• Title/Summary/Keyword: Pattern-lock

Search Result 57, Processing Time 0.025 seconds

Side-Channel Attack of Android Pattern Screen Lock Exploiting Cache-Coherent Interface in ARM Processors (ARM 캐시 일관성 인터페이스를 이용한 안드로이드 OS의 스크린 잠금 기능 부채널 공격)

  • Kim, Youngpil;Lee, Kyungwoon;Yoo, Seehwan;Yoo, Chuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.227-242
    • /
    • 2022
  • This paper presents a Cache-Coherency Interconnect(CCI)-based Android pattern screen lock(PSL) attack on modern ARM processors. CCI has been introduced to maintain the cache coherency between the big core cluster and the little core cluster. That is, CCI is the central interconnect inside SoC that maintains cache coherency and shares data. In this paper, we reveal that CCI can be a side channel in security, that an adversary can observe security-sensitive operations. We design and implement a technique to compromise Android PSL within only a few attempts using the information of CCI in user-level applications on Android Nougat. Further, we analyzed the relationship between the pattern complexity and security. Our evaluation results show that complex and simple patterns would have similar security strengths against the proposed technique.

A simplified vortex model for the mechanism of vortex-induced vibrations in a streamlined closed-box girder

  • Hu, Chuanxin;Zhao, Lin;Ge, Yaojun
    • Wind and Structures
    • /
    • v.32 no.4
    • /
    • pp.309-319
    • /
    • 2021
  • The vortex-drift pattern over a girder surface, actually demonstrating the complex fluid-structure interactions between the structure and surrounding flow, is strongly correlated with the VIVs but has still not been elucidated and may be useful for modeling VIVs. The complex fluid-structure interactions between the structure and surrounding flow are considerably simplified in constructing a vortex model to describe the vortex-drift pattern characterized by the ratio of the vortex-drift velocity to the oncoming flow velocity, considering the aerodynamic work. A spring-suspended sectional model (SSSM) is used to measure the pressure in wind tunnel tests, and the aerodynamic parameters for a typical streamlined closed-box girder are obtained from the spatial distribution of the phase lags between the distributed aerodynamic forces at each pressure point and the vortex-excited forces (VEFs). The results show that the ratio of the vortex-drift velocity to the oncoming flow velocity is inversely proportional to the vibration amplitude in the lock-in region and therefore attributed to the "lock-in" phenomena of the VIVs. Installing spoilers on handrails can destroy the regular vortex-drift pattern along the girder surface and thus suppress vertical VIVs.

Experimental Study on the Leakage Performance Characteristics of Floating Ring Seal (플로팅 링 실의 누설 특성에 관한 실험적 연구)

  • 안경민;이용복;김창호;하태웅
    • Tribology and Lubricants
    • /
    • v.20 no.4
    • /
    • pp.183-189
    • /
    • 2004
  • The floating ring seal is used in an oxidizer and a fuel pump of the turbo pump unit in the liquid rocket engine to optimize a leakage without rubbing phenomenon. The damper floating ring seal, one of the floating ring seals, is with round hole pattern surfaces. It can reduce the leakage by increased friction factor that obtained from experimental data. In this paper, the leakage test about floating ring seal and damper floating ring seal was conducted. The test result showed the leakage performance of damper floating ring seal was better than the leakage performance of floating ring seal. With the leakage test the lock-up and rotation test about seal was conducted and that position is measured. The relatively large lock-up eccentric ratio was obtained from the test result of damping floating ring seal. The attitude angle of seal increases with increasing of shaft rotation.

Experimental Study on the Leakage Performance Characteristics of floating Ring Seal (플로팅 링 실의 누설 특성에 관한 실험적 연구)

  • 안경민;이용복;김창호;하태웅
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2004.05a
    • /
    • pp.820-825
    • /
    • 2004
  • The floating ring seal is used in an oxidizer and a fuel pump of the turbo pump unit in the liquid rocket engine to optimize a leakage without rubbing phenomenon. The damper floating ring seal, one of the floating ring seals, is with round hole pattern surfaces. It can reduce the leakage by increased friction factor that obtained from experimental data. In this paper, the leakage test about floating ring seal and damper floating ring seal was conducted. The test result showed the leakage performance of damper floating ring seal was better than the leakage performance of floating ring seal. With the leakage test the lock-up and rotation test about seal was conducted and that position is measured. The relatively large lock-up eccentric ratio was obtained from the test result of damping floating ring seal. The attitude angle of seal increases with increasing of shaft rotation

