• Title/Summary/Keyword: System Vulnerability

Search Result 993, Processing Time 0.027 seconds

Research on Web Cache Infection Methods and Countermeasures (웹 캐시 감염 방법 및 대응책 연구)

  • Hong, Sunghyuck;Han, Kun-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.2
    • /
    • pp.17-22
    • /
    • 2019
  • Cache is a technique that improves the client's response time, thereby reducing the bandwidth and showing an effective side. However, there are vulnerabilities in the cache technique as well as in some techniques. Web caching is convenient, but it can be exploited by hacking and cause problems. Web cache problems are mainly caused by cache misses and excessive cache line fetch. If the cache miss is high and excessive, the cache will become a vulnerability, causing errors such as transforming the secure data and causing problems for both the client and the system of the user. If the user is aware of the cache infection and the countermeasure against the error, the user will no longer feel the cache error or the problem of the infection occurrence. Therefore, this study proposed countermeasures against four kinds of cache infections and errors, and suggested countermeasures against web cache infections.

Seismic damage mitigation of bridges with self-adaptive SMA-cable-based bearings

  • Zheng, Yue;Dong, You;Chen, Bo;Anwar, Ghazanfar Ali
    • Smart Structures and Systems
    • /
    • v.24 no.1
    • /
    • pp.127-139
    • /
    • 2019
  • Residual drifts after an earthquake can incur huge repair costs and might need to replace the infrastructure because of its non-reparability. Proper functioning of bridges is also essential in the aftermath of an earthquake. In order to mitigate pounding and unseating damage of bridges subjected to earthquakes, a self-adaptive Ni-Ti shape memory alloy (SMA)-cable-based frictional sliding bearing (SMAFSB) is proposed considering self-adaptive centering, high energy dissipation, better fatigue, and corrosion resistance from SMA-cable component. The developed novel bearing is associated with the properties of modularity, replaceability, and earthquake isolation capacity, which could reduce the repair time and increase the resilience of highway bridges. To evaluate the super-elasticity of the SMA-cable, pseudo-static tests and numerical simulation on the SMA-cable specimens with a diameter of 7 mm are conducted and one dimensional (1D) constitutive hysteretic model of the SMAFSB is developed considering the effects of gap, self-centering, and high energy dissipation. Two types of the SMAFSB (i.e., movable and fixed SMAFSBs) are applied to a two-span continuous reinforced concrete (RC) bridge. The seismic vulnerabilities of the RC bridge, utilizing movable SMAFSB with the constant gap size of 60 mm and the fixed SMAFSBs with different gap sizes (e.g., 0, 30, and 60 mm), are assessed at component and system levels, respectively. It can be observed that the fixed SMAFSB with a gap of 30 mm gained the most retrofitting effect among the three cases.

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF

A Study on Development of Climate Change Adaptation in Ecosystem Sector - Focused on Policy and Research Base in Major Countries - (생태분야 기후변화 적응의 흐름과 발전방향 - 국내외 정책 및 연구기반을 중심으로 -)

  • Yeo, Inae;Hong, Seungbum;Park, Eunjin
    • Journal of Environmental Impact Assessment
    • /
    • v.28 no.1
    • /
    • pp.1-22
    • /
    • 2019
  • This study aims at deriving the implications for adaptation policy and research target regarding climate change risk assessment in ecosystem sector in Korea. The common ground of exemplary cases of "world leaders" in terms of adaptation policies and researches was that they emphasize nationwide study on climate change on biodiversity and ecosystem in target of establishing scientific evidence-bases and reducing uncertainty for their national adaptation policies and plans. In light of this trend, Korean government should settle down more successful adaptation structure by leading adaptation system in further national policy-settings to observe UNFCCC and CBD integratedly and effectively, considering the economic value of adaptation in policy, and strengthening scientific research programs and technology developments. Moreover, risks assessment based on diagnoses and analysis on the risk factors (hazard, exposure, and vulnerability) for climate change in nationwide habitats and species and consolidations with subsequent adaptation strategies could make adaptations in ecosystem sector more effective and successful.

The Direction and Implication of Urban Development in the Age of Response Climate Change (기후변화 대응시대의 도시개발방향과 시사점)

  • Oh, Eun-Yeol
    • Journal of Industrial Convergence
    • /
    • v.17 no.1
    • /
    • pp.33-39
    • /
    • 2019
  • The purpose of this study was to present the direction and implications of urban development in relation to climate risk factors and environment for practical implementation of urban development in response to climate change. The research method was carried out through a qualitative data survey and analysis. As a result of the study, the direction of urban development according to the climate risk factors emphasized the importance of preparing conditions for urban development by establishing a damage prevention system for natural disasters and analyzing the risk of natural disasters by conducting analysis of the impact and vulnerability of climate change in urban planning. The direction of urban development on the environmental side suggested the need for the promotion of public transport oriented development (TOD) in the form of urban planning to realize sustainable and practical urban development. Future research directions will need to be supplemented with more quantitative and empirical findings.

