• Title/Summary/Keyword: ATTACK AREA

Search Result 347, Processing Time 0.023 seconds

Enhanced Knock Code Authentication with High Security and Improved Convenience

  • Jang, Yun-Hwan;Park, Yongsu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4560-4575
    • /
    • 2018
  • Since smartphone contains various personal data, security is one of the important aspects in smartphone technologies. Up to now, various authentication techniques have been proposed to protect smartphones. The pattern lock on the Android system is one of the most widely used authentication methods for low-cost devices but it is known to be vulnerable to smudge attack or shoulder surfing attack. LG's smartphone uses its own technique, which is called "Knock Code." The knock code completes the authentication by touching the user defined area in turn on the screen. In this paper, we propose the new, enhanced version of knock code by adding the sliding operation and by using flexible area recognition. We conducted security analysis, which shows that under the same password size, the search space is overwhelmingly larger than the original algorithm. Also, by using the sliding operation, the proposed scheme shows resilience against smudge attacks. We implemented the prototype of our scheme. Experimental results show that compared with the original Knock Code and Android pattern lock, our scheme is more convenient while providing better security.

Practical Silicon-Surface-Protection Method using Metal Layer

  • Yi, Kyungsuk;Park, Minsu;Kim, Seungjoo
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.16 no.4
    • /
    • pp.470-480
    • /
    • 2016
  • The reversal of a silicon chip to find out its security structure is common and possible at the present time. Thanks to reversing, it is possible to use a probing attack to obtain useful information such as personal information or a cryptographic key. For this reason, security-related blocks such as DES (Data Encryption Standard), AES (Advanced Encryption Standard), and RSA (Rivest Shamir Adleman) engines should be located in the lower layer of the chip to guard against a probing attack; in this regard, the addition of a silicon-surface-protection layer onto the chip surface is a crucial protective measure. But, for manufacturers, the implementation of an additional silicon layer is burdensome, because the addition of just one layer to a chip significantly increases the overall production cost; furthermore, the chip size is increased due to the bulk of the secure logic part and routing area of the silicon protection layer. To resolve this issue, this paper proposes a practical silicon-surface-protection method using a metal layer that increases the security level of the chip while minimizing its size and cost. The proposed method uses a shift register for the alternation and variation of the metal-layer data, and the inter-connection area is removed to minimize the size and cost of the chip in a more extensive manner than related methods.

Outbreaks of Salmonellosis in a Provincial Area (한 도의 Salmonella sp. 에 의한 집단발병 보고)

  • Park, H.C.;Jeon, D.Y.;Kim, G.H.;Kim, S.C.
    • Journal of agricultural medicine and community health
    • /
    • v.17 no.2
    • /
    • pp.123-127
    • /
    • 1992
  • Of 80 cases of Salmonellosis reported in a provincial area in 1992, 90% were related to outbreaks, which occurred from Apr. to Nov. And the serotypes include the following: typhimurium, hadar, and enteritidis etc. Among these outbreaks the authors carried out the epidemiological investigation for 'I-eup'(highest attack region) outbreak. The results obtained were as follows: 1. The S. typhimurium isolated from stools of 7 cases among 29 cases. 2. The common-source of exposure was boiled pork and/or skewered slices of seasoned meat. 3. The incidence rate was 65.1%(29 cases). 4. The incidence showed significant difference between males(32.1%) and females(80.0%). 5. The incidence in under 20 years of age and 40 years of age were much higher than other age groups but there was no significant difference among much age groups. 6. The mean and the median incubation period were 18.5 and 17.0 hours respectively. 7. The secondary attack was not appeared.

  • PDF

A Classification Model for Attack Mail Detection based on the Authorship Analysis (작성자 분석 기반의 공격 메일 탐지를 위한 분류 모델)

  • Hong, Sung-Sam;Shin, Gun-Yoon;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.35-46
    • /
    • 2017
  • Recently, attackers using malicious code in cyber security have been increased by attaching malicious code to a mail and inducing the user to execute it. Especially, it is dangerous because it is easy to execute by attaching a document type file. The author analysis is a research area that is being studied in NLP (Neutral Language Process) and text mining, and it studies methods of analyzing authors by analyzing text sentences, texts, and documents in a specific language. In case of attack mail, it is created by the attacker. Therefore, by analyzing the contents of the mail and the attached document file and identifying the corresponding author, it is possible to discover more distinctive features from the normal mail and improve the detection accuracy. In this pager, we proposed IADA2(Intelligent Attack mail Detection based on Authorship Analysis) model for attack mail detection. The feature vector that can classify and detect attack mail from the features used in the existing machine learning based spam detection model and the features used in the author analysis of the document and the IADA2 detection model. We have improved the detection models of attack mails by simply detecting term features and extracted features that reflect the sequence characteristics of words by applying n-grams. Result of experiment show that the proposed method improves performance according to feature combinations, feature selection techniques, and appropriate models.