  • PDF

A Study of the Chewing Patterns in Patients with Temporomandibular Disorders by Electrognathography (Electrognathography를 이용한 측두하악장애환자의 저작양태에 관한 연구)

  • Moon-Gyu Kim;Kyung-Soo Han
    • Journal of Oral Medicine and Pain
    • /
    • v.20 no.2
    • /
    • pp.291-306
    • /
    • 1995
  • Mandibular movement is composed of border movement and functional movement. Border movement such as maximal mouth opening, hinge opening ad lateral eccentric movement has good reproducibility, but functional movement such as chewing, swallowing and speech has also reproducibility. Especially for chewing movement, individual reproducibility has been confirmed by many studies. Study of chewing pattern is still in controversy. In new approach for raising the diagnostic value, numeric parameters and morphologic characteristics could be used for evaluation of chewing pattern. This study was performed to investigate the differences between chewing pattern in controls and in patients with temporomandibular disorders. Sixty-three patients with temporomandibular disorders participated in this study, and they were divided into unilaterally affected subjects or bilaterally affected subjects. Then unilaterally affected subjects were classified into closed lock group, disk displacement with reduction group, and degenerative joint disease group. For recording of chewing pattern, subjects were asked to chew one piece of presoftened chewing gum on both sides, and the chewing movement was recorded with the Electrognatho- Graphy(Bio-Research Associates Inc., U.S.A.). Tooth contact pattern for occlusal stability (Total left-right statistics )was also recorded with T-Scan(Tekscan Co., U.S.A.). The dta related to chewing pattern and total left-right statistics were statistically analyzed by SAS/stat program. The obtained results were as follows : 1. In patient group, mean value of A-P distance and the ratio of A-P distance to vertical distance were larger than control group, but the value of lateral distance in affected side and the closing velocity in unaffected side were smaller than that of control group, respectively. 2. In case of unilateral affected patients, chewing pattern of other side had tendency to restricted movement and slow velocity in closed lock group or degenerative joint disease group than control group or disk displacement with reduction group. 3. In bilateral degenerative joint disease patients, contralateral side had tendency to large range of motion and slow chewing velocity than preferred chewing side. 4. The patients with restricted mouth opening below than 35mm had higher value of total left-right statistics than patient group mouth opening above 35mm. Also closed lock group had higher total left-right statistics than disk displacement with reduction group, degenerative joint disease group and control group. 5. There was some difference in morphologic characteristics of chewing pattern between in control group and in affected side of unilateral patient group, but no difference between control group and unaffected side of unilateral patient group. 6. There were positive correlations between vertical distance and A-P distance, between vertical distance and chewing velocity, between A-P distance and chewing velocity, and between opening velocity and closing velocity in unilateral affected patients.

  • PDF

A Study on the Mandibular Movements in the Patients with TMJ Lock Closed (악관절 폐구성 과두걸림 환자의 하악운동에 관한 연구)

  • Ji-Won Lee;Sung-Chang Chung
    • Journal of Oral Medicine and Pain
    • /
    • v.15 no.1
    • /
    • pp.79-89
    • /
    • 1991
  • The author examined the patterns and various ranges of mandibular movements in TMJ lock closed patients in the frontal, sagittal and horizontal plane and obtained the following results. 1. In the frontal trajectory, the mean amount of maximum mouth opening was 24.4mm and the opening paths were deviated to the affected side in 87.1% of the patients. The mean amount of maximum laterotrusion to the affected side was 10.4mm and that of non-affected side was 7.5mm. There was a significant difference between them(p<0.001). 2. In the sagittal trajectory, the mean amount of the maximum protrusion was 7.0mm, the mean amount of the maximal retrusion was 1.0mm 3. In the horizontal trajectory, the pattern of laterotrusion showed asymmetry: the mean length of non-affected side was smaller than that of the affected side. Protrusive path were deviated to the affected side in 64.5% of the patients, the mean degree of deviation was 16.4$^{\circ}$. The mandibular movements of TMJ lock-closed patients can be characterized by decreased range of mouth opening, protrusive movement, and laterotrusive movement to the non-affected side and also characterized by deviated opening and protrusive path to the affected side.

