• Title/Summary/Keyword: 확산 취약성

Search Result 191, Processing Time 0.027 seconds

Analyzing and Fixing the Vulnerabilities of ASK Protocol (ASK 모바일 프로토콜 취약점 분석 및 수정)

  • Ryu Gab Sang;Kim Il Gon;Kim Hyun Seok;Lee Ji Yeon;Kang In Hye;Choi Jin Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • Security protocols have usually been developed using informal design and verification techniques. However, many security protocols thought to be secure was found to be vulnerable later. Thus, the importance of formal specification and verification for analyzing the safely of protocols is increasing. With the rise of mobile communication networks, various mobile security protocols have been proposed. In this paper, we identify the security weakness of the ASK mobile Protocol using formal verification technique. In addition, we propose a new ASK protocol modifying its vulnerability and verify its robustness.

Chloride Diffusion Coefficient Evaluation in 1 Year-Cured OPC Concrete under Loading Conditions and Cold Joint (하중조건과 콜드조인트를 고려한 1년 양생된 OPC 콘크리트의 염화물 확산계수 평가)

  • Oh, Kyeong-Seok;Kwon, Seung-Jun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.21 no.5
    • /
    • pp.21-29
    • /
    • 2017
  • Cold joint caused by construction delay is vulnerable to shear stress and it allows more rapid chloride penetration and diffusion. In the paper, investigation of chloride diffusion coefficient is performed for 1-year cured concrete considering compressive and tensile loading level and cold joint. The results are compared with the previous results in 91-day cured concrete. In the 1-year cured concrete without loading, 10.7% and 10.5% of diffusion reduction are evaluated for those in 91-day cured concrete, respectively. The reduction ratios are almost similar however the result in cold joint concrete shows much higher values. The results in 1-year cured concrete under 30% and 60% of compressive loading show reduction of chloride diffusion by 10.9% and 5.8% compared with 91-day cured results, which is caused by steady hydration of cement particles, so called, time effect. In the case of tensile loading, the differences in results are not significant regardless of time effect and cold joint since micro cracks which is weak point of concrete is much dominant despite of long term curing.

Technology, Labour, and Precarious Lives A Theoretical Reflection on the Relation Between Immaterial Labour and Precarity (테크놀로지, 노동, 그리고 삶의 취약성)

  • Chae, Suk Jin
    • Korean journal of communication and information
    • /
    • v.79
    • /
    • pp.226-259
    • /
    • 2016
  • Drawing on the autonomist Marxist concepts of 'social factory', 'immaterial labour', and 'precarity', this paper discusses the changed nature of labour, life and social relations in contemporary informational capitalism. More specifically, it first traces back to the early autonomist (operasimo) theories of 'social factory' and 'class composition' and then discusses how these earlier theories were developed into the concept of 'immaterial labour' by a group of later autonomist theorists such as Paolo Virno, Maurizio Lazzarato, Micheal Hardt, and Antonio Negri. Then, it reviews how the concept of immaterial labour was taken up to understand the nature of labour in digital economy within the tradition of Cultural Studies, closely intersecting with the critiques of 'creative labour'. Finally, it discusses how the changed nature of labour is interrelated with the neoliberal labour forces transformations such as casualization of employment and increasing insecurity in employment and life, which the autonomist explores with the concept of 'precarity', the material condition of immaterial labour.

  • PDF

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.

Disaster Prevention Planning through Analysis of Debris Flow Vulnerability Based on Mountain Basin Features (산지유역 기반의 토석류 취약성 분석을 통한 재해방지 계획수립 연구)

  • Kim, Man-Il;Lee, Moon-Se;Hong, Kwan-Pyo
    • The Journal of Engineering Geology
    • /
    • v.27 no.4
    • /
    • pp.393-403
    • /
    • 2017
  • Mountain disasters in Korea have caused massive social and economic damage. During the period 2005-2014 there has been an annual average of 7 deaths and disaster recovery costs of 79.8 billion won in the country's 4393 ha of mountainous areas. The primary mountain disasters are landslides on mountain slopes, and secondary debris flows can spread along mountain streams, damaging facilities and settlements in lower areas. Typhoons and local rainfall can cause such disasters, while anthropogenic factors include development that damages the mountainous terrain. The study area was divided into three basins. For each basin, a debris flow vulnerability assessment method was proposed considering FLO-2D analysis results and the local topography, geology, and forestation. To establish an in situ investigation, analysis, and evaluation plan for potential mountain disasters, we selected mountain basins that are potentially vulnerable to mountain disasters through analysis of their mountain slopes and streams. This work suggests the establishment of a comprehensive plan for disaster prevention based on a mountain basin feature.

Evaluation of Chloride Diffusion Coefficients in Cold Joint Concrete Considering Tensile and Compressive Regions (인장 및 압축영역에서 콜드조인트 콘크리트의 염화물 확산계수 평가)

  • Mun, Jin-Man;Kwon, Seung-Jun
    • Journal of the Korea Concrete Institute
    • /
    • v.28 no.4
    • /
    • pp.481-488
    • /
    • 2016
  • Concrete member has been subjected to dead and live loads in use, and the induced stress can affect not only structural but also durability behavior. In mass concrete construction, construction joint are required, however cold joint usually occur due to poor surface treatment and delayed concrete placing. The concrete with joint is vulnerable to both shear stress and chloride ingress. This paper presents a quantitative evaluation of cold joint and loading conditions on chloride diffusion behavior. With increasing tensile stress from 30% to 60%, chloride diffusion coefficient gradually increases, which shows no significant difference from result in the sound concrete. However chloride diffusion coefficient under 30% level of compressive stress significantly increases by 1.70 times compared with normal condition. Special attention should be paid for the enlarged diffusion behavior cold joint concrete under compressive stress.

