• Title/Summary/Keyword: Security Verification

Search Result 702, Processing Time 0.031 seconds

Ballistocardiographical Heart Rate Measurement Using Head Mounted 6-axis Accelerometer (머리 착용형 6축 가속도계를 사용한 심탄도 심박수 측정)

  • Jinman Kim;Joongjin Kook
    • Journal of the Semiconductor & Display Technology
    • /
    • v.23 no.2
    • /
    • pp.33-37
    • /
    • 2024
  • Recently, wearable virtual reality devices are widely used. These instruments include a 3-axis accelerometer. User's heart rate information in virtual reality contents can be useful for measuring user experience. In this paper, we propose a method to measure the heart rate through a 3-axis accelerometer based on the principle of ballistocardiography without additional sensors. The angular velocity was successively measured in a time series by the 3-axis accelerometer mounted to the head. The frequency of the maximum magnitude is determined as the heart rate through frequency transform and band pass filtering of the time series signal. For verification, the heart rate calculated from photoplethysmography sensors acquired at the same time was compared as ground-truth. In the virtual reality, the user's heart rate information can be extracted without additional heart rate sensor, and the emotional state and fatigue can be measured.

  • PDF

Trends in Quantum Communication Testbeds (양자통신 테스트베드 동향)

  • I. Kim;J. Ju
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.5
    • /
    • pp.86-97
    • /
    • 2024
  • With the advancement of quantum computers and increasing importance of cybersecurity, quantum cryptography has become an essential technology in quantum world. The success of ground-to-satellite quantum communication in the range of 4,600 km has been reported, and intercountry quantum cryptography connecting the UK and Ireland has been demonstrated. In the European Union, OpenQKD has established 18 testbeds for quantum communication in 12 countries. Through the progress from experimental to pilot networks, quantum cryptography testbeds have begun to provide networks for commercial services, such as finance, healthcare, and government administration. Similarly, the Republic of Korea launched a quantum communication testbed project to accelerate the development of quantum communication devices and materials. The project also aims to support the relevant companies and services in the verification and certification of security functionalities operated by the National Intelligence Service. We review the status of quantum communication testbeds in 16 countries.

A Design of Information Security Education training Databank System for Preventing Computer Security incident (침해사고 예방을 위한 정보보안 교육훈련 문제은행 시스템)

  • Mo, Eun-Su;Lee, Jae-Pil;Lee, Jae-Gwang;Lee, Jun-Hyeon;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.277-280
    • /
    • 2015
  • Smishing, Phishing personal privacy caused by Incident accidents such as Phishing information security has become a hot topic. Such incidents have privacy in personal information management occurs due to a lack of user awareness. This paper is based on the existing structure of the XML Tag question bank used a different Key-Value Structure-based JSON. JSON is an advantage that does not depend on the language in the text-based interchange format. The proposed system is divided into information security sector High, Middle and Low grade. and Provides service to the user through the free space and the smart device and the PC to the constraints of time. The use of open source Apache Load Balancing technology for reliable service. It also handles the user's web page without any training sessions Require server verification result of the training(training server). The result is sent to the training server using jQuery Ajax. and The resulting data are stored in the database based on the user ID. Also to be used as a training statistical indicators. In this paper, we design a level training system to enhance the user's information security awareness.

  • PDF

Development of Success Attribution Scale for Body Guard in Korea (한국 경호원의 성공귀인 측정도구 개발)

  • Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.173-183
    • /
    • 2017
  • This study is for presenting the factors about success attribution that fit the korean security service conditions and developing the actual analysis of measurement tools by investigating the success factors of the security service agents. To this end, conducted a meeting from the fully open questionnaire at first, and then formed the semi-structured questionnaire, finally carried out the survey from the closed questionnaire and analyzed data from SPSS 21.0, AMOS 21.0 and developed the measurements. It was conducted from December, 2014 to June, 2015. This survey was conducted of 170 security guards after the verification of the content validity though the pilot survey and presented the success attribution factors and standards on the basis of the result form this survey. At the first and second analysis process, the success attribution factors of the guards consisted of inner qualities, external qualities, induction factors for inner qualities, and induction factor for external qualities. On analysis of the final data and documents, however, at the third analysis, the success attribution factors of the guards consisted of 'martial arts and physical ability'(4 questions), 'attitudes to work'(3 questions), 'support for the working environment'(3 questions), 'organized business skills'(3 questions), 'attitudes to the duty'(3 questions), and 'coping with crises(2 questions).

