• 제목/요약/키워드: Security Verification

검색결과 702건 처리시간 0.038초

보안성 정형화 설계 및 검증 기술에 관한 연구 (A Study on Formal Specification and Verification Mechanism for Security)

  • 전철욱;김일곤;최진영;강인혜;강필용;이완석
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2003년도 가을 학술발표논문집 Vol.30 No.2 (1)
    • /
    • pp.865-867
    • /
    • 2003
  • 최근 보안성의 취약점을 이용한 보안 사고들이 증가하고 있다. 이러한 보안적 취약점을 극복할 수 있는 방법으로 정형적 설계 및 검증이 있으며 그 필요성은 국외뿐만 아니라 국내에서도 점차적으로 늘어나고 있다. 고등급의 보안 시스템을 개발하기 위해서는 정형화된 설계 및 검증 방법론을 사용해야 하지만 국내에서는 아직 정형적 설계 및 검증 방법에 대한 이해가 부족할 뿐만 아니라 개발자 수준에서 보안성을 보다 쉽게 설계하고 안전성을 검증, 평가 할 수 있는 자동화 도구도 갖추어지지 않은 실정이다. 본 논문에서는 기존의 보안성을 정형적으로 설계하고 검증한 사례를 조사, 분류하여 국내 보안 시스템 개발자들이 활용할 수 있는 가이드를 만드는데 근간을 두고자 한다.

  • PDF

전극간 표면누설에 의한 탄화도전로의 생성과 방향성 (The direction and formation of carbonized conductive path according to surface leakage between electrodes)

  • 송길목;한운기;이기연;곽희로
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 제37회 하계학술대회 논문집 C
    • /
    • pp.1525-1526
    • /
    • 2006
  • Electrical current always travels through the minimum resistance path. In this paper, we are studied on the direction and formation of carbonized conductive path according to surface leakage between electrodes. The analysis of characteristics of the arc discharge as surface is broken down between exposed live parts. Using the HSIS(high speed imaging system, 100,000fps, redlake ltd., USA), it took photographs by arc growth mechanism occurred in on/off surge, ground fault and discharge between electrodes. Therefore, it recommended for results of technology development and application such as theoretic verification of an arc direction and economic security according to a technology about connecting arc generation in surfaces of insulators. Hereafter, it expected effects that application of energy utility technology through the arc control.

  • PDF

격납건물 ILRT 본시험시간이 시험에 미치는 영향에 관한 연구 (A Study on the Effect of Integrated Leakage Rate Testing of Containment Vessel due to the Type A Testing Time)

  • 김창수;문용식
    • 한국압력기기공학회 논문집
    • /
    • 제8권3호
    • /
    • pp.1-6
    • /
    • 2012
  • The containment Integrated Leakage Rate Testing(ILRT) of nuclear power plants in Korea is performed in accordance with NSSC(Nuclear Safety and Security Commission) code 2012-16 and ANSI/ANS 56.8-1994. Nuclear power plants in Korea and the United States are to apply same test criteria, ANSI/ANS 56.8-1994, except type A testing time. NPPs in Korea apply 24 hours according to NSSC code 2012-16, but NPPs in United States apply 8 hours according to 10CFR50 App. J for type A test. So, there are many difficulties in order to perform ILRT in Korea. In this study, I review the impact on the ILRT results and the effect of ILRT due to type A testing time. The future, we will continue study to enhance the test reliability and improve these problems.

Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms

  • Bekkouch, Souad;Faraoun, Kamel Mohamed
    • Journal of Information Processing Systems
    • /
    • 제11권3호
    • /
    • pp.406-420
    • /
    • 2015
  • We present a secure and robust image watermarking scheme that uses combined reversible DWT-DCT-SVD transformations to increase integrity, authentication, and confidentiality. The proposed scheme uses two different kinds of watermarking images: a reversible watermark, $W_1$, which is used for verification (ensuring integrity and authentication aspects); and a second one, $W_2$, which is defined by a logo image that provides confidentiality. Our proposed scheme is shown to be robust, while its performances are evaluated with respect to the peak signal-to-noise ratio (PSNR), signal-to-noise ratio (SNR), normalized cross-correlation (NCC), and running time. The robustness of the scheme is also evaluated against different attacks, including a compression attack and Salt & Pepper attack.

시간 정보를 이용한 인증서 상태 검증 정보 제공에 관한 연구 (A Study on Certificate Status Verification Information Providing using the Time-stamp Information)

  • 곽진;이승우;조석향;홍순좌;원동호
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2002년도 춘계학술발표논문집 (하)
    • /
    • pp.829-832
    • /
    • 2002
  • 공개키 기반구조의 응용이 네트워크 상의 전자 거래로 확대됨에 따라 통신 상대방의 인증을 위해 인증서의 사용이 증대되었으며, 이 인증서는 사용하기 전에 반드시 검증 과정을 거쳐야 한다. 본 논문에서는 시간정보(Time-stamp Information)를 포함한 인증서 검증 프로토콜을 제안한다. 본 논문에서는 긴 길이의 폐지 정보와 주기적으로 발행되는 특징을 가진 인증서 폐지 목록 등 기존의 인증서 검증 메커니즘들이 가지는 문제점을 분석하고 현재의 인증서 상태에 대한 유효성뿐만 아니라 인증서 검증 결과에 시간 정보를 추가하여 보다 신뢰할 수 있는 인증서의 상태 검증 정보를 제공할 수 있는 프로토콜을 제안한다.

