• Title/Summary/Keyword: Security Verification

Search Result 688, Processing Time 0.025 seconds

Conveyance Verification through Analysis of River Vegetation and Soil Impact using Sentinel-2 (Sentinel-2를 활용한 하천의 식생 및 토양 영향 분석을 통한 통수능 검정)

  • Bang, Young Jun;Choi, Byeong Jun;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.4
    • /
    • pp.37-45
    • /
    • 2021
  • Flooding damage may occur due to an unexpected increase in rainfall in summer. Previously, the roughness coefficient, which is a major factor of conveyance, was calculated through on-site measurement, but in case of on-site measurement, there are many limits in accurately grasping changes in vegetation. In this study, the vegetation index (NDVI) was calculated using the Sentinel-2 optical images, and the modified roughness coefficient was calculated through the density and distribution area of the vegetation. Then the calculated roughness coefficient was applied to HEC-RAS 1D model and verified by comparing the results with the water level at the water level station directly downstream of the Soyang River dam. As a result, the error rate of the water level decreased about 14% compared to applying the previous roughness coefficient. Through this, it is expected that it will be possible to refine the flood level of rivers in consideration of seasonal flood characteristics and to efficiently maintain rivers in specific sections.

Reverse Engineering of Deep Learning Network Secret Information Through Side Channel Attack (부채널 분석을 이용한 딥러닝 네트워크 신규 내부 비밀정보 복원 방법 연구)

  • Park, Sujin;Lee, Juheon;Kim, HeeSeok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.855-867
    • /
    • 2022
  • As the need for a deep learning accelerator increases with the development of IoT equipment, research on the implementation and safety verification of the deep learning accelerator is actively. In this paper, we propose a new side channel analysis methodology for secret information that overcomes the limitations of the previous study in Usenix 2019. We overcome the disadvantage of limiting the range of weights and restoring only a portion of the weights in the previous work, and restore the IEEE754 32bit single-precision with 99% accuracy with a new method using CPA. In addition, it overcomes the limitations of existing studies that can reverse activation functions only for specific inputs. Using deep learning, we reverse activation functions with 99% accuracy without conditions for input values with a new method. This paper not only overcomes the limitations of previous studies, but also proves that the proposed new methodology is effective.

A Study on Insider Threat Dataset Sharing Using Blockchain (블록체인을 활용한 내부자 유출위협 데이터 공유 연구)

  • Wonseok Yoon;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.15-25
    • /
    • 2023
  • This study analyzes the limitations of the insider threat datasets used for insider threat detection research and compares and analyzes the solution-based insider threat data with public insider threat data using a security solution to overcome this. Through this, we design a data format suitable for insider threat detection and implement a system that can safely share insider threat information between different institutions and companies using blockchain technology. Currently, there is no dataset collected based on actual events in the insider threat dataset that is revealed to researchers. Public datasets are virtual synthetic data randomly created for research, and when used as a learning model, there are many limitations in the real environment. In this study, to improve these limitations, a private blockchain was designed to secure information sharing between institutions of different affiliations, and a method was derived to increase reliability and maintain information integrity and consistency through agreement and verification among participants. The proposed method is expected to collect data through an outflow threat collector and collect quality data sets that posed a threat, not synthetic data, through a blockchain-based sharing system, to solve the current outflow threat dataset problem and contribute to the insider threat detection model in the future.

  • PDF

An Analysis of Item Factors for Preliminary Survey of Job Satisfaction of General Disaster Manager in High-rise and Underground-linked Complex Buildings (초고층 및 지하연계 복합건축물 등에서 총괄재난관리자의 직무만족도 예비조사를 위한 항목요인 분석)

  • Jong Bueom Kim;Min Kyun Eun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.47-56
    • /
    • 2022
  • Along with high-rise buildings, complex buildings used by many unspecified people, such as various buildings and underground-linked buildings, are increasing. In particular, high-rise buildings are accompanied by a number of casualties and a lot of property damage in the event of a disaster, so reinforced integrated disaster management is necessary. The High-Rise Disaster Management Act stipulates that a general disaster manager is appointed and requires stricter safety management tasks than other buildings. Therefore, this study aims to analyze and present item factors for a preliminary survey of job satisfaction of general disaster managers through literature research and expert verification.

Secret Sharing based Node Authentication in FANET (FANET에서의 비밀분산 기반 노드 인증)

  • Yang Ji Hun;Lee Soo Jin
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.25-34
    • /
    • 2022
  • This paper proposes a secret sharing based fast node authentication technique applicable to Flying Ad-Hoc Network (FANET) that can be used to construct self-organized communication network in multi drones and drone squadrons operations. Before deployment, each node stores an exponential share, exponential secret and a portion of PUF CRP table. After being deployed in the field, in the early-stage of network formation, each node broadcasts its ID, exponential share and a hash value of PUF Response and pseudo-random number. Then each node performs a reconstruction of the exponential secret using the exponential shares transmitted from neighboring nodes. When the exponential secret is reconstructed, simultaneous authentication is completed for all nodes that have transmitted the exponential share used in the reconstruction. A node that transmits an incorrect exponential share to disturb the reconstruction of the exponential secret during the authentication process can be detected before performing the reconstruction through the verification of the hash value, and will be excluded from the reconstruction.

