• Title/Summary/Keyword: 위변조

Search Result 473, Processing Time 0.019 seconds

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

A Countermeasures on Credit Card Crime Using Personal Credit Information (개인신용정보이용 신용카드범죄에 대한 대처방안)

  • Kim, Jong-Soo
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.27-68
    • /
    • 2005
  • Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.

  • PDF

The Effect of Information Security Breach and Security Investment Announcement on the Market Value of Korean Firms (정보보안 사고와 사고방지 관련 투자가 기업가치에 미치는 영향)

  • Kwon, Young-Ok;Kim, Byung-Do
    • Information Systems Review
    • /
    • v.9 no.1
    • /
    • pp.105-120
    • /
    • 2007
  • With the fast development of the Internet and the increasing dependence on information infrastructures, companies are faced with various information security threats such as information leakages, modifications, and information breaches. South Korea is one of the leading countries in the Internet usage, but is ranked relatively low when it comes to information security. In fact, many Korean firms have suffered financial losses and damaged corporate images from the information security breaches. However, because of the difficulties in quantifying the costs of the information security breaches, Korean companies tend to delay their investment decisions on information security. The purpose of this study is to measure the cost of information security breach and the economic value of security investment using the event study methodology. Our results show that the announcement of an information security breach negatively influenced the market value of the corresponding company. The effect was statistically significant at the significance level of p=0.05. The breached companies lose, on average, 0.86% of their market values on the day of the announcement - an average loss in market capitalization of $55 million. On the other hand, the investment on information security had no effect on the stock price or the market value of the firm.

A study on the Frequency Dependence of Dynamic Pyroelectric Properties for $Pb_{l-x}La_{x}Ti_{l-x/4}O_3$ (x=0.1) (PLT(10)) Ferroelectric Thin Film ($Pb_{l-x}La_{x}Ti_{l-x/4}O_3$ (x=0.1) (PLT(10)) 강유전체 박막에서 동적 초전특성의 주파수의존성에 관한 연구)

  • 차대은;장동훈;강성준;윤영섭
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.12
    • /
    • pp.1008-1015
    • /
    • 2002
  • The fabricated La-modified lead titanate (PLT) thin film without poling treatment was investigated for modulation frequency dependence of pyroelectric properties by the dynamic method. $Pb_{l-x}La_{x}Ti_{l-x/4}O_3$(x=0.1) (PLT(10)) thin film haying 10 mol% La content was deposited on a Pt/$TiO_{x}$/$SiO_2$/Si substrate by sol-gel method. The PLT(10) thin film exhibits a relatively excellent dielectric property. The pyroelectric coefficient (p) of the PLT(10) thin film is 6.6 x $10^{-9}C$$textrm{cm}^2$$.$K without frequency dependence. The figure of merits for the voltage responsivity and specific detectivity are 1.03 x $10^{-11}C$.cm/J and 1.46 x $10^{-10}C$.cm/J, respectively The PLT(10) thin film has voltage responsivity (RV) of 5.IS V/W at 8 Hz. Noise equivalent power (NEP) and specific detectivity ($D^{*}$) of the PLT(10) thin film are 9.93 x $10^{-8}$W/$Hz^{1/2}$ and 1.81 x $10^{6}$cm.$Hz^{1/2}$/W at the same frequency of 100 Hz,, respectively The results means that PLT thin film having 10 mol% La content is suitable for the sensing materials of pyroelectric IR sensors.

