• Title/Summary/Keyword: 사전취약

Search Result 361, Processing Time 0.028 seconds

Intermediate-Representation Translation Techniques to Improve Vulnerability Analysis Efficiency for Binary Files in Embedded Devices (임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술)

  • Jeoung, Byeoung Ho;Kim, Yong Hyuk;Bae, Sung il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2018
  • Utilizing sequence control and numerical computing, embedded devices are used in a variety of automated systems, including those at industrial sites, in accordance with their control program. Since embedded devices are used as a control system in corporate industrial complexes, nuclear power plants and public transport infrastructure nowadays, deliberate attacks on them can cause significant economic and social damages. Most attacks aimed at embedded devices are data-coded, code-modulated, and control-programmed. The control programs for industry-automated embedded devices are designed to represent circuit structures, unlike common programming languages, and most industrial automation control programs are designed with a graphical language, LAD, which is difficult to process static analysis. Because of these characteristics, the vulnerability analysis and security related studies for industry automation control programs have only progressed up to the formal verification, real-time monitoring levels. Furthermore, the static analysis of industrial automation control programs, which can detect vulnerabilities in advance and prepare for attacks, stays poorly researched. Therefore, this study suggests a method to present a discussion on an industry automation control program designed to represent the circuit structure to increase the efficiency of static analysis of embedded industrial automation programs. It also proposes a medium term translation technology exploiting LLVM IR to comprehensively analyze the industrial automation control programs of various manufacturers. By using LLVM IR, it is possible to perform integrated analysis on dynamic analysis. In this study, a prototype program that converts to a logical expression type of medium language was developed with regards to the S company's control program in order to verify our method.

A Study on the Special Needs of the Hearing-Impaired Person for Disaster Response (청각장애인 재난대응 욕구에 관한 연구)

  • Kim, Soungwan;Kim, Hey Sung;Roh, Sungmin
    • 재활복지
    • /
    • v.21 no.2
    • /
    • pp.63-88
    • /
    • 2017
  • This study evaluated the actual status of special needs of the hearing-impaired person for disaster response. The analysis revealed a significant level of unmet needs in disaster response for hearing-impaired person. The 5 special needs in disaster response include: 1) communication needs, which involve securing the means to make an emergency rescue request and communicating information during the rescue process; 2) transportation needs, which indicate the effective evacuation capacity and the level of training; 3) medical needs, which address the degree of preparedness for physical and mental emergency measures and the delivery of health information for rescue and first aid process; 4) maintaining functional independence needs, which refer to the level of self-preparedness to minimize damage in disaster situations, and; 5) supervision needs, which correspond to a personalized support system provided to disaster-vulnerable groups.

Development of Empirical Fragility Function for High-speed Railway System Using 2004 Niigata Earthquake Case History (2004 니가타 지진 사례 분석을 통한 고속철도 시스템의 지진 취약도 곡선 개발)

  • Yang, Seunghoon;Kwak, Dongyoup
    • Journal of the Korean Geotechnical Society
    • /
    • v.35 no.11
    • /
    • pp.111-119
    • /
    • 2019
  • The high-speed railway system is mainly composed of tunnel, bridge, and viaduct to meet the straightness needed for keeping the high speed up to 400 km/s. Seismic fragility for the high-speed railway infrastructure can be assessed as two ways: one way is studying each element of infrastructure analytically or numerically, but it requires lots of research efforts due to wide range of railway system. On the other hand, empirical method can be used to access the fragility of an entire system efficiently, which requires case history data. In this study, we collect the 2004 MW 6.6 Niigata earthquake case history data to develop empirical seismic fragility function for a railway system. Five types of intensity measures (IMs) and damage levels are assigned to all segments of target system for which the unit length is 200 m. From statistical analysis, probability of exceedance for a certain damage level (DL) is calculated as a function of IM. For those probability data points, log-normal CDF is fitted using MLE method, which forms fragility function for each damage level of exceedance. Evaluating fragility functions calculated, we observe that T=3.0 spectral acceleration (SAT3.0) is superior to other IMs, which has lower standard deviation of log-normal CDF and low error of the fit. This indicates that long-period ground motion has more impacts on railway infrastructure system such as tunnel and bridge. It is observed that when SAT3.0 = 0.1 g, P(DL>1) = 2%, and SAT3.0 = 0.2 g, P(DL>1) = 23.9%.

A Study on the Application of School Guard to School Police System (학교지킴이의 청원경찰 적용 방안에 관한 연구)

  • Park, Yong Soo
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.177-186
    • /
    • 2013
  • It has been long time since the social concern about school safety was fully raised in our country. The accidents, such as sexual violence against young children, traffic accident when going to and from school, psychological violence by bullying, extorting money & violence and so on, frequently happen. Under the circumstances that this kind of school safety problems are concerned greatly by society, it is very important for schools to create the environment in which children can have a safe living. The study focuses on the necessity and introduction of a professional school police system to establish the sexual violence prevention system in advance. The system, practically and systematically organized, can prevent various kinds of safety accidents and form the agreement of family, regional society, and related institutions alike. It is also supposed to emphasize the strengthening of school safety by its operation.

