• Title/Summary/Keyword: Memory Attack

Search Result 129, Processing Time 0.023 seconds

A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad (스마트 보안패드를 이용한 안전한 인터넷 서비스 제공 모델에 관한 연구)

  • Lee, Jae-Sik;Kim, Hyung-Joo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1428-1438
    • /
    • 2013
  • Services take place in Internet environment, a formation of the trust relationship between user and service provider for services. Different authentication schemes such as using Certificate of Public Key Infrastructure authentication and using ID/PW for a simple user authentication have been proposed for trust relationship. In addition, in the case of electronic financial transactions, transaction integrity and non-repudiation features are provided. These services are provided in Internet environment, use various measures to ensure service safety. However, it was difficult to prevent attacks using existing security technology because of emergence of MITB attack that manipulate the memory area of the Web browser and social engineering attacks such as phishing/pharming, requires application of new security technologies became. In this paper, we propose a concept of smart secure-pad, and utilize it safely formed a trust relationship between user and service provider, a model has been proposed to ensure safety of data transmission. Proposed model's security evaluation results show security against to MITB attack and phishing/pharming that can't be prevent attack using existing security technology. In addition, service provider can easily apply the model in safe environment can provide Internet service using provided representative services applying the proposed model.

Korean EFL learners' perception and the effects of structured input processing (구조화된 입력처리 문법지도에 대한 학습자의 인식과 효과)

  • Hwang, Seon-Yoo
    • English Language & Literature Teaching
    • /
    • v.12 no.3
    • /
    • pp.267-286
    • /
    • 2006
  • The purpose of the study was to investigate what kinds of learning strategies EFL learners use to learn English grammar and what is benefit from structured grammar input processing. Students of the study consisted of 48 college students who took Practical English Grammar at a university in Kyung-Gi area and were divided into two groups based on grammar scores. The students were asked to take two grammar tasks and grammar tests and complete a survey including questions on grammar strategy and input processing. The results of the study are as follows. First, learners' grammar level has an effect on use of grammar attack strategy including asking teachers, using grammar books and given contexts whereas there was no significant difference between groups in the planning strategies, Among memory strategies, using grammar exercise and linking with already known structure demonstrated a significant difference between groups. Second, with regard to input processing, high level students got higher score on how much they understood the structured grammar input compared with low level students. Third, explicit implicit instruction added to input processing seems more comprehensible and more available than structured input only, Finally, it showed that there is positive relationship between perception and score of input processing tasks and grammar tests. Especially, learners' perception of input processing correlated more with final tests and tasks. Therefore, it suggests that the more input processing task need to develop and utilize in order to facilitate learners' intake.

  • PDF

RFID Authenticated Encryption Scheme of Multi-entity by Elliptic Curve's Coordinates (타원곡선 좌표계를 이용한 RFID 다중객체 간 인증 암호기법)

  • Kim, Sung-Jin;Park, Seok-Cheon
    • Journal of Internet Computing and Services
    • /
    • v.9 no.3
    • /
    • pp.43-50
    • /
    • 2008
  • Authenticated Encryption scheme in RFID system is the important issue for ID security. But, implementing authenticated Encryption scheme in RFID systems is not an easy proposition and systems are often delivered for reasons of complexity, limited resources, or implementation, fail to deliver required levels of security. RFID system is so frequently limited by memory, performance (or required number of gates) and by power drain, that lower levels of security are installed than required to protect the information. In this paper, we design a new authenticated encryption scheme based on the EC(Elliptic Curve)'s x-coordinates and scalar operation. Our scheme will be offers enhanced security feature in RFID system with respect to user privacy against illegal attack allowing a ECC point addition and doubling operation.

  • PDF

Study on selective PR removal at Color filter process (Color Filter Process에서 선택적 Photoresist 제거방안에 대한 연구)

  • Lee, Sang-Eon;Park, Jung-Dae;Huh, Dong-Chul;Hah, Steve;Lee, Sun-Yong;Roh, Yong-Han
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.95-96
    • /
    • 2006
  • CMOS Image Sensor(CIS) 소자에서 광감도의 향상과 천연색 형성을 위하여 적용하고 있는 Color-Filter 공정에서 국부적으로 발생하는 strip성 불량과 막질손상을 제거하기 위한 연구를 진행하였다. 우선 지역적 경향성을 보이는 불량에 대해서는 PR strip process type을 액조 진행방식에서 회전식으로 변경했을 때 제거됨을 확인하였고, 막질손상을 최소화하기 위해서는 새로운 유기용매의 적용이 필요하였다. 실험 결과, 케톤기를 가지는 화합물과 Polar Apotic 용매의 혼합화합물을 적용하였을 때 각 막질에 attack을 최소화하면서 원하는 PR만 선택적으로 제거 되며 미세잔류성분에 대한 제거력도 향상됨을 확인하였다.

