• Title/Summary/Keyword: Protection requirements

Search Result 562, Processing Time 0.022 seconds

Study on Structure for Robust App Protection through Commercial Android App Hardening Service (상용 안드로이드 앱 보호 서비스 분석을 통한 강건한 앱 보호 구조 연구)

  • Ha, Dongsoo;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1209-1223
    • /
    • 2018
  • Android apps are made up of bytecode, so they are vulnerable to reverse engineering, and protection services are emerging that robustly repackage the app to compensate. Unlike cryptographic algorithms, the robustness of these protection services depends heavily on hiding the protection scheme. Therefore, there are few systematic discussions about the protection method even if destruction techniques of the protection service are various. And it is implemented according to the intuition of the developer. There is a need to discuss systematic protection schemes for robust security chains, rather than simple deployment of techniques disrupting static or dynamic analysis. In this paper, we analyze bangcle, a typical commercial Android app protection service, to examine the protection structure and vulnerable elements. We propose the requirements for robust structure and principles of protection structure.

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

  • Park, Jaekwan;Suh, Yongsuk
    • Nuclear Engineering and Technology
    • /
    • v.46 no.1
    • /
    • pp.47-54
    • /
    • 2014
  • The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

Flexible Barrier System for Rockfall Protection (유연성 방호책을 이용한 철도변 낙석방호사례)

  • 최승일;유병옥;김경석
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2003.06a
    • /
    • pp.103-116
    • /
    • 2003
  • Rockfall Protection fence is one of the most common rockfall Protection methods in Korea. If rockfall protection fences are required along the road or railway, their location, height and capacity, in terms of the maximum kinetic energy that they can absorb, should be specified. Within this paper, the best practice of rockfall barrier is introduced. Modern rockfall simulations as a means to define risks, protection requirements, dynamic loading and height of potential structures and selection of appropriate placement is presented. Technical possibilities of rockfall barriers and their actual limits are presented. Safety concepts based on probabilistic approaches are proposed. Recent studies peformed in other countries show that Flexible Barriers are also a feasible system to stop and retain debris flows. Finally an outlook onto further development is given.

  • PDF

Software Verification & Validation for Digital Reactor Protection System (디지털 원자로 보호계통의 소프트웨어 확인 및 검증)

  • Park, Gee-Yong;Kwon, Kee-Choon
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.185-187
    • /
    • 2005
  • The reactor protection system is the most important function for the safe operation of nuclear powerplants (NPPs) in that such system protects a nuclear reactor tore whose damage can cause an enormous disaster to the nuclear facility and the public. A digital reactor protection system (DRPS) is being developed in KAERI for use in the newly-constructed NPPs and also for replacing the existing analog-type reactor Protection systems. In this paper, an software verification and validation (V&V) activities for DRPS, which are independent of the DRPS development processes, are described according to the software development life cycle. The main activities of DRPS V&V processes are the software planning documentations, the verification of software requirements specification (SRS) and software design specification (SDS), the verification of codes, the tests of the integrated software and system. Moreover, the software safety analysis and the software configuration management are involved in the DRPS V&V processes. All of the V&V activities are described, in detail, in this paper.

  • PDF

Flexible Barrier System for Rockfall Protection (유연성 원리를 이용한 낙석방호시스템)

  • Choi Seung-Il;Lee Chang-Ho;Kim Duk-Bong
    • Proceedings of the KSR Conference
    • /
    • 2003.05a
    • /
    • pp.68-81
    • /
    • 2003
  • Rockfall protection fence is one of the most common rockfall protection methods in Korea. If rockfall protection fences are required along the road or railway, their location, height and capacity, in terms of the maximum kinetic energy that they can absorb, should be specified. Within this paper, the best practice of rockfall barrier is introduced. Modern rockfall simulations as a means to define risks, protection requirements, dynamic loading and height of potential structures and selection of appropriate placement is presented. Technical possibilities of rockfall barriers and their actual limits are presented. Safety concepts based on probabilities approaches are proposed. Recent studies performed in other countries show that Flexible Barriers are also a feasible system to stop and retain debris flows. Finally an outlook onto further development is given.

  • PDF

The Study on the Minimum Requirements for the Design of an Airpark used in Light Sport Aircraft Operations (경량항공기 이착륙장의 최소 요구조건에 대한 연구)

  • Shin, Dai-Won;Shin, Hong-Chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.17 no.2
    • /
    • pp.18-22
    • /
    • 2009
  • In this study, we surveyed the operating status of the Light Sport Aircraft(LSA) in Korea, and reviewed the minimum requirements of the airpark for LSA in other countries. Based on the information, we presented the airpark standards to ensure the safe take-off, landing, and operation of LSA in Korea.

