• Title/Summary/Keyword: etc

Search Result 28,488, Processing Time 0.053 seconds

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

Research on the Classification Model of Similarity Malware using Fuzzy Hash (퍼지해시를 이용한 유사 악성코드 분류모델에 관한 연구)

  • Park, Changwook;Chung, Hyunji;Seo, Kwangseok;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1325-1336
    • /
    • 2012
  • In the past about 10 different kinds of malicious code were found in one day on the average. However, the number of malicious codes that are found has rapidly increased reachingover 55,000 during the last 10 year. A large number of malicious codes, however, are not new kinds of malicious codes but most of them are new variants of the existing malicious codes as same functions are newly added into the existing malicious codes, or the existing malicious codes are modified to evade anti-virus detection. To deal with a lot of malicious codes including new malicious codes and variants of the existing malicious codes, we need to compare the malicious codes in the past and the similarity and classify the new malicious codes and the variants of the existing malicious codes. A former calculation method of the similarity on the existing malicious codes compare external factors of IPs, URLs, API, Strings, etc or source code levels. The former calculation method of the similarity takes time due to the number of malicious codes and comparable factors on the increase, and it leads to employing fuzzy hashing to reduce the amount of calculation. The existing fuzzy hashing, however, has some limitations, and it causes come problems to the former calculation of the similarity. Therefore, this research paper has suggested a new comparison method for malicious codes to improve performance of the calculation of the similarity using fuzzy hashing and also a classification method employing the new comparison method.

Recent Advances in Metal Organic Framework based Thin Film Nanocomposite Membrane for Nanofiltration (나노여과를 위한 금속유기구조체 기반 박막 나노복합막의 최근 발전)

  • Kim, Esther;Patel, Rajkumar
    • Membrane Journal
    • /
    • v.31 no.1
    • /
    • pp.35-51
    • /
    • 2021
  • Advancements in thin-film nanocomposite (TFN) membrane technology for nanofiltration is crucial for removing pollutants from natural resources. In recent years, various metal-organic framework (MOF) modifications have been tested to overcome the drawbacks that are inevitable with conventional thin-film composite (TFC) and TFN membranes. In general, MIL-101(Cr), UiO-66, ZIF-8, and HKUST-1 [Cu3(BCT2)] are MOFs that were proven to exhibit excellent membrane performance in terms of solvent permeability and solute rejection; their respective studies are reviewed in this article. Other novelties, such as the simultaneous use of different MOFs and unique MOF layering techniques (e.g., dip-coating, spray pre-disposition, Langmuir-Schaefer film, etc.) are also discussed as they present alternate solutions for membrane enhancement and/or preparation convenience. Not only are these MOF-modified TFN membranes frequently shown to improve separation performance from their respective TFC and TFN membranes, but many reports also explain their potential for a cost-effective and environmentally friendly process. In this review the thin film nanocomposite nanofiltration membrane is discussed.

A Study on experiential consumption and development of the customized cosmetics on female university students in their 20s -Preliminary Study- (20대 여대생의 맞춤형화장품 체험소비 및 발전방향 연구)

  • Lee, Ha-yeon;Ju, Hyun-young;Kim, Gyu-ri
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.595-606
    • /
    • 2020
  • To find out the a Study on experiential consumption and development of the customized cosmetics on female university students in their 20s, this study conducted sampling using probability sampling from cosmetics major students in S City from September 1 to October 30, 2020. In this study, a study model was designed for a total of 30 people and studied as an Experience-Consume Experimentation. First, the result of the pre-purchase survey revealed that skincare cosmetics had the highest percentage for being selected by 30 people for "the preferred cosmetic type per the perception regarding customized cosmetics." Second, the result of the pre-purchase survey revealed that 11 people answered skincare cosmetics, 1 person answered shade cosmetics, and 2 people answered fragrance products (perfume, diffusers, etc.) for "the experience type for customized cosmetics." Third, the result of the post-purchase survey revealed that 29 people are willing to recommend the products, while 1 person is not. For the appropriateness of the price, 23 people answered yes; 7 people answered no. for the characteristics of the experience, 24 people (80%) answered that they selected ingredients according to their skin type; 9 people answered that the price is cheap considering they received 1:1 consultation; 18 people answered that they made a choice per their preferences (skin type) rather than per brands; 3 people answered that their self-esteem is stronger as if they received personal care. Therefore, customized cosmetics are expected to increase the attractiveness and purchase rate of female students in their twenties given that 'Human Touch,' genetic analysis, and 'hyper-customization technology,' which requires new development of customized cosmetics experience consumption for female college students in their 20s.

A Study of Hazard Analysis and Monitoring Concepts of Autonomous Vehicles Based on V2V Communication System at Non-signalized Intersections (비신호 교차로 상황에서 V2V 기반 자율주행차의 위험성 분석 및 모니터링 컨셉 연구)

  • Baek, Yun-soek;Shin, Seong-geun;Ahn, Dae-ryong;Lee, Hyuck-kee;Moon, Byoung-joon;Kim, Sung-sub;Cho, Seong-woo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.6
    • /
    • pp.222-234
    • /
    • 2020
  • Autonomous vehicles are equipped with a wide rage of sensors such as GPS, RADAR, LIDAR, camera, IMU, etc. and are driven by recognizing and judging various transportation systems at intersections in the city. The accident ratio of the intersection of the autonomous vehicles is 88% of all accidents due to the limitation of prediction and judgment of an area outside the sensing distance. Not only research on non-signalized intersection collision avoidance strategies through V2V and V2I is underway, but also research on safe intersection driving in failure situations is underway, but verification and fragments through simple intersection scenarios Only typical V2V failures are presented. In this paper, we analyzed the architecture of the V2V module, analyzed the causal factors for each V2V module, and defined the failure mode. We presented intersection scenarios for various road conditions and traffic volumes. we used the ISO-26262 Part3 Process and performed HARA (Hazard Analysis and Risk Assessment) to analyze the risk of autonomous vehicle based on the simulation. We presented ASIL, which is the result of risk analysis, proposed a monitoring concept for each component of the V2V module, and presented monitoring coverage.