Integrated Approach for Rehabilitating the Hydrologic Cycle in the Anyangcheon Watershed(I): Identification of the Status (안양천 유역의 물순환 건전화를 위한 통합관리방안(I): 현황 파악)

  • Lee Kil Seong;Chung Eun-Sung;Kim Young-Oh
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.1528-1532
    • /
    • 2005
  • 본 연구는 유역통합관리를 위한 사전 단계로 유역의 물순환에 대해 구체적이고 정량적으로 문제점을 파악하는데 그 목적이 있다. 중유역별로 현장답사 및 다양한 지수를 이용하여 치수, 이수, 수질 등의 측면에서 제시될 수 있는 문제점을 파악하였다. 홍수피해잠재능(PFD)을 이용하여 수문요소뿐만 아니라 사회경제적인 요소까지 포괄하여 홍수에 대한 잠재적인 피해 취약도를 조사하였고, 건천화 지수(SDI)를 이용한 하천의 건천 정도를 도출하였으며, 중유역별 불투수 면적 비율(IAR)을 이용하여 수질관리 방안을 분류하였다. 또한, 복개하천 현황, 단순하게 운영되고 있는 저수지 현황, 하천수의 취수, 지하수의 이용, 하천수가 하천바닥으로 손실되는 여부, 오수의 하천 유입 등을 조사하여 치수 이수, 수질관리 측면에서 문제가 되는 중유역을 도출하였다. 이렇게 중유역별로 정량적 또는 정성적으로(qualitatively) 제시하는 방법은 유역통합관리를 위한 조사사업 등에 도움이 될 것이며 향후 유역통합관리 방안을 올바르게 수립하는데 기초 자료로 활용될 수 있다.

  • PDF

A Study of the Reciprocal Borrowing System in Public Libraries (공공도서관 통합대출서비스에 대한 연구)

  • Kwak, Chul-Wan;Kim, Sun-Ae;Chung, Eun-Kyung;Chung, Jin-Soo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.21 no.1
    • /
    • pp.161-174
    • /
    • 2010
  • The purpose of this study is to identify the problems of the reciprocal borrowing service in Korea and to develop the reciprocal borrowing model. Using interview and survey method were used for collecting data. Results show that public librarian had positive thought about reciprocal borrowing service and there were many problems to solve before operating the service. Main problems were: leaking of private information, responsibility of lost materials, budget and staff, borrowing regulation, non-competitive libraries. Also three reciprocal borrowing system models were introduced: integrated system model, distributed system model, and reciprocal arrangement model.

Design and Implementation of User Authentication System Using USIM Information (USIM 정보를 이용한 사용자 인증 방안 설계 및 구현)

  • Lee, Jin-Woo;Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.571-578
    • /
    • 2017
  • In order to approach information system through smart device and pc, user has to authenticate him or herself via user authentication. At that time when user tries reaching the system, well-used user authentication technologies are ID/PW base, OTP, certificate, security card, fingerprint, etc. The ID/PWbased method is familiar to users, however, it is vulnerable to brute force cracking, keylogging, dictionary attack. so as to protect these attacks, user has to change the passwords periodically as per password combination instructions. In this paper, we designed and implemented a user authentication system using smartphone's USIM without using password while enhancing security than existing ID / PW based authentication technology.

ICS Security Risk Analysis Using Attack Tree (공격 트리를 이용한 산업 제어 시스템 보안 위험 분석)

  • Kim, Kyung-Ah;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.6
    • /
    • pp.53-58
    • /
    • 2011
  • There is increasing use of common commercial operation system and standard PCs to control industrial production systems, and cyber security threat for industrial facilities have emerged as a serious problem. Now these network connected ICS(Industrial Control Systems) stand vulnerable to the same threats that the enterprise information systems have faced and they are exposed to malicious attacks. In particular Stuxnet is a computer worm targeting a specific industrial control system, such as a gas pipeline or power plant and in theory, being able to cause physical damage. In this paper we present an overview of the general configuration and cyber security threats of a SCADA and investigate the attack tree analysis to identify and assess security vulnerabilities in SCADA for the purpose of response to cyber attacks in advance.

A New Defense against DDoS Attacks using Reputation (평판을 이용한 새로운 DDoS 공격 대응 방안 연구)

  • Shin, Jung-Hwa;Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.8
    • /
    • pp.1720-1726
    • /
    • 2011
  • The DDoS attacks which are increasing recently must have many zombie PCs before attacking targeted systems by attacker. A zombie PC is infected by attacker's malignant code and may be operated by the his/her special malicious purposes. But most users generally don't know that their PCs are infected and used as zombies by illegal activities covertly. In this paper, we propose a new scheme that decreases vulnerable PCs and isolates them from Internet before being zombie PCs. The proposed scheme point the reputations of connected PCs and decide whether their Internet connections are keeping continuously or not. Also We show the figures how to infect susceptable PCs to zombie PCs, and analyze the decrease effects of DDoS attacks adapted by the proposed scheme with various experiments.

M2M based personage information monitoring system (M2M기반 인물 정보 모니터링 시스템)

  • Lee, Jong-sung;Jeon, Min-ho;Oh, Chang-heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.1000-1003
    • /
    • 2013
  • The monitoring system using a surveillance camera, has the advantage that can be observed in real time the blind spot of the crime, case to be mounted is increasing. However, surveillance camera, is used for the purpose of verification of the crime later than risk detection of crime before advance. Therefore, in this paper, in order to supplement the weak information collection monitoring system using the monitoring camera, by using the position information of the smartphone, infers the person monitoring region, the movement path of the image information other event occurs it is a fusion iT monitoring system that provides information of the user who judged. Result of the experiment, the proposed system confirmed the improved efficiency and usability than conventional systems.

  • PDF