• Title/Summary/Keyword: 대응 오류

Search Result 270, Processing Time 0.023 seconds

Compatibilist Replies to Manipulation Arguments (자유의지에 대한 조작논증과 근원-양립가능주의의 대응)

  • Kim, Sungsu
    • Korean Journal of Logic
    • /
    • v.21 no.3
    • /
    • pp.373-393
    • /
    • 2018
  • Manipulation arguments purport to show that source freedom is incompatible with determinism. According to manipulation arguments, (1) intuitively, an agent manipulated in a certain manner to do A is not free, and (2) there is no significant difference between manipulation and determination. It follows that an agent determined to do A is not free. A compatibilist hard-line reply ('HR') denies (1), whereas a soft-line reply ('SR') denies (2). HR, which is arguably compatibilists' favorite, is assessed from the 'neutral stance.' HR turns out to fall short of adequately rejecting manipulation arguments. Recently Sartorio defends HR by claiming that (1) commits some sort of psychological fallacy. I argue that it does not work. I claim that SR is more promising. I examine the difference between intentional manipulation by design and ordinary determination. I argue that this difference suggests some determination scenario without intentional manipulation to which SR and manipulation arguments make different predictions, and that SR is better supported. Finally, incompatibilist objections are considered and replied.

Polygraph Security Screening as an Internal Control Method to Counter Industrial Espionage in Korea (폴리그라프를 활용한 산업스파이 대응방안)

  • Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.291-311
    • /
    • 2009
  • Amid intensified global competition, securing high technologies is becoming a prerequisite towards achieving developed nation status. Korea has made tremendous efforts into developing technologies for decades and it has now obtained a leading position in many fields. As a result, however, Korea has become a major target of industrial espionage and not a few Korean businesses have already suffered from it. In order to effectively counter industrial espionage, this research explores the use of polygraph security screening as an internal control method through literature review, and discusses matters which need to be considered before the introduction of it into Korea, focusing on the accuracy of security screening. Since polygraph security screening generates deterrent effect by increasing certainty and celerity of punishment, it makes a valuable contribution to the control of industrial espionage. However, the most important problem with the use of the polygraph in security screening is errors of the examination. Thus, polygraph security screening should be used as a part of comprehensive security management program to reduce the possibility of errors. In addition, because factors such as countermeasures and examiner's experience are known to influence the accuracy of the examination, the issues surrounding them should also be addressed.

  • PDF

Secure RSA with CRT Protected Against Fault Attacks without using Checking Procedure (비교연산을 사용하지 않는 오류주입 공격에 안전한 CRT 기반의 RSA)

  • Kim, Sung-Kyoung;Kim, Tae-Hyun;Han, Dong-Guk;Park, Young-Ho;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.17-25
    • /
    • 2008
  • Because Chinese Remainder Theorem based RSA (RSA CRT) offers a faster version of modular exponentiation than ordinary repeated squaring, it is promoting with standard. Unfortunately there are major security issues associated with RSA CRT, since Bellcore announced a fault-based cryptanalysis against RSA CRT in 1996. In 1997, Shamir developed a countermeasure using error free immune checking procedure. And soon it became known that the this checking procedure can not effect as the countermeasures. Recently Yen proposed two hardware fault immune protocols for RSA CRT, and this two protocols do not assume the existence of checking procedure. However, in FDTC 2006, the method of attack against the Yen's two protocols was introduced. In this paper, the main purpose is to present a countermeasure against the method of attack from FDTC 2006 for CRT-RSA. The proposed countermeasure use a characteristic bit operation and dose not consider an additional operation.

A Physical Combined Attack and its Countermeasure on BNP Exponentiation Algorithm (BNP 멱승 알고리듬에 대한 물리적인 조합 공격 및 대응책)

  • Kim, Hyung-Dong;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.585-591
    • /
    • 2013
  • Recently, the combined attack which is a combination of side channel analysis and fault attack has been developed to extract the secret key during the cryptographic processes using a security device. Unfortunately, an attacker can find the private key of RSA cryptosystem through one time fault injection and power signal analysis. In this paper, we diagnosed SPA/FA resistant BNP(Boscher, Naciri, and Prouff) exponentiation algorithm as having threats to a similar combined attack. And we proposed a simple countermeasure to resist against this combined attack by randomizing the private key using error infective method.

Research on the Rescue Maneuvering of POB to Implement Cognitive Simulation (인지 시뮬레이션 구축을 위한 익수자 구조 선박조종법 검토)

  • Yoon, Cheong-Guem;Kim, Deok-Bong;Jeong, Cho-Young
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.07a
    • /
    • pp.259-261
    • /
    • 2015
  • The model for ship maneuvering simulation is to enhance the competence of officer's ship maneuvering skills such as navigation equipment operation, collision avoidances, countermeasure an emergency situation so on. Despite using such ship maneuvering model, critical maritime accidents are occurred periodically in the world. To find adequate simulation model to evaluate competence abilities of deck officer who have maneuvering skills with some competence levels, we search the standard ship maneuvering method representing on the part 3 Person Overboard(POB) to onboard emergences of IAMSAR manual. Moreover we monitor the officer's human factors appearing during education and training and consider the use of human factors as fundamental data.

