• Title/Summary/Keyword: Secure Coding

Search Result 92, Processing Time 0.062 seconds

Identification of Vehicle Using Edge Detection (S/W 개발 보안의 필요성과 기대효과)

  • Shin, SY;Kim, DK;Lee, CW;Lee, HC;Lee, TW;Park, KH
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.741-742
    • /
    • 2016
  • Secure Coding is in the development phase, removing a potential security vulnerability that could lead to attacks such as hacking in advance, says the technique to develop secure software from external attacks. In this paper, we'll learn about the needs and expectations of the effectiveness of these security software development. Due to this, the threat to the safe software development project, and there is an effect to improve quality.

  • PDF

A Study on Security Enhancement for the Use and Improvement of Blockchain Technology (보안성 강화를 위한 블록체인기술의 활용과 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.63-68
    • /
    • 2023
  • In this study, in relation to blockchain protocol and network security, we study the configuration of blockchain and encryption key management methods on smart contracts so that we can have a strong level of response to MITM attacks and DoS/DDoS attacks. It is expected that the use of blockchain technology with enhanced security can be activated through respond to data security threats such as MITM through encryption communication protocols and enhanced authentication, node load balancing and distributed DDoS attack response, secure coding and vulnerability scanning, strengthen smart contract security with secure consensus algorithms, access control and authentication through enhanced user authentication and authorization, strengthen the security of cores and nodes, and monitoring system to update other blockchain protocols and enhance security.

Power Splitting-based Analog Network Coding for Improving Physical Layer Security in Energy Harvesting Networks (에너지 하베스팅 네트워크에서 물리계층 보안을 향상시키기 위한 파워 분할 기반의 아날로그 네트워크 코딩)

  • Lee, Kisong;Choi, Hyun-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1849-1854
    • /
    • 2017
  • Recently, RF energy harvesting, in which energy is collected from the external RF signals, is considered as a promising technology to resolve the energy shortage problem of wireless sensors. In addition, it is important to guarantee secure communication between sensors for implementing Internet-of-Things. In this paper, we propose a power splitting-based network analog coding for maximizing a physical layer security in 2-hop networks where the wireless-powered relay can harvest energy from the signals transmitted by two sources. We formulate systems where two sources, relay, and eavesdropper exist, and find an optimal power splitting ratio for maximizing the minimum required secrecy capacity using an exhaustive search. Through simulations under various environments, it is demonstrated that the proposed scheme improves the minimum required secrecy capacity by preventing the eavesdropper from overhearing source signals, compared to the conventional scheme.

A Study on the Partnership Conflict of Damyang Samdari Village Using the Grounded Theory - For Damyang Samdari Village, No.4 National Important Agriculture Heritage - (근거이론을 활용한 담양 삼다리마을 지역주민의 파트너십 갈등 연구 - 국가중요농업유산 제 4호, 담양 대나무밭을 중심으로 -)

  • Kim, Young-Rang;Kim, Eun-Sol;Lee, Tae-Gyeom
    • Journal of Korean Society of Rural Planning
    • /
    • v.26 no.4
    • /
    • pp.41-52
    • /
    • 2020
  • The purpose of this study is to identify the conflict between residents and governments in partnership arising from the designation of National Important Agricultural Heritage for Damyang Samdari village and to suggest directions for improvement. To this end, residents of Samdari Village in Damyang, designated as an important national agricultural heritage, were interviewed. Interviews were analyzed through grounded theory, categorized into open coding, axial coding, and selective coding, and a paradigm model was constructed. Through this, the central phenomena of resident participation patterns currently appearing in the village were identified, and causal, contextual, and intervening conditions were analyzed. Causal conditions were analyzed as one-sided administrative treatment, assortment matching project, one-time plan, excessive dependence of residents and economic damages of residents at the beginning of the designation of national important agricultural heritage. As a result, conflict between residents and local governments occurred as a central phenomenon, and contextual conditions such as decline in the competitive of bamboo resources and frequent change in managers were also affecting the central phenomenon. As intervening conditions to alleviate the central phenomenon, there are local government's purchase of bamboo fields and fragmentary business effects. The action taken by the residents and officials in response to a fixed conflict is called an action-interaction strategy. Residents refused to change and settled in reality, and local governments avoided conflict. From the beginning of the designation to the present, the villagers gradually lost interest in the National Important Agricultural Heritage due to problems and conflicts that occurred in the process of forming a partnership in the National Important Agricultural Heritage project. Based on the analyzed model, a plan to build the partnership standards on Damyang bamboo field to secure the sustainability of the field and increase the practicality of resident participation, that is partnership, was suggested.

A Study of Pre-inspection for Information Security in Information System (정보시스템의 정보보호를 위한 사전점검에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.513-518
    • /
    • 2014
  • According to the development of IT technology, various new technologies are being produced. As the complexity of the information system like using the network and convergence devices is increasing, threat and vulnerability against various security problems are increasing even though new IT services provide the convenience of users' accessibility to services. In order to secure the safety of information system, the weakness is being removed through the information protection vulnerability analysis starting from information and communication service construction stage and the system is being prepared for pre-inspection activities about whether the information protection measures were established and applied. In this paper, introduction and current status of each country about advanced check-up systems in the information system are to be identified. Progress direction about the advanced pre-inspection system which is driven by Korea Internet Security Agency and its activation plan to secure the safety are to be suggested.