Static Analysis Based on Backward Control Flow Graph Generation Method Model for Program Analysis (프로그램 분석을 위한 정적분석 기반 역추적 제어흐름그래프 생성 방안 모델)

  • Park, Sunghyun;Kim, Yeonsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1039-1048
    • /
    • 2019
  • Symbolic execution, an automatic search method for vulnerability verification, has been technically improved over the last few years. However, it is still not practical to analyze the program using only the symbolic execution itself. One of the biggest reasons is that because of the path explosion problem that occurs during program analysis, there is not enough memory, and you can not find the solution of all paths in the program using symbolic execution. Thus, it is practical for the analyst to construct a path for symbolic execution to a target with vulnerability rather than solving all paths. In this paper, we propose a static analysis - based backward CFG(Control Flow Graph) generation technique that can be used in symbolic execution for program analysis. With the creation of a backward CFG, an analyst can select potential vulnerable points, and the backward path generated from that point can be used for future symbolic execution. We conducted experiments with Linux binaries(x86), and indeed showed that potential vulnerability selection and backward CFG path generation were possible in a variety of binary situations.

A Study on the Authenticity Verification of UxNB Assisting Terrestrial Base Stations

  • Kim, Keewon;Park, Kyungmin;Kim, Jonghyun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.131-139
    • /
    • 2022
  • In this paper, to verify the authenticity of UxNB that assists terrestrial base stations, the solutions for SI (System Information) security presented in 3GPP TR 33.809 are analyzed from the perspective of UxNB. According to the definition of 3GPP (Third Generation Partnership Project), UxNB is a base station mounted on a UAV (Unmanned Aerial Vehicle), is carried in the air by the UAV, and is a radio access node that provides a connection to the UE (User Equipment). Such solutions for SI security can be classified into hash based, MAC (Message Authentication Codes) based, and digital signature based, and a representative solution for each category is introduced one by one. From the perspective of verifying the authenticity of UxNB for each solution, we compare and analyze the solutions in terms of provisioning information and update, security information leakage of UxNB, and additionally required amount of computation and transmission. As a result of the analysis, the solution for verifying the authenticity of the UxNB should minimize the secret information to be stored in the UxNB, be stored in a secure place, and apply encryption when it is updated over the air. In addition, due to the properties of the low computing power of UxNB and the lack of power, it is necessary to minimize the amount of computation and transmission.

Application and Development Strategies of a Secure Real-Time Operating System in Weapon Systems within the Defense Sector (국방분야 보안 RTOS의 무기체계 적용 및 발전 방안)

  • Sang-Seung Lee;Keun-Ha Choi;Seung-Hyeon Hwang;Hyun-Ji Kim;Kyung-Deok Seo;Hwa-Eun Seong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.189-193
    • /
    • 2024
  • As cyber threats increase in the defense sector, the security of weapon system software is becoming increasingly important. Currently, most of the embedded software installed in domestic weapon systems operates based on foreign real-time operating systems(RTOS) that have no security. As a result, the localization and security enhancement of embedded software for weapon systems have emerged as urgent tasks. This study aims to propose the application and development strategies of secure RTOS for weapon systems. To this end, we examined the technological trends of domestic and foreign RTOS and secure RTOS, and analyzed the problems of current embedded software in weapon systems. The results revealed major issues such as low localization, vulnerability to cyber attacks, difficulty in maintenance, increased costs, and loss of opportunities for accumulating technological capabilities. An investigation of the current status of embedded software applied to existing weapon systems found that embedded SW are in operation across all fields, including maneuver, firepower, protection, command and control, communication, naval vessels, and aircraft. Among them, 99% rely on foreign RTOS such as VxWorks. A review of the core functions and applicability of secure RTOS to weapon systems suggests that it can be applied to key areas requiring real-time performance and security, such as fire control, navigation devices, and flight control in existing and future weapon systems. However, ensuring performance and reliability, securing verification and compatibility, and systematic government support were raised as prerequisites.