Security Threats Analysis for Network-based Mobile IPv6 (네트워크 기반 Mobile IPv6 보안 취약점 분석)

  • Kim, Hyun-Gon;Seo, Jae-Hyeon;Oh, Byeong-Kyun;Ahn, Tae-Nam;Kim, Jin-Hyung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.137-147
    • /
    • 2007
  • In the host-based Mobile IPv6, a mobile node is responsible for doing the signaling to its home agent to enable session continuity as it moves between subnets. To remove the mobile node's signalling processing load, the network-based Mobile IPv6 has been proposed recently. It allows session continuity for a mobile node without its involvement in mobility management. The proxy mobility agent in the network performs the signaling and does the mobility management on behalf of the mobile node. However, to make secure communications for a mobile node, security mechanisms against diverse attacks should be adopted. To do this, first of all security threats to the network-based Mobile IPv6 should be also identified and analyzed. Potential attack objectives may be to consume network services at the cost of a legitimate mobile node and, eavesdropping and fabrication of user traffic through interception of a mobile node's communications. This paper identifies and discusses security threats to the network-based Mobile IPv6 in details. The results of threats analysis are limited to threats that are peculiar to the network-based Mobile IPv6 except threats to IPv6 in general.

Analysis on Power Consumption Characteristics of SHA-3 Candidates and Low-Power Architecture (SHA-3 해쉬함수 소비전력 특성 분석 및 저전력 구조 기법)

  • Kim, Sung-Ho;Cho, Sung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.115-125
    • /
    • 2011
  • Cryptographic hash functions are also called one-way functions and they ensure the integrity of communication data and command by detecting or blocking forgery. Also hash functions can be used with other security protocols for signature, authentication, and key distribution. The SHA-1 was widely used until it was found to be cryptographically broken by Wang, et. al, 2005. For this reason, NIST launched the SHA-3 competition in November 2007 to develop new secure hash function by 2012. Many SHA-3 hash functions were proposed and currently in review process. To choose new SHA-3 hash function among the proposed hash functions, there have been many efforts to analyze the cryptographic secureness, hardware/software characteristics on each proposed one. However there are few research efforts on the SHA-3 from the point of power consumption, which is a crucial metric on hardware module. In this paper, we analyze the power consumption characteristics of the SHA-3 hash functions when they are made in the form of ASIC hardware module. Also we propose power efficient hardware architecture on Luffa, which is strong candidate as a new SHA-3 hash function. Our proposed low power architecture for Luffa achieves 10% less power consumption than previous Luffa hardware architecture.

Design of 77 GHz Automotive Radar System (77 GHz 차량용 레이더 시스템 설계)

  • Nam, Hyeong-Ki;Kang, Hyun-Sang;Song, Ui-Jong;Cui, Chenglin;Kim, Seong-Kyun;Nam, Sang-Wook;Kim, Byung-Sung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.9
    • /
    • pp.936-943
    • /
    • 2013
  • This work presents the design and measured results of the single channel automotive radar system for 76.5~77 GHz long range FMCW radar applications. The transmitter uses a commercial GaAs monolithic microwave integrated circuit(MMIC) and the receiver uses the down converter designed using 65 nm CMOS process. The output power of the transmitter is 10 dBm. The down converter chip can operate at low LO power as -8 dBm which is easily supplied from the transmitter output using a coupled line coupler. All MMICs are mounted on an aluminum jig which embeds the WR-10 waveguide. A microstrip to waveguide transition is designed to feed the embedded waveguide and finally high gain horn antennas. The overall size of the fabricated radar system is $80mm{\times}61mm{\times}21mm$. The radar system achieved an output power of 10 dBm, phase noise of -94 dBc/Hz at 1 MHz offset and a conversion gain of 12 dB.

3-D Analysis of Semiconductor Surface by Using Photoacoustic Microscopy (광음향 현미경법을 이용한 반도체 표면의 3차원적 구조 분석)

