• Title/Summary/Keyword: 위조 방지

Search Result 106, Processing Time 0.029 seconds

Cognitive Approach to Anti-Phishing and Anti-Pharming: Survey (피싱/파밍 예방을 위한 인지기반 접근 방법)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.33-39
    • /
    • 2013
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser. However, they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS Pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or Pharming is presented by using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or Pharming. Therefore, proposed method effective cognitive approach against phishing and Pharming attacks.

  • PDF

Code Automatic Analysis Technique for Virtualization-based Obfuscation and Deobfuscation (가상화 기반 난독화 및 역난독화를 위한 코드 자동 분석 기술)

  • Kim, Soon-Gohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.724-731
    • /
    • 2018
  • Code obfuscation is a technology that makes programs difficult to understand for the purpose of interpreting programs or preventing forgery or tampering. Inverse reading is a technology that analyzes the meaning of origin through reverse engineering technology by receiving obfuscated programs as input. This paper is an analysis of obfuscation and reverse-toxicization technologies for binary code in a virtualized-based environment. Based on VMAttack, a detailed analysis of static code analysis, dynamic code analysis, and optimization techniques were analyzed specifically for obfuscation and reverse-dipidization techniques before obfuscating and reverse-dipulation techniques. Through this thesis, we expect to be able to carry out various research on virtualization and obfuscation. In particular, it is expected that research from stack-based virtual machines can be attempted by adding capabilities to enable them to run on register-based virtual machines.

A Survey of Decentralized Finance(DeFi) based on Blockchain

  • Kim, Junsang;Kim, Seyong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.59-67
    • /
    • 2021
  • Blockchain technology began in 2008 when an unidentified person named Satoshi Nakamoto proposed a cryptocurrency called Bitcoin. Satoshi Nakamoto had distrust of the existing financial system and wanted to implement a financial system that is robust against hacking or mannipulation without a middleman such as a bank through blockchain technology. Satoshi proposed a blockchain as a technology to prevent the creation of the bitcoin and forging of transactions, and through this, the functions of issuance, transaction, and verification of currency were implemented. Since then, Ethereum, a cryptocurrency that can implement the smart contract on the blockchain, has been developed, allowing financial products that require complex contracts such as deposits, loans, insurance, and derivatives to be brought into the area of cryptocurrency. In addition, it is expanding the possibility of substituting products provided by financial institutions through combination with real assets. These applications are defined as Decentralized Finance (DeFi). This paper was prepared to understand the overall technical understanding of DeFi and to introduce the services currently in operation. First, the technologies and ecosystems that implement the overall DeFi are explained, and then the representative DeFi services are categorized by feature and described.

Blockchain-based Smart Meter Authentication Protocol in Smart Grid Environment (스마트 그리드 환경에서 블록체인 기반 스마트 미터 인증 프로토콜)

  • Jonghyun Kim;Myeonghyun Kim;Youngho Park
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.5
    • /
    • pp.41-54
    • /
    • 2023
  • Smart grid that supports efficient energy production and management is used in various fields and industries. However, because of the environment in which services are provided through open networks, it is essential to resolve trust issues regarding security vulnerabilities and privacy preservation. In particular, the identification information of smart meter is managed by a centralized server, which makes it vulnerable to security attacks such as device stolen, data forgery, alteration, and deletion. To solve these problems, this paper proposes a blockchain based authentication protocol for a smart meter. The proposed scheme issues an unique decentralized identifiers (DIDs) for individual smart meter through blockchain and utilizes a random values based on physical unclonable function (PUF) to strengthen the integrity and reliability of data. In addition, we analyze the security of the proposed scheme using informal security analysis and AVISPA simulation, and show the efficiency of the proposed scheme by comparing with related work.

Secure Routing Mechanism using one-time digital signature in Ad-hoc Networks (애드혹 네트워크에서의 one-time 전자 서명을 이용한 라우팅 보안 메커니즘)

  • Pyeon, Hye-Jin;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.623-632
    • /
    • 2005
  • In ad-hoc network, there is no fixed infrastructure such as base stations or mobile switching centers. The security of ad-hoc network is more vulnerable than traditional networks because of the basic characteristics of ad-hoc network, and current muting protocols for ad-hoc networks allow many different types of attacks by malicious nodes. Malicious nodes can disrupt the correct functioning of a routing protocol by modifying routing information, by fabricating false routing information and by impersonating other nodes. We propose a routing suity mechanism based on one-time digital signature. In our proposal, we use one-time digital signatures based on one-way hash functions in order to limit or prevent attacks of malicious nodes. For the purpose of generating and keeping a large number of public key sets, we derive multiple sets of the keys from hash chains by repeated hashing of the public key elements in the first set. After that, each node publishes its own public keys, broadcasts routing message including one-time digital signature during route discovery and route setup. This mechanism provides authentication and message integrity and prevents attacks from malicious nodes. Simulation results indicate that our mechanism increases the routing overhead in a highly mobile environment, but provides great security in the route discovery process and increases the network efficiency.