  • PDF

A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks

  • Fu, Anmin;Zhang, Gongxuan;Yu, Yan;Zhu, Zhenchao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권9호
    • /
    • pp.3250-3265
    • /
    • 2014
  • Integrated WiMAX and WiFi networks is of great potential for the future due to the wider coverage of WiMAX and the high data transport capacity of WiFi. However, seamless and secure handover (HO) is one of the most challenging issues in this field. In this paper, we present a novel vertical HO authentication scheme with privacy preserving for WiMAX-WiFi heterogeneous networks. Our scheme uses ticket-based and pseudonym-based cryptographic methods to secure HO process and to achieve high efficiency. The formal verification by the AVISPA tool shows that the proposed scheme is secure against various malicious attacks and the simulation result indicates that it outperforms the existing schemes in terms of communication and computation cost.

안전한 오픈소스 소프트웨어를 위한 익스플로잇터블 검증에 관한 연구 (A Study on Exploitable Verification for Secure Open Source Software)

  • 김범용;송준호;김건;전문석
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 추계학술발표대회
    • /
    • pp.617-619
    • /
    • 2015
  • 최근 IT 제품의 활용의 증가와 함께 소프트웨어는 컴퓨터를 넘어 적용 범위가 더욱 넓어지고 그에 따른 수요 또한 급격히 성장하고 있다. 또한 상용 소프트웨어와 더불어 오픈소스 소프트웨어(Open Source Software)의 수요도 함께 급성장하고 있다. 하지만 오픈소스 소프트웨어는 보안에 대한 전문지식이 없는 개발자에 의해 개발이 이루어진다. 이에 하트블리드(HeartBleed), 쉘쇼크(ShellShock)와 같은 다양한 보안취약점(Security Vulnerabilities)이 발생하고 있으며 공격으로 이어지는 사례도 늘고 있다. 따라서 본 논문에서는 다른 소프트웨어 점검 도구들과 연계하여 발견된 보안취약점이 익스플로잇터블(Exploitable)한 지 검증하는 엔진을 제안한다.

Patch Integrity Verification Method Using Dual Electronic Signatures

  • Kim, JunHee;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • 제13권6호
    • /
    • pp.1516-1526
    • /
    • 2017
  • Many organizations today use patch management systems to uniformly manage software vulnerabilities. However, the patch management system does not guarantee the integrity of the patch in the process of providing the patch to the client. In this paper, we propose a method to guarantee patch integrity through dual electronic signatures. The dual electronic signatures are performed by the primary distribution server with the first digital signature and the secondary distribution server with the second digital signature. The dual electronic signature ensures ensure that there is no forgery or falsification in the patch transmission process, so that the client can verify that the patch provided is a normal patch. The dual electronic signatures can enhance the security of the patch management system, providing a secure environment for clients.

A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service

  • Kim, Heeyoul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권3호
    • /
    • pp.1659-1673
    • /
    • 2019
  • Android platform provides In-app Billing service for purchasing valuable items inside mobile applications. However, it has become a major target for attackers to achieve valuable items without actual payment. Especially, application developers suffer from automated attacks targeting all the applications in the device, not a specific application. In this paper, we propose a novel scheme detecting automated attacks with probabilistic tests. The scheme tests the signature verification method in a non-deterministic way, and if the method was replaced by the automated attack, the scheme detects it with very high probability. Both the analysis and the experiment result show that the developers can prevent their applications from automated attacks securely and efficiently by using of the proposed scheme.

Study On Masked Face Detection And Recognition using transfer learning

  • Kwak, NaeJoung;Kim, DongJu
    • International Journal of Advanced Culture Technology
    • /
    • 제10권1호
    • /
    • pp.294-301
    • /
    • 2022
  • COVID-19 is a crisis with numerous casualties. The World Health Organization (WHO) has declared the use of masks as an essential safety measure during the COVID-19 pandemic. Therefore, whether or not to wear a mask is an important issue when entering and exiting public places and institutions. However, this makes face recognition a very difficult task because certain parts of the face are hidden. As a result, face identification and identity verification in the access system became difficult. In this paper, we propose a system that can detect masked face using transfer learning of Yolov5s and recognize the user using transfer learning of Facenet. Transfer learning preforms by changing the learning rate, epoch, and batch size, their results are evaluated, and the best model is selected as representative model. It has been confirmed that the proposed model is good at detecting masked face and masked face recognition.