• Title/Summary/Keyword: integrity checking

Search Result 61, Processing Time 0.025 seconds

A JTAG Protection Method for Mobile Application Processors (모바일 애플리케이션 프로세서의 JTAG 보안 기법)

  • Lim, Min-Soo;Park, Bong-Il;Won, Dong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.4
    • /
    • pp.706-714
    • /
    • 2008
  • In this paper, we suggest a practical and flexible system architecture for JTAG(Joint Test Action Group) protection of application processors. From the view point of security, the debugging function through JTAG port can be abused by malicious users, so the internal structures and important information of application processors, and the sensitive information of devices connected to an application processor can be leak. This paper suggests a system architecture that disables computing power of computers used to attack processors to reveal important information. For this, a user authentication method is used to improve security strength by checking the integrity of boot code that is stored at boot memory, on booting time. Moreover for user authorization, we share hard wired secret key cryptography modules designed for functional operation instead of hardwired public key cryptography modules designed for only JTAG protection; this methodology allows developers to design application processors in a cost and power effective way. Our experiment shows that the security strength can be improved up to $2^{160}{\times}0.6$second when using 160-bit secure hash algorithm.

A Proposal for Transmission Method of Safety CRL to Distributed OCSP Group (분산된 OCSP 그룹으로 안전한 인증서 취소 목록 전달 방법에 관한 연구)

  • Ko Hoon;Jang Uijin;Shin Yongtae
    • Journal of Internet Computing and Services
    • /
    • v.5 no.2
    • /
    • pp.33-40
    • /
    • 2004
  • PKI(Public Key Infrastructure) issues a certificate for providing Integrity of public key. and it Inspects the validity by downloading CRL(Certificate Revocation List) for checking the validity of certificate. But. it imposes a burden on processing of certificate due to Increase of user and the size of CRL, Lately, OCSP(Online Certificate Status Protocol), which examines the validity on online, is published as an alternative plan. But, it makes a problem due to concentration of just one certificate repository, Accordingly we propose the scheme that OCSP server is arranged in distributed area and then the information is safely transmitted to OCSP server.

  • PDF

Leak flow prediction during loss of coolant accidents using deep fuzzy neural networks

  • Park, Ji Hun;An, Ye Ji;Yoo, Kwae Hwan;Na, Man Gyun
    • Nuclear Engineering and Technology
    • /
    • v.53 no.8
    • /
    • pp.2547-2555
    • /
    • 2021
  • The frequency of reactor coolant leakage is expected to increase over the lifetime of a nuclear power plant owing to degradation mechanisms, such as flow-acceleration corrosion and stress corrosion cracking. When loss of coolant accidents (LOCAs) occur, several parameters change rapidly depending on the size and location of the cracks. In this study, leak flow during LOCAs is predicted using a deep fuzzy neural network (DFNN) model. The DFNN model is based on fuzzy neural network (FNN) modules and has a structure where the FNN modules are sequentially connected. Because the DFNN model is based on the FNN modules, the performance factors are the number of FNN modules and the parameters of the FNN module. These parameters are determined by a least-squares method combined with a genetic algorithm; the number of FNN modules is determined automatically by cross checking a fitness function using the verification dataset output to prevent an overfitting problem. To acquire the data of LOCAs, an optimized power reactor-1000 was simulated using a modular accident analysis program code. The predicted results of the DFNN model are found to be superior to those predicted in previous works. The leak flow prediction results obtained in this study will be useful to check the core integrity in nuclear power plant during LOCAs. This information is also expected to reduce the workload of the operators.

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

Development of an Error-Type Analysis Frame and Analysis of High School Students' Error-Types in Observation Behavior Using Microscopes (고등학생의 현미경 관찰 활동에 대한 결과 보고 오류 유형 분석틀의 고안 및 오류 유형 분석)

  • Jin, Hyun-Jung;Lee, Il-Sun;Kwon, Yong-Ju
    • Journal of Science Education
    • /
    • v.35 no.2
    • /
    • pp.127-137
    • /
    • 2011
  • The purpose of this study is to develop the analysis frame of reporting observation results by high school students in biology experiments using microscopes and analyze their error types. For this study, five experiments were carried out by 12 high school students in B metropolitan city. Before these experiments, developed the analysis frame of reporting observation results. Tests for checking prior knowledge of students were done and results of each experiment were taken picture of. Using the developed framework, the real results and reported results submitted by students were analyzed. The result of this study shows how students report their observation results and they tend to have difficulty in doing observation activity itself. The ratio of factual reports is low because observation ways and recording ways have not been taught properly. Observation training is needed for observing real results objectively. The improvement in experiment environment is necessary for right observation, not observation for checking based on only results. In addition, the education of ethics in science research focusing on the integrity should be performed. The analysis data of reporting observation result by students can be used as basic data for teachers to plan observation strategies and to have right observation views and ways.