Possibility of Information Leakage through Analysis of Chinese Antivirus Software (중국 안티바이러스 제품 분석을 통한 정보유출 가능성 연구)

  • Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1369-1374
    • /
    • 2021
  • Recently, controversy has been raised over the security and safety of Chinese-made network equipment (Huawei 5G), apps (TikTok, etc.). In particular, according to the results of the Ministry of Defense investigation in 2020, malicious codes were found in CCTVs made in China that were delivered as military surveillance equipment used as a coast guard system, and specific information was remotely transmitted to a Chinese server. The safety issues of these Chinese security products can be questioned as being systematically led by the state rather than by companies or individuals. In this paper, we perform network and process level analysis of 360 Total Security(360 TS), a Chinese antivirus software. In addition, it compares and analyzes the domestic cloud-based vaccine V3 Lite product. Through this, the safety of Chinese security solutions is checked and information leakage and risks are suggested.

Investigating Volumetric changes of Brain Structure in Women Aged 65 to 85 Years Old (65세부터 85세 여성의 뇌 구조 부피 변화 조사)

  • Kim, Yong-Wane
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.7
    • /
    • pp.947-956
    • /
    • 2020
  • The human body becomes vulnerable to various diseases due to deterioration in structure and function as it ages. In particular, changes in brain structure weaken the immune system against diseases such as vascular and metabolic neuropsychiatric diseases. In this study, we used a magnetic resonance imaging technique that allows non-invasive observation of brain structures and measurement of how the volumes of the brain, gray matter, white matter, and subcortical regions changes with aging in women aged 65 to 85 years. As a result of our investigation, we observed a significant linear decrease in subcortical regions with age. These results suggest that the changes due to aging in the brain structure area are closely related to neuropsychiatric diseases in old age, and can provide information in understanding the vulnerability of the brain in old age.

A Strong RFID Authentication Protocol Based on Synchronized Secret Information (비밀정보 동기화에 기반한 Strong RFID 인증)

  • Ha, Jae-Cheol;Ha, Jung-Hoon;Park, Jea-Hoon;Moon, Sang-Jae;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.99-109
    • /
    • 2007
  • Lee et al. recently proposed an RFID mutual authentication scheme based on synchronized secret information. However, we found that their protocol is vulnerable to a spoofing attack in which an adversary can impersonate a legal tag to the reader by sending a malicious random number. To remedy this vulnerability, we propose two RFID authentication protocols which are secure against all possible threats including backward and forward traceability. Furthermore, one of the two proposed protocols requires only three hash operations(but, $[m/2]{\cdot}2+3$ operations in resynchronization state, m is the number of tags) in the database to authenticate a tag, hence it is well suitable fur large scale RFID systems.

A Study on adopting cloud computing in the military (국방 클라우드 컴퓨팅 도입에 관한 보안체계 연구)

  • Jang, Worl-Su;Choi, Jung-Young;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.645-654
    • /
    • 2012
  • The South Korean Defense Ministry is planning and pushing forward to conduct a cloud computing pilot project in 2012. Taking into consideration the high-level security necessary in the military as well as wartime duties, if not designed properly, this project may anticipate severe damage to national security and interest. In particular, despite the fact that vulnerability due to inter-Korean confrontation and regular security-related incidents have been triggered, unconditionally conducting a cloud computing pilot project without reviewing not only violates security regulations but also causes various security-related side effects in and outside South Korea. Therefore, this thesis found conditions for conduct of this project by suggesting duties that can apply cloud computing as well as security technology, administration, post-accident matters and conditions for legally solving cloud computing in the military.

Analysis of Usage Patterns and Security Vulnerabilities in Android Permissions and Broadcast Intent Mechanism (안드로이드 권한과 브로드캐스트 인텐트 매커니즘의 사용 현황 및 보안 취약성 분석)

  • Kim, Young-Dong;Kim, Ikhwan;Kim, Taehyoun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1145-1157
    • /
    • 2012
  • Google Android employs a security model based on application permissions to control accesses to system resources and components of other applications from a potentially malicious program. But, this model has security vulnerabilities due to lack of user comprehension and excessive permission requests by 3rd party applications. Broadcast intent message is widely used as a primary means of communication among internal application components. However, this mechanism has also potential security problems because it has no security policy related with it. In this paper, we first present security breach scenarios caused by inappropriate use of application permissions and broadcast intent messages. We then analyze and compare usage patterns of application permissions and broadcast intent message for popular applications on Android market and malwares, respectively. The analysis results show that there exists a characteristic set for application permissions and broadcast intent receiver that are requested by typical malwares. Based on the results, we propose a scheme to detect applications that are suspected as malicious and notify the result to users at installation time.