• Title/Summary/Keyword: vulnerability testing

Search Result 74, Processing Time 0.029 seconds

Association Analyses of ST8SIA2 Genetic Polymorphisms with Schizophrenia in the Korean Population (한국인 조현병 환자에서 ST8SIA2 유전자 다형성의 연합 연구)

  • Yoo, Jae-Hyun;Ryu, Seung-Hyong;Cho, Eun-Young;Huh, Ik-Soo;Park, Tae-Sung;Lee, Yu-Sang;Kwon, Jun-Soo;Hong, Kyung-Sue
    • Korean Journal of Biological Psychiatry
    • /
    • v.19 no.3
    • /
    • pp.140-145
    • /
    • 2012
  • Objectives : ST8SIA2 (ST8 alpha-N-acetyl-neuraminide alpha-2, 8-sialyltransferase 2 gene) is located at 15q26, a susceptibility locus for schizophrenia. Some previous research had indicated that single-nucleotide polymorphisms (SNPs) in the promoter region of ST8SIA2 were associated with schizophrenia in Japanese and Chinese populations. We investigated the association between SNPs in the promoter region of ST8SIA2 and schizophrenia in the Korean population. Methods : The study subjects were 190 Korean patients with schizophrenia and 190 healthy controls. We performed allelic, genotypic, and haplotypic association analyses for rs3759916, rs3759915 and rs3759914 of ST8SIA2. All genotypes were determined by direct sequencing. Results : In the genotype-based analysis, rs3759914 showed a nominally significant association with schizophrenia under recessive genotypic model (p = 0.047). However, this association did not remain statistically significant after correction for multiple testing. Both allelic and haplotype analyses did not show any significant association. Conclusions : These findings suggest that ST8SIA2 does not play a major role in the susceptibility to schizophrenia in the Korean population. Further studies with a larger number of subjects are required to definitively rule out minor effects of this gene on schizophrenia vulnerability.

A SW Testing Procedure for Information Technology Security Evaluation and Vulnerability Analysis (정보 보안 평가 및 취약점 분석을 위한 SW 테스팅 절차)

  • Kim, Dong-Jin;Jeong, Youn-Sik;Cho, Seong-Je;Park, Min-Kyu;Lee, Jin-Young;Kim, Il-Gon;Lee, Tae-Seung;Kim, Hong-Geun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.80-82
    • /
    • 2012
  • 다양한 정보보호 제품이 개발됨에 따라, 정보보호 제품 보증을 위해 자체의 보안성 평가 및 인증이 중요시되고 있다. 정보보호 제품의 평가 및 인증을 위해서는 보안기능 검사와 취약점 분석 단계가 매우 중요하지만 이를 위한 정보보호 제품의 보안기능 시험과 취약성 분석을 위한 테스팅 절차에 대한 연구는 그 중요성에 비해 많이 수행되지 않았다. 현재까지는 보안제품을 기능별로 제품을 분류하여 보안성을 평가하였는데, 본 논문에서는 보안 제품들에서 공격에 취약한 SW 모듈 중심으로 테스팅 대상을 분류하는 방법을 제안한다. 분류된 SW 모듈별로 적합한 보안 테스팅 기법을 정의하고, 보안제품의 취약점을 효과적으로 탐지하기 위해 공개되어 있는 관련 취약점도 분석하였다. 이를 통해 정보보호 제품의 취약점 분석 및 제품 보안성 평가를 위한 SW 모듈별 보안 테스팅 절차를 수립하고, 테스트하였다. 실험을 통해 취약한 SW 모듈별 적절한 공격 기법 선정 시 제안 절차가 정보보호 제품 평가 인증에 활용될 수 있음을 확인하였다.