  • PDF

Efficient Management of Statistical Information of Keywords on E-Catalogs (전자 카탈로그에 대한 효율적인 색인어 통계 정보 관리 방법)

  • Lee, Dong-Joo;Hwang, In-Beom;Lee, Sang-Goo
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.4
    • /
    • pp.1-17
    • /
    • 2009
  • E-Catalogs which describe products or services are one of the most important data for the electronic commerce. E-Catalogs are created, updated, and removed in order to keep up-to-date information in e-Catalog database. However, when the number of catalogs increases, information integrity is violated by the several reasons like catalog duplication and abnormal classification. Catalog search, duplication checking, and automatic classification are important functions to utilize e-Catalogs and keep the integrity of e-Catalog database. To implement these functions, probabilistic models that use statistics of index words extracted from e-Catalogs had been suggested and the feasibility of the methods had been shown in several papers. However, even though these functions are used together in the e-Catalog management system, there has not been enough consideration about how to share common data used for each function and how to effectively manage statistics of index words. In this paper, we suggest a method to implement these three functions by using simple SQL supported by relational database management system. In addition, we use materialized views to reduce the load for implementing an application that manages statistics of index words. This brings the efficiency of managing statistics of index words by putting database management systems optimize statistics updating. We showed that our method is feasible to implement three functions and effective to manage statistics of index words with empirical evaluation.

  • PDF

Compilation of records and Management of those materials, in the latter half period of the Joseon dynasty (조선후기 기록물 편찬과 관리)

  • Shin, Byung Ju
    • The Korean Journal of Archival Studies
    • /
    • no.17
    • /
    • pp.39-84
    • /
    • 2008
  • In this article, how the records were compiled, stored and managed during the latter half period of the Joseon dynasty is examined. In details, the compilation of and and Euigwe, the establishment of 'history chambers(史庫)' and the Wae-Gyujanggak facility, and the creation of records such as 'Shillok Hyeongji-an', are all investigated. Examination of all these details revealed that in the latter half period of the Joseon dynasty, it was the royal family which actively led the task of meticulously compiling records and also storing & managing those established materials with great integrity and passion. The intention behind creating all these records containing everything the kings said and done over centuries must have been determination to enhance the openness and integrity of politics in general, while also emphasizing the importance of such values inside the government. In order to establish a tradition preserving records not only for a limited time period but also for eternity, 'history chambers' were founded in rocky mountain areas, and additional chambers(Wae-Sago) were created as well, in areas deemed strategically safe in military terms such as the Ganghwa-do island. Officials put in charge by the king himself of historical documenting reported to the history chambers on a regular basis and checked the status of the materials in custody, and the whole checking process was documented into a form called 'Shillok Hyeongji-an'. And for long-term preservation of materials, officials sent by the king regularly took all the materials outside, and conducted a series of 'desiccating procedures', under strong sunlight('Poswae'). Thanks to the efforts of our ancestors who did their best to preserve all the records, and tried everything to manage them with great caution, we can examine and experience all these centuries-old materials, mostly intact. It is imperative that we inherit not only the magnificent culture of creating and preserving records, but also the spirit which compelled our ancestors to do so.

