharge than spatial dependent errors. To further investigate the effect of the magnitude of time correlation among radar errors, different magnitudes of temporal correlations were employed during the rainfall-runoff simulation. The results indicated that strong correlation caused a higher variation in peak discharge. This concluded that the effects on reducing temporal and spatial correlation must be taken in addition to correcting the biases in radar rainfall estimates. Acknowledgements This research was supported by a grant from a Strategic Research Project (Development of Flood Warning and Snowfall Estimation Platform Using Hydrological Radars), which was funded by the Korea Institute of Construction Technology.

  • PDF

Optimizing shallow foundation design: A machine learning approach for bearing capacity estimation over cavities

  • Kumar Shubham;Subhadeep Metya;Abdhesh Kumar Sinha
    • Geomechanics and Engineering
    • /
    • 제37권6호
    • /
    • pp.629-641
    • /
    • 2024
  • The presence of excavations or cavities beneath the foundations of a building can have a significant impact on their stability and cause extensive damage. Traditional methods for calculating the bearing capacity and subsidence of foundations over cavities can be complex and time-consuming, particularly when dealing with conditions that vary. In such situations, machine learning (ML) and deep learning (DL) techniques provide effective alternatives. This study concentrates on constructing a prediction model based on the performance of ML and DL algorithms that can be applied in real-world settings. The efficacy of eight algorithms, including Regression Analysis, k-Nearest Neighbor, Decision Tree, Random Forest, Multivariate Regression Spline, Artificial Neural Network, and Deep Neural Network, was evaluated. Using a Python-assisted automation technique integrated with the PLAXIS 2D platform, a dataset containing 272 cases with eight input parameters and one target variable was generated. In general, the DL model performed better than the ML models, and all models, except the regression models, attained outstanding results with an R2 greater than 0.90. These models can also be used as surrogate models in reliability analysis to evaluate failure risks and probabilities.

블록체인 기반 가상화폐 거래의 보안 위험 및 대응방안 (The Security Risk and Countermeasures of Blockchain based Virtual Currency Trading)

  • 정용식;차재상
    • 한국정보전자통신기술학회논문지
    • /
    • 제11권1호
    • /
    • pp.100-106
    • /
    • 2018
  • 2008년 비트코인이라는 가상화폐의 개념이 발표된 이후, 비트코인의 기반이 되는 블록체인 기술은 향후 우리 사회를 변화시킬 수 있는 4차 산업혁명 시대의 중요한 플랫폼 기술로 주목받고 있다. 기존의 전자금융거래는 정부나 은행 등 신뢰할 수 있는 중앙기관에서 모든 거래 내역을 저장, 관리하고 있는 반면, 블록체인 기반의 전자금융거래는 거래에 참여하는 모든 참여자가 거래 내역을 각각 저장, 관리하는 분산 구조로 이루어져 있어서, 시스템 구축과 운영비용을 절감하면서도 거래의 투명성을 보장할 수 있는 특징을 가지고 있다. 이러한 블록체인 기술은 비트코인으로 시작된 가상화폐 이외에도 스마트 계약, 문서관리 등 다양한 영역으로 그 활용방안이 확장되고 있다. 블록체인의 핵심 기술 영역은 검증된 암호기술을 기반으로 거래 내역의 위조나 해킹이 어렵도록 일정수준 이상의 보안성을 갖추고 있으나, 가상화폐를 사고파는 거래 서비스나 상품 대금으로 지급하는 결제 서비스의 구현에 있어서는 구현 방식에서의 보안 취약점이 존재할 수 있기에 가상화폐 사용에 있어서 보안 위험에 대해서 살펴보고 대응방안에 대해서 논하고자 한다. 특히 가상화폐 거래를 손쉽게 해주는 가상화폐 거래소에 대한 보안 사고가 최근에 자주 발생하고 있으며, 가상화폐를 거래하는 사용자들의 피해도 증가하고 있기에 금융권에 적용 가능한 블록체인 보안 위협을 살펴보고 그 중에서도 특히 보안사고로 인한 피해가 많이 발생하는 가상화폐 거래소에 대한 보안 위협과 적용 가능한 보안 대책을 제시하고자 한다.