• Title/Summary/Keyword: Attack Modeling

Search Result 152, Processing Time 0.028 seconds

METALLIC INTERFACES IN HARSH CHEMO-MECHANICAL ENVIRONMENTS

  • Yildiz, Bilge;Nikiforova, Anna;Yip, Sidney
    • Nuclear Engineering and Technology
    • /
    • v.41 no.1
    • /
    • pp.21-38
    • /
    • 2009
  • The use of multi scale modeling concepts and simulation techniques to study the destabilization of an ultrathin layer of oxide interface between a metal substrate and the surrounding environment is considered. Of particular interest are chemo-mechanical behavior of this interface in the context of a molecular-level description of stress corrosion cracking. Motivated by our previous molecular dynamics simulations of unit processes in materials strength and toughness, we examine the challenges of dealing with chemical reactivity on an equal footing with mechanical deformation, (a) understanding electron transfer processes using first-principles methods, (b) modeling cation transport and associated charged defect migration kinetics, and (c) simulation of pit nucleation and intergranular deformation to initiate the breakdown of the oxide interlayer. These problems illustrate a level of multi-scale complexity that would be practically impossible to attack by other means; they also point to a perspective framework that could guide future research in the broad computational science community.

A Survey of Research on Human-Vehicle Interaction in Defense Area (국방 분야의 인간-차량 인터랙션 연구)

  • Yang, Ji Hyun;Lee, Sang Hun
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.3
    • /
    • pp.155-166
    • /
    • 2013
  • We present recent human-vehicle interaction (HVI) research conducted in the area of defense and military application. Research topics discussed in this paper include: training simulation for overland navigation tasks; expertise effects in overland navigation performance and scan patterns; pilot's perception and confidence on an overland navigation task; effects of UAV (Unmanned Aerial Vehicle) supervisory control on F-18 formation flight performance in a simulator environment; autonomy balancing in a manned-unmanned teaming (MUT) swarm attack, enabling visual detection of IED (Improvised Explosive Device) indicators through Perceptual Learning Assessment and Training; usability test on DaViTo (Data Visualization Tool); and modeling peripheral vision for moving target search and detection. Diverse and leading HVI study in the defense domain suggests future research direction in other HVI emerging areas such as automotive industry and aviation domain.

Probability-Based Prediction of Time to Corrosion Initiation of RC Structure Exposed to Salt Attack Environment Considering Uncertainties (불확실성을 고려한 RC구조물의 부식개시시기에 대한 확률 기반 예측)

  • Kim, Jin-Su;Do, Jeong-Yun;Hun, Seung;Soh, Seung-Young;Soh, Yang-Seob
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2005.05b
    • /
    • pp.249-252
    • /
    • 2005
  • Chloride ingress is a common cause of deterioration of reinforced concrete structures. Modeling the chloride ingress is an important basis for designing reinforced concrete structures and for assessing the reliability of an existing structure. The modelling is also needed for predicting the deterioration of a reinforced structure. This paper presents an approach for the probabilistic modeling of the chloride-induced corrosion of reinforcement steel in concrete structures that takes into account the uncertainties in the physical models. The parameters of the models are modeled as random variables and the distribution of the corrosion time and probability of corrosion are determined by using Monte Carlo simulation. The predictions of the proposed model is very effective to do the decision-making about initiation time and deterioration degree.

  • PDF

Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services

  • Jin Kim;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.173-184
    • /
    • 2024
  • The connected car services are one of the most widely used services in the Internet of Things environment, and they provide numerous services to existing vehicles by connecting them through networks inside and outside the vehicle. However, although vehicle manufacturers are developing services considering the means to secure the connected car services, concerns about the security of the connected car services are growing due to the increasing number of attack cases. In this study, we reviewed the research related to the connected car services that have been announced so far, and we identified the threats that may exist in the connected car services through security threat modeling to improve the fundamental security level of the connected car services. As a result of performing the test to the applications for connected car services developed by four manufacturers, we found that all four companies' applications excessively requested unnecessary permissions for application operation, and the apps did not obfuscate the source code. Additionally, we found that there were still vulnerabilities in application items such as exposing error messages and debugging information.

MILP-Aided Division Property and Integral Attack on Lightweight Block Cipher PIPO (경량 블록 암호 PIPO의 MILP-Aided 디비전 프로퍼티 분석 및 인테그랄 공격)

  • Kim, Jeseong;Kim, Seonggyeom;Kim, Sunyeop;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.875-888
    • /
    • 2021
  • In this paper, we search integral distinguishers of lightweight block cipher PIPO and propose a key recovery attack on 8-round PIPO-64/128 with the obtained 6-round distinguishers. The lightweight block cipher PIPO proposed in ICISC 2020 is designed to provide the efficient implementation of high-order masking for side-channel attack resistance. In the proposal, various attacks such as differential and linear cryptanalyses were applied to show the sufficient security strength. However, the designers leave integral attack to be conducted and only show that it is unlikely for PIPO to have integral distinguishers longer than 5-round PIPO without further analysis on Division Property. In this paper, we search integral distinguishers of PIPO using a MILP-aided Division Property search method. Our search can show that there exist 6-round integral distinguishers, which is different from what the designers insist. We also consider linear operation on input and output of distinguisher, respectively, and manage to obtain totally 136 6-round integral distinguishers. Finally, we present an 8-round PIPO-64/128 key recovery attack with time complexity 2124.5849 and memory complexity of 293 with four 6-round integral distinguishers among the entire obtained distinguishers.

