• Title/Summary/Keyword: Software Patch

Search Result 94, Processing Time 0.022 seconds

A Study on Methods for Efficient Enterprise Software Patch Management

  • Kang, Chang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.179-188
    • /
    • 2022
  • In this paper, we propose an efficient and procedural software patch management phases. Every year, organizations have tens of thousands of known vulnerabilities and spend tens of thousands of hours and millions of dollars or more patching them. Despite these efforts, research has shown that the time it takes for an exploit to appear for a given patched vulnerability is shortening. As various types of organizations such as companies and universities manage patches in inconsistent ways, problems such as security problems, system instability, information leakage and work delay due to patches occur. In this paper, we look at the basics required for software patch management and define the factors to be considered for patch management and the effective steps for patch management. Therefore, this study will be used as a method to efficiently and procedurally execute the organization's patch management policy in the process of updating and patching the software in the organization to a new version as a solution to software function modification and security vulnerability.

A Design for a Hyperledger Fabric Blockchain-Based Patch-Management System

  • Song, Kyoung-Tack;Kim, Shee-Ihn;Kim, Seung-Hee
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.301-317
    • /
    • 2020
  • An enterprise patch-management system (PMS) typically supplies a single point of failure (SPOF) of centralization structure. However, a Blockchain system offers features of decentralization, transaction integrity, user certification, and a smart chaincode. This study proposes a Hyperledger Fabric Blockchain-based distributed patch-management system and verifies its technological feasibility through prototyping, so that all participating users can be protected from various threats. In particular, by adopting a private chain for patch file set management, it is designed as a Blockchain system that can enhance security, log management, latest status supervision and monitoring functions. In addition, it uses a Hyperledger Fabric that owns a practical Byzantine fault tolerant consensus algorithm, and implements the functions of upload patch file set, download patch file set, and audit patch file history, which are major features of PMS, as a smart contract (chaincode), and verified this operation. The distributed ledger structure of Blockchain-based PMS can be a solution for distributor and client authentication and forgery problems, SPOF problem, and distribution record reliability problem. It not only presents an alternative to dealing with central management server loads and failures, but it also provides a higher level of security and availability.

Ensemble Learning Based on Tumor Internal and External Imaging Patch to Predict the Recurrence of Non-small Cell Lung Cancer Patients in Chest CT Image (흉부 CT 영상에서 비소세포폐암 환자의 재발 예측을 위한 종양 내외부 영상 패치 기반 앙상블 학습)

  • Lee, Ye-Sel;Cho, A-Hyun;Hong, Helen
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.3
    • /
    • pp.373-381
    • /
    • 2021
  • In this paper, we propose a classification model based on convolutional neural network(CNN) for predicting 2-year recurrence in non-small cell lung cancer(NSCLC) patients using preoperative chest CT images. Based on the region of interest(ROI) defined as the tumor internal and external area, the input images consist of an intratumoral patch, a peritumoral patch and a peritumoral texture patch focusing on the texture information of the peritumoral patch. Each patch is trained through AlexNet pretrained on ImageNet to explore the usefulness and performance of various patches. Additionally, ensemble learning of network trained with each patch analyzes the performance of different patch combination. Compared with all results, the ensemble model with intratumoral and peritumoral patches achieved the best performance (ACC=98.28%, Sensitivity=100%, NPV=100%).

Design and Implementation of a Secure Software Architecture for Security Patch Distribution (안전한 보안패치 분배 구조의 설계 및 구현)

  • 손태식;서정우;문종섭;서정택;임을규;이철원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.47-62
    • /
    • 2003
  • Patch distribution is one of important processes to fix vulnerabilities of software and to ensure security of systems. Since an institute or a company has various operating systems or applications, it is not easy to update patches promptly. In this paper, we propose a secure patch distribution architecture with an authentication mechanism, a security assurance mechanism, a patch integrity assurance mechanism, and an automatic patch installation mechanism. We argue that the proposed architecture improve security of patch distribution processes within a domain.

Automatic Patch Information Collection System Using Web Crawler (웹 크롤러를 이용한 자동 패치 정보 수집 시스템)

  • Kim, Yonggun;Na, Sarang;Kim, Hwankuk;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1393-1399
    • /
    • 2018
  • Companies that use a variety of software use patch management systems provided by security vendor to manage security vulnerabilities of software to improve security. System administrators monitor the vendor sites that provide new patch information to maintain the latest software versions, but it takes a lot of cost and monitoring time to find and collect patch information because the patch cycle is irregular and the structure of web page is different. In order to reduce this, studies to automate patch information collection based on keyword or web service have been conducted, but since the structure to provide patch information in vendor site is not standardized, it was applicable only to specific vendor site. In this paper, we propose a system that automates the collection of patch information by analyzing the structure and characteristics of the vendor site providing patch information and using web crawler to reduce the cost and monitoring time consumed in collecting patch information.

