• Title/Summary/Keyword: safety verification

Search Result 1,127, Processing Time 0.027 seconds

Advanced Mandatory Authentication Architecture Designed for Internet Bank (인터넷은행을 위한 개선된 본인확인 구조)

  • Hong, Ki-seok;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1503-1514
    • /
    • 2015
  • Non-face-to-face real name verification policy that financial authorities announced, in order to secure a face-to-face or more of accuracy, are in principle of multi check. The business model and legal entities of Internet banks is different from existing Internet banking. Relpacing real name verification from face-to-facd to non-face-to-face while maintaining the structure of identification can not only cause inconvenience to a first time member, but also can be more vulnerable to verious security risks. In this study, to evaluate a service level of a bank of the Internet, and provide an improved identification of the structure such that the registration and use of differentiated services is performed in accordance with the evaluation. In addition, the security that may occur with respect to Bank of the Internet to establish a vulnerability and attack model, the results of the analysis of the safety of the step-by-step security attributes and services of the authentication medium of each attack model, existing the safer than Internet banking, confirmed the usefulness in user registration guide.

Development of Security Functional Requirements for Secure-Introduction of Unmanned Aerial Vehicle (무인항공기의 안전한 도입을 위한 보안기능요구사항 개발)

  • Kang, Dongwoo;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.97-105
    • /
    • 2019
  • With the possibility of wireless control of the aircraft by Nicola Tesla, Unmanned Aerial Vehicle(UAV) was mainly used for military and defense purposes with the rapid development through World War I and II. As civilian applications of unmanned aerial vehicles have expanded, they have been used with various services, and attempts have been made to control various environmental changes and risk factors of unmanned aerial vehicles. However, GPS spoofing, Jamming attack and security accidents are occurring due to the communication in the unmaned aerial vehicle system or the security vulnerability of the unmanned aerial vehicle itself. In order to secure introduction of Unmanned aerial vehicle, South Korea has established Unmanned Aerial Vehicle verification system called Airworthiness Certification. However, the existing cerfication system is more focused on test flight, design and structure's safety and reliability. In this paper, we propose a unmanned aerial vehicle system model and propose security functional requirements on unmanned aerial vehicle system in the corresponding system model for secure-introduction of Unmanned Aerial Vehicle. We suggest the development direction of verification technology. From this proposal, future development directions of evaluation and verification technology of Unmanned Aerial Vehicle will be presented.

Seismic Response Amplification Factors of Nuclear Power Plants for Seismic Performance Evaluation of Structures and Equipment due to High-frequency Earthquakes (구조물 및 기기의 내진성능 평가를 위한 고주파수 지진에 의한 원자력발전소의 지진응답 증폭계수)

  • Eem, Seung-Hyun;Choi, In-Kil;Jeon, Bub-Gyu;Kwag, Shinyoung
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.24 no.3
    • /
    • pp.123-128
    • /
    • 2020
  • Analysis of the 2016 Gyeongju earthquake and the 2017 Pohang earthquake showed the characteristics of a typical high-frequency earthquake with many high-frequency components, short time strong motion duration, and large peak ground acceleration relative to the magnitude of the earthquake. Domestic nuclear power plants were designed and evaluated based on NRC's Regulatory Guide 1.60 design response spectrum, which had a great deal of energy in the low-frequency range. Therefore, nuclear power plants should carry out seismic verification and seismic performance evaluation of systems, structures, and components by reflecting the domestic characteristics of earthquakes. In this study, high-frequency amplification factors that can be used for seismic verification and seismic performance evaluation of nuclear power plant systems, structures, and equipment were analyzed. In order to analyze the high-frequency amplification factor, five sets of seismic time history were generated, which were matched with the uniform hazard response spectrum to reflect the characteristics of domestic earthquake motion. The nuclear power plant was subjected to seismic analysis for the construction of the Korean standard nuclear power plant, OPR1000, which is a reactor building, an auxiliary building assembly, a component cooling water heat exchanger building, and an essential service water building. Based on the results of the seismic analysis, a high-frequency amplification factor was derived upon the calculation of the floor response spectrum of the important locations of nuclear power plants. The high-frequency amplification factor can be effectively used for the seismic verification and seismic performance evaluation of electric equipment which are sensitive to high-frequency earthquakes.