Adaptive Data Hiding based on Turbo Coding in DCT Domain

  • Yang, Jie;Lee, Moon Ho;Chen, Xinhao
    • Journal of Broadcast Engineering
    • /
    • v.7 no.2
    • /
    • pp.192-201
    • /
    • 2002
  • This paper develops a novel robust information hiding technique that uses channel codes derived from the error-correcting coder. The message encoded by the cover encoder is hidden in DCT transform domain of the cover image. The method exploits the sensitivity of human eyes to adaptively embed a visually recognizable message in an image without affecting the perceptual quality of the underlying cover image. Experimental results show that the proposed data hiding technique is robust to cropping operations, lossy JPEG compression, noise interference and secure against known stego attacks. The performance of the proposed scheme with turbo coder is superior to that without turbo coder.

Design of a Secure and Adaptive Transmission Framework for Multimedia Contents Distribution (적응성 있는 안전한 멀티미디어 데이터 전송 프레임워크에 관한 설계)

  • Kim Il-Hee;Lee Gil-Ju;Park Yong-Su;Cho Seung-Je;Cho Yoo-Kun
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.295-298
    • /
    • 2006
  • 인터넷의 발달로 네트워크를 통한 멀티미디어 데이터 서비스가 늘어나면서 유료 콘텐츠에 대한 저작권 관리와 보호 및 다양한 이기종의 단말 장치에 적합한 콘텐츠 적응(adaptation) 서비스에 대한 필요성이 높아지고 있다. 이를 위하여 현재까지 DRM, Scalable Coding, Progressive Encryption, ISMA, ARMS, Metadata Adaptation 등 다양한 연구가 진행되어 왔지만 요구사항을 포괄적으로 만족하는 멀티미디어 전송 프레임워크는 부재한 상태이다. 이에, 본 논문에서는 기존 기법을 분석하고 기능을 통합하여 안전하고 보다 여러 종류의 단말 장치에 서비스가 가능하며 다양한 서비스 형태를 가질 수 있는 프레임워크를 설계하였다. 이를 통해 멀티미디어 서비스가 보다 광범위하게 활용되고 확산 될 수 있으리라 기대된다.

  • PDF

A Design of Secure Coding Program and Web Shell Linkage System (시큐어코딩 프로그램 웹쉘 연동 시스템 설계)

  • Kim, Minjin;Song, Seokhwa;Kim, Mansik;Kang, Jungho;Jun, Moon-Soeg
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.290-292
    • /
    • 2016
  • 시큐어 코딩은 2014년부터 행정자치부에서 법제화되어 의무사용이 이뤄지고 있다. 기존 소프트웨어 시장의 성장과 함께 여러 해킹방법도 고도화됨에 따라 근본적인 설계 및 코딩단계에서의 취약점 보완 필요성이 제시 되었다. 특히 웹쉘 공격은 해킹당하는 웹 페이지의 대부분이 해당 공격으로 피해를 받고 있으며, 위장하여 침투하기 때문에 백신으로 인한 검출도 어렵다. 따라서 본 논문에서는 시큐어코딩 프로그램을 웹쉘과 연동하여 취약점 분석하는 시스템을 제안하고 동작 과정에서 웹쉘 분석 후 생성되는 파일리스트를 확인해 보았다. 이것은 각 파일을 동기화하고 이후 운영과정에서도 변경되는 소스코드들을 반영하기 때문에 웹쉘로부터 웹 페이지를 효과적으로 방어할 수 있을 것으로 기대된다.

Secure Coding Guide of Design Step-Verification and Expression of Input Data (설계 단계의 보안 코딩 지침-입력 데이터 검증 및 표현)

  • Shin, SSeong-Yoon;Lee, Hyun-Chang;Ahn, Woo-Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.105-106
    • /
    • 2016
  • 본 논문에서는 S/W 개발 보안 지침에서 설계 단계의 보안 코딩 지침을 알려준다. 크로스 사이트 스크립트 공격 취약점(XSS)에서부터 자원 삽입 까지 S/W 보안 취약점의 주요 내용을 입력 데이터의 검증 및 표현에 맞추어 지침을 전달하도록 한다.

  • PDF

Design Method of Linking Process for Secure Coding Program Configuration Management System (시큐어코딩 프로그램 형상관리 시스템 연동 프로세스 설계 방법)

  • Lee, Jaeseung;Chung, Hague;Park, Seyoung;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.827-828
    • /
    • 2015
  • 최근 유비쿼터스 컴퓨팅 시대가 도래함에 따라 소프트웨어는 스마트기기, 홈 네트워크 등 다양한 분야에 활용되고 있으며, 이러한 환경 변화에 맞춰 해커들은 소프트웨어의 자체 취약점을 이용한 다양한 악의적 공격을 진행하고 있다. 실제 소프트웨어 보안 취약점으로 인해 발생하는 피해액이 연간 1800억불에 달하고 있으며, 이러한 문제를 방지하기 위해 다양한 시큐어코딩 제품들이 등장하고 있다. 본 논문에서는 기존 시큐어코딩 프로그램의 효율성 향상을 위한 형상관리 시스템 연동 프로세스 방법을 제안한다.