• Title/Summary/Keyword: forensic technology

Search Result 303, Processing Time 0.032 seconds

Steel Plant Construction (EPC) Project Case Study : Forensic Lessons-learned Analysis and Systems Engineering Improvement Recommendation

  • Kyung-Bae Jin;Young-Ho Kim;Eul-Bum Lee;Suk-Hwan Seo
    • International conference on construction engineering and project management
    • /
    • 2013.01a
    • /
    • pp.145-150
    • /
    • 2013
  • As a recent global trend, the majority of mega-size plant projects are delivered through EPC (Engineering, Procurement and Construction) contracts, where a single contract is awarded for engineering, procurement, and construction. Under this contracting mechanism, it is challenging for contractors to carry out the projects under traditional project management processes used in design-bid-build projects. A new EPC Plant, the POSCO Special Steel Plant in Changwon, was built successfully at the beginning of 2012 and it is currently in full-scale production. The project has encountered a number of major difficulties however, with some technical and managerial issues through its development process. As summarized in this paper, the authors (as project participants with the contractor) investigated it as a post construction analysis and recorded the Lessons-learned for future project management improvement.

  • PDF

A Study on Development of Digital Forensic Capability Evaluation Indices (디지털 포렌식 수준 평가 지표 개발에 관한 연구)

  • Park, Hee-il;Yoon, Jong-seong;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1153-1166
    • /
    • 2015
  • With the acceleration of information digitization caused by fast growth of Information Technology, the application of digital forensics has increased but it is underestimated because digital evidence is easy to forge. Especially, the evaluation of the reliability of digital forensics organization is judged only by judges domestically because there is no objective verification system or evaluation method of the capability of digital forensics organization. Therefore, the evaluation model and indices of the capability of digital forensics concentrated on the digital forensics organization, personnel, technology, facilities and the procedure in domestic justice system was presented in this research after reviewing the domestic and foreign evaluation method and the standard of the capability of digital forensics and information security. The standard for judicial evaluation of digital evidence and composition, management, evaluation of digital forensics organization would be presented based on this research.

Applying Embedded System Forensics to Car GPS Navigation System Analysis (임베디드 포렌식 기술을 활용한 차량용 GPS 항법 장치 분석)

  • Lee, Yang-Sun;Park, Jong-Hyuk;Kim, Soo-Kyun
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.639-645
    • /
    • 2009
  • It has increased rapidly use of GPS car navigation system in the last few years worldwide. The type of navigation operation is composed of hardware or software. Navigation based on software is stored in exterior storage(e.g. SD card) and executed. One of many navigation software, Mappy, is used most plentifully in Korea. It stores user information such frequently visited place, route and etc. in exterior storage. If it analyzes the dat of navigation, we gain the information such a suspect's movement, route of car. There are important means in a digital forensic perspective because it's available for investigating the crime such kidnapping, murder and etc. This paper provides the necessary information in digital investigation through the analysis of stored data of navigation in a digital forensic perspective.

  • PDF

Forensic Characterization of Four New Bovine Tri-nucleotide Microsatellite Markers in Korean Cattle (Hanwoo)

  • Sim, Yong Teak;Na, Jong Gil;Lee, Chul-Sang
    • Journal of Animal Science and Technology
    • /
    • v.55 no.2
    • /
    • pp.87-93
    • /
    • 2013
  • We identified four new bovine tri-nucleotide microsatellite loci and analyzed their sequence structures and genetic parameters in 105 randomly selected Korean cattle (Hanwoo). Allele numbers of the loci B17S0808, B15S6253, B8S7996, and B17S4998 were 10, 11, 12, and 29, respectively. These alleles contained a simple or compound repeat sequences with some variations. Allele distributions of all these loci were in Hardy-Weinberg equilibrium (P > 0.05). Observed heterozygosity and expected heterozygosity ranged from 0.54 (B15S6253) to 0.92 (B17S4998) and from 0.599 (B15S6253) to 0.968 (B17S4998), respectively, and two measures of heterozygosity at each locus were highly correlated. Polymorphism information content (PIC) for these 4 loci ranged from 0.551 (B15S6253) to 0.932 (B17S4998), which means that all these loci are highly informative (PIC > 0.5). Other genetic parameters, power of discrimination (PD) and probability of exclusion (PE) ranged from 0.783 (B15S6253) to 0.984 (B17S4998) and from 0.210 (B15S6253) to 0.782 (B17S4998), respectively. Their combined PD and PE values were 0.9999968 and 0.98005176, respectively. Capillary electrophoresis revealed that average peak height ratio for a stutter was 13.89% at B17S0808, 26.67% at B15S6253, 9.09% at B8S7996, and 43.75% at B17S4998. Although the degree of genetic variability of the locus B15S6253 was relatively low among these four microsatellite markers, their favorable parameters and low peak height ratios for stutters indicate that these four new tri-nucleotide microsatellite loci could be useful multiplex PCR markers for the forensic and population genetic studies in cattle including Korean native breed.

Vulnerability Analysis Method of Software-based Secure USB (소프트웨어 기반 보안 USB에 대한 취약성 분석 방법론)

  • Kim, Minho;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo;Kim, Minsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1345-1354
    • /
    • 2012
  • The modern society with the wide spread USB memory, witnesses the acceleration in the development of USB products that applied secure technology. Secure USB is protecting the data using the method as device-based access control, encryption of stored files, and etc. In terms of forensic analyst, to access the data is a lot of troubles. In this paper, we studied software-based data en/decryption technology and proposed for analysis mechanism to validation vulnerability that secured on removable storage media. We performed a vulnerability analysis for USB storage device that applied security mechanism. As a result, we found vulnerabilities that extracts a source file without a password.