Configurable Smart Contracts Automation for EVM based Blockchains

  • ZAIN UL ABEDIN;Muhammad Shujat Ali;Ashraf Ali;Sana Ejaz
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.147-156
    • /
    • 2023
  • Electronic voting machines (EVMs) are replacing research ballots due to the errors involved in the manual counting process and the lengthy time required to count the votes. Even though these digital recording electronic systems are advancements, they are vulnerable to tampering and electoral fraud. The suspected vulnerabilities in EVMs are the possibility of tampering with the EVM's memory chip or replacing it with a fake one, their simplicity, which allows them to be tampered with without requiring much skill, and the possibility of double voting. The vote data is shared among all network devices, and peer-to-peer verification is performed to ensure the vote data's authenticity. To successfully tamper with the system, all of the data stored in the nodes must be changed. This improves the proposed system's efficiency and dependability. Elections and voting are fundamental components of a democratic system. Various attempts have been made to make modern elections more flexible by utilizing digital technologies. The fundamental characteristics of free and fair elections are intractability, immutability, transparency, and the privacy of the actors involved. This corresponds to a few of the many characteristics of blockchain-like decentralized ownership, such as chain immutability, anonymity, and distributed ledger. This working research attempts to conduct a comparative analysis of various blockchain technologies in development and propose a 'Blockchain-based Electronic Voting System' solution by weighing these technologies based on the need for the proposed solution. The primary goal of this research is to present a robust blockchain-based election mechanism that is not only reliable but also adaptable to current needs.

A Study on the Discrimination Criteria of AMOLED-related Patents, a National Core Technology of Display Industry (디스플레이 분야 국가핵심기술인 AMOLED 관련 특허의 판별 기준 연구)

  • Se Hee Pak;Hang Bae Chang
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.105-121
    • /
    • 2024
  • Korea operates a national core technology system to protect important technologies at the national level. In the administrative procedures of the nation's core technology, the deliberation process conducted by qualitative evaluation by related industry experts is important. As the need for timely and appropriate technology protection increased, the need to shorten the time required for administrative procedures related to the designation and removal of national core technologies was raised. Therefore, this study studied the criteria for identifying patents related to national core technologies. For AMOLED, a national core technology in the display field, LDA topic modeling was applied to related news and papers to derive important technology and its trends, and mapped to AMOLED advanced technology processes under Article 5 of the Industrial Development Act to prepare criteria for discrimination. Since then, objective verification has been conducted through AMOLED national core technology patents already known. Through this study, patents related to AMOLED national core technologies can be identified, which can shorten the time for related administrative procedures.

The Design and Protective Capacity Assessment of the Prefabricated PC Arch Ammo Magazines (아치형 조립식 PC 탄약고 설계 및 방호성능 평가)

  • Park, Jang-Kweon;Lim, Chul-Won;Ryu, Dong-Woo;Son, Ki-Young;Baek, Jong-Hyuk;Park, Young-Jun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.14 no.6
    • /
    • pp.615-621
    • /
    • 2014
  • This study suggests the design and assembly drawing of the prefabricated precast concrete arch ammo magazines using the numerical analysis as well as the explosion verification test. The protective capacity of the proposed magazines is identified with the maximum support rotation angles measured by explosion verification tests according to the U.S. Unified Facility Criteria 3-340-02. Using numerical analysis, it is examined that oval-type members are better than the semi-circle ones in terms of protective capacity. Based on this numerical results, the design and assemble drawing for the prefabricated precast concrete arch ammo magazine are developed. It is identified that the structure constructed by invented design and assembly drawing has enough protective capacity against blast pressure caused by 133.75kg TNT explosion. The detonation point cannot be open due to the military security. In sum, it could be concluded that the ammo magazine proposed in this study has reliable protective capacity with enough redundancy. The redundancy means that there are more economic design approach with reducing the curved wall thickness.

Fusion algorithm for Integrated Face and Gait Identification (얼굴과 발걸음을 결합한 인식)

  • Nizami, Imran Fareed;Hong, Sug-Jun;Lee, Hee-Sung;Ann, Toh-Kar;Kim, Eun-Tai;Park, Mig-Non
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2007.11a
    • /
    • pp.15-18
    • /
    • 2007
  • Identification of humans from multiple view points is an important task for surveillance and security purposes. For optimal performance the system should use the maximum information available from sensors. Multimodal biometric systems are capable of utilizing more than one physiological or behavioral characteristic for enrollment, verification, or identification. Since gait alone is not yet established as a very distinctive feature, this paper presents an approach to fuse face and gait for identification. In this paper we will use the single camera case i.e. both the face and gait recognition is done using the same set of images captured by a single camera. The aim of this paper is to improve the performance of the system by utilizing the maximum amount of information available in the images. Fusion is considered at decision level. The proposed algorithm is tested on the NLPR database.

  • PDF

A Novel Two-Stage Approach in Rectifying BioHash's Problem under Stolen Token Scenario

  • Lim, Meng-Hui;Jeong, Min-Yi;Teoh, Andrew Beng Jin
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.173-179
    • /
    • 2010
  • Over recent years, much research attention has been devoted to a two-factor authentication mechanism which integrates both tokenized pseudorandom numbers with user specific biometric features for biometric verification, known as Biohash. The main advantage of Biohash over sole biometrics is that Biohash is able to achieve a zero equal error rate and provide a clean separation of the genuine and imposter populations, thereby allowing elimination of false accept rates without imperiling the false reject rates. Nonetheless, when the token of a user is compromised, the recognition performance of a biometric system drops drastically. As such, a few solutions have been proposed to improve the degraded performance but such improvements appear to be insignificant. In this paper, we investigate and pinpoint the basis of such deterioration. Subsequently, we propose a two-level approach by utilizing strong inner products and fuzzy logic weighting strategies accordingly to increase the original performance of Biohash under this scenario.