A Sobel Operator Combined with Patch Statistics Algorithm for Fabric Defect Detection

  • Jiang, Jiein;Jin, Zilong;Wang, Boheng;Ma, Li;Cui, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.687-701
    • /
    • 2020
  • In the production of industrial fabric, it needs automatic real-time system to detect defects on the fabric for assuring the defect-free products flow to the market. At present, many visual-based methods are designed for detecting the fabric defects, but they usually lead to high false alarm. Base on this reason, we propose a Sobel operator combined with patch statistics (SOPS) algorithm for defects detection. First, we describe the defect detection model. mean filter is applied to preprocess the acquired image. Then, Sobel operator (SO) is applied to deal with the defect image, and we can get a coarse binary image. Finally, the binary image can be divided into many patches. For a given patch, a threshold is used to decide whether the patch is defect-free or not. Finally, a new image will be reconstructed, and we did a loop for the reconstructed image to suppress defects noise. Experiments show that the proposed SOPS algorithm is effective.

Interpretation of Real Information-missing Patch of Remote Sensing Image with Kriging Interpolation of Spatial Statistics

  • Yiming, Feng;Xiangdong, Lei;Yuanchang, Lu
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1479-1481
    • /
    • 2003
  • The aim of this paper was mainly to interpret the real information-missing patch of image by using the kriging interpolation technology of spatial statistics. The TM Image of the Jingouling Forest Farm of Wangqing Forestry Bureau of Northeast China on 1 July 1997 was used as the tested material in this paper. Based on the classification for the TM image, the information pixel-missing patch of image was interpolated by the kriging interpolation technology of spatial statistics theory under the image treatment software-ERDAS and the geographic information system software-Arc/Info. The interpolation results were already passed precise examination. This paper would provide a method and means for interpreting the information-missing patch of image.

  • PDF

Patch Integrity Verification Method Using Dual Electronic Signatures

  • Kim, JunHee;Won, Yoojae
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1516-1526
    • /
    • 2017
  • Many organizations today use patch management systems to uniformly manage software vulnerabilities. However, the patch management system does not guarantee the integrity of the patch in the process of providing the patch to the client. In this paper, we propose a method to guarantee patch integrity through dual electronic signatures. The dual electronic signatures are performed by the primary distribution server with the first digital signature and the secondary distribution server with the second digital signature. The dual electronic signature ensures ensure that there is no forgery or falsification in the patch transmission process, so that the client can verify that the patch provided is a normal patch. The dual electronic signatures can enhance the security of the patch management system, providing a secure environment for clients.

Soft Systems are Ubiquitous-Defenses are Rare: A Case for Contingent Outsourcing of Patch Management

  • Arnett Kirk P.
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.23-30
    • /
    • 2005
  • Computer attacks on vulnerable software are ubiquitous. Today's attacks on client PCs can be used to create armies of zombie computers that are capable of wide reach attacks on high profile businesses and governments. The simple act of patching software vulnerabilities will certainly mitigate this problem, but patching has its own set of problems. Further, it is frequently the case that patches which are available to mitigate vulnerabilities are not being made on a timely basis and sometimes are not being made at all. One solution to the patch management dilemma is outsourcing. This paper notes that outsourcing is not a carte blanche decision that can be made based on dollars, but rather that a contingency decision matrix can provide guidance on outsourcing solutions for patch management and other security components as well. The matrix recognizes that IS staff expertise and employee security awareness are two important factors in the outsourcing decision.

  • PDF

A New Circular Patch Antenna with Circular Polarization (새로운 형태의 원편파 원형 패치 안테나)

  • 이석곤;이용구;안병철
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2000.11a
    • /
    • pp.364-368
    • /
    • 2000
  • In this paper, we present the design and fabrication of a new circularly polarized circular patch antenna. The antenna is realized using a plastic foam sheet, a Teflon substrate and a metal-coated film. The radiating element is a circular patch proximity-fed by a wide microstrip line. Two thins slots are introduced on the circular patch to obtain a circular polarized radiation. The antenna is optimized using a commercial software. The antenna has 18% impedance bandwidth, 4% axial-ratio band width and 9.12dBi gain.

  • PDF