  • Lee, Eung-Joo;Choi, Ok-Lim;Lim, Jong-Tae;Kim, Ji-Woong;Choi, Joong-Gill
    • Journal of the Korean Chemical Society
    • /
    • v.48 no.6
    • /
    • pp.553-560
    • /
    • 2004
  • In this experiment, a three dimensional structure analysis was carried out to examine the surface defects of semiconductor made artificially on known scale. It was investigated the three dimensional imaging according to the sample depth and the thermal diffusivity as well as the carrier transport properties. The thermal diffusivity measurement of the intrinsic GaAs semiconductor was also analyzed by the difference of frequency-dependence photoacoustic signals from the sample surface of different conditions. Thermal properties such as thermal diffusion length or thermal diffusivity of the Si wafer with and without defects on the surface were obtained by interpreting the frequency dependence of the PA signals. As a result, the photoacoustic signal is found to have the dependency on the shape and depth of the defects so that their structure of the defects can be analyzed. This method demonstrates the possibility of the application to the detection of the defects, cracks, and shortage of circuits on surface or sub-surface of the semiconductors and ceramic materials as a nondestructive testing(NDT) and a nondestructive evaluation(NDE) technique.

A Study on the Reduction of Organ Motion from Respiration (호흡 운동에 의한 내부 장기의 움직임 감소에 관한 연구)

  • Kim Jae-Gyoun;Lee Dong-Han;Lee Dong-Hoon;Kim Mi-Sook;Cho Chul-Koo;Yoo Seong-Yul;Yang Kwang-Mo;Oh Won-Yong;Ji Young-Hoon
    • Progress in Medical Physics
    • /
    • v.15 no.4
    • /
    • pp.179-185
    • /
    • 2004
  • To deal with tumor motion from respiration is one of the important issues for the advanced treatment techniques, such as the intensity modulated radiation therapy (IMRT), the image guided radiation therapy (IGRT), the three dimensional conformal therapy (3D-CRT) and the Cyber Knife. Studies including the active breath control (ABC) and the gated radiation therapy have been reported. Authors have developed the device for reducing the respiration effects and the diaphragm motions with this device were observed to determined the effectiveness of the device. The device consists of four belts to immobilize diaphragm motion and the vacuum cushion. Diaphragm motions without and with device were monitored fluoroscopically. Diaphragm motion ranges were found to be 1.14 ~ 3.14 cm (average 2.14 cm) without the device and 0.72~1.95 cm (average 1.16 cm) with the device. The motion ranges were decreased 20 ~ 68.4% (average 44.9%.) However, the respiration cycle was increased from 4.4 seconds to 3.7 seconds. The CTV-PTV margin could be decreased significantly with the device developed in this study, which may be applied to the treatments of the tumor sited diaphragm region.

  • PDF

Discrepancies between Calculated and Delivered Dose Distributions of Respiratory Gated IMRT Fields according to the Target Motion Ranges for Lung and Liver Cancer Patients (호흡연동방사선치료시 폐암과 간암환자의 병소 움직임 크기에 따른 선량분포 차이 분석)

  • Kim, Youngkuk;Lim, Sangwook;Choi, Ji Hoon;Ma, Sun Young;Jeung, Tae Sig;Ro, Tae Ik
    • Progress in Medical Physics
    • /
    • v.25 no.4
    • /
    • pp.242-247
    • /
    • 2014
  • To see the discrepancies between the calculated and the delivered dose distribution of IMRT fields for respiratory-induced moving target according to the motion ranges. Four IMRT plans in which there are five fields, for lung and liver patients were selected. The gantry angles were set to $0^{\circ}$ for every field and recalculated using TPS (Eclipse Ver 8.1, Varian Medical Systems, Inc., USA). The ion-chamber array detector (MatriXX, IBA Dosimetry, Germany) was placed on the respiratory simulating platform and made it to move with ranges of 1, 2, and 3 cm, respectively. The IMRT fields were delivered to the detector with 30~70% gating windows. The comparison was performed by gamma index with tolerance of 3 mm and 3%. The average pass rate was 98.63% when there's no motion. When 1.0, 2.0, 3.0 cm motion ranges were simulated, the average pass rate were 98.59%, 97.82%, and 95.84%, respectively. Therefore, ITV margin should be increased or gating windows should be decreased for targets with large motion ranges.