• Title/Summary/Keyword: Bypass scheme

Search Result 40, Processing Time 0.029 seconds

Study on Variable Systems for Compressor and Turbine and its Control Scheme (압축기 정익, 터빈 노즐 가변 메카니즘 및 제어기법 연구)

  • Kim, Sangjo;Kim, Donghyun;Bae, Kyoungwook;Kim, Dae-il;Son, Changmin;Kim, Kuisoon;Lee, Daewoo;Go, Jeungsang;Choi, Dong-Whan;Kim, Myungho;Min, Seongki
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.19 no.5
    • /
    • pp.1-14
    • /
    • 2015
  • In case of a gas turbine engine for supersonic operation, the engine have a wide range of operating inlet mass flow rate and required high performance such as thrust and fuel consumption. Therefore, variable system and its optimal control logic are essentially needed. In this work, a method for performance prediction of a gas turbine engine with variable system compressor and its control scheme were developed. Conceptual design of compact acuation system for the operation of the variable system was also conducted. The performance of a low-bypass ratio mixed flow turbofan engine was analyzed, and it was observed that the surge margin of the engine is improved at off-design condition by applying the control scheme.

CFI Approach to Defend against GOT Overwrite Attacks (CFI(Control Flow Integrity) 적용을 통한 GOT(Global Offset Table) 변조 공격 방지 방안 연구)

  • Jeong, Seunghoon;Hwang, Jaejoon;Kwon, Hyukjin;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.179-190
    • /
    • 2020
  • In the Unix-like system environment, the GOT overwrite attack is one of the traditional control flow hijacking techniques for exploiting software privileges. Several techniques have been proposed to defend against the GOT overwrite attack, and among them, the Full Relro(Relocation Read only) technique, which blocks GOT overwrites at runtime by arranging the GOT section as read-only in the program startup, has been known as the most effective defense technique. However, it entails loading delay, which limits its application to a program sensitive to startup performance, and it is not currently applied to the library due to problems including a chain loading delay problem caused by nested library dependency. Also, many compilers, including LLVM, do not apply the Full Relro technique by default, so runtime programs are still vulnerable to GOT attacks. In this paper, we propose a GOT protection scheme using the Control Flow Integrity(CFI) technique, which is currently recognized as the most suitable technique for defense against code reuse attacks. We implemented this scheme based on LLVM and applied it to the binutils-gdb program group to evaluate security, performance and compatibility. The GOT protection scheme with CFI is difficult to bypass, fast, and compatible with existing library programs.

Processor Design Technique for Low-Temperature Filter Cache (필터 캐쉬의 저온도 유지를 위한 프로세서 설계 기법)

  • Choi, Hong-Jun;Yang, Na-Ra;Lee, Jeong-A;Kim, Jong-Myon;Kim, Cheol-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.1-12
    • /
    • 2010
  • Recently, processor performance has been improved dramatically. Unfortunately, as the process technology scales down, energy consumption in a processor increases significantly whereas the processor performance continues to improve. Moreover, peak temperature in the processor increases dramatically due to the increased power density, resulting in serious thermal problem. For this reason, performance, energy consumption and thermal problem should be considered together when designing up-to-date processors. This paper proposes three modified filter cache schemes to alleviate the thermal problem in the filter cache, which is one of the most energy-efficient design techniques in the hierarchical memory systems : Bypass Filter Cache (BFC), Duplicated Filter Cache (DFC) and Partitioned Filter Cache (PFC). BFC scheme enables the direct access to the L1 cache when the temperature on the filter cache exceeds the threshold, leading to reduced temperature on the filter cache. DFC scheme lowers temperature on the filter cache by appending an additional filter cache to the existing filter cache. The filter cache for PFC scheme is composed of two half-size filter caches to lower the temperature on the filter cache by reducing the access frequency. According to our simulations using Wattch and Hotspot, the proposed partitioned filter cache shows the lowest peak temperature on the filter cache, leading to higher reliability in the processor.

A New Replacement Method of Distribution Transformers without Outage using the Phase Converter (위상변환장치를 이용한 새로운 배전변압기 무정전 교체방법)

  • Shin, Dong-Yeol;Kim, Suk-Cheol;Yoon, Gi-Gab;Cha, Han-Ju
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.10
    • /
    • pp.166-175
    • /
    • 2007
  • Nowadays, the power quality issue becomes very important in the electric distribution system. Especially, when a distribution transformer is replaced, the customers who are supplied electricity from the transformer feel inconvenience due to electric outage. Therefore, an advanced method for the distribution transformer replacement without outage is strongly required. The conventional method is the primary-secondary high voltage bypass method according to the transformer utilization factor and the field condition. But it is inconvenient and has some problems such as breakdown and security troubles of the workers according to the unauthorized and temporary work. Therefore, the new scheme for the replacement with uninterruptable power supply is demanded. This paper proposes the new replacement method using the phase converter. The proposed method can reduces the process of replacement work and also ensures worker's safety. Therefore, the method is reasonable in comparison with the conventional method. The proposed method is able to contribute the national economy growth and elevate the convenience of national life by uninterruptable power supply.