Luminescent Properties and Anti-Counterfeiting Applications of SrWO4:RE3+ (RE=Dy, Sm, Dy/Sm) Phosphors Doped with Several Activator Ions (다양한 활성제 이온이 도핑된 SrWO4:RE3+ (RE=Dy, Sm, Dy/Sm) 형광체의 특성과 위조 방지 응용)

  • Yoon, Soohwan;Cho, Shinho
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.33 no.5
    • /
    • pp.393-399
    • /
    • 2020
  • A series of phosphors, SrWO4:5 mol% Dy3+, SrWO4:5 mol% Sm3+, and SrWO4:5 mol% Dy3+:x Sm3+ (x=1~15 mol%), were prepared using a facile co-precipitation. The crystal structure, morphology, photoluminescence properties, and application in anti-counterfeiting fields were investigated. The crystalline structures of the prepared phosphors were found to be tetragonal systems with the dominant peak occurring at the (112) plane. The excitation spectra of the Dy3+ singly-doped SrWO4 phosphors were composed of an intense charge-transfer band centered at 246 nm in the range of 210~270 nm and two weak peaks at 351 nm and 387 nm due to the 6H15/26P7/2 and 6H15/24I13/2 transitions of Dy3+ ions, respectively. The wavelength of 246 nm was optimum for exciting the luminescence of Dy3+ and Sm3+ co-doped SrWO4 phosphors. The emission spectra consisted of two intense blue and yellow emission bands at 480 nm and 573 nm corresponding to the 4F9/26H15/2 and 4F9/26H13/2 transitions of Dy3+, and two strong emission peaks at 599 nm and 643 nm originating from the 4G5/26H7/2 and 4G5/26H9/2 transitions of Sm3+, respectively. As the concentration of Sm3+ ions increased, the emission intensities of Dy3+ rapidly decreased, while the emission intensities of Sm3+ gradually increased. These results suggest that the color of the emission light can be tuned from yellow to white by changing the concentration of Sm3+ ions at a fixed 5 mol% Dy3+. Furthermore, the fluorescent security inks were synthesized for use in anti-counterfeiting applications.

A Protection System of Medical Information using Multiple Authentication (다중 인증 기술을 이용한 의료정보 보호시스템)

  • Kim, Jin-Mook;Hong, Seong-Sik
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.3-8
    • /
    • 2014
  • Recently, A utilization request of the U-Healthcare services are increasing rapidly. This is because the increase in smartphone users and ubiquitous computing technology was developed. Furthermore, the demand for access to and use of medical information systems is growing rapidly with a smartphone. This system have the advantage such as they can access from anywhere and anytime in the healthcare information system using their smartphone quickly and easily. But this system have various problems that are a privacy issue, the location disclosure issue, and the potential infringement of personal information. this problems are arise very explosive. Therefore, we propose a secure information security system that can solve the security problems in healthcare information systems for healthcare workers using smartphone. Our proposed system, doctors record, store, modify and manage patient medical information and this system would be safer than the existing healthcare information systems. The proposed system allows the doctor to perform further authentication by transmitting using SMS to GOTP message when they accessing medical information systems. So our proposed system can support to more secure system that can protect user individual information stealing and modify attack by two-factor authentication scheme. And this system can support confidentiality, integrity, location information blocking, personal information steal prevent using cryptography algorithm that is easy and fast.

