• Title/Summary/Keyword: 위협의 평가

Search Result 705, Processing Time 0.028 seconds

Thermoreflectance Microscopy for Thermal Analysis of Electronics (전자소자 열분석을 위한 열반사 현미경 기술)

  • Kim, Hyeon-Beom;Lee, Seunghwan;Jang, Hyejin
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.29 no.2
    • /
    • pp.19-31
    • /
    • 2022
  • With the advent of technologies based on big data, the trend of electronics towards high performance and high integration density continues. However, this development of electronics suffers from overheating issues, which seriously threaten the reliability of the devices. To develop effective strategies for thermal management, it is crucial to accurately evaluate the temperature distribution and design the heat dissipation path within the device in the operating condition. This paper introduces thermoreflectance microscopy that can observe the temperature distribution of a device with high spatial and temporal resolutions in a non-contact way. Specifically, the working principle and various forms of thermoreflectance microscopy are presented along with the latest research trends to improve the temperature, space, and time resolutions. We further review several examples in which thermoreflectance microscopy is applied to investigate the temperature and thermal characteristics of electronic devices.

Behavior and Script Similarity-Based Cryptojacking Detection Framework Using Machine Learning (머신러닝을 활용한 행위 및 스크립트 유사도 기반 크립토재킹 탐지 프레임워크)

  • Lim, EunJi;Lee, EunYoung;Lee, IlGu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1105-1114
    • /
    • 2021
  • Due to the recent surge in popularity of cryptocurrency, the threat of cryptojacking, a malicious code for mining cryptocurrencies, is increasing. In particular, web-based cryptojacking is easy to attack because the victim can mine cryptocurrencies using the victim's PC resources just by accessing the website and simply adding mining scripts. The cryptojacking attack causes poor performance and malfunction. It can also cause hardware failure due to overheating and aging caused by mining. Cryptojacking is difficult for victims to recognize the damage, so research is needed to efficiently detect and block cryptojacking. In this work, we take representative distinct symptoms of cryptojacking as an indicator and propose a new architecture. We utilized the K-Nearst Neighbors(KNN) model, which trained computer performance indicators as behavior-based dynamic analysis techniques. In addition, a K-means model, which trained the frequency of malicious script words for script similarity-based static analysis techniques, was utilized. The KNN model had 99.6% accuracy, and the K-means model had a silhouette coefficient of 0.61 for normal clusters.

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment (SDP 환경에서 SVDD 기반 이상행위 탐지 기술을 이용한 디바이스 유효성 검증 방안)

  • Lee, Heewoong;Hong, Dowon;Nam, Kihyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1181-1191
    • /
    • 2021
  • The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.

Structural Analysis and Safety Assessment for Constricted Bridges (협착교량의 구조해석 및 안전성 평가)

  • Jeong, Jae-Hun;Kim, Moon-Ok;Choi, Hyun-Ho;Kim, Jang-Hwan
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.26 no.6
    • /
    • pp.33-38
    • /
    • 2022
  • As the intense heat continues, many cases of highway pavement blow up and bridge expansion joints damages have been inspected. Especially, Expansion joint closure of bridges is an important problem that can threat the safety of the bridge structure or reduce long-term durability. This paper proposed a structural analysis method for bridges having expansion joint closure and structural analysis was performed to verify the effects according to bridge types. Analysis bridges were divided into four types: concrete and steel bridges, shallow and piled foundations. To induce the situation of abutments and bridge decks are jammed, the following loads were additionally considered; lateral flow pressure, pavement expansion by alkali-aggregate reaction, creep settlement of backfill. The structural analysis method was verified by comparing the structural analysis results with the actually measured joint gap data. In addition, behavioral analysis due to joint closure was conducted to confirm the change in safety ratio by type of superstructure as the axial force increased.

A study on the three-dimensional display of onboard training for Naval Combat System. (함정 전투체계 모의훈련 시나리오 3차원 전시방안 연구)

  • Lee, SuHoon;Ahn, JinSu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.62-65
    • /
    • 2022
  • NCS(Naval Combat System) is a system that maximizes the combat effectiveness for the naval ships by providing track detection, tracking, thereat analysis, engagement, hit assessment and many other capabilities using ship integrated heterogeneous sensor and weapon systems. In order to achieve the purpose of the NCS, every crew is require to be proficient in the operation of NCS. In accordance with the goal, NCS provides a onboard training function, and the crew conducts system operation proficiency and teamwork training on the ship. Training instructors for control training should have a high standard of training environment control and monitoring capabilities, which need to be studied. This paper studies a 3D display method for visualizing the training situation of training instructors.

  • PDF

Improving the Security Policy Based on Data Value for Defense Innovation with Science and Technology (과학기술 중심 국방혁신을 위한 데이터 가치 기반 보안정책 발전 방향)

  • Heungsoon Park
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.109-115
    • /
    • 2023
  • The future outlook for defense faces various and challenging environments such as the acceleration of uncertainty in the global security landscape and limitations in domestic social and economic conditions. In response, the Ministry of National Defense seeks to address the problems and threats through defense innovation based on scientific and technological advancements such as artificial intelligence, drones, and robots. To introduce advanced AI-based technology, it is essential to integrate and utilize data on IT environments such as cloud and 5G. However, existing traditional security policies face difficulties in data sharing and utilization due to mainly system-oriented security policies and uniform security measures. This study proposes a paradigm shift to a data value-based security policy based on theoretical background on data valuation and life-cycle management. Through this, it is expected to facilitate the implementation of scientific and technological innovations for national defense based on data-based task activation and new technology introduction.

