• Title/Summary/Keyword: PA Attack

Search Result 15, Processing Time 0.024 seconds

Performance Improvement of Power Analysis Attacks based on Wavelet De-noising (웨이블릿 잡음 제거 방법을 이용한 전력 분석 공격 성능 개선)

  • Kim, Wan-Jin;Song, Kyoung-Won;Lee, Yu-Ri;Kim, Ho-Won;Kim, Hyoung-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1330-1341
    • /
    • 2010
  • Power analysis (PA) is known as a powerful physical attack method in the field of information security. This method uses the statistical characteristics of leaked power consumption signals measured from security devices to reveal the secret keys. However, when measuring a leakage power signal, it may be easily distorted by the noise due to its low magnitude values, and thus the PA attack shows different performances depending on the noise level of the measured signal. To overcome this vulnerability of the PA attack, we propose a noise-reduction method based on wavelet de-noising. Experimental results show that the proposed de-noising method improves the attack efficiency in terms of the number of signals required for the successful attack as well as the reliability on the guessing key.

On the Security of S3PAS against Intersection Attack (S3PAS의 교차 공격에 대한 위협성 분석)

  • Shin, Dong-Oh;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.77-84
    • /
    • 2011
  • While The passwords that combined with characters and numbers are easy to memorize and use, they have low complexity. Therefore they can easily be revealed by the shoulder-surfing attack when they are inputted through the input devices such like keyboard. To overcome these problems, many new authentication schemes, which change the user secret different form or let users input their secrets through the more complex manners, have been suggested, but it is still hard to find the balanced point between usability and security. S3PAS is one of well-known schemes which had both usability and security against shoulder-surfing attack. However, this scheme was not considered about intersection attack that the attacker tried to pass the authentication system after observing several authentication sessions. In this paper, we consider the security problem of S3PAS; what the attacker can do when he can observe the authentication sessions in several times. We confirm it through user study and experiments. And also we consider the alternative that overcomes the problem.

Lightweight Capability-Based Access Control System on File Descriptor via ARM PA (ARM PA를 통한 경량화된 파일 디스크립터 권한 관리 시스템)

  • Kyuwon Cho;Hojoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.319-323
    • /
    • 2023
  • In intra-process isolation, file descriptors work as another attack vector from the memory corruption attacks. The attacker can read or write by corrupting file descriptors so they can escape the isolation. In this paper, we propose new lightweight capability-based access control system on file descriptor using ARM's hardware extension, PA(Pointer Authentication). Our system was implemented on Linux kernel module, only shows 5% overhead to control the access on the file descriptor.

Primary Aldosteronism and Cerebrovascular Diseases

  • Chen, Zheng-Wei;Hung, Chi-Sheng;Wu, Vin-Cent;Lin, Yen-Hung;TAIPAI study group
    • Endocrinology and Metabolism
    • /
    • v.33 no.4
    • /
    • pp.429-434
    • /
    • 2018
  • As diagnostic techniques have advanced, primary aldosteronism (PA) has emerged as the most common cause of secondary hypertension. The excess of aldosterone caused by PA resulted in not only cardiovascular complications, including coronary artery disease, myocardial infarction, arrhythmia, and heart failure, but also cerebrovascular complications, such as stroke and transient ischemic attack. Moreover, PA is associated more closely with these conditions than is essential hypertension. In this review, we present up-to-date findings on the association between PA and cerebrovascular diseases.

Experimental Environment Analysis for Power Analysis Attacks (전력분석공격에 대한 실험환경 분석)

  • Kang, Young Jin;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.390-393
    • /
    • 2014
  • The importance of this emerging information security and u-Korea or ubiquitous IT era, and the information security is more important. Especially, the small core device password encryption algorithm is an important part of the secure side channel attack cryptographic algorithms. However, it can provide high level of security, an adversary can attack small core device through implementation of cryptographic algorithms. In this paper describes for the Power Analysis attack and analyze the experimental environment.

  • PDF

Research of Characterization of Covalently Cross-linked SPEEK/Cs-Substituted MoPA/Ceria 1wt% Composite Membrane for Water Electrolysis (Cs 치환에 따른 수전해용 공유가교 SPEEK/Cs(n)-MoPA/Ceria 1%(n = 1~3) 복합막의 특성 연구)