Development of Verification and Conformance Testing Tools for Communication Protocol (통신 프로토콜 검정기 및 적합성시험 도구 개발)

  • Seo Mi-Seon;Hwang Jong-Gyu;Lee Jae-Ho;Kim Sung-Un
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1119-1133
    • /
    • 2005
  • As a very important part in development of the protocol, verification and conformance test for protocol specification are complementary techniques that are used to increase the level of confidence in the system functions as prescribed by their specifications. In this paper, we verify the safety and liveness properties of rail signal control protocol type 1 specified in LTS with model checking method, and experimentally prove that it is possible to check for the deadlock, livelock and rechability of the states and actions on LTS. The implemented formal checker is able to verify whether properties expressed in modal logic are true in specifications using modal mu-calculus. We also propose a formal method on generation of conformance test cases using the concept of UIO sequences from verified protocol specification. The suggested tools are implemented by C++ language under Windows NT.

  • PDF

Process Algebra Based Formal Method for SDN Application Verification (SDN 응용 검증을 위한 프로세스 알지브라 기반 정형 기법)

  • Shin, Myung-Ki;Yi, Jong-Hwa;Choi, Yunchul;Lee, Jihyun;Lee, Seung-Ik;Kang, Miyoung;Kwak, Hee Hwan;Choi, Jin-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.6
    • /
    • pp.387-396
    • /
    • 2014
  • Recently, there have been continuous efforts and progresses regarding the research on diverse network control and management platforms for SDN (Software Defined Networking). SDN is defined as a new technology to enable service providers/network operators easily to control and manage their networks by writing a simple application program. In SDN, incomplete or malicious programmable entities could cause break-down of underlying networks shared by heterogeneous devices and stake-holders. In this sense, any misunderstanding or diverse interpretations should be completely avoided. This paper proposes a new framework for SDN application verification and a prototype based on the formal method, especially with process algebra called pACSR which is an extended version of Algebra of Communicating Shared Resources (ACSR).

A Design Secure QR-Login User Authentication Protocol and Assurance Methods for the Safety of Critical Data Using Smart Device (스마트 기기를 이용한 안전한 QR-Login 사용자 인증 프로토콜의 설계 및 중요 정보의 안전성 보증을 위한 방법)

  • Lee, Jae-Sik;You, Han-Na;Cho, Chang-Hyun;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.949-964
    • /
    • 2012
  • Our PC have been under constant threat of malicious codes and viruses today. As many new ways of cyber attacks are being developed, such as zero-day-attack, nobody's PC is guaranteed to be safe from the attacks. In case where a user uses the existing verification protocol on a unsecured PC, the user's verification information may well be threatened by sniffing or man-in-the-middle attack. Especially, deadly attacks like memory hacking would give hard time for users to even recognize any symptom of virus infection. Therefore, this paper designs secured QR-Login user verification protocol for smart devices that are ready to communicate with QR-Code and proposes a way to keep critical data safe when using the internet. This way, user would be able to safeguard his/her critical data even when under attack by unknown attacks and safely carry out extremely sensitive task, like financial trading, on the device.

Clinical Implementation of an In vivo Dose Verification System Based on a Transit Dose Calculation Tool for 3D-CRT