  • PDF

Fault Analysis Attacks on Control Statement of RSA Exponentiation Algorithm (RSA 멱승 알고리즘의 제어문에 대한 오류 주입 공격)

  • Gil, Kwang-Eun;Baek, Yi-Roo;Kim, Hwan-Koo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.63-70
    • /
    • 2009
  • Many research results show that RSA system mounted using conventional binary exponentiation algorithm is vulnerable to some physical attacks. Recently, Schmidt and Hurbst demonstrated experimentally that an attacker can exploit secret key using faulty signatures which are obtained by skipping the squaring operations. Based on similar assumption of Schmidt and Hurbst's fault attack, we proposed new fault analysis attacks which can be made by skipping the multiplication operations or computations in looping control statement. Furthermore, we applied our attack to Montgomery ladder exponentiation algorithm which was proposed to defeat simple power attack. As a result, our fault attack can extract secret key used in Montgomery ladder exponentiation.

Design of Web based ID Traffic Analysis System (웹기반의 침입탐지 트래픽 분석 시스템 설계)

  • 한순재;오창석
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.144-148
    • /
    • 2003
  • A general administrator's response ability plunged in confusion as intrusion detection system like an existing Snort display much alert messages on administrator's screen. Also, there are some possibilities to cause false positive. In this paper, to solve these problems, we designed Web-based ID(Intrusion Detection) traffic analysis system using correlation, and implemented so that administrator can check easily whole intrusion traffic state in web which dividing into normal and intrusion traffic using Libpcap, Snort, ACID, Nmap and Nessus. As a simulation result, it is proved that alert message number and false positive rate are minimized.

  • PDF

Code Coverage Improvement through Symbolic Execution (Symbolic Execution을 통한 Code Coverage의 향상)

  • Kim, Jin-Hyun;Park, Sun-Woo;Park, Yongsu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.648-651
    • /
    • 2017
  • 프로그램의 코드에 있어서 실행되지 않은 영역은 미지의 영역으로써 각종 에러와 오류의 잠재적 가능성을 지니고 있다. 개발자는 이러한 영역을 모두 검증, 테스팅 해봐야 이후 프로그램의 실행에서 예상치 못한 치명적 오류들에 대응할 수 있을 것이다. 우리는 본 논문에서 소프트웨어 테스팅의 두 가지 기법에 대하여 소개를 하고 이 두 가지를 이용하여 미실행된 영역을 실행시킬 수 있는 방법론을 제안하고자 한다. 실험에서 JaCoCo와 SPF를 사용하여 방법론을 적용하였고 이를 통하여 미실행 영역이 커버되는 테스트 케이스를 자동으로 얻어 낼 수 있었다.

Performance Evaluation of IDS based on Anomaly Detection Using Machine Learning Techniques (기계학습 기법에 의한 비정상행위 탐지기반 IDS의 성능 평가)

  • Noh, Young-Ju;Cho, Sung-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.965-968
    • /
    • 2002
  • 침입탐지 시스템은 전산시스템을 보호하는 대표적인 수단으로, 오용탐지와 비정상행위탐지 방법으로 나눌 수 있는데, 다양화되는 침입에 대응하기 위해 비정상행위 탐지기법이 활발히 연구되고 있다. 비 정상행위기반 침임탐지 시스템에서는 정상행위 구축 방법에 따라 다양한 침입탐지율과 오류율을 보인다. 본 논문에서는 비정상행위기반 침입탐지시스템을 구축하였는데, 사용되는 대표적인 기계학습 방법인 동등 매칭(Equality Matching), 다층 퍼셉트론(Multi-Layer Perceptron), 은닉마르코프 모델(Hidden Markov Model)을 구현하고 그 성능을 비교하여 보았다. 실험결과 다층 퍼셉트론과 은닉마르코프모델이 높은 침입 탐지율과 낮은 false-positive 오류율을 내어 정상행위로 사용되는 시스템감사 데이터에 대한 정보의 특성을 잘 반영하여 모델링한다는 것을 알 수 있었다.

  • PDF

Intrusion Alert Filtering Using System Profile and Attack Bucket (System profile과 Attack bucket을 이용한 침입시도정보 필터링)

  • 장명근;이은영;이상훈;박응기;채송화;김동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.427-429
    • /
    • 2004
  • 인터넷상에서 해킹도구들을 구할 수 있게 되고 이러한 정보들이 쉽고 빠르게 전파됨에 따라 쉽게 해킹을 시도할 수 있게 되었고 이로 인해 침입시도의 수가 급증하고 있다. 그 결과 침입탐지시스템(Intrusion Detection System, IDS)에서 발생하는 침입시도정보의 수도 늘어나고 있다. 또한 이렇게 생성되는 많은 침입시도정보들에서 긍정오류(false positive)와 같은 잘못된 침입시도정보들이 큰 문제이다. 침입으로 오인된 정보가 너무 많음으로 인해 네트워크 관리자가 정확하게 판단을 하여 대응하는데 많은 노력이 요구된다. 이러한 노력을 줄여주기 위하여 긍정오류와 반복되는 침입시도정보를 줄여주는 기법이 필요하다. 본 논문에서는 이러한 필터링 시스템을 제안한다. 시스템 정보를 이용하여 위험이 될 수 없는 공격을 제거하여 관리자에게 정확한 정보를 전달하고 동일한 공격들을 제거하여 침입 시도정보의 수를 줄여 주는 방법을 제안한다.

  • PDF