Technology Risk and Social Responsibility of Innovation: The Shut-Down Law and On-line Game as a Post Catch-up Innovation (기술위험과 혁신의 사회적 책임 - 셧다운제와 탈추격형 혁신으로서 온라인게임 -)

  • Jung, Byung Kul
    • Informatization Policy
    • /
    • v.20 no.4
    • /
    • pp.71-88
    • /
    • 2013
  • Probability of technology risk is expected to increase as the post catch-up innovation, characterized by high uncertainty and high risk, would dominate in the coming era of post catchup. Social controversy on online game as a post catch-up innovation is still ongoing, though the shutdown law was enacted by the government. Socio-technical vulnerability causing technology risk paradoxically arose from the world top-level ICT infrastructures and has been reinforced by developmentalism. While both the pros and cons of the regulation fail to recognize dilemma objectively, social cost is brought about and accumulated. With recognizing dilemma between technology innovation and risks, we can tackle technology risks and ensure responsible innovation in post catch-up era.

  • PDF

An Experimental Study on the Estimation of Chloride Diffusion Coefficient of LNG Storage Tanks (LNG 저장탱크 염해 확산 계수 산출을 위한 실험적 고찰)

  • Lee, Seung-Rim;Hwang, Seung-Hyun
    • Journal of Energy Engineering
    • /
    • v.21 no.2
    • /
    • pp.119-123
    • /
    • 2012
  • Although LNG storage tanks are very delicate with chloride attack owing to its operating inshore location, specific integrity management system for chloride attack has not been studied so far. As the design warranty life time, about 25 years, has come, to prevent paying huge amount of construction cost and required resources for new alternative storage tanks and manage the life time of operating storage tanks, the basic data of chloride attack is necessary. This study intended to build up basic data for following detailed study to develop technologies for life time management of LNG storage tanks, NT Build 492 method in North Europe was used to test chloride diffusion coefficient for the newly-constructing concrete outer tank. Results of these tests lead us to the conclusion that 90 days diffusion coefficients show 46% of 28 days' due to a large quantity of fly ash mixing and much similar to estimation from concrete process table. It seems resonable to conclude that 90 days specimens are recommended estimating the chloride diffusion coefficient for LNG storage tanks to enhance the reliabilities.

The Security Analysis of Previous CRT-RSA Scheme on Modified Opcode and Operand Attack (연산자 조작 공격과 피연산자 조작 공격에 대한 기존 CRT-RSA Scheme의 안전성 분석)

  • Hur, Soon-Haeng;Lee, Hyung-Sub;Rhee, Hyun-Seung;Choi, Dong-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.185-190
    • /
    • 2009
  • As the use of RSA based on chinese remainder theorem(CRT-RSA) is being generalized, the security of CRT-RSA has been important. Since Bellcore researchers introduced the fault attacks on CRT-RSA, various countermeasures have been proposed. In 1999, Shamir firstly proposed a countermeasure using checking procedure. After Shamir's countermeasure was introduced, various countermeasures based on checking procedure have been proposed. However, Shamir's countermeasure was known to be vulnerable to the modified operand attack by Joey et al. in 2001, and the checking procedure was known to be vulnerable to the modified opcode attack by Yen et al. in 2003. Yen et al. proposed a new countermeasure without checking procedure, but their countermeasure was known to be also vulnerable to the modified operand attack by Yen and Kim in 2007. In this paper, we point out that pre, but countermeasures were vulnerable to the modified operand attack or the modified opcode attack.

FIDO 2.0 범용인증기술 소개

  • Cho, Sangrae;Cho, YoungSeob;Kim, Soohyung
    • Review of KIISC
    • /
    • v.26 no.2
    • /
    • pp.14-19
    • /
    • 2016
  • 국내 인증기술은 패스워드를 시작으로 X.509 인증서 기반의 공인인증 기술로 발전되어 왔고 현재는 패스워드의 보안 취약성을 개선하기 위해 개발된 FIDO 기술로 전환되는 과정에 있다. FIDO는 바이오 인증 기술뿐만 아니라 다중 인증 기술도 지원하는 범용인증기술로 FIDO 인증 서버를 한번만 설치하면 서비스 제공자의 요구사항에 따라 다양한 인증방식을 서버 변경 없이 수용할 수 있다는 장점을 가지고 있어, 금융, 결제 등 다양한 분야에 급속하게 확산되고 있다. 본 고에서는 범용인증기술인 FIDO 1.0 기술을 설명하고 최근에 표준화를 진행하고 있는 FIDO 2.0 기술에 대한 소개 및 FIDO 1.0 기술과의 차이점을 기술하여 FIDO 2.0이 가지는 여러 의미를 분석하여 향후 인증기술에 대한 전망을 제시한다.