  • PDF

Implement pattern lock security enhancement using thread to measure input time (입력시간을 측정하는 쓰레드를 활용한 패턴 잠금 보안 강화 구현)

  • An, Kyuhwang;Kwon, Hyeokdong;Kim, Kyungho;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.470-476
    • /
    • 2019
  • The pattern locking technique applied to smart phones is a locking technique that many people use conveniently. However, the safety of pattern locking techniques is very low compared with other techniques. The pattern locking technique is vulnerable to a shoulder surfing attack, which is based on the user's input and can be interpreted by looking at the movement of the shoulder, and the smudge attack is also vulnerable due to fingerprint drag marks remaining on the mobile phone pad. Therefore, in this paper, we want to add a new security method to check the pressed time by using a thread in the pattern locking scheme to secure the vulnerability. It is divided into short, middle, and long click according to the pressing time at each point. When dragging using the technique, security performance enhances $3^n$ tiems. Therefore, even if dragging in the same 'ㄱ' manner, it becomes a completely different pattern depending on the pressing time at each point.

Vulnerability analysis for AppLock Application (AppLock 정보 은닉 앱에 대한 취약점 분석)

  • Hong, Pyo-gil;Kim, Dohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.845-853
    • /
    • 2022
  • As the memory capacity of smartphone increases, the type and amount of privacy stored in the smartphone is also increasing. but recently there is an increasing possibility that various personal information such as photos and videos of smartphones may be leaked due to malicious apps by malicious attackers or other people such as repair technicians. This paper analyzed and studied the security and vulnerability of these vault apps by analyzing the cryptography algorithm and data protection function. We analyzed 5.3.7(June 13, 2022) and 3.3.2(December 30, 2020) versions of AppLock, the most downloaded information-hidding apps registered with Google Play, and found various vulnerabilities. In the case of access control, there was a vulnerability in that values for encrypting patterns entered by users were hardcoded into plain text in the source code, and encrypted pattern values were stored in xml files. In addition, in the case of the vault function, there was a vulnerability in that the files and log files for storing in the vault were not encrypted.

Analysis of Characteristics of Functional Outers with Moisture-permeable Waterproof Fabric - Focus on Fabrics, Washing·Cares, Design, Patterns, Subsidiary Materials, and Sewing - (투습방수 직물을 사용한 기능성 아우터의 특성 분석 - 소재, 세탁·취급, 디자인, 패턴, 부자재, 봉제를 중심으로 -)

  • Roh, Eui Kyung;Yoon, Mi Kyung
    • Fashion & Textile Research Journal
    • /
    • v.23 no.1
    • /
    • pp.129-141
    • /
    • 2021
  • This study investigated fabrics, washing and cares, design, pattern, subsidiary materials, and sewing methods with a focus on the functional outers using moisture-permeable waterproof fabric as a shell; in addition, each element was analyzed for differences depending on fabric type. The characteristics of 34 outers were investigated through labels, online product introductions, visual inspection, observations from two experts with more than 30 years experience and wear tests. Moisture-permeable waterproof fabrics used for the outer were classified into two types; in addition, the shell of the high-density fabric and the 2 & 3-layer fabrics had different characteristics. Various fabrics, detailed designs, and three-dimensional patterns suitable for each part of the human body were used to improve functionality. In addition, various subsidiary materials and sewing methods were used to form an organic relationship. The same washing and cares, patterns and subsidiary materials were used regardless of fabric type; however, the fabric type influenced the detailed design and sewing. The outers with high-density fabric had a loose fit, short placket, e-banded cuffs, lock-stitch, and lock-stitch+binding. However, the outer with 2 & 3 layer fabric had a slim fit, hood width adjustment, zippered pockets, cuffs with tab, seamless adhesive sewing such as laminating, lock-stitch+ seam-sealing, and welding.

Enhanced Knock Code Authentication with High Security and Improved Convenience

  • Jang, Yun-Hwan;Park, Yongsu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4560-4575
    • /
    • 2018
  • Since smartphone contains various personal data, security is one of the important aspects in smartphone technologies. Up to now, various authentication techniques have been proposed to protect smartphones. The pattern lock on the Android system is one of the most widely used authentication methods for low-cost devices but it is known to be vulnerable to smudge attack or shoulder surfing attack. LG's smartphone uses its own technique, which is called "Knock Code." The knock code completes the authentication by touching the user defined area in turn on the screen. In this paper, we propose the new, enhanced version of knock code by adding the sliding operation and by using flexible area recognition. We conducted security analysis, which shows that under the same password size, the search space is overwhelmingly larger than the original algorithm. Also, by using the sliding operation, the proposed scheme shows resilience against smudge attacks. We implemented the prototype of our scheme. Experimental results show that compared with the original Knock Code and Android pattern lock, our scheme is more convenient while providing better security.