• Title/Summary/Keyword: Memory vulnerability

Search Result 62, Processing Time 0.029 seconds

Security-Enhanced Local Process Execution Scheme in Cloud Computing Environments (클라우드 컴퓨팅 환경에서 보안성 향상을 위한 로컬 프로세스 실행 기술)

  • Kim, Tae-Hyoung;Kim, In-Hyuk;Kim, Jung-Han;Min, Chang-Woo;Kim, Jee-Hong;Eom, Young-Ik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.5
    • /
    • pp.69-79
    • /
    • 2010
  • In the current cloud environments, the applications are executed on the remote cloud server, and they also utilize computing resources of the remote cloud server such as physical memory and CPU. Therefore, if remote server is exposed to security threat, every applications in remote server can be victim by several security-attacks. Especially, despite many advantages, both individuals and businesses often have trouble to start the cloud services according to the malicious administrator of the cloud server. We propose a security-enhanced local process executing scheme resolving vulnerability of current cloud computing environments. Since secret data is stored in the local, we can protect secret data from security threats of the cloud server. By utilizing computing resource of local computer instead of remote server, high-secure processes can be set free from vulnerability of remote server.

A Design and Implementation of Intelligent Self-directed learning APP for Considering User Learning Level (학습 수준정보를 반영한 지능형 자기 주도 학습 앱 설계 및 구현)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.4
    • /
    • pp.55-62
    • /
    • 2013
  • Most of the APP market today, it is biased in the field of games and entertainment. In contrast, market-share of the educational APP is very low. This phenomenon is due to two major problems. The first is a decrease in the reuse because of the test of simple pattern. The second is difficult to consider user-level range that was learned previously. In this case it is necessary for students to do additional effort. This paper, propose an educational intelligent educational APP to solve the problems described above and shows implementation results. This system analyzes the stored results that have been saved to determine the area of vulnerability. Time-based Re-validation module helps long-term memory of student. The proposed system in this way directly supports self-directed learning. Therefore, the students can be able to relearn weak area autonomously. It results in improved academic achievement.

  • PDF

Research about Security Attack Methods to Arduino Boards Using Temporary Files Data Manipulation (임시파일 데이터 조작을 통한 아두이노 보드 공격 기법에 관한 연구)

  • Lee, Woo Ho;Jung, Hyun Mi;Jeong, Kimoon
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.21-27
    • /
    • 2017
  • Internet of Things(IoT), which is developing for the hyper connection society, is based on OSHW (Open Source Hardware) such as Arduino and various small products are emerging. Because of the limitation of low performance and low memory, the IoT is causing serious information security problem that it is difficult to apply strong security technology. In this paper, we analyze the vulnerability that can occur as a result of compiling and loading the application program of Arduino on the host computer. And we propose a new attack method that allows an attacker to arbitrarily change the value input from the sensor of the arduino board. Such as a proposed attack method may cause the arduino board to misinterpret environmental information and render it inoperable. By understanding these attack techniques, it is possible to consider how to build a secure development environment and cope with these attacks.

Low-weight Secure Encryption Protocol on RFID for Manufactory Automation (공장 자동화를 위한 RFID 경량 암호 프로토콜에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.173-180
    • /
    • 2016
  • There has been a growing interest in automation of factories in the country. And, the development in this regard has been actively attempted. In particular, on the basis of the "innovation 3.0 strategy of manufacturing industry", interest in the smart of the manufacturing plant of small and medium-sized enterprises has increased rapidly. As well as policy for building smart plant, technical, seeking a strategic approach. But, in order to introduce such a smart plant or factory automation systems, manufacturing plant security with vulnerability and personal information protection problems, it should always be top priority there. Accordingly, we provide the applicable lightweight secure protocols in RFID communication. It is a wireless communication technology that is most often introduced for factory automation. Our proposed lightweight secure protocol in this study, less the number of calculations in comparison with the existing public key-based and the symmetric key encryption algorithm. And it is fast in compare with the existing protocol. Furthermore, we design that it system can support to low power consumption and small consume the memory size.

Side-Channel Cryptanalysis on Stream Cipher HC-128 for Mobile Ad-Hoc Network Environments (이동 Ad-Hoc 네트워크 환경에 적합한 스트림 암호 HC-128의 부채널 안전성 분석)

  • Bae, KiSeok;Park, YoungHo;Moon, SangJae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.6
    • /
    • pp.11-17
    • /
    • 2012
  • The HC-128 stram cipher which selected for the final eSTREAM portfolio is suitable for mobile Ad-Hoc network environments because of the ability of high-speed encryption in restricted memory space. In this paper, we analyzed the vulnerability of side channel analysis attack on HC-128 stream cipher. At the first, we explain a flaw of previous theoretical analysis result which defined the complexity of side-channel attack of HC-128 stream cipher as 'low' and then re-evaluate the security against side-channel attack by estimating the concrete complexity for recovering the secret key. As a result, HC-128 stream cipher is relatively secure against side-channel attack since recovering the secret key have $2^{65}$ computation complexity which is higher than other stream cipher's one.