Real-Time Copyright Security Scheme of Immersive Content based on HEVC (HEVC 기반의 실감형 콘텐츠 실시간 저작권 보호 기법)

  • Yun, Chang Seob;Jun, Jae Hyun;Kim, Sung Ho;Kim, Dae Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.27-34
    • /
    • 2021
  • In this paper, we propose a copyright protection scheme for real-time streaming of HEVC(High Efficiency Video Coding) based realistic content. Previous research uses encryption and modular operation for copyright pre-protection and copyright post-protection, which causes delays in ultra high resolution video. The proposed scheme maximizes parallelism by using thread pool based DRM(Digital Rights Management) packaging with only HEVC's CABAC(Context Adaptive Binary Arithmetic Coding) codec and GPU based high-speed bit operation(XOR), thus enabling real-time copyright protection. As a result of comparing this scheme with previous research at three resolutions, PSNR showed an average of 8 times higher performance, and the process speed showed an average of 18 times difference. In addition, as a result of comparing the robustness of the forensic mark, the filter and noise attack, which showed the largest and smallest difference, with a 27-fold difference in recompression attacks, showed an 8-fold difference.

Classification of DJI Drones Based on Flight Log Decryption Method (비행 로그 복호화 방식에 따른 DJI 드론 분류)

  • Lee, Youngwoo;Kim, Juhwan;Yu, Jihyeon;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.77-88
    • /
    • 2022
  • With the development and popularization of drone manufacturing technology, the drone market, which was mainly focused on industry, agriculture, and military, is also showing great growth in individual and commercial markets. Among them, DJI has a high share in the personal and commercial drone market, and accordingly, forensic analysis of DJI drones is drawing attention. In particular, when stealing and analyzing drones used in criminal acts, a technology to interpret flight logs recording drone flight paths and hardware information is needed, which inevitably applies drone models due to differences in decryption methods. Therefore, when an unidentified drone is acquired from the perspective of a digital forensic investigator, a clear classification of a drone model to which analysis can be applied is required. This paper proposes a method of extracting and analyzing artifacts of DJI drones through forensics, and analyzes media data analysis and flight log analysis results and decryption methods for three drone models with different release years of DJI. Finally, drones in the DJI product line are classified according to whether the commercialized DJI drone flight log is decrypted.

Scientific and Engineering Applications of Full-field Swept-source Optical Coherence Tomography

  • Mehta, Dalip Singh;Anna, Tulsi;Shakher, Chandra
    • Journal of the Optical Society of Korea
    • /
    • v.13 no.3
    • /
    • pp.341-348
    • /
    • 2009
  • We report the development of full-field swept-source optical coherence tomography (SS-OCT) in the wavelength range of 815-870 nm using a unique combination of super-luminescent diode (SLD) as broad-band light source and acousto-optic tunable filter (AOTF) as a frequency-scanning device. Some new applications of full-field SS-OCT in forensic sciences and engineering materials have been demonstrated. Results of simultaneous topography and tomography of latent fingerprints, silicon microelectronic circuits and composite materials are presented. The main advantages of the present system are completely non-mechanical scanning, wide-field, compact and low-cost.

Mass Spectrometry-based Hair Metabolomics for Biomarker Discovery

  • Lee, Yu Ra;Hong, Jongki;Chung, Bong Chul
    • Mass Spectrometry Letters
    • /
    • v.13 no.1
    • /
    • pp.2-10
    • /
    • 2022
  • Metabolomics makes it possible to analyze the interrelationships between various signaling molecules based on the metabolic pathways involved by using high-resolution devices. This approach can also be used to obtain large-scale metabolic information to identify the relevant pathways for disease diagnosis and prognosis and search for potential biomarkers. In the fields of medicine and forensics, hair analysis is used to detect various metabolites in the body. Hair can be harvested readily in a noninvasive manner and is easier to transport and store than blood and urine. Another advantage from a forensic viewpoint is that hair reflects all the components of body fluids. In addition, because of the unique coating structure of hair, it can be used for measurements without changing or destroying its adsorbed components. In this review, the pretreatments for hair analysis, instrumental conditions and clinical applications are discussed. Especially, the clinical use of hair metabolomics in the diagnosis of various diseases and the limitations of the technique are described.

A Study on Vulnerability Analysis and Memory Forensics of ESP32

  • Jiyeon Baek;Jiwon Jang;Seongmin Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.3
    • /
    • pp.1-8
    • /
    • 2024
  • As the Internet of Things (IoT) has gained significant prominence in our daily lives, most IoT devices rely on over-the-air technology to automatically update firmware or software remotely via the network connection to relieve the burden of manual updates by users. And preserving security for OTA interface is one of the main requirements to defend against potential threats. This paper presents a simulation of an attack scenario on the commoditized System-on-a-chip, ESP32 chip, utilized for drones during their OTA update process. We demonstrate three types of attacks, WiFi cracking, ARP spoofing, and TCP SYN flooding techniques and postpone the OTA update procedure on an ESP32 Drone. As in this scenario, unpatched IoT devices can be vulnerable to a variety of potential threats. Additionally, we review the chip to obtain traces of attacks from a forensics perspective and acquire memory forensic artifacts to indicate the SYN flooding attack.