• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.026 seconds

A New TWA-Based Efficient Signal Integrity Verification Technique for Complicated Multi-Layer RLC Interconnect Lines (복잡한 다층 RLC 배선구조에서의 TWA를 기반으로 한 효율적인 시그널 인테그러티 검증)

  • Jo Chan-Min;Eo Yung-Seon
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.7 s.349
    • /
    • pp.20-28
    • /
    • 2006
  • A new TWA(Traveling-wave-based Waveform Approximation)-based signal integrity verification method for practical interconnect layout structures which are composed of non-uniform RLC lines with various discontinuities is presented. Transforming the non-uniform lines into virtual uniform lines, signal integrity of the practical layout structures can be very efficiently estimated by using the TWA-technique. It is shown that the proposed technique can estimate the signal integrity much more efficiently than generic SPICE circuit model with 5% timing error and 10% crosstalk error.

Health Status and Ego-Integrity of the Permanent Elderly Returnees from Sakhalin (사할린 영주귀국 노인의 건강상태와 자아통합감)

  • Yi, Young-Soo;Sohng, Kyeong-Yae
    • Journal of Korean Public Health Nursing
    • /
    • v.30 no.1
    • /
    • pp.5-16
    • /
    • 2016
  • Purpose: This correlational study was conducted to determine the relationship between health status and ego integrity of permanent elderly returnees from Sakhalin. Methods: We surveyed 94 permanent elderly returnees from Sakhalin, living in Gimpo, Korea. Data were analyzed using the SPSS/WIN 18.0 program for descriptive statistics, t-test, $Scheff{\acute{e}}$ test, ANOVA, and Pearson correlation coefficient. Results: The mean score of total health status was 3.7 on a 5 point Likert scale. The mean score of ego integrity was 3.6 on a 5 point Likert scale. The health status showed significant correlation with the ego integrity of the permanent elderly returnees from Sakhalin. Conclusion: In the present study, although the health status of the permanent elderly returnees from Sakhalin appeared to be good, the lack of awareness about health care and the need for ego integrity, is in itself the actual suffering. Thus by providing health education along with medical information can enhance the health management. And, this practice can be self regulating for the society and can provide institutional support for the permanent elderly returnees from Sakhalin, which they require.

Effects of Integrity, Ability, and Benevolence on Trust Buildup in Information Technology Environment (정보기술환경에서 무결성, 능력, 배려 요인이 신뢰에 미치는 영향에 대한 분석)

  • Namn, Su-Hyeon
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.313-323
    • /
    • 2011
  • We study how the three antecedents of trust such as integrity, ability and benevolence affect trust building, based on the articles extracted from the New York Times during 1981-2010. Major findings are that the ratio of negative impact on trust from integrity is 86%, whereas the ratios of positive impact on trust from ability and benevolence are 70% and 71% respectively. Statistical tests show that the hypothesis that the negative impact of integrity on trust build-up will be higher is supported, but the most unstructured benevolence related hypotheses are not confirmed due to small sample sizes. Based on the study, we suggest that the future direction of IT application should accommodate benevolence factor seriously to fulfill corporate social responsibility.

Legal System and Regulation Analysis by S/W Development Security (S/W 개발 분석 단계에서 암호화)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.221-222
    • /
    • 2014
  • This paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security.

  • PDF

A study on the vulnerability of integrity verification functions of android-based smartphone banking applications (안드로이드 스마트폰 뱅킹 앱 무결성 검증 기능의 취약점 연구)

  • Kim, Soonil;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.743-755
    • /
    • 2013
  • In recent years, the malicious apps with malicious code in normal apps are increasingly redistributed in Android market, which may incur various problems such as the leakage of authentication information and transaction information and fraudulent transactions when banking apps to process the financial transactions are exposed to such attacks. Thus the financial authorities established the laws and regulations as an countermeasures against those problems and domestic banks provide the integrity verification functions in their banking apps, yet its reliability has not been verified because the studies of the safety of the corresponding functions have seldom been conducted. Thus this study suggests the vulnerabilities of the integrity verification functions of banking apps by using Android reverse engineering analysis techniques. In case the suggested vulnerabilities are exploited, the integrity verification functions of banking apps are likely to be bypassed, which will facilitate malicious code inserting attacks through repackaging and its risk is very high as proved in a test of this study. Furthermore this study suggests the specific solutions to those vulnerabilities, which will contribute to improving the security level of smartphone financial transaction environment against the application forgery attacks.

Design and Implementation of VIES for Integrity Evaluation in VPN (VPN의 데이터 무결성 평가를 위한 VIES 설계 및 구현)

  • Lee, Dong-Chun;Kim, Jeom-Gu;Jo, Seok-Pal
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.481-488
    • /
    • 2002
  • Guarantee of the data integrity is important to the Virtual Private Network (VPN) which can be improved cost decreasing and effective work by applying on Internet as the private network. Thus, the integrity function in the VPN must be maintained and the security manager must be check it occasionally. In this paper we propose the VPN Integrity Evaluation System (VIES) which is collecting, and evaluating automatically the vulnerable data of VPN against current hacking mechanisms in information security system. And this VIES obtain to the results which have objectivity and fairness of evaluation by driving off the evaluation scenario based on Common Criteria (CC), and general users or non-specialist can utilize easy the security evaluation of organization.

