• Title/Summary/Keyword: Repackaging

검색결과 20건 처리시간 0.034초

Preliminary Design Evaluation of Auxiliary Equipment for Transportation and Storage of Multi-purpose Canister (사용후핵연료 다목적 캐니스터의 운반 및 저장 보조 설비에 대한 예비설계 평가)

  • Chang Min Shin;Sang Hwan Lee;Yeon Oh Lee;In Su Jung;Gil Yong Cha
    • Journal of Radiation Industry
    • /
    • 제17권3호
    • /
    • pp.309-320
    • /
    • 2023
  • A multi-purpose canister (MPC) was developed for the purpose of transportation, storage and disposal of spent nuclear fuel (SNF) and has the advantage of minimizing repackaging between management stages of SNF. Considering the typical rock characteristics in Korea, a disposal canister is expected to contain 4 assemblies of Pressurized water reactor (PWR) SNF. The capacity of the MPC should be similarly designed with the disposal canister. However, the MPC with four SNF assemblies is expected to be less efficient in transporting and storing compared to a large-capacity canister. Therefore, a preliminary concept was derived for an auxiliary equipment that can transport and store multiple MPCs in a large overpack. A previously derived concept from US was thoroughly reviewed, and the preliminary concept was revised considering domestic situations including crane capacity and others. In addition, the safety of the normal transportation and storage of the MPC placed in transportation and storage overpack was evaluated with the auxiliary equipment.

Hacking and Countermeasure on Smart TV (스마트 TV 해킹 위협 및 대응방안 분석)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • 제12권1호
    • /
    • pp.313-317
    • /
    • 2014
  • Smart-phone, PC or tablet platforms, such as smart terminals spread to the masses trying to capitalize. Smart TV also is increasing. In Korea, market size of TV is growing fast with growth of risk of hacking. In this paper, several kinds of Smart TV hacking cases are presented with the possibility of attacks against the vulnerability analysis and countermeasures. Most of the Linux operating system is open. Thus, it is vulnerable for latest hacking techniques. Most are based on the Linux OS to enhance security mount Sand-Box. However, bypass procedure using the technique, or APT attacks can avoid San-Box technique. New hacking techniques and a variety of ways will occur in the future. Therefore, this paper will develop Smart TV, and it analysis of a security threat and establishes better prepared in the future because new hacking attacks are expected to prepare more.

Efficient Detection of Android Mutant Malwares Using the DEX file (DEX 파일을 이용한 효율적인 안드로이드 변종 악성코드 탐지 기술)

  • Park, Dong-Hyeok;Myeong, Eui-Jung;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제26권4호
    • /
    • pp.895-902
    • /
    • 2016
  • Smart phone distribution rate has been rising and it's security threat also has been rising. Especially Android smart phone reaches nearly 85% of domestic share. Since repackaging on android smart phone is relatively easy, the number of re-packaged malwares has shown steady increase. While many detection techniques have been proposed in order to prevent malwares, it is not easy to detect re-packaged malwares by static analysis and it is also difficult to operate dynamic analysis in android smart phone. Static analysis proposed in this paper features code reuse of repackaged malwares. We extracted DEX files from android applications and performed static analysis using class names and method names. This process doesn't not include reverse engineering, so it is possible to detect malwares efficiently.

Design of DRM System for Contents Redistribution in Home Domain (홈 도메인에서의 콘텐츠 재배포를 위한 DRM 시스템 설계)

  • Moon, Ju-Young;Lee, Chang-Bo;Kim, Jung-Jae;Jun, Moon-Seog
    • Journal of the Korea Society of Computer and Information
    • /
    • 제12권3호
    • /
    • pp.59-65
    • /
    • 2007
  • In this paper, we proposed the DRM(Digital Rights Management) system that allows to redistribute contents safely based on home domain. This DRM system for contents redistribution within home domain can solve the restriction and the inconvenience occuring in using contents and at the same time protect the right of contents producer and provider as well. To play contents using home digital device, we must build home domain for contents redistribution among devices. That is to say, devices that are registered with home domain can redistribute contents to other devices at same domain. The domain must send redistribution-specifics to DRM server, so that user can pay reasonable amount for using the contents. Futhermore, by restricting within domain the right of contents redistribution, one can strictly prohibit the illegal redistribution.