  • Jeong, Seonghoon;Yoon, Myonggeun;Chung, Weon Kuu;Chung, Mijoo;Kim, Dong Wook
    • Journal of the Korean Physical Society
    • /
    • v.73 no.10
    • /
    • pp.1571-1576
    • /
    • 2018
  • We developed and evaluated an algorithm to calculate the target radiation dose in cancer patients by measuring the transmitted dose during 3D conformal radiation treatment (3D-CRT) treatment. The patient target doses were calculated from the transit dose, which was measured using a glass dosimeter positioned 150 cm from the source. The accuracy of the transit dose algorithm was evaluated using a solid water phantom for five patient treatment plans. We performed transit dose-based patient dose verification during the actual treatment of 34 patients who underwent 3D-CRT. These included 17 patients with breast cancer, 11 with pelvic cancer, and 6 with other cancers. In the solid water phantom study, the difference between the transit dosimetry algorithm with the treatment planning system (TPS) and the measurement was $-0.10{\pm}1.93%$. In the clinical study, this difference was $0.94{\pm}4.13%$ for the patients with 17 breast cancers, $-0.11{\pm}3.50%$ for the eight with rectal cancer, $0.51{\pm}5.10%$ for the four with bone cancer, and $0.91{\pm}3.69%$ for the other five. These results suggest that transit-dosimetry-based in-room patient dose verification is a useful application for 3D-CRT. We expect that this technique will be widely applicable for patient safety in the treatment room through improvements in the transit dosimetry algorithm for complicated treatment techniques (including intensity modulated radiation therapy (IMRT) or volumetric modulated arc therapy (VMAT).

Development of Feedback Data Automated Verification Program for Mission S/W (임무 S/W 시험을 위한 피드백 데이터의 기댓값 검증 자동화 도구 개발)

  • Kwon, GI-Bong;Lee, Ha-Yoeun;Ha, Seok-Wun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.10
    • /
    • pp.871-877
    • /
    • 2021
  • Aircraft defects are important matters directly related to the operation of the aircraft and the life of the pilot. The defects in the mission software that occur during aircraft control seriously affect the pilot's mission performance and safety. Therefore, the organization in charge of aircraft development or software defects are reinforced in the process to identify and eliminate defects in the early stages of development, and a lot of labor and time are spent, but due to the nature of the mission software, strong functional coupling with other avionics and high complexity, so there are restrictions on the identification and removal of software defects through the existing test method. This study analyzes the effect of securing mission software integrity and reducing test cost through data integrity verification by developing a tool that automates the verification of expected value of feedback data among communication data of mission computer interlocking equipment.

H-DsM: Distributed Simulation Middleware with HILS for Hybrid System Verification (H-DsM: 하이브리드 시스템 검증을 위한 HILS 지원 분산 시뮬레이션 미들웨어)

  • Lee, Seung-Gi;Yun, Seong-jin;Kim, Han-jin;Kim, Won-Tae
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1073-1078
    • /
    • 2018
  • As interest in the 4th Industrial Revolution increases, the CPS, in which things existing in the reality and things existing in the virtual interact with each other, is attracting attention as an important technology. Complex systems such as electric vehicles, autonomous driving, smart factories, and smart grid system are considered as core technology fields of the 4th Industrial Revolution, and many types of research have been conducted to develop it. The reliability of the system is directly related to the safety of people in case of the autonomous driving, and verification of the actual vehicle's hardware and software of ADAS is essential. In this paper, we proposed distributed simulation middleware supporting HILS for reliable verification of the complex hybrid systems.

Implementation of Test Automation Agent for DO-330 Tool Qualified of ARINC-661 Development Tool (ARINC-661 개발 도구의 DO-330 도구 자격 획득을 위한 시험 자동화 에이전트 구현)

  • Kim, Do Gyun;Kim, Younggon
    • Journal of Platform Technology
    • /
    • v.8 no.4
    • /
    • pp.47-58
    • /
    • 2020
  • DO-330 Software Tool Qualification Considerations is a guideline for development of tools used to develop/verify software and hardware installed on aircraft. And among several processes, the verification process is very crucial as it occupies a large proportion for DO-330. Especially, in order to qualify tool with high safety level, test objectives must be performed with independence, accordingly, more time, cost, and manpower are required than other objectives. In addition, even if the test cases or test procedures are well defined, the higher the complexity of the test the higher probability of human error occurs. In this paper, we propose Script-based Test Automation Agent software structure for efficient DO-330 verification process of A661UAGEN tool developed by Hanwha Systems. Compared to the test performed manually by the test engineer, testing time of the Script-based Test Automation Agent is reduced by 87.5% and testing productivity is increased by 43.75%.

  • PDF