• Title/Summary/Keyword: System Vulnerability

Search Result 1,000, Processing Time 0.037 seconds

Jamming Vulnerability on Aviation Communication System by Smart-phone with Frequency Modulation (스마트폰 주파수 변조를 이용한 항공 통신 시스템 전파교란 취약점)

  • Kim, In-Bum;Kim, Yoon-Young;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.49-59
    • /
    • 2010
  • Recently, As smart phone offers rather superior functionality and interface than normal phone, the number of user increase rapidly. for the convenience of user, there are so many case of customize the system. Simultaneously a number of smart phones which vulnerable to security increase Exponentially. The number of malware which targets smartphone increases Annually, namely Threats have intensified. In this thesis, we suggest the Techniques and countermeasures of the vulnerability which targets aviation communication system by Smart-phone RF module with frequency modulation.

Design and Implementation of an Enhanced Secure Android-Based Smartphone using LIDS

  • Lee, Sang Hun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.49-55
    • /
    • 2012
  • Recently, with the rapid development of android-based smartphones, it is becomes a major security issue that the case of Android platform is an open platform. so it is easy to be a target of mobile virus penetration and hacking. Even there are a variety of security mechanisms to prevent the vulnerable points of the Android platform but the reason of most of the security mechanisms were designed at application-level that highly vulnerable to the attacks directly to the operating system or attacks using the disadvantages of an application's. It is necessary that the complementary of the android platform kernel blocks the kernel vulnerability and the application vulnerability. In this paper, we proposed a secure system using linux-based android kernel applied to LIDS(Linux Intrusion Detection and Defense System) and applied a smart phone with s5pc110 chip. As a result, the unauthorized alteration of the application was prevented with a proposed secure system.

A Method of Preventing Blackout Caused by Relay (계전기 동작에 의한 광역정전 방지방안)

  • Jin, B.G.;Lee, S.J.;Kim, S.T.
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.7-8
    • /
    • 2007
  • This paper presents an vulnerability index for hidden failure of protective relays in transmission system. The bad influence can be quantized by an vulnerability index. When there is mis-operation, no-operation or mis-setting, power flow can be quantized by an index. According to the index, relays can be resetting. So the wide area blackout can be prevented.

  • PDF

Design Model for Extensible Architecture of Smart Contract Vulnerability Detection Tool

  • Choi, Yun-seok;Lee, Wan Yeon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.189-195
    • /
    • 2020
  • Smart contract, one of the applications of blockchain, is expected to be used in various industries. However, there is risks of damages caused by attacks on vulnerabilities in smart contract codes. Tool support is essential to detect vulnerabilities, and as new vulnerabilities emerge and smart contract implementation languages increase, the tools must have extensibility for them. We propose a design model for extensible architecture of smart contract vulnerability detection tools that detect vulnerabilities in smart contract source codes. The proposed model is composed of design pattern-based structures that provides extensibility to easily support extension of detecting modules for new vulnerabilities and other implementation languages of smart contract. In the model, detecting modules are composed of independent module, so modifying or adding of module do not affect other modules and the system structure.

Development of Risk Rating and Index for Coastal Activity Locations

  • Lee, Young-Jai;Jung, Cho-Young;Gu, Ja-Yeong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.3
    • /
    • pp.227-232
    • /
    • 2020
  • This paper develops a risk index based on an indicator of risk assessment in terms of coastal activity location and accident type. The risk index is derived from a formula which adds the consequence of failure to a vulnerability value, then subtracts the mitigation value. Specifically, the consequence of failure is the number of casualties in coastal activity locations. An indicator of vulnerability refers to coastal environment elements and social elements. A pointer of mitigation includes managerial and organizational elements that indicate the capabilities of coastal activities. A risk rating of coastal activity location is found from a risk matrix consisting of the accident location and type. The purpose of this study is to prevent accidents at coastal activity locations by allowing the Coastal police guard to monitor effectively and inform visitors of potential risks.

Line Security Evaluation of WANS Considering Protectability of Relays and Vulnerability of Lines

  • Hussain, Akhtar;Seok, Chang-Ju;Choi, Myeon-Song;Lee, Seung-Jae;Lim, Seong-Il
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.6
    • /
    • pp.1864-1872
    • /
    • 2014
  • Maloperation of protective relays is one of the major causes for cascading tripping in WANS. Another line trip followed by a previous line trip may occur due to overloading of the line, because of the load redistribution or unwanted trip of a backup relay due to change in the flow of fault current. Evaluation of each line is required by considering both of these effects. A new index named Line Security Index (LSI) is proposed in this paper which combines both Vulnerability Index (VI) and Protectability Index (PI) to completely evaluate the security of individual lines and their importance in the power grid. Computer simulations have been performed on the Korean power grid data to establish the feasibility of the proposed idea.