  • PDF

Design of Interoperable DRM System in Home Domain (상호 호환성을 위한 홈 도메인 DRM 설계)

  • Moon, Ju-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • 제15권12호
    • /
    • pp.117-123
    • /
    • 2010
  • In this paper, we proposed the interoperable DRM(Digital Rights Management) system that allows to redistribute contents safely based on home domain. We tried to solve the problem about contents redistribution between devices under different DRM regime so that we suggested a interoperable DRM system that allow end users to redistribute contents within home domain can solve the restriction and the inconvenience occuring in using contents and at the same time protect the right of contents producer and provider as well. In order that end users can use freely their contents using home digital device without additional payment, we must build a home domain for interoperable DRM system for contents redistribution among devices. If both of exporting device and importing device are authenticated in home domain by HADM(Home Authorized Domain Manager), then the exporting device can redistribute packaged contents under importing DRM regime to the importing device by DIM(DRM Interoperability Manager).

Robust Anti Reverse Engineering Technique for Protecting Android Applications using the AES Algorithm (AES 알고리즘을 사용하여 안드로이드 어플리케이션을 보호하기 위한 견고한 역공학 방지기법)

  • Kim, JungHyun;Lee, Kang Seung
    • Journal of KIISE
    • /
    • 제42권9호
    • /
    • pp.1100-1108
    • /
    • 2015
  • Classes.dex, which is the executable file for android operation system, has Java bite code format, so that anyone can analyze and modify its source codes by using reverse engineering. Due to this characteristic, many android applications using classes.dex as executable file have been illegally copied and distributed, causing damage to the developers and software industry. To tackle such ill-intended behavior, this paper proposes a technique to encrypt classes.dex file using an AES(Advanced Encryption Standard) encryption algorithm and decrypts the applications encrypted in such a manner in order to prevent reverse engineering of the applications. To reinforce the file against reverse engineering attack, hash values that are obtained from substituting a hash equation through the combination of salt values, are used for the keys for encrypting and decrypting classes.dex. The experiments demonstrated that the proposed technique is effective in preventing the illegal duplication of classes.dex-based android applications and reverse engineering attack. As a result, the proposed technique can protect the source of an application and also prevent the spreading of malicious codes due to repackaging attack.

The Establishment and Improvement of Full Cycle History Management System for Low- and Intermediate-level Radioactive Waste (중저준위 방사성폐기물 전주기 이력관리체계 구축 및 개선)

  • Jin-Woo Lee;Jun Lee;Hee-Chul Eun;Ji-Young Jeong
    • Journal of Radiation Industry
    • /
    • 제18권1호
    • /
    • pp.95-100
    • /
    • 2024
  • To establish a radioactive waste life cycle history management system, a series of processes including waste generation, classification, packaging, storage, transportation, and disposal were reflected in the information management system. A preliminary review process was introduced to reduce the amount of radioactive waste generated and manage it efficiently. Through this, the amount of radioactive waste generated must be checked from the beginning of the research, and the generated radioactive waste must be thoroughly managed from the stage of generation to final disposal. In particular, in the case of radioactive waste data generated during nuclear facility operation and each experiment, a radioactive waste information management system must be operated to receive information from the waste generator and integrate it with processing information at the management stage. The application process for small-package containers was reflected so that information such as the generation facility of radioactive waste, generation facility, project information, types of radioactive waste, major radionuclides, etc. In the radioactive waste management process, the preceding steps are to receive waste history from the waste generators. This includes an application for a specified container with a QR label, pre-inspection, and management request. Next, the succeeding steps consist of repackaging, treatment, characterization, and evaluating the suitability of disposal, for a process to transparently manage radioactive wastes.