Proxy Based Application Digital Signature Validation System (프락시 기반 애플리케이션 전자서명 검증 시스템)

  • Kwon, Sangwan;Kim, Donguk;Lee, Kyoungwoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.743-751
    • /
    • 2017
  • As smart phones are becoming popular, an operating system is being used at wearable devices, home appliances and smart TVs. A user is able to use various applications on devices with operating system, but there is an increased threat of hacker. Thus, the technology for detecting the forgery of applications is becoming more important on operating system. To detect the forgery of the application, a digital signature technology is used on the filed of application digital signature. According to W3C recommendation, the signing process of application digital signature must be performed at least twice, and the applications which are signed by the application digital signature have to be validated for all signature files when the application is installed in the operating system. Hence, the performance of the application digital signature validation system is closely related to the installer performance on the operating system. Existing validation system has performance degradation due to redundancy of integrity verification among application components. This research was conducted to improve the performance of the application digital signature validation system. The proposal of validation system which is applied proxy system shows a performance improvement compared to the existing verification system.

A Study on Improvement for Service Proliferation Based on Blockchain (블록체인 기반 서비스 확산을 위한 개선 방안 연구)

  • Yoo, Soonduck;Kim, Kiheung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.1
    • /
    • pp.185-194
    • /
    • 2018
  • This study investigates the limitations of blockchain technology and the ways to improve it by using Delphi technique. Limit factors and improvement measures are classified into technology, service, and legal system. First, from a technical point of view, lack of standardization of the technology, insufficiency of integration, lack of scalability, unclear cancellation or correction policy, excessive cost of transaction verification, insufficient personal information protection and not enough to respond to hacking defense were the limiting factors. In order to improve these, the followings; ensuring standardization, securing integration and scalability, establishing cancellation of each applicable data, establishment of correction policy, efficiency of verification cost, the protection of personal information and countermeasure against hacking are provided. The related technology development and countermeasures must be established to effectively introduce the blockchain technology to the market. Second, in the early stage of blockchain service, it showed lack of utilization of the blockchain, security threat, shortage of skilled workers, and lack of legal liability. As a solution to these problems, it is necessary to suggest various applications, against security threat, training professional manpower, and securing legal responsibility. It should also provide a foundation for providing institutionally stable services. Third, from as legal system point of view, inadequate legal compliance, lack of relevant regulation, and uncertainty in the regulation were the limiting factors. Therefore establishing a legal system, which is the most important area for activating the service, should be accompanied by the provision of legal countermeasures, clearness of regulations and measures to be taken by relevant governmental authorities. This study will contribute as a reference for a research, related to the blockchain.

A Proposal of Personal Information DB Encryption Assurance Framework (개인정보 DB 암호화 검증 프레임웍 제안)

  • Ko, Youngdai;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.397-409
    • /
    • 2014
  • According to the Personal Information Protection Act(PIPA) which is legislated in March 2011, the individual or company that handles personal information, called Personal information processor, should encrypt some kinds of personal information kept in his Database. For convenience sake we call it DB Encryption in this paper. Law enforcement and the implementation agency accordingly are being strengthen the supervision that the status of DB Encryption is being properly applied and implemented as the PIPA. However, the process of DB Encryption is very complicate and difficult as well as there are many factors to consider in reality. For example, there are so many considerations and requirements in the process of DB Encryption like pre-analysis and design, real application and test, etc.. And also there are surely points to be considered in related system components, business process and time and costs. Like this, although there are plenty of factors significantly associated with DB Encryption, yet more concrete and realistic validation entry seems somewhat lacking. In this paper, we propose a realistic DB Encryption Assurance Framework that it is acceptable and resonable in the performance of the PIPA duty (the aspect of the individual or company) and standard direction of inspection and verification of DB Encryption (the aspect of law enforcement).