• Title/Summary/Keyword: Inside Attack

Search Result 106, Processing Time 0.025 seconds

Hardware Crypto-Core Based Authentication System (하드웨어 암호코어 기반 인증 시스템)

  • Yoo, Sang-Guun;Park, Keun-Young;Kim, Tae-Jun;Kim, Ju-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.1
    • /
    • pp.121-132
    • /
    • 2009
  • Default password protection used in operating systems have had many advances, but when the attacker has physical access to the server or gets root(administrator) privileges, the attacker can steal the password information(e.g. shadow file in Unix-like systems or SAM file in Windows), and using brute force and dictionary attacks can manage to obtain users' passwords. It is really difficult to obligate users to use complex passwords, so it is really common to find weak accounts to exploit. In this paper, we present a secure authentication scheme based on digital signatures and secure key storage that solves this problem, and explain the possible implementations using Trusted Platform Module(TPM). We also make a performance analysis of hardware and software TPMs inside implementations.

Effects of Angles of Attack and Throttling Conditions on Supersonic Inlet Buzz

  • NamKoung, Hyuck-Joon;Hong, Woo-Ram;Kim, Jung-Min;Yi, Jun-Sok;Kim, Chong-Am
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.13 no.3
    • /
    • pp.296-306
    • /
    • 2012
  • A series of numerical simulations are carried out to analyze a supersonic inlet buzz, which is an unsteady pressure oscillation phenomenon around a supersonic inlet. A simple but efficient geometry, experimentally adopted by Nagashima, is chosen for the analysis of unsteady flow physics. Among the two sets of simulations considered in this study, the effects of various throttling conditions are firstly examined. It is seen that the major physical characteristic of the inlet buzz can be obtained by inviscid computations only and the computed flow patterns inside and around the inlet are qualitatively consistent with the experimental observations. The dominant frequency of the inlet buzz increases as throttle area decreases, and the computed frequency is approximately 60Hz or 15% lower than the experimental data, but interestingly, this gap is constant for all the test cases and shock structures are similar. Secondly, inviscid calculations are performed to examine the effect regarding angle of attack. It is found that patterns of pressure oscillation histories and distortion due to asymmetric (or three-dimensional) shock structures are substantially affected by angle of attack. The dominant frequency of the inlet buzz, however, does not change noticeably even in regards to a wide range of angle of attacks.

A Study on Attack Detection Technique based on n-hop Node Certification in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 n-hop 노드 인증 기반 공격 탐지 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.3-8
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

Aerodynamic Characteristics and Wing Tip Vortex Behavior of Three-Dimensional Symmetric Wing According to Heights (대칭단면을 갖는 3 차원 날개의 지면고도에 따른 공력특성과 끝단와 거동)

  • Yoo, Younghyun;Lee, Sanghwan;Lee, Juhee
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.36 no.12
    • /
    • pp.1161-1169
    • /
    • 2012
  • A numerical study has been conducted to investigate the aerodynamic characteristics and behavior of a wing-tip vortex around a three-dimensional symmetric wing (NACA0015) in the vicinity of the ground. The aerodynamic characteristics and the wing-tip vortex change as a wing approaches the ground as a result of two different phenomena: the ground effect and the Venturi effect. The ground effect increases lift and decreases drag whereas the Venturi effect generates negative lift and increases drag suddenly. A symmetric airfoil experiences both phenomena with respect to changes in the angle of attack. In the case of a NACA0015 airfoil, the Venturi effect is dominant at small angles of attack but the ground effect is dominant at large angles of attack. Interestingly, both phenomena can be observed at the 4 degree of angle of attack. The vortex core moves inside a wing when the wing experiences the Venturi effect, whereas the vortex core moves outward when the wing experiences the ground effect.

Study on the Affects of Mounting Axisymmetric Inlet to Airframe

  • Ando, Yohei;Matsuo, Akiko;Kojima, Takayuki;Maru, Yusuke;Sato, Tetsuya
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2004.03a
    • /
    • pp.699-702
    • /
    • 2004
  • In this study, the affect of mounting axisymmetrical supersonic inlet to airfoil, which has 65 degree swept angle was numerically investigated. The parameter for this calculation are tree stream Mach number M=2.0 and 2.5, the distance between inlet spike and airfoil lower surface $L_{sw}$/$R_{cowl}$ = 1.21-1.54 and angle of attack to the airfoil 0-4. The mass capture ratio improved 3points in M=2.0 condition and 1points in M=2.5 while the mass capture ratio without airfoil surface was 57% and 71 % for each case. These are the result from increase of density and change of velocity deflection by the shock wave structure formed between inlet and airfoil surface. On the other hand, the distortion of Mach number at cowl lip plane increased by 13% in M=2.0, 3% in M=2.5 condition. The effects of the angle attack on the mass capture ratio is greater than that of the shock wave interaction between inlet and cowl, but the effects to the distortion is smaller in the range of this calculation condition. In the condition of M=2.0 with 4 degrees of angle of attack, inlet distortion of Mach number is mainly caused by the affects of the shock wave interaction between inlet and airfoil surface, while the largest angle of the velocity vector in the radial direction at cowl lip plane is caused by the affect of angle of attack. This large velocity vector made the flow inside the cowl subsonic and caused spillage, which interfere with the boundary layer of airfoil surface.