  • PDF

Derivation of Anti-Tamper System Requirements Based on CMVP Standard for Technology Protection of Weapon Systems (무기 시스템의 기술 보호를 위한 CMVP 표준 기반의 Anti-Tamper 시스템 요구사항 도출)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.470-478
    • /
    • 2019
  • As the growth of the domestic defense industry is remarkable regarding technology level and export size, technology protection is necessary. Particularly, there is a need to apply anti-tamper measures to prevent critical technologies from illegally being taken out of weapon systems. However, there is no security protection strategy and system built yet in ROK. Precedent studies discussed the trend analysis and technical research for specific protective techniques, and the application of anti-tamper using limited procedures was provided. Recently, methods of how to select the technology for protection were studied based on risk management. Nonetheless, these studies cannot be associated with the acquisition process for the whole life-cycle, having difficulty with actual development and evaluation of the weapon systems. The objective of our study is to derive the system requirements of the weapon system for which anti-tamper measures have been determined to apply. Specifically, requirements items suitable for the development of anti-tamper weapon systems were derived based on ISO/IEC 19790, the CMVP standard for the development and verification of cryptographic modules. Also, its utilization in technical reviews and test & evaluations was presented. The usefulness of the research results was confirmed through inductive inference and comparative evaluation. The result can be expected to play a role in initiating extensive activities needed for technology protection of the weapon systems.

A Study on Workwear Prototype Development: Based on the Functional, Expressive, Aesthetic (FEA) Model

  • Huh Ga Young
    • Journal of Fashion Business
    • /
    • v.27 no.6
    • /
    • pp.37-46
    • /
    • 2023
  • This study aims to develop workwear prototypes by applying a systematic approach considering the characteristics of workwear. A case study was conducted before this study to derive workwear's four characteristics: 'Ergonomic Pattern-Making, Certified Fabric, Specialized Color, and Customized Details.' a prior study proposed the integrated framework combining these characteristics with the FEA model. The new framework identified that these characteristics are considered in terms of functionality, expression, and aesthetics; it can increase workers' satisfaction and meet the market demand without concentrating on only particular aspects. Before prototype production, the requirements for each characteristic of workwear were analyzed through theoretical research of previously published related papers. The study primarily gathered workwear requirements data and sources from consumer satisfaction surveys and investigations into the wearing conditions of work clothes. When considering all aspects of pattern-making, fabric, color, and detail in functionality, 'comfort movement, body protection, improved work efficiency' were identified as necessary. Expressive requirements were fundamental, including 'reflecting the wearer's preferences, expressing a sense of belonging and identity. It was clear that incorporating design elements and applying current trends to the aesthetic requirements of work clothes was necessary. Four prototypes comprised two top and bottom sets and two overalls using these requirements. The framework was used throughout the entire process of planning, producing, and evaluating prototypes, and through this, the results fulfilled the requirements. This study is significant because it produced workwear prototypes using an integrated approach that considered functional, expressive, and aesthetic aspects.

A Study on Efficient Improvement Ways of Fire Protection Management System (방화관리제도의 효율적 개선방안에 관한 연구)

  • Kook, Hyeong-Ho;Jo, Dae-Ho;Kong, Ha-Sung
    • Fire Science and Engineering
    • /
    • v.22 no.1
    • /
    • pp.115-127
    • /
    • 2008
  • Fire protection management system has been introduced to prevent structure fire since establishment of Fire Prevention Act. Nevertheless, Damage by fires is continue. The main purpose of this study is to discuss approaches to improve fire protection management system into the fire prevention properties. Now fire protection management system has lots of the problems in managerial and systematical aspects. To improve these a unified fire protection management system must be establish by suggests revision of a unified Fire Prevention Act and foundation of Fire Prevention Institution, reform educational system for the fire safety directors would be essential to includes environment improvement, enhancement of certification requirements and education, a standardized computational management system of the fire protection properties must be build for efficient fire protection operations.

Sequential Confidence Interval with $\beta$-protection for a Linear Function of Two Normal Means

  • Kim, Sung-Lai
    • Journal of the Korean Statistical Society
    • /
    • v.26 no.3
    • /
    • pp.309-317
    • /
    • 1997
  • A sequential procedure for estimating a linear function of two normal means which satisfies the two requirements, i.e. one is a condition of coverage probability, the other is a condition of $\beta$-protection, is proposed when the variances are unknown and not necessarily equal. We give asymptotic behaviors of the proposed stopping time.

  • PDF