Structural health monitoring of seismically vulnerable RC frames under lateral cyclic loading

  • Chalioris, Constantin E.;Voutetaki, Maristella E.;Liolios, Angelos A.
    • Earthquakes and Structures
    • /
    • v.19 no.1
    • /
    • pp.29-44
    • /
    • 2020
  • The effectiveness and the sensitivity of a Wireless impedance/Admittance Monitoring System (WiAMS) for the prompt damage diagnosis of two single-storey single-span Reinforced Concrete (RC) frames under cyclic loading is experimentally investigated. The geometrical and the reinforcement characteristics of the RC structural members of the frames represent typical old RC frame structure without consideration of seismic design criteria. The columns of the frames are vulnerable to shear failure under lateral load due to their low height-to-depth ratio and insufficient transverse reinforcement. The proposed Structural Health Monitoring (SHM) system comprises of specially manufactured autonomous portable devices that acquire the in-situ voltage frequency responses of a network of twenty piezoelectric transducers mounted to the RC frames. Measurements of external and internal small-sized piezoelectric patches are utilized for damage localization and assessment at various and increased damage levels as the magnitude of the imposed lateral cycle deformations increases. A bare RC frame and a strengthened one using a pair of steel crossed tension-ties (X-bracing) have been tested in order to check the sensitivity of the developed WiAMS in different structural conditions since crack propagation, damage locations and failure mode of the examined frames vary. Indeed, the imposed loading caused brittle shear failure to the column of the bare frame and the formation of plastic hinges at the beam ends of the X-braced frame. Test results highlighted the ability of the proposed SHM to identify incipient damages due to concrete cracking and steel yielding since promising early indication of the forthcoming critical failures before any visible sign has been obtained.

Effect of Micro-Cracks on Chloride Ions Penetration of Concrete II: Examination of Critical Crack Width (미세균열이 콘크리트의 염소이온 침투에 미치는영향 II: 임계 균열폭의 고찰)

  • Yoon, In-Seok
    • Journal of the Korea Concrete Institute
    • /
    • v.19 no.6
    • /
    • pp.707-715
    • /
    • 2007
  • The vulnerability of concrete to its environment is significantly dependent on the fact that concrete is a porous material. For well-consolidated and well-cured concrete, its service life is a very long and an entrance of aggressive substance might be only pores. However, for cracked concrete, cracks should be preferential channel for the penetration of aggressive substance such as chloride ions. The effect of crack on chloride penetration depends on its size for example, crack width and crack depth. The purpose of this study is examining the effect of crack width and crack depth on chloride penetration. In order to visualize chloride penetration via cracks, RCM (rapid chloride migration) testing is accomplished. Crack width is examined using an optical microscope and CMOD value is used to estimate average crack width. From the examination on the trend of chloride diffusion coefficients of concrete specimens with various crack widths, a critical crack width and a critical crack depth are found out.

A study on vulnerabilities of serial based DNP in power control fields (전력 제어시스템의 시리얼 기반 DNP통신 취약점에 관한 연구)

  • Jang, Ji Woong;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1143-1156
    • /
    • 2013
  • Power control system like SCADA(Supervisory Control And Data Acquisition) is gathering information using RS232C and low-speed analog communication network. In general, these methods are known as secure because of the secure characteristics from the analog based communication network and serial communication. In this study, first we build DNP communication environment using commercial power control simulator and find some vulnerabilities by testing from the viewpoint of confidentiality, integrity and availability. Consequently, we see the necessity of a valid method for authentication and data encryption when gathering information, even though that is known as secure so far. Discussion of needs of DNP authentication and data encryption is started about several years ago, but there is still nowhere applied that on real environment because the current methods can not fully meet the security requirements of the real environment. This paper suggests a solution to the vulnerabilities, and propose some considerations for enhancing power control system's security level by applying DNP authentication and data encryption.