Analysis of corrugated steel web beam bridges using spatial grid modelling

  • Xu, Dong;Ni, Yingsheng;Zhao, Yu
    • Steel and Composite Structures
    • /
    • v.18 no.4
    • /
    • pp.853-871
    • /
    • 2015
  • Up to now, Japan has more than 200 corrugated steel web composite beam bridges which are under construction and have been constructed, and China has more than 30 corrugated steel web composite beam bridges. The bridge type includes the simply supported beam, continuous beam, continuous rigid frame and cable stayed bridge etc. The section form has developed to the single box and multi-cell box girder from the original single box and single chamber. From the stress performance and cost saving, the span range of 50~150 m is the most competitive. At present, the design mostly adopts the computational analytical method combining the spatial bar system model, plane beam grillage model and solid model. However, the spatial bar system model is short of the refinement analysis on the space effect, such as the shear lag effect, effective distribution width problem, and eccentric load factor problem etc. Due to the similarity of the plane beam grillage method in the equivalence principle, it cannot accurately reflect the shearing stress distribution and local stress of the top and bottom plates of the box type composite beam. The solid model is very difficult to combine with the overall calculation. Moreover, the spatial grid model can achieve the refinement analysis, with the integrity of the analysis and the comprehensiveness of the stress checking calculation, and can make up the deficiency of the analytical method currently. Through the example verification of the solid model and spatial grid model, it can be seen that the calculation results for the stress and the displacement of two models are almost consistent, indicating the applicability and precision of the spatial grid model.

Field Measurement and Modal Identification of Various Structures for Structural Health Monitoring

  • Yoshida, Akihiko;Tamura, Yukio
    • International Journal of High-Rise Buildings
    • /
    • v.4 no.1
    • /
    • pp.9-25
    • /
    • 2015
  • Field measurements of various structures have been conducted for many purposes. Measurement data obtained by field measurement is very useful to determine vibration characteristics including dynamic characteristics such as the damping ratio, natural frequency, and mode shape of a structure. In addition, results of field measurements and modal identification can be used for modal updating of FEM analysis, for checking the efficiency of damping devices and so on. This paper shows some examples of field measurements and modal identification for structural health monitoring. As the first example, changes of dynamic characteristics of a 15-story office building in four construction stages from the foundation stage to completion are described. The dynamic characteristics of each construction stage were modeled as accurately as possible by FEM, and the stiffness of the main structural frame was evaluated and the FEM results were compared with measurements performed on non-load-bearing elements. Simple FEM modal updating was also applied. As the next example, full-scale measurements were also carried out on a high-rise chimney, and the efficiency of the tuned mass damper was investigated by using two kinds of modal identification techniques. Good correspondence was shown with vibration characteristics obtained by the 2DOF-RD technique and the Frequency Domain Decomposition method. As the last example, the wind-induced response using RTK-GPS and the feasibility of hybrid use of FEM analysis and RTK-GPS for confirming the integrity of structures during strong typhoons were shown. The member stresses obtained by hybrid use of FEM analysis and RTK-GPS were close to the member stresses measured by strain gauges.

Design of Fault Diagnostic and Fault Tolerant System for Induction Motors with Redundant Controller Area Network

  • Hong, Won-Pyo;Yoon, Chung-Sup;Kim, Dong-Hwa
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.371-374
    • /
    • 2004
  • Induction motors are a critical component of many industrial processes and are frequently integrated in commercially available equipment. Safety, reliability, efficiency, and performance are some of the major concerns of induction motor applications. Preventive maintenance of induction motors has been a topic great interest to industry because of their wide range application of industry. Since the use of mechanical sensors, such as vibration probes, strain gauges, and accelerometers is often impractical, the motor current signature analysis (MACA) techniques have gained murk popularity as diagnostic tool. Fault tolerant control (FTC) strives to make the system stable and retain acceptable performance under the system faults. All present FTC method can be classified into two groups. The first group is based on fault detection and diagnostics (FDD). The second group is independent of FDD and includes methods such as integrity control, reliable stabilization and simultaneous stabilization. This paper presents the fundamental FDD-based FTC methods, which are capable of on-line detection and diagnose of the induction motors. Therefore, our group has developed the embedded distributed fault tolerant and fault diagnosis system for industrial motor. This paper presents its architecture. These mechanisms are based on two 32-bit DSPs and each TMS320F2407 DSP module is checking stator current, voltage, temperatures, vibration and speed of the motor. The DSPs share information from each sensor or DSP through DPRAM with hardware implemented semaphore. And it communicates the motor status through field bus (CAN, RS485). From the designed system, we get primitive sensors data for the case of normal condition and two abnormal conditions of 3 phase induction motor control system is implemented. This paper is the first step to drive multi-motors with serial communication which can satisfy the real time operation using CAN protocol.

  • PDF