  • Park, Daeyoung;Hwang, Sungha;Oh, Seunghee;Yoon, Daejin;Kang, Ansoo;Moon, Sangbong;Chung, Janghoon
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.25 no.1
    • /
    • pp.1-10
    • /
    • 2014
  • Ceria ($CeO_2$) was used to scavenge free radicals which attack the membrane in the polymer electrolyte membrane water electrolysis (PEMWE) circumstance and to increase the duration of the membrane. In order to improve the electrochemical, mechanical and electrocatalytic characteristics, engineering plastic of the sulfonated polyether ether ketone (SPEEK) as polymer matrix was prepared in the sulfonation reaction of polyether ether ketone (PEEK) and the organic-inorganic blended composite membranes were prepared by sol-gel casting method with loading the highly dispersed ceria and cesium-substituted phophomolybdic acid(Cs-MoPA) with cross-linking agent contents of 0.01mL. In conclusion, CL-SPEEK/$Cs_{(2.5)}$-MoPA/ceria(1%) membrane showed the optimum results such as 0.1095S/cm of proton conductivity at $80^{\circ}C$, 2.906meq./g-dry-membrane of ion exchange capacity and mechanical characteristics, and 49.73MPa of tensile strength which were better than Nafion 117 membrane.

DDoS Prevention System Using Double Firewall and Multi-Filtering Method (이중 방화벽과 다중 필터링을 이용한 DDoS 차단 시스템)

  • Cho, jiHo;Shin, Jiyong;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.65-72
    • /
    • 2014
  • This paper proposes multi-filtering method on the double firewall to prevent DDoS attack. In the first firewall, R-PA filtering algorithm and rigid hop counter filtering method are applied by analyzing packet paths. In the second firewall, packets are examined to be distinguished abnormal from normal packets. Security policy system monitors each user sessions and if the traffic is over the threshold value, the system blocks that session for an assigned time.

Papers : Effects of LEX on the Surface Pressure Distribution over a Delta Wing (논문 : LEX 가 델타형 날개의 표면압력분포에 미치는 영향)

  • Baek, Seung-Uk;Son, Myeong-Hwan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.30 no.3
    • /
    • pp.1-7
    • /
    • 2002
  • An experimental study was conducted to investigate the effects of leading edge extension(LEX) on the surface prssure distribution over a delta wing in a subsonic wind tunnel. Freestream velocity was 40m/sec and Reynolds number per meter was 1.7x$10^6$ with total pressure of 101Pa and total temperature of 278K. LEX changed the surface pressure distribution on the wing dramatically. Comparing with the results without LEX, the peak of pressure distribution decreased on the front chordwise location but it turned to increase on the rear chordwise location with increase of the angle of attaci. The spanwise gradient of the pressure distribution also increased in the rear chordwise location. Without LEX, the peak of pressure distribution increased and decreased irregularly with increase of the angle of attack at each chordwise location, but LEX made it increased almost linearly with increase of the angle of attack at all of the chordwise locations.

A Study on Control Law Augmentation in order to Improve Aircraft Controllability and Stability in High Angle of Attack (고받음각에서 조종성능 및 안정성 증강을 위한 제어법칙에 관한 연구)

  • Kim, Chong-Sup;Hwang, Byung-Moon;Lee, Dong-Gyu
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.10
    • /
    • pp.60-67
    • /
    • 2005
  • Modern version of supersonic jet fighter aircraft must have guaranteed appropriate controllability and stability in HAoA(high angle of attack). Limit value of aircraft entering into the deep stall in HAoA is related to aircraft configuration design. But, In order to guarantee the aircraft's safety in HAoA, control law for HAoA region implemented in digital Fly-By-Wire flight control system of supersonic jet fighter. The AoA limiter is designed for positive HAoA in longitudinal control law. But, aircraft departure during aggressive negative pitch maneuver such as push over in departure resistance flight test. Therefore negative AoA limiter is needed in longitudinal control law. Result of T-50 flight test show that the AoA is exceed the limit value during aggressive positive pitch maneuver in pull up of power approach mode. In this paper, the AoA limit control law in positive and negative AoA was proposed in order to improve aircraft controllability and stability.

Development and Validation of Automatic Thrust Control System (자동추력 제어시스템 개발 및 검증)

  • Kim, Chong-Sup;Cho, In-Je;Lee, Dong-Kyu
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.9
    • /
    • pp.905-912
    • /
    • 2010
  • Modern version of advanced supersonic fighter have ATCS (Automatic Thrust Control System) to maximum flight safety, fuel efficiency and mission capability the integrated advanced autopilot system such as TFS (Terrain Following System), GCAS (Ground Collision Avoidance System) and AARS (Automatic Attitude Recovery System) and etc. This paper addresses the design and verification of ATCS based on advanced supersonic trainer in HILS (Hardware In the Loop Simulator) with minimum hardware modification to reduce of development cost and maintain of system reliability. The function of ATCS is consisted of target speed hold mode in UA (Up and Away) and angle of attack hold mode in PA (Power Approach). The real-time pilot evaluation reveals that pilot workload is minimized in cruise and approach flight stage by ATCS.