A study on the vulnerability of integrity verification functions of android-based smartphone banking applications (안드로이드 스마트폰 뱅킹 앱 무결성 검증 기능의 취약점 연구)

  • Kim, Soonil;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제23권4호
    • /
    • pp.743-755
    • /
    • 2013
  • In recent years, the malicious apps with malicious code in normal apps are increasingly redistributed in Android market, which may incur various problems such as the leakage of authentication information and transaction information and fraudulent transactions when banking apps to process the financial transactions are exposed to such attacks. Thus the financial authorities established the laws and regulations as an countermeasures against those problems and domestic banks provide the integrity verification functions in their banking apps, yet its reliability has not been verified because the studies of the safety of the corresponding functions have seldom been conducted. Thus this study suggests the vulnerabilities of the integrity verification functions of banking apps by using Android reverse engineering analysis techniques. In case the suggested vulnerabilities are exploited, the integrity verification functions of banking apps are likely to be bypassed, which will facilitate malicious code inserting attacks through repackaging and its risk is very high as proved in a test of this study. Furthermore this study suggests the specific solutions to those vulnerabilities, which will contribute to improving the security level of smartphone financial transaction environment against the application forgery attacks.

A Practical Attack on In-Vehicle Network Using Repacked Android Applications (커넥티드 카 환경에서 안드로이드 앱 리패키징을 이용한 자동차 강제 제어 공격)

  • Lee, Jung Ho;Woo, Samuel;Lee, Se Young;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제26권3호
    • /
    • pp.679-691
    • /
    • 2016
  • As vehicle started to contain many different communication devices, collecting external information became possible in IoT environment. In such environment, remotely controling vehicle is possible when vehicle information is obtained by looking in to vehicle network through smart device. However, android based smart device applications are vulnerable to malicious modulation and redistribution. Modulated android application can lead to vehicle information disclosure that could bring about vehicle control accident which becomes threat to drivers. furthermore, since vehicles today does not contain security methods to protect it, they are very vulnerable to security threats which can cause serious damage to users and properties. In this paper, many different vehicle management android applications that are sold in Google Play has been analyzed. With this information, possible threats that could happen in vehicle management applications are being analysed to prove the risks. the experiment is done on actual vehicle to prove the risks. Also, access control method to protect the vehicle against malicious actions that could happen through external network in IoT environment is suggested in the paper.

Field Application of RFID for the Cavity Maintenance of Under Pavement (도로하부 공동의 유지관리를 위한 RFID의 현장 적용성 평가)

  • Park, Jeong Jun;Shin, Eun Chul;Kim, In Dae
    • Journal of the Society of Disaster Information
    • /
    • 제15권4호
    • /
    • pp.459-468
    • /
    • 2019
  • Purpose: The cavity exploration of the lower part of the road is carried out to prevent ground-sinking. However, the detected communities cannot be identified by the cavity location and history information, such as repackaging the pavement. Therefore, the field applicability of RFID systems was evaluated in this study to enable anyone to accurately identify information. Method: During temporary recovery, tag recognition distance and recognition rate were measured according to underground burial materials and telecommunication tubes using RFID systems with electronic tag chips attached to the bottom of the rubber cap. Result: The perceived distance and perceived rate of depth for each position of the electron tag did not significantly affect the depth up to 15cm, but it did have some effect if the depth was 20cm. In addition, water effects from nearby underground facilities and rainfall are relatively small, and the effects of wind will need to be considered during the weather conditions of the road. Conclusion: The RFID tags for field application of the pavement management system store various information such as location and size of cavity, identification date, cause of occurrence, and surrounding underground facilities to maximize cavity management effect with a system that can be computerized and mobile utilization.