• Title/Summary/Keyword: Security Development Lifecycle

Search Result 23, Processing Time 0.017 seconds

A Safety Process Guideline of Medical Device System Based on STPA (STPA를 적용한 의료기기 시스템의 안전성 프로세스 가이드라인)

  • Choi, Bo-yoon;Lee, Byong-gul
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.59-69
    • /
    • 2021
  • Malfunctions and failures linked to medical devices may result in significant damage for human being. Thus, in order to ensure that safety of medical device is achieved, it should be established and applied the international standard. It is required to integrate and customize activities at standards, owing to reference relationship between standards, especially, activities based safety analysis is too expensive. This paper proposes a integration process that integrate activities of development lifecycle and safety process. Additionally, we derived a guidance based on STPA for integration process. As a result, we can be performed systematically from early stage of the development and increased effectiveness of integration process by the guidance.

Trustworthy AI Framework for Malware Response (악성코드 대응을 위한 신뢰할 수 있는 AI 프레임워크)

  • Shin, Kyounga;Lee, Yunho;Bae, ByeongJu;Lee, Soohang;Hong, Heeju;Choi, Youngjin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1019-1034
    • /
    • 2022
  • Malware attacks become more prevalent in the hyper-connected society of the 4th industrial revolution. To respond to such malware, automation of malware detection using artificial intelligence technology is attracting attention as a new alternative. However, using artificial intelligence without collateral for its reliability poses greater risks and side effects. The EU and the United States are seeking ways to secure the reliability of artificial intelligence, and the government announced a reliable strategy for realizing artificial intelligence in 2021. The government's AI reliability has five attributes: Safety, Explainability, Transparency, Robustness and Fairness. We develop four elements of safety, explainable, transparent, and fairness, excluding robustness in the malware detection model. In particular, we demonstrated stable generalization performance, which is model accuracy, through the verification of external agencies, and developed focusing on explainability including transparency. The artificial intelligence model, of which learning is determined by changing data, requires life cycle management. As a result, demand for the MLops framework is increasing, which integrates data, model development, and service operations. EXE-executable malware and documented malware response services become data collector as well as service operation at the same time, and connect with data pipelines which obtain information for labeling and purification through external APIs. We have facilitated other security service associations or infrastructure scaling using cloud SaaS and standard APIs.

A Study on OMS/MP for Establishing Target RAM Values of New Weapon System in Precedent study : Focusing on the case of unmanned combat vehicle (선행 연구단계에서 신규 무기체계의 RAM 목표값 설정을 위한 OMS/MP 작성 연구 : 무인전투차량의 사례를 중심으로)

  • Choi, Hong-Cheol;Kang, Taeho;Youn, Byung Jo;Lee, Hochan
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.163-174
    • /
    • 2019
  • RAM analysis determines the range of resources to be invested by presenting the development goals of the weapon system. If the RAM analysis is not performed properly, it can cause a huge increase in business costs. While the cumulative cost ratio in the concept study is less than 1% of the total cost, 65-70% of the total lifecycle cost is determined and can't be reduced later. Therefore, RAM analysis is crucial in precedent study. When calculating the target RAM value by writing an existing OMS/MP, new functions and the future missions are hardly considered and reflected. Therefore, this paper proposes a method to establish OMS/MP by deriving arguments based on Delphi and Bayesian theory focusing on unmanned combat vehicle.