Model Tests on Deformation Behavior of Soft Ground Under Embankment (성토하부 연약지반의 변형거동에 관한 모형실험)

  • Lee, Kwang-Wu;Cho, Sam-Deok;Hong, Won-Pyo
    • Journal of the Korean Geotechnical Society
    • /
    • v.25 no.5
    • /
    • pp.17-28
    • /
    • 2009
  • When embankments are constructed on soft clay deposit, unsymmetrical surcharges due to embankments may generate the excessive vertical settlement and lateral deformation of soft clay foundation. The excessive deformations in soft grounds cause not only stability problem of the embankment itself but also that of the adjacent structures. The objectives of this research are to study the deformational behavior of soft ground due to the embankment load with different loading and soil conditions. Five model tests are carried out with different test conditions. From the results of the model tests, it is concluded that the lateral displacement induced by the embankment load occurs in the range of two times of the embankment width from a toe. In addition, the relationship between loading rate, v, and the vertical settlement of the soft ground, ${\Delta}s$, and the lateral displacement at the toe of embankment, ${\Delta}y_m$, is investigated based on the model test results.

SWOT Analysis for Infrastructure of Hydrogen Energy Industry in Korea (국내 수소에너지 산업인프라 구축을 위한 SWOT 분석)

  • Kim, Chae-Bogk
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.5
    • /
    • pp.337-345
    • /
    • 2016
  • There is an increasing attention on the sustainable energy in the world as the problem of fossil energy exhaustion and environmental issues appear. This paper addresses technologies and industries related to hydrogen energy in the literature, and develops strategy for the preparation of hydrogen energy infrastructure in Korea by extracting several factors suitable for SWOT analysis after reviewing literature. Research articles and reports about the practical application of hydrogen energy in the literature were investigated and seventy evaluation factors were extracted. Then, survey to eliminate the unsuitability problems of duplication, disproportion and objectivity was performed by scholars and experts in research institutes. Finally, sixteen factors consisting of 4 strength factors, 4 weakness factors, 5 opportunity factors and 4 threat factors were determined as the strategic factors for the infrastructure of hydrogen energy industry.

Quantum Circuit Implementation of the LED Block Cipher with Compact Qubit (최적의 큐빗수를 만족하는 LED 블록암호에 대한 양자 회로 구현)

  • Min-ho Song;Kyung-bae Jang;Gyeong-ju Song;Won-woong Kim;Hwa-Jeong Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.383-389
    • /
    • 2023
  • The development of quantum computers and the emergence of quantum algorithms such as Shor's algorithm and Grover's algorithm pose a significant threat to the security of existing cipher systems. Quantum algorithms can efficiently perform mathematical operations that take a long time on traditional computers. This characteristic can significantly reduce the time it takes to break modern cipher systems that rely on mathematical problems. To prepare for quantum attacks based on these algorithms, existing ciphers must be implemented as quantum circuits. Many ciphers have already been implemented as quantum circuits, analyzing quantum resources required for attacks and verifying the quantum strength of the cipher. In this paper, we present quantum circuits for LED lightweight block ciphers and explain each function of quantum circuits. Thereafter, the resources for the LED quantum circuit are estimated and evaluated by comparing them with other lightweight block ciphers.

Analysis of solar power generation efficiency through spatiotemporal analysis of solar radiation on the Korean Peninsula using GK2A (천리안2위성을 활용한 한반도 일사량의 시공간적 분석을 통한 태양광 발전 효율 분석)

  • Hwang, Seunghyun;Baik, Jongjin;Kim, Hyeonjoon;Byun, Jongyun;Cha, Hoyoung;Jun, Changhyun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.457-457
    • /
    • 2022
  • 최근 기후변화로 인한 위기가 인류의 생존을 위협하면서 전 지구적으로 기후변화에 대응하기 위한 탄소 중립 대책을 모색하고 있으며, 지속가능한 신재생에너지에 대해 주목하고 있다. 산업통상자원부는 2034년까지 총 발전량 중 신재생에너지의 비율을 25.8%까지 증가시키는 것을 목표로 신재생에너지의 발전 비율을 증가시키기 위한 다양한 노력을 기울이고 있다. 특히, 신재생에너지 중 가장 많은 비중을 차지하고 있는 태양광 발전은 비교적 광범위한 부지를 필요로 하고 있으며, 환경 및 지형적 영향이 크게 작용하는 만큼 발전 시설 부지 선정 및 운용 계획을 위한 면밀한 분석이 필수적이다. 그러나, 태양광 발전 활용 계획을 수립하기 위해 고려할 수 있는 지상 관측 일사량 및 일조량 데이터는 상당히 제한적이며 관측 밀도가 조밀하지 않다는 한계점이 있다. 본 연구에서는 천리안위성의 후속으로 발사된 천리안2위성의 산출물인 일사량 데이터를 활용하여 한반도 영역에서의 일사량에 대한 시·공간적 분석을 수행하였으며, 이를 기반으로 각 지역적 특성을 파악하고, 토지 피복 유형에 따른 태양광 발전의 효율 정도를 분석·평가하였다. 본 연구의 결과는 계측 지역 및 미계측 지역에서의 시공간적인 태양광 에너지의 효율성에 대한 정보를 제공함에 따라 태양광 발전을 위한 관련 시설물들의 최적 설치 위치 및 규모 등에 대한 설계 기준 마련에 활용될 수 있을 것으로 판단된다.

  • PDF