Energy-efficient Data Dissemination Protocol for Detouring Routing Holes in Wireless Sensor Networks (무선 센서 네트워크에서 라우팅 홀을 우회하기 위한 에너지 효율적 데이타 전달 프로토콜)

  • Ye, Tian;Yu, Fucai;Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Jin, Min-Sook;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.321-325
    • /
    • 2008
  • Void areas(holes) as an inevitable phenomenon exist in geographic routing of wireless sensor networks, because the unpredictable and harsh nature application environment or uneven energy consumption. Most of the existing schemes for the issue tend to construct a static detour path to bypass a hole. The static detour path may lead to uneven energy consumption of the nodes on the perimeter of the hole; thus it may enlarge the hole. At the same time, traffic would concentrate on the peripheral node of the hole; thus the nodes on the perimeter of the hole tend to be depleted quietly. In previous work, we have proposed a hole geometric model to reduce the energy consumption and packet collisions of the nodes on the hole boundary. This scheme, however, still has the static detour path problem. Therefore, we extend the previous work by constructing a dynamic detour path hole geometric model for wireless sensor networks in this paper. The location of hole detour anchors is dynamically shifted according to Gaussian function, just generating dynamic hole detour paths.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

Mobility Management Scheme Using Efficient Relay Agent in Nested Mobile Networks (중첩된 이동망에서 효율적 릴레이 에이전트를 사용하는 이동성 관리 기법)

  • 이재걸;홍충선;이재조
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10A
    • /
    • pp.796-806
    • /
    • 2003
  • Mobile Node usually communicate with CN bia only it's own HA but Nested Mobile Networks correspond with CN bia all HA involved with them. when Mobile Network of a MR moves from its home link to a foreign link in the stationary network. then Mobile Network of another MR moves from its home link in stationary network to foreign link in previous mobile network. CN send Packet destined to the latter MR via both Home Agent of the former MR and the latter MR. There are two problem in this scenario. One is inefficient routing path that bypass via several HA. the other is waste of transmission resource and delay of Registration process which change of Nested Mobile Network Architecture cause Mobile Router. so We propose MRA(Mobile Relay Agent) to support effective routing by local mobility management.

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

Flexible Disjoint Multipath Routing Protocol Using Local Decision in Wireless Sensor Networks (무선 센서 네트워크에서 지역 결정을 통한 유연한 분리형 다중경로 라우팅 프로토콜)

  • Jung, Kwansoo;Yeom, Heegyun;Park, Hosung;Lee, Jeongcheol;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.11
    • /
    • pp.911-923
    • /
    • 2013
  • Multipath routing is one of challenging issues for improving the reliability of end-to-end data delivery in wireless sensor networks. Recently, a disjointedness and management of path have been studying to enhance the robustness and efficiency of the multipath routing. However, previous multipath routing protocols exploit the disjointed multipath construction method that is not to consider the wireless communication environment. In addition, if a path failures is occurred due to the node or link failures in the irregular network environment, they maintain the multipath through the simple method that to construct a new extra path. Even some of them have no a method. In order to cope with the insufficiency of path management, a hole detouring scheme, to bypass the failures area and construct the new paths, was proposed. However, it also has the problem that requires a heavy cost and a delivery suspension to the some or all paths in the hole detouring process due to the centralized and inflexible path management. Due to these limitations and problems, the previous protocols may lead to the degradation of data delivery reliability and the long delay of emergency data delivery. Thus, we propose a flexible disjoint multipath routing protocol which constructs the radio disjoint multipath by considering irregular and constrained wireless sensor networks. It also exploits a localized management based on the path priority in order to efficiently maintain the flexible disjoint multipath. We perform the simulation to evaluate the performance of the proposed method.

A Study The Structural Stability of the Fence Ohgokmun Soswaewon Factor Analysis (소쇄원 오곡문 담장의 구조적 안정에 미치는 요인 분석)

  • Jang, Ik-Sik;Jeon, Hyeong-Soon;Ha, Tae Ju;Lee, Jae-Keun
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.31 no.4
    • /
    • pp.113-122
    • /
    • 2013
  • In this study, the traditional structure of the impact on the stability analysis. Korean traditional landscape architecture column space of stonework stable composition as the foundation of the fence for a long time been known to fall down and not maintained. The destination of research Ohgokmun Damyang Soswaewon fence which is in harmony with nature is one of the traditional structures that affect its shape without being kept so far came true. This includes our ancestral wisdom and that wisdom can guess guesswork. But I let the traditional reproduction incidence structures frequently. This deviation from the traditional method of construction application of shorthand stand. Thus, the subject of this study, the factors that do not fall down fences Ohgokmun solution is to indirectly gain the weak. In addition, epidemiological studies and the methods of calculation of the inferred physical examination, the results of the analysis were derived through the following. First, the internal factors of the fence Ohgokmun constituting the structural member and the coupling of the scheme. 1) based on stable ground. Greater role in the country rock The fact that the settlement will have no symptoms. 2) to minimize the friction caused by hydrological water to remove the two-pronged process through stone work building form and menu sustaining power in hydrology and flooding made against the bypass channel. 3) due to the load bearing capacity and durability to withstand the strength of the material and the construction of structures in the form of a dispersion of power between each individual to maximize the process of getting traction was applied. Second, external factors Ohgokmun fence the results obtained through the calculation of the dynamics of repair, is greatly affected by the wind and the water gate of the fence, but the action of the structural stability of the lack of power that hurt enough conclusion. In this study, the results of the structure of internal and external influence as well through the structure can be viewed as composed consisting. However, over the next follow-up in terms of climate and environmental factors due to the fact that the fall might.