Association Study of ANK3 Polymorphism and Risk of Schizophrenia (ANK3 유전자 다형성과 조현병의 연관성에 대한 연합연구)

  • Yang, So Yung;Huh, Ik-Soo;Cho, Eun Young;Choi, Mi Ji;Park, Taesung;Lee, Yu-Sang;Hong, Kyung Sue
    • Korean Journal of Biological Psychiatry
    • /
    • v.22 no.4
    • /
    • pp.173-178
    • /
    • 2015
  • Objectives Previous genome-wide association studies have indicated the association between ankyrin 3 (ANK3) and the vulnerability of schizophrenia. We investigated the association between single nucleotide polymorphisms (SNPs) covering the whole ANK3 locus and schizophrenia in the Korean population. Methods The study subjects were 582 patients with schizophrenia and 502 healthy controls. Thirty-eight tag SNPs on ANK3 and five additional SNPs showing significant association with schizophrenia in previous studies were genotyped. Results Three (rs10994181, rs16914791, rs1938526) of 43 SNPs showed a nominally significant association (p < 0.05) with at least one genotype model. But none of these associations remained significant after adjusting for multiple testing errors with Bonferroni's correction. Conclusions We could not identify a significant association between ANK3 and schizophrenia in the Korean population. However, three SNPs showing an association signal with nominal significance need to be investigated in future studies with higher statistical power and more specific phenotype crossing the current diagnostic categories.

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

Fatigue Life Evaluation of Fiber Reinforced Composite Rotor Blades Considering Impact Damages (충격손상을 고려한 섬유강화 복합재 로터 블레이드의 피로수명 평가)

  • Kee, Young-Jung;Park, Jae-Hun;Kim, Sung-Man;Kim, Gi-Hun
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.spc
    • /
    • pp.22-30
    • /
    • 2020
  • Composite rotor blades for rotorcraft have an intrinsic vulnerability to foreign object impact from its inherent structural characteristics of insufficient strength in the thickness direction, which may easily lead to internal structure damage. Therefore, defects and strength reducing effects caused by foreign object impact should be considered in fatigue evaluation of composite blades. For this purpose, the flaw tolerant safe-life and fail-safe concepts were adopted in fatigue evaluation since 1980s, and recently those concepts have been replaced by the damage tolerance concept. In this paper, the relevant standards for fatigue evaluation are analyzed focusing on fiber reinforced composite rotor blades used in rotorcraft. In addition, fatigue evaluation procedure of composite blades considering impact damages is proposed by reviewing the practices implemented through domestic development projects.

A Study on Security Requirments Analysis through Security Threat Modeling of Home IoT Appliance (Home IoT 가전의 보안위협모델링을 통한 보안요구사항 분석에 관한 연구)

  • Yun, Suk-Jin;Kim, Jungduk
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.113-124
    • /
    • 2019
  • Today many companies are offering IoT-enabled products and place emphasis on security from the planning stage to protect their products and user information from external threats. The present security levels, however, remain low because the time and resources invested in developing security requirements for each device are far from enough to meet the needs of a wide range of IoT products. Nevertheless, vulnerabilities of IoT devices have been reported continuously, which calls for more detailed security requirements for home IoT devices. In this context, this research identified threats of home IoT systems by using Microsoft Threat Modeling Tool. It then suggested measures to enhance the security of home IoT devices by developing security assessment items through comparative analysis of the identified threats, domestic and global vulnerability assessment standards and related research. It also verified the effectiveness of the developed security requirements by testing them against the existing ones, and the results revealed the security requirements developed in this research proved to be more effective in identifying vulnerabilities.

A DOM-Based Fuzzing Method for Analyzing Seogwang Document Processing System in North Korea (북한 서광문서처리체계 분석을 위한 Document Object Model(DOM) 기반 퍼징 기법)

  • Park, Chanju;Kang, Dongsu
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.5
    • /
    • pp.119-126
    • /
    • 2019
  • Typical software developed and used by North Korea is Red Star and internal application software. However, most of the existing research on the North Korean software is the software installation method and general execution screen analysis. One of the ways to identify software vulnerabilities is file fuzzing, which is a typical method for identifying security vulnerabilities. In this paper, we use file fuzzing to analyze the security vulnerability of the software used in North Korea's Seogwang Document Processing System. At this time, we propose the analysis of open document text (ODT) file produced by Seogwang Document Processing System, extraction of node based on Document Object Mode (DOM) to determine test target, and generation of mutation file through insertion and substitution, this increases the number of crash detections at the same testing time.