  • PDF

The Risk of Wardriving Attack Against Wireless LAN and its Counterplan (무선랜 워드라이빙 공격의 위험성과 대응방안)

  • Choi, Young-Nam;Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2121-2128
    • /
    • 2009
  • The application range of IEEE 802.11 wireless LAN has rapidly expanding from campus, enterprise to the public network of Hot Spot area due to the advantages of easiness of construction, mobility of wireless client station, convenience of usage and so on. However the security of WLAN(Wireless LAN) is vulnerable inherently because of using RF as a medium, and so the dangers of infringement of personal information and inside data of enterprises have increased and wardriving attack searching for security vulnerability in wireless LAN has become more serious especially. In this paper, we find out the overview of various procedures and preparatory stages for wardriving attack against wireless LAN, and propose complementary methods to prevent information infringement accidents from wardriving attack in wireless LAN. For this purpose, we make an equipment which is suitable for wardriving in wireless LAN and show security vulnerability of AP(Access Point) operation in WLAN around Yangjae-Dong in Seoul as a result of using the equipment.

A Message Authentication and Key Distribution Mechanism Secure Against CAN bus Attack (CAN 버스 공격에 안전한 메시지 인증 및 키 분배 메커니즘)

  • Cho, A-Ram;Jo, Hyo Jin;Woo, Samuel;Son, Young Dong;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1057-1068
    • /
    • 2012
  • According to advance on vehicle technology, many kinds of ECU(Electronic Control Unit) are equipped inside the vehicle. In-vehicle communication among ECUs is performed through CAN(Controller Area Networks). CAN have high reliability. However, it has many vulnerabilities because there is not any security mechanism for CAN. Recently, many papers proposed attacks of in-vehicle communication by using these vulnerabilities. In this paper, we propose an wireless attack model using a mobile radio communication network. We propose a secure authentication mechanism for in-vehicle network communication that assure confidentiality and integrity of data packets and also protect in-vehicle communication from the replay attack.

Periodic-and-on-Event Message-Aware Automotive Intrusion Detection System (Periodic-and-on-Event 메시지 분석이 가능한 차량용 침입탐지 기술)

  • Lee, Seyoung;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.373-385
    • /
    • 2021
  • To provide convenience and safety of drivers, the recent vehicles are being equipped with a number of electronic control units (ECUs). Multiple ECUs construct a network inside a vehicle to share information related to the vehicle's status; in addition, the CAN protocol is normally applied. As the modern vehicles provide highly convenient and safe services, it provides many types of attack surfaces; as a result, it makes them vulnerable to cyber attacks. The automotive IDS (Intrusion Detection System) is one of the promising techniques for securing vehicles. However, the existing methods for automotive IDS are able to analyze only periodic messages. If someone attacks on non-periodic messages, the existing methods are not able to properly detect the intrusion. In this paper, we present a method to detect intrusions including an attack using non-periodic messages. Moreover, we evaluate our method on the real vehicles, where we show that our method has 0% of FPR and 0% of FNR under our attack model.

Performance Improvement of Power Attacks with Truncated Differential Cryptanalysis (부정차분을 이용한 전력분석 공격의 효율 향상*)

  • Kang, Tae-Sun;Kim, Hee-Seok;Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.43-51
    • /
    • 2009
  • In 1998, Kocher et al. introduced Differential Power Attack on block ciphers. This attack allows to extract secret key used in cryptographic primitives even if these are executed inside tamper-resistant devices such as smart card. At FSE 2003 and 2004, Akkar and Goubin presented several masking methods, randomizing the first few and last few($3{\sim}4$) rounds of the cipher with independent random masks at each round and thereby disabling power attacks on subsequent inner rounds, to protect iterated block ciphers such as DES against Differential Power Attack. Since then, Handschuh and Preneel have shown how to attack Akkar's masking method using Differential Cryptanalysis. This paper presents how to combine Truncated Differential Cryptanalysis and Power Attack to extract the secret key from intermediate unmasked values and shows how much more efficient our attacks are implemented than the Handschuh-Preneel method in term of reducing the number of required plaintexts, even if some errors of Hamming weights occur when they are measured.

Heat Transfer in a Two Wall Divergent Rectangular Channel with V-Shaped Ribs on One Wall (한 벽면에 V형 리브가 있는 2면 확대 사각채널의 열전달)

  • Lee, Myung-Sung;Ahn, Soo-Whan
    • Journal of Power System Engineering
    • /
    • v.19 no.5
    • /
    • pp.32-37
    • /
    • 2015
  • The present study is to investigates the convective heat transfer characteristics and pressure drop inside the rib-roughened cooling passage of gas turbine blades. The divergent rectangular channel is fabricated with V-shaped ribs on one wall only and the inlet hydraulic diameter to outlet hydraulic diameter ratio($D_{ho}/D_{hi}$) of 1.49 is used. The current investigation has covered a Reynolds number (Re) range of 22,000~75,000, relative roughness height ($e/D_h$) of 0.1~0.2, and rib angle of attack (a) of $30^{\circ}$, $45^{\circ}$, and $60^{\circ}$ for a fixed relative pitch of 10. Results show that the Nusselt numbers are the greatest in the $60^{\circ}$-angled ribs; however, the total friction factors are the highest in the $30^{\circ}$-angled ribs.