Impact spectrum of flood hazard on seismic vulnerability of bridges

  • Yilmaz, Taner;Banerjee, Swagata
    • Structural Engineering and Mechanics
    • /
    • v.66 no.4
    • /
    • pp.515-529
    • /
    • 2018
  • Multiple hazards (multihazard) conditions may cause significant risk to structures that are originally designed for individual hazard scenarios. Such a multihazard condition arises when an earthquake strikes to a bridge pre-exposed to scour at foundations due to flood events. This study estimates the impact spectrum of flood-induced scour on seismic vulnerability of bridges. Characteristic river-crossing highway bridges are formed based on the information obtained from bridge inventories. These bridges are analyzed under earthquake-only and the abovementioned multihazard conditions, and bridge fragility curves are developed at component and system levels. Research outcome shows that bridges having pile shafts as foundation elements are protected from any additional seismic vulnerability due to the presence of scour. However, occurrence of floods can increase seismic fragility of bridges at lower damage states due to the adverse impact of scour on bridge components at superstructure level. These findings facilitate bridge design under the stated multihazard condition.

Analysis of Hazard of Disaster in the Aspect of Human Damage (인적 피해 중심의 재해취약성 분석)

  • Wang, Soon-Joo;Lee, Myung-Sun
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.1
    • /
    • pp.87-101
    • /
    • 2007
  • The definition and concept of disasters and their preparedness have been changing according to the modern situation. The basic change is that the concept of absolute standard and prevention of hardware damage in the past have been changing to the concept of relative standard and mitigation of direct damage to human. For achieving the purpose, advanced countries developed and used their own analysis method of hazard and vulnerability for disaster ; ASHE hazard and vulnerability evaluation method, hazard matrix method by CDC, FEMA model method and SMUG hazard priority method. Because each analysis method cannot evaluate the hazard and vulnerability for specific disaster, the advantages and disadvantages should be applied for specific situation of disaster in Korea and new analysis method should be extracted in the future.

  • PDF

Vulnerability Assessment of Sub-Alpine Vegetations by Climate Change in Korea (한반도 지역의 기후변화에 의한 고산·아고산 식생 취약성 평가)

  • Lee, Dong-Kun;Kim, Jae-Uk
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.10 no.6
    • /
    • pp.110-119
    • /
    • 2007
  • This study's objects are to predict distribution and to assess vulnerability of sub-alpine vegetations in the Korean peninsula for climate change using various climate models. This study validates relationship between sub-alpine vegetations and environmental factors using Pearson correlation analysis. Then, the future distribution of sub-alpine vegetations are predicted by a logistic regression. The major findings in this study are; First, spring mean temperature (March-May), total precipitation, elevation and warmth index are highly influencing factors to the distribution of sub-alpine vegetations. Second, the sub-alpine vegetations will be disappeared in South Korea and concentrated around Baekdu Mountain in North Korea. North Korea is predicted to have serious impact of climate change because temperature will be increased higher than in South Korea. The study findings concluded that the assessment of the future vulnerability of sub-alpine vegetations to climate change are significant.

A Study on Implements for Security Risk Management System (보안위험관리시스템 개발에 관한 연구)

  • Kim, In-Jung;Jung, Yoon-Jung;Park, Jung-Gil;Won, Bong-Ho
    • Annual Conference of KIPS
    • /
    • 2003.11c
    • /
    • pp.1953-1956
    • /
    • 2003
  • 현재 기관들은 정보통신기반시설에 대한 위험을 여러 가지 다른 방식으로 분석하고 있다. 또한, 각종 위험관리방법론, 지침 및 절차, 수준 측정 등에서 사용되는 기준들 사이에는 일관성이 없거나 서로 비교할 수가 없는 경우가 많다. 해당 기관의 보안 목표와는 상관없이 보안시스템이 설치 운영되고 있으며 그나마 없는 경우도 많다. 또한 당국에 보고하는 위험 분석 결과와 실제 기관 내에 위험 통제를 하기 위해 사용하는 위험 분석 결과도 서로 다른 경우가 흔하다. 기관 전체 차원에서의 일관성 있는 보안위험관리 방법의 부재로 말미암아 경제적으로 효율적인 위험 관리가 불가능하다고 할 수 있다. 본 논문에서는 이러한 문제점을 해결하기 위하여 정보통신기반시설에 대한 보안위험관리시스템을 제안하고 이에 대한 구현 방안을 제시한다.

  • PDF