A Study of Privacy Protection Awareness of Mobile Phone Users (휴대폰 사용자의 개인정보 보호 의식 연구)

  • Rhee, Hae-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.5B
    • /
    • pp.386-394
    • /
    • 2008
  • Adoption of wireless communication facilities in mobile devices leads to increased vulnerability in individual privacy. One of such cases was discovered when a smart mobile phone of Paris Hilton at Oscar Award Ceremony was hacked a Swedish group of hackers. In this study, I wondered what sort of personal information could be exposed to hackers in such cases. In the course of survey, it was recognized that technical analysis of flash memory in mobile devices to check what kinds of data are stored there is technically almost impossible, since they are usually built in a proprietary manner. No generic tools could apply to discover their contents. Having recognized technical difficulties, it was inevitable to resort to a questionnaire survey to see awareness level with regard to personal privacy. We collected response from three hundred respondents by posting the questionnaire at World Survey on-line research site. What we have discovered was quite astonishing that even personal residence registration numbers have been found from nine of every ten respondents. Other data revealed include phone numbers, names, and personal bank accounts.

Aging of Immune System (면역 반응체계의 노화)

  • Chung, Kyung Tae
    • Journal of Life Science
    • /
    • v.29 no.7
    • /
    • pp.817-823
    • /
    • 2019
  • Immune system provides defense integrity of body against external invaders. In order to accomplish the important defending role immune system is composed of many different components which are regenerated continuously during lifespan. The key components are professional killing cells such as macrophage, neutrophil, natural killer cell, and cytotoxic T cell and professional blocking molecule, antibody, which is produced by plasma cell, the terminal differentiated B cell. Immune response is orchestrated harmoniously by all these components mediated through antigen presenting cells such as dendritic cells. Immune responses can be divided into two ways: innate immune response and adaptive immune response depending on induction mechanism. Aging is a broad spectrum of physiological changes. Likewise other physiological changes, the immune components and responses are wane as aging is progressing. Immune responses become decline and dysregulating, which is called immunosenescense. Immune components of both innate and adaptive immune response are affected as aging progresses leading to increased vulnerability to infectious diseases. Numbers of immune cells and amounts of soluble immune factors were decreased in aged animal models and human and also functional and structural alterations in immune system were reduced and declined. Cellular intrinsic changes were discovered as well. Recent researches focusing on aging have been enormously growing. Many advanced tools were developed to bisect aging process in multi-directions including immune system area. This review will provide a broad overview of aging-associated changes of key components of immunity.

Seismic damage mitigation of bridges with self-adaptive SMA-cable-based bearings

  • Zheng, Yue;Dong, You;Chen, Bo;Anwar, Ghazanfar Ali
    • Smart Structures and Systems
    • /
    • v.24 no.1
    • /
    • pp.127-139
    • /
    • 2019
  • Residual drifts after an earthquake can incur huge repair costs and might need to replace the infrastructure because of its non-reparability. Proper functioning of bridges is also essential in the aftermath of an earthquake. In order to mitigate pounding and unseating damage of bridges subjected to earthquakes, a self-adaptive Ni-Ti shape memory alloy (SMA)-cable-based frictional sliding bearing (SMAFSB) is proposed considering self-adaptive centering, high energy dissipation, better fatigue, and corrosion resistance from SMA-cable component. The developed novel bearing is associated with the properties of modularity, replaceability, and earthquake isolation capacity, which could reduce the repair time and increase the resilience of highway bridges. To evaluate the super-elasticity of the SMA-cable, pseudo-static tests and numerical simulation on the SMA-cable specimens with a diameter of 7 mm are conducted and one dimensional (1D) constitutive hysteretic model of the SMAFSB is developed considering the effects of gap, self-centering, and high energy dissipation. Two types of the SMAFSB (i.e., movable and fixed SMAFSBs) are applied to a two-span continuous reinforced concrete (RC) bridge. The seismic vulnerabilities of the RC bridge, utilizing movable SMAFSB with the constant gap size of 60 mm and the fixed SMAFSBs with different gap sizes (e.g., 0, 30, and 60 mm), are assessed at component and system levels, respectively. It can be observed that the fixed SMAFSB with a gap of 30 mm gained the most retrofitting effect among the three cases.

Software Security Testing using Block-based File Fault Injection (블록 기반 파일 결함 주입 기법을 이용한 소프트웨어 보안 테스팅)

  • Choi, Young-Han;Kim, Hyoung-Chun;Hong, Soon-Jwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.3-10
    • /
    • 2007
  • In this paper, we proposed the methodology for security testing using block-based file fault injection. When fault is inserted into software, we consider the format of file in order to efficiently reduce the error that is caused by mismatch of format of file. The Vulnerability the methodology focuses on is related to memory processing, such as buffer overflow, null pointer reference and so on. We implemented the automatic tool to apply the methodology to image file format and named the tool ImageDigger. We executed fault-injection focused on WMF and EMF file format using ImageDigger, and found 10 DOS(Denial of Service) in Windows Platform. This methodology can apply to block-based file format such as MS Office file.

Correlation Power Analysis Attacks on the Software based Salsa20/12 Stream Cipher (소프트웨어 기반 스트림 암호 Salsa20/12에 대한 상관도 전력분석 공격)

  • Park, Young-Goo;Bae, Ki-Seok;Moon, Sang-Jae;Lee, Hoon-Jae;Ha, Jae-Cheul;Ahn, Mahn-Ki
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.35-45
    • /
    • 2011
  • The Salsa20/12 stream cipher selected for the final eSTREAM portfolio has a better performance than software implementation of AES using an 8-bit microprocessor with restricted memory space, In the theoretical approach, the evaluation of exploitable timing vulnerability was 'none' and the complexity of side-channel analysis was 'low', but there is no literature of the practical result of power analysis attack. Thus we propose the correlation power analysis attack method and prove the feasibility of our proposed method by practical experiments, We used an 8-bit RISC AVR microprocessor (ATmegal128L chip) to implement Salsa20/12 stream cipher without any countermeasures, and performed the experiments of power analysis based on Hamming weight model.