A study on the cyber security assessment modeling of critical infrastructure (핵심기반시설 사이버 보안 평가 모델링 기법 연구)

  • Euom, Ieck-Chae
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.105-113
    • /
    • 2019
  • The purpose of this study is to analyze cyber security risk modeling of critical infrastructure, draw out limitations and improvement measures. This paper analyzed cyber security risk modeling of national critical infrastructure like as electricity sector, nuclear power plant, SCADA. This paper analyzed the 26 precedent research cases of risk modeling in electricity sector, nuclear power plant, SCADA. The latest Critical Infrastructure is digitalized and has a windows operating system. Critical Infrastructure should be operated at all times, it is not possible to patch a vulnerability even though find vulnerability. This paper suggest the advanced cyber security modeling characteristic during the life cycle of the critical infrastructure and can be prevented.

Analysis of Rocket Booster Separation from Air-Breathing Engine with Kane's Method (Kane 다물체 동력학을 이용한 공기흡입식 추진기관 부스터 분리에 관한 연구)

  • Choi, Jong-Ho;Lim, Jin-Shik
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.13 no.3
    • /
    • pp.41-49
    • /
    • 2009
  • The present paper describes a mathematical modeling and simulation of the separation of a solid rocket booster from an air breathing engine vehicle. The vehicle and booster are considered as a multi-connected body and the booster is assumed to move only along the axial direction of the vehicle. The dynamic motion of the vehicle and the booster were modeled by using Kane's method. The aerodynamic forces on the whole system along various positions of booster were calculated by using DATCOM software and the internal pressure force acting on the effective surface during separation was simply calculated with gas dynamics and Taylor MacColl equation. Numerical simulation was done by using Mathworks-Matlab. From the result, the variation of Mach number and angle of attack are not large during the separation, so the variation of pitch angle and the characteristics of inlet flow for varying the Mach number and angle of attack during the separation test can be identified as neglectable values.

Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트 TV 보안 요구사항 도출)

  • Oh, In-Kyung;Seo, Jae-Wan;Lee, Min-Kyu;Lee, Tae-Hoon;Han, Yu-Na;Park, Ui-Seong;Ji, Han-Byeol;Lee, Jong-Ho;Cho, Kyu-Hyung;Kim, Kyounggon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.213-230
    • /
    • 2020
  • As smart TVs have recently emerged as the center of the IoT ecosystem, their importance is increasing. If a vulnerability occurs within a smart TV, there is a possibility that it will cause financial damage, not just in terms of privacy invasion and personal information leakage due to sniffing and theft. Therefore, in this paper, to enhance the completeness of smart TV vulnerability analysis, STRIDE threat classification are used to systematically identify threats. In addition, through the manufacture of the Attack Tree and the actual vulnerability analysis, the effectiveness of the checklist was verified and security requirements were derived for the safe smart TV use environment.

Research on System Architecture and Methodology based on MITRE ATT&CK for Experiment Analysis on Cyber Warfare Simulation

  • Ahn, Myung Kil;Lee, Jung-Ryun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.31-37
    • /
    • 2020
  • In this paper, we propose a system architecture and methodology based on cyber kill chain and MITRE ATT&CK for experiment analysis on cyber warfare simulation. Threat analysis is possible by applying various attacks that have actually occurred with continuous updates to reflect newly emerging attacks. In terms of cyber attack and defense, the current system(AS-IS) and the new system(TO-BE) are analyzed for effectiveness and quantitative results are presented. It can be used to establish proactive cyber COA(Course of Action) strategy, and also for strategic decision making. Through a case study, we presented the usability of the system architecture and methodology proposed in this paper. The proposed method will contribute to strengthening cyber warfare capabilities by increasing the level of technology for cyber warfare experiments.

A Study on the Probabilistic Vulnerability Assessment of COTS O/S based I&C System (상용 OS기반 제어시스템 확률론적 취약점 평가 방안 연구)

  • Euom, Ieck-Chae
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.8
    • /
    • pp.35-44
    • /
    • 2019
  • The purpose of this study is to find out quantitative vulnerability assessment about COTS(Commercial Off The Shelf) O/S based I&C System. This paper analyzed vulnerability's lifecycle and it's impact. this paper is to develop a quantitative assessment of overall cyber security risks and vulnerabilities I&C System by studying the vulnerability analysis and prediction method. The probabilistic vulnerability assessment method proposed in this study suggests a modeling method that enables setting priority of patches, threshold setting of vulnerable size, and attack path in a commercial OS-based measurement control system that is difficult to patch an immediate vulnerability.