Development of Synthetic Signal Generator and Simulator for Performance Evaluation in Multiple Sonobuoy System (다중 소노부이 체계의 신호합성기 및 성능검증용 시뮬레이터 개발)

  • Lee, Su Hyoung;Park, Sang Bae;Han, Sang-Gyu;Kown, Bum Soo
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.2
    • /
    • pp.11-22
    • /
    • 2021
  • Sonobuoy is widely used as a very important sensor in combat management system using P-3 patrol aircraft due to its advantages of rapid searching into wide exploration range. It is necessary to verify the performance of developed sonobuoy system using various maritime test data in order to be successfully applied in combat management system. But it is difficult to acquire various real maritime data because it needs much time and effort. Therefore we have developed in this paper a synthetic signal generator and a simulator that they can verify the performance of sonobuoy system and evaluate its operational effectiveness without conducting maritime test. We have synthesized target signals based on the characteristics of underwater sound sources, and then developed the synthesized signal generator which consider to sound propagation etc. like as underwater environment. And in the simulator development we use a HMI technique to enhance the convenience of operator, and design to verify the performance of sonobuoy system. The developed signal generator and simulator can be used as useful tools to evaluate the operational effectiveness such as optimal deployment of sonobuoy in combat management system using P-3 patrol aircraft.

A Design and Effect of Maker Education Using Educational Artificial Intelligence Tools in Elementary Online Environment (초등 온라인 환경에서 교육용 인공지능 도구를 활용한 메이커 수업 설계 및 효과)

  • Kim, Keun-Jae;Han, Hyeong-Jong
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.61-71
    • /
    • 2021
  • In a situation where the online learning is expanding due to COVID-19, the current maker education has limitations in applying it to classes. This study is to design the class of online maker education using artificial intelligence tools in elementary school. Also, it is to identify the responses to it and to confirm whether it helps improve the learner's computational thinking and creative problem solving ability. The class was designed by the literature review and redesign of the curriculum. Using interveiw, the responses of instructor and learners were identified. Pre- and post-test using corresponding sample t-test was conducted. As a result, the class consisted of ten steps including empathizing, defining making problems, identifying the characteristics of material and tool, designing algorithms and coding using remixes, etc. For computing thinking and creative problem solving ability, statistically significant difference was found. This study has the significance that practical maker activities using educational artificial intelligence tools in the context of elementary education can be practically applied even in the online environment.

Domestic Research Trends on Grit (그릿에 관한 국내 연구동향)

  • Hong, Seung-Hee;Hyun, Yong-Chan;Park, Jung-Hwan
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.131-138
    • /
    • 2021
  • The purpose of this study is to derive the implications of Grit research by analyzing domestic research trends on Grit, which is a non-cognitive subject that has been actively researched in Korea recently in order to grasp the achievements so far and to seek directions for research. The analysis method was analyzed according to the pre-set criteria (annual publication status, research subject, research method, research topic, etc.) which were focusing on KCI listed and KCI excellent Grit papers among domestic academic papers of 'RISS'. As a result of the study, from 2013 to 2019, a total of 203 papers were searched and published in 92 domestic journals. Beside that, the subjects of the study, 88 cases (43.35%) were college students and 180 cases (88.67%) were quantitative studies as the research method. So, the most common research method was quantitative research. As a quantitative research method, the structural relationship between Grit and other variables, mediating effect, difference verification, and moderation effect verification were shown in order, and qualitative research has been conducted since 2017 to develop the concept of Grit, the Grit scale, and the corresponding factor structure and validity. This study will contribute to the educational field by presenting the implications of research on the development of Grit in Korea.

A Study on the Effects of Intrinsic Motivation, Extrinsic Motivation and Pre-knowledge of Office Workers on the Hybrid Start-up Intention (직장인의 내재적 동기, 외재적 동기와 사전지식이 Hybrid 창업의도에 미치는 영향 연구)

  • Yun, Kyung-Ho;You, Yen-Yoo;Park, In-Chae;Park, Hyun-Sung
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.83-98
    • /
    • 2021
  • This study identified the influence of employees' hybrid start-up intention (intention to start a business while maintaining a job) on the employees' self-determination motivation (intrinsic motivation, extrinsic motivation) and prior knowledge through the Model of Goal-directed Behavior (MGB). We used a PLS-SEM called SmartPLS 3.0 for 126 valid samples collected by judgement extraction for office workers throughout June 13, 2020 to July 3, 2020, and empirically evaluated the measurement model (internal consistency reliability, convergent and discriminant validity) and the structural model (multicollinearity, determination coefficient, effect size, predictive relevance, etc.). Only the intrinsic motivation for realizing the hybrid start-up goal of office workers had a significant impact on the hybrid start-up attitude and subjective norms, and the prior knowledge of hybrid start-up had a significant impact on the hybrid start-up desire and the hybrid start-up intention. In order to induce hybrid start-ups for workers with unstable employment, we need systems and programs that can inspire employees with intrinsic motivation and knowledge about hybrid start-up, so follow-up researches are necessary to analyze about government systems and consulting support that can promote hybrid start-up.