• Title/Summary/Keyword: 크래시 분석

Search Result 12, Processing Time 0.014 seconds

A Study on the Improvement of a Damageability and Repairability by Improving Mounting Structure of a Bumper for Passenger Cars (범퍼체결구조 개선을 통한 손상성.수리성 향상방안에 관한 연구)

  • Kim, Ji-Won;Park, In-Song;Lee, Chang-Sik
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.1
    • /
    • pp.1-9
    • /
    • 2010
  • The purpose of this study is to analyze the bumper mounting structure of passenger vehicles at low speed collision. In order to improve the repairability and damageability of the vehicle, the low speed crash tests of RCAR(Research Council for Automobile Repairs) standard(front & rear 15km/h 40% offset crash test) were carried out for analysis of 3 different types of bumper mounting structures. The results of experiments show that the impact energy absorbing ability of bumper stay with rectangular crash box type vehicle which is inserted into the bumper rail was superior to another two different bumper mounting structures that are applied to many passenger vehicles. In this thesis, well designed bumper mounting structure such as rectangular crash box type can enhance the safety of occupants as well as contribute to reduce repair cost at low collision accident by improving repairability and damageability of vehicle.

Efficient Coverage Guided IoT Firmware Fuzzing Technique Using Combined Emulation (복합 에뮬레이션을 이용한 효율적인 커버리지 가이드 IoT 펌웨어 퍼징 기법)

  • Kim, Hyun-Wook;Kim, Ju-Hwan;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.847-857
    • /
    • 2020
  • As IoT equipment is commercialized, Bluetooth or wireless networks will be built into general living devices such as IP cameras, door locks, cars and TVs. Security for IoT equipment is becoming more important because IoT equipment shares a lot of information through the network and collects personal information and operates the system. In addition, web-based attacks and application attacks currently account for a significant portion of cyber threats, and security experts are analyzing the vulnerabilities of cyber attacks through manual analysis to secure them. However, since it is virtually impossible to analyze vulnerabilities with only manual analysis, researchers studying system security are currently working on automated vulnerability detection systems, and Firm-AFL, published recently in USENIX, proposed a system by conducting a study on fuzzing processing speed and efficiency using a coverage-based fuzzer. However, the existing tools were focused on the fuzzing processing speed of the firmware, and as a result, they did not find any vulnerability in various paths. In this paper, we propose IoTFirmFuzz, which finds more paths, resolves constraints, and discovers more crashes by strengthening the mutation process to find vulnerabilities in various paths not found in existing tools.