  • PDF

Pragmatic Reachability Analysis of Bounded Petri Nets based on Unfoldings (언폴딩에 기반한 유한페트리넷의 실용적 도달가능성 분석)

  • Kim, Eui-Seok;Lee, Jeong-Gun;Lee, Dong-Ik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.6
    • /
    • pp.599-607
    • /
    • 2000
  • This paper suggests an efficient reachability analysis method of bounded petri nets. Reachability analysis is a fundamental basis for studying the dynamic properties of any discrete event systems. However, it takes at least exponential execution time and memory space to verify in general petri nets. That is, state space explosion problem may occur. In this paper, we attack problems of previous approaches - state space explosion and restrictions to applicable petri net classes - by formulating the reachability problem as set operation over structural relations among places on an unfolding.

  • PDF

Video Based Face Spoofing Detection Using Fourier Transform and Dense-SIFT (푸리에 변환과 Dense-SIFT를 이용한 비디오 기반 Face Spoofing 검출)

  • Han, Hotaek;Park, Unsang
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.483-486
    • /
    • 2015
  • Security systems that use face recognition are vulnerable to spoofing attacks where unauthorized individuals use a photo or video of authorized users. In this work, we propose a method to detect a face spoofing attack with a video of an authorized person. The proposed method uses three sequential frames in the video to extract features by using Fourier Transform and Dense-SIFT filter. Then, classification is completed with a Support Vector Machine (SVM). Experimental results with a database of 200 valid and 200 spoof video clips showed 99% detection accuracy. The proposed method uses simplified features that require fewer memory and computational overhead while showing a high spoofing detection accuracy.

A Study on the Trend of an Avionics System Architecture Development for UAV (무인기 항공전자 체계의 아키텍처 개발 동향연구)

  • Kim, Sung Woo;Sim, Jae Ick;Lee, Wang Gug;Lee, Woo Jin;Won, Dae Yeon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.436-447
    • /
    • 2014
  • The major elements of avionics system architecture are requirements, Real Time Operating System, message communication, memory, and data format etc. Herein describes a state-of-the-art development trend for the avionics system architecture, system requirements and data bus among the major elements of avionics system. While, domestic technology has been tried to Integrated Modular Avionics(IMA) system based on the Avionics Full Duplex Switched Ethernet(AFDX) technology during Light Attack Helicopter(LAH) project in Korea, but not yet proved as the product case in Full Scale Development Phase. The avionics system architecture considering the domestic inexperience of the IMA system architecture are suggested for the Next-generation Corps Unmanned Aircraft System.

A JTAG Protection Method for Mobile Application Processors (모바일 애플리케이션 프로세서의 JTAG 보안 기법)

  • Lim, Min-Soo;Park, Bong-Il;Won, Dong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.4
    • /
    • pp.706-714
    • /
    • 2008
  • In this paper, we suggest a practical and flexible system architecture for JTAG(Joint Test Action Group) protection of application processors. From the view point of security, the debugging function through JTAG port can be abused by malicious users, so the internal structures and important information of application processors, and the sensitive information of devices connected to an application processor can be leak. This paper suggests a system architecture that disables computing power of computers used to attack processors to reveal important information. For this, a user authentication method is used to improve security strength by checking the integrity of boot code that is stored at boot memory, on booting time. Moreover for user authorization, we share hard wired secret key cryptography modules designed for functional operation instead of hardwired public key cryptography modules designed for only JTAG protection; this methodology allows developers to design application processors in a cost and power effective way. Our experiment shows that the security strength can be improved up to $2^{160}{\times}0.6$second when using 160-bit secure hash algorithm.

mNPKI for Mobile Government in Developing Countries (개발도상국의 모바일 정부를 위한 mNPKI)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.161-171
    • /
    • 2019
  • Government transactions over wireless electronic devices are not safe and hence the messages are prone to attack. Thereby, devices supporting wireless Internet must assure the same level of security and privacy as the wired network. National public key infrastructure (NPKI) for electronic government used in the wired environment is not suitable for wireless environment for mobile government (mGovernment) because of the limitations of computing power, memory capacity and restricted battery power. This requires the development of a new NPKI for mGovernment, denoted as mNPKI, to developing countries, which provides the same security level as the wired NPKI. For the wireless environment requirements, mNPKI is based on short lived certificates. Analysis shows that mNPKI is well suited to wireless Internet and provides the same security requirement from the wired NPKI.

Improved Group Key Exchange Scheme Secure Against Session-State Reveal Attacks (세션상태 정보 노출 공격에 안전한 개선된 그룹 키 교환 프로토콜)

  • Kim, Ki-Tak;Kwon, Jeong-Ok;Hong, Do-Won;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.3-8
    • /
    • 2008
  • Ephemeral data are easily revealed if state specific information is stored in insecure memory or a random number generator is corrupted. In this letter, we show that Nam et al.'s group key agreement scheme, which is an improvement of Bresson et al.'s scheme, is not secure against session-state reveal attacks. We then propose an improvement to fix the security flaw.