An Improved ID-based Anonymous Authentication Scheme for Wireless Body Area Networks (WBAN 환경에서의 개선된 ID 기반 익명 인증 기법)

  • Jeong, Min-Soo;Suk, Jae Hyuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.322-332
    • /
    • 2017
  • Wireless Body Area Networks is an environment that provides an appropriate service remotely by collecting user's biometric information. With the growing importance of sensor, WBAN also attracts extensive attention. Since WBAN is representatively used in the medical field, it can be directly related to the patient's life. Hence security is very important in WBAN. Mutual authentication between the client and the application provider is essential. And efficiency is also important because a used device is limited to computation cost. In this reason, ID-based anonymous authentication scheme in WBAN has been intensively studied. We show that the recent research result of Wu et al. which is about the ID-based anonymous authentication scheme is vulnerable to impersonation attack. And we propose a new ID-based anonymous authentication scheme that is secure against the attacks discovered in the existing schemes. Compared to the existing schemes, the computation cost of our scheme is improved by 30.6% and 7.3%.

Dynamics of Heterogeneous Warfare

  • Park, Kyung-Soo
    • Journal of the Korean Statistical Society
    • /
    • v.6 no.1
    • /
    • pp.65-76
    • /
    • 1977
  • The relative importance of single-shot kill probabilities, rates of fire, weapon allocation strategies, and the size of initial force in warfare between two force with heterogeneous multiple weapon systems are considered by examining their effect on a natural measure of effectiveness, the expected number of survivors. Attrition equations are derived via stochastic formulation to represent the mean course of battle having an underlying probability distribution. It is assumed that each side uses indirect area fires. Level of intelligence activities are reflected in the availability of spontaneous information on the current enemy status. Depending on the availability of the information on the current enemy status, each participatory unit may follow 1) a prescribed attack pattern (fraction of the available units assigned to various enemy targets) or 2) an adaptive attack pattern depending on the enemy status at that time. Conditions for possible stalemate are discussed.

  • PDF

NUMERICAL STUDY ON THE WAKE OF A SINGLE MICRO VORTEX GENERATOR (Single micro Vortex Generator의 후류에 대한 수치적 연구)

  • Kim, G.H.;Park, S.O.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.494-499
    • /
    • 2011
  • One of the devices to prevent separated flow over a wing or a flap at high angle of attack is a vortex generator. In the present work, we numerically study the flow around a low-profile or micro vortex generator whose height is less than local boundary layer thickness which can delay separation with a minimum drag penalty owing to its very small wetted surface area. As a first step toward a parametric study to efficiently design this MVG flow control system, we simulate the flow around a single MVG on a flat plate. For the simulation, we employ OpenFOAM with Launder-Sharma ${\kappa}$-epsilon model. The analysis results are validated by comparing with experimental results of a rectangular MVG at an angle of attack of 10 degrees whose height is 20% of local boundary layer. Important results and aspects of this numerical study are discussed. We also simulate the flow around rectangular, triangular and trapezoidal MVGs and the results are compared

  • PDF

Design of System Call Monitoring System for Command Execution Detection in Stack Memory Area (스택메모리상의 명령 수행 탐지를 위한 시스템콜 모니터링 도구 설계)

  • 최양서;서동일;이상호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.772-775
    • /
    • 2004
  • After Morris' Internet Worm in 1988, the stack buffer overflow hacking became generally known to hackers and it has been used to attack systems and servers very frequently. Recently, many researches tried to prevent it, and several solutions were developed such as Libsafe and StackGuard; however, these solutions have a few problems. In this paper we present a new stack buffer overflow attack prevention technique that uses the system call monitoring mechanism and memory address where the system call is made.

  • PDF

A Survey for Vulnerability Attack and Defense Method of Satellite-Link Based Communication System

  • Isaac Sim;Jinwoo Jeong;Sangbom Yun;Yunsik Lim;Junghyun Seo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.128-133
    • /
    • 2023
  • Satellite based communication is networks in which users in a wide area can access without wired-based ground infrastructure. In particular, the need is emerging due to the recent Ukraine-Russia war. Satellite network systems acquire data that is difficult to observe on Earth as well as communication networks and are also used for research and development, which allows additional data to be produced. However, due to the nature of communication networks existing in outer space, certain vulnerabilities are revealed, and attacks based on them can be exposed. In this paper, we analyze vulnerabilities that may arise due to the nature of satellite communication networks and describes current research, countermeasures, and future research directions.

Effects of Angles of Attack and Throttling Conditions on Supersonic Inlet Buzz

  • NamKoung, Hyuck-Joon;Hong, Woo-Ram;Kim, Jung-Min;Yi, Jun-Sok;Kim, Chong-Am
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.13 no.3
    • /
    • pp.296-306
    • /
    • 2012
  • A series of numerical simulations are carried out to analyze a supersonic inlet buzz, which is an unsteady pressure oscillation phenomenon around a supersonic inlet. A simple but efficient geometry, experimentally adopted by Nagashima, is chosen for the analysis of unsteady flow physics. Among the two sets of simulations considered in this study, the effects of various throttling conditions are firstly examined. It is seen that the major physical characteristic of the inlet buzz can be obtained by inviscid computations only and the computed flow patterns inside and around the inlet are qualitatively consistent with the experimental observations. The dominant frequency of the inlet buzz increases as throttle area decreases, and the computed frequency is approximately 60Hz or 15% lower than the experimental data, but interestingly, this gap is constant for all the test cases and shock structures are similar. Secondly, inviscid calculations are performed to examine the effect regarding angle of attack. It is found that patterns of pressure oscillation histories and distortion due to asymmetric (or three-dimensional) shock structures are substantially affected by angle of attack. The dominant frequency of the inlet buzz, however, does not change noticeably even in regards to a wide range of angle of attacks.