Fault Detection Performance Analysis of GNSS Integrity RAIM (GNSS 무결성을 위한 RAIM 기법의 고장검출 성능 분석)

  • Kim, Ji Hye;Park, Kwan Dong;Kim, Du Sik
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.20 no.3
    • /
    • pp.49-56
    • /
    • 2012
  • Performance analysis on RAIM, which is one of the techniques for monitoring integrity to ensure the reliability of GPS, was conducted in this study. RAIM is such a method which allows its user to monitor integrity in the stand-alone mode. Among the existing RAIM procedures, the representative methods including the RCM (Range Comparison Method), LSRM (Least Square Residual Method), Parity approach and WRAIM (Weighted RAIM) were evaluated, and their performance was analyzed. To validate the performance of the implemented algorithms, fault detection was tried on the clock malfunctioning event of PRN 23 occurred on January 1st, 2004. As a result, it was identified that the LSRM and the WRAIM detected all the faults happened in the event. In the case of RCM, all the states of fault were detected except for the error which occurred as a false alarm at one epoch. Furthermore, simulated biases were added for each satellite to analyze the sensitivity of each algorithm. Consequently, when biases of the 9-13 meters range were simulated for the RCM and LSRM algorithm, all the malfunctions were detected. For the WRAIM method, it could detect range biases greater than 15 meters.

A Study on Forensic Integrity Proof Standard a Cellular Phone Confiscation Criminal Investigation (휴대폰 압수수색 표준절차와 포렌식 무결성 입증)

  • Lee, Gyu-An;Park, Dae-Woo;Shin, Young-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.6C
    • /
    • pp.512-519
    • /
    • 2008
  • The proof of a cellular phone used to a crime important data of a criminal investigation and legal judgment become. A lot of on a process use the file format that do not become that is kind of various cellular phones and model pipe, and collect criminal proof, and to analyze be difficult. Also, standardization is not made, and can be adopted on procedures from confiscation search processes regarding a cellular phone to integrity extractions of Forensic data in courts in the confiscation criminal investigation spots. Standardize confiscation search procedures of a cellular phone at these papers. Use a radio waves interception envelope and radio waves interception device for a movement which a security does integrity of criminal on-site cellular phone confiscation search data by standard procedures, and was devoted to. Analyze corroborative facts of a cellular phone seized, and verify integrity, and present problems regarding cellular phone confiscation search procedures and measures, and will contribute in development of Mobile Forensic through integrity damage experiment.

Design of CCTV Enclosure Record Management System based on Blockchain

  • Yu, Kwan Woo;Lee, Byung Mun;Kang, Un Gu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.141-149
    • /
    • 2022
  • In this paper, we propose a design of CCTV enlcosure record management system based on blockchain. Since CCTV video records are transferred to the control center through enclosure, it is very important to manage the enclosure to prevent modulation and damage of the video records. Recently, a smart enclosure monitoring system with real-time remote monitoring and opening and closing state management functions is used to manage CCTV enclosures, but there is a limitation to securing the safety of CCTV video records. The proposed system detect modulated record and recover the record through hash value comparison by distributed stored record in the blockchain. In addition, the integrity verification API is provided to ensure the integrity of enclosure record received by the management server. In order to verify the effectiveness of the system, the integrity verification accuracy and elapsed time were measured through experiments. As a result, the integrity of enclosure record (accuracy: 100%) was confirmed, and it was confirmed that the elapsed time for verification (average: 73 ms) did not affect monitoring.

TCST : A Technology for Verifying Control Flow Integrity for Smart Contracts within a Trusted Execution Environment (TCST : 신뢰실행환경 내에서 스마트 컨트랙트의 제어 흐름 무결성 검증을 위한 기술)

  • Park, Seonghwan;Kwon, Donghyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1103-1112
    • /
    • 2022
  • Blockchain technology is widespread in everyday life and various industry fields. It guarantees integrity and transparency between blockchain network participants through a distributed ledger. The smart contract is modifying and managing the distributed ledger, which is the most important component of guaranteeing integrity and transparency of blockchain network. Still, smart contracts are also a component of blockchain networks, it is disclosed to network participants transparently. For this reason, the vulnerability of smart contracts could be revealed easily. To mitigate this, various studies are leveraging TEE to guarantee the confidentiality of smart contracts. In existing studies, TEE provides confidentiality of smart contracts but guaranteeing the integrity of smart contracts is out of their scope. In this study, we provide not only the confidentiality of smart contracts but also their integrity, by guaranteeing the CFI of smart contracts within TEE.