Physiological Responses for Soil Water Stresses in 'Mihong' Peach Tree (복숭아 '미홍'의 토양 수분 스트레스에 따른 생리반응)

  • Kwon, Yong Hee;Lee, Jae Man;Han, Hyun Hee;Ryu, Suhyun;Jeong, Jae Hoon;Do, Gyung-Ran;Han, Jeom Hwa;Lee, Han-Chan;Park, Hee-Seung
    • Journal of Bio-Environment Control
    • /
    • v.25 no.4
    • /
    • pp.255-261
    • /
    • 2016
  • The present study was conducted to characterize physiological responses of aerial part according to soil water stresses in 'Mihong' peach trees. Discolorations, wilting and falling of leaves were observed in chronological order as response for waterlogging and no irrigation and the phenomena started from basal to end of shoots. Shoot growth in elongation and thickness decreased and fallen leaves were severe in waterlogged trees. Function of water uptake by roots and photosynthesis and leaf respiration decreased by waterlogging. Leaf chlorophyll contents decreased in both treatments. In waterlogging treatment, decrease of chlorophyll was observed in normal leaves with waterlogging using light microscopy. Starch content was lower in both treatment and carbohydrate content was lower in root with waterlogging. These results demonstrated that waterlogging weakened the function of soil water uptake and movement and decreased photosynthesis and fallen leaves. Finally the peach trees would wither or suffer low temperature damage through the shortage of reserve accumulations. We suggested that waterlogging damage in peach trees could be reduced to take notice of irrigation and install drainage facility to improve soil condition.

Synthesis and Properties of SrMoO4 Phosphors Doped with Various Rare Earth Ions for Anti-Counterfeiting Applications (위조 방지 분야에 응용 가능한 다양한 희토류 이온이 도핑된 SrMoO4 형광체의 제조 및 특성)

  • Moon, Tae-Ok;Jung, Jae-Yong;Cho, Shinho
    • Korean Journal of Materials Research
    • /
    • v.30 no.8
    • /
    • pp.406-412
    • /
    • 2020
  • SrMoO4:RE3+ (RE=Dy, Sm, Tb, Eu, Dy/Sm) phosphors are prepared by co-precipitation method. The effects of the type and the molar ratio of activator ions on the structural, morphological, and optical properties of the phosphor particles are investigated. X-ray diffraction data reveal that all the phosphors have a tetragonal system with a main (112) diffraction peak. The emission spectra of the SrMoO4 phosphors doped with several activator ions indicate different multicolor emissions: strong yellow-emitting light at 573 nm for Dy3+, red light at 643 nm for Sm3+, green light at 545 nm for Tb3+, and reddish orange light at 614 nm for Eu3+ activator ions. The Dy3+ singly-doped SrMoO4 phosphor shows two dominant emission peaks at 479 and 573 nm corresponding to the 4F9/26H15/2 magnetic dipole transition and 4F9/26H13/2 electric dipole transition, respectively. For Dy3+ and Sm3+ doubly-doped SrMoO4 phosphors, two kinds of emission peaks are observed. The two emission peaks at 479 and 573 nm are attributed to 4F9/26H15/2 and 4F9/26H13/2 transitions of Dy3+ and two emission bands centered at 599 and 643 nm are ascribed to 4G5/26H7/2 and 4G5/26H9/2 transitions of Sm3+. As the concentration of Sm3+ increases from 1 to 5 mol%, the intensities of the emission bands of Dy3+ gradually decrease; those of Sm3+ slowly increase and reach maxima at 5 mol% of Sm3+ ions, and then rapidly decrease with increasing molar ratio of Sm3+ ions due to the concentration quenching effect. Fluorescent security inks based on as-prepared phosphors are synthesized and designed to demonstrate an anti-counterfeiting application.

Case History of Sea Dyke Filter Construction Using Geotextile Tube Mattress (튜브형 매트리스를 활용한 방조제 필터공 축조사례연구)

  • Oh, Young-In;Yoo, Jeon-Yong;Kim, Hyun-Tae
    • Journal of the Korean Geosynthetics Society
    • /
    • v.6 no.1
    • /
    • pp.9-16
    • /
    • 2007
  • Geotextile is one of the most useful and effective polymer material in civil construction works and the main function of geotextile is separation, reinforcement, filtering and drainage. Recently, because of the shortage of natural rock, traditional forms of river and coastal structures have become very expensive to build and maintain. Therefore, the materials used in hydraulic and coastal structures are changing from the traditional rubble and concrete systems to the cheaper materials and systems. One of these alternatives employs geotextile tube technology in the construction of coastal and shore protection structures, such as embankment, see dyke, groins, jetties, detached breakwaters and so on. Geotextile tube technology has changed from being an alternative construction technique and, in fact, has advanced to become the most effective solution of choice. This paper presents case history of sea dyke filter construction using geotextile tube mattress and also, various issues related to the tube mattress design and construction technology.

  • PDF