• 제목/요약/키워드: Reverse Engineering Attack

검색결과 24건 처리시간 0.025초

Implementation of a security system using the MITM attack technique in reverse

  • Rim, Young Woo;Kwon, Jung Jang
    • 한국컴퓨터정보학회논문지
    • /
    • 제26권6호
    • /
    • pp.9-17
    • /
    • 2021
  • 본 논문에서는 기존 네트워크의 물리적인 구조 및 구성을 변경하지 않고 네트워크 보안을 도입할 수 있는 방안으로 "Man In The Middle Attack" 공격 기법을 역이용함으로, Single Ethernet Interface만으로 가상 네트워크 오버레이를 형성하여 논리적인 In-line Mode를 구현하여 외부의 공격으로부터 네트워크를 보호하는 초소형 네트워크 보안 센서와 클라우드서비스를 통한 통합관제 방안을 제안한다. 실험 결과, Single Ethernet Interface만으로 가상 네트워크 오버레이를 형성하여 논리적인 In-line Mode를 구현할 수 있었으며, Network IDS/IPS, Anti-Virus, Network Access Control, Firewall 등을 구현할 수 있었고, 초소형 네트워크보안센서를 클라우드서비스에서 통합관제하는 것이 가능했다. 본 논문의 제안시스템으로 저비용으로 고성능의 네트워크 보안을 기대하는 중소기업에 도움이 되고 또한, IoT 및 Embedded System 분야에 안전·신뢰성을 갖춘 네트워크 보안환경을 제공할 수 있다.

Characteristics of Vortical Jet Structures of a Hydrofoil

  • Yang, Chang-Jo;Kim, You-Taek;Choi, Min-Seon
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제31권7호
    • /
    • pp.842-851
    • /
    • 2007
  • Oscillating foil propulsion, the engineering application of fish-like movement of a hydrofoil, has received in recent decades as a possible competitor for propellers. The oscillating foil produces an effective angle of attack, resulting in a normal force vector with thrust and lift components, and it can be expected to be a new highly effective propulsion system. We have explored propulsion hydrodynamics as a concept in wake flow pattern. The present study has been examined various conditions such as oscillating frequencies and amplitudes in NACA0010 profile. Flow visualizations showed that high thrust was associated with the generation of moderately strong vortices, which subsequently combine with trailing-edge vorticity leading to the formation of a reverse $K\acute{a}rm\acute{a}n$ vortex street. Vortex generation was inherent to jet production and playeda fundamental role in the wake dynamics. And it was shown that the strong thrust coefficient obtained as the Strouhal number was larger.

Effects of hypochlorite exposure on morphology and trace organic contaminant rejection by NF/RO membranes

  • Simon, Alexander;Nghiem, Long D.
    • Membrane and Water Treatment
    • /
    • 제5권4호
    • /
    • pp.235-250
    • /
    • 2014
  • The impacts of membrane degradation due to chlorine attack on the rejection of inorganic salts and trace organic contaminants by nanofiltration (NF) and reverse osmosis (RO) membranes were investigated in this study. The rejection of trace contaminants was examined at environmentally relevant concentrations. Changes in the membrane surface morphology were observed as a result of chlorine exposure. A small increase in rejection was consistently observed with all four membranes selected in this study after being exposed to a low concentration of hypochlorite (100 ppm). In contrast, a higher concentration of hypochlorite (i.e., 2000 ppm) could be detrimental to the membrane separation capacity. Membranes with severe chlorine impact showed a considerable decrease in rejection over filtration time, possibly due to rearrangement of the polyamide chains under the influence of chlorine degradation and filtration pressure. The reported results indicate that loose NF membranes are more sensitive to chlorine exposure than RO membranes. The impact of hypochlorite exposure (both positive and negative) on rejection is dependent on the strength of the hypochlorite solution and is more significant for the neutral carbamazepine compound than the negatively charged sulfamethoxazole.

Systems Engineering Approach to develop the FPGA based Cyber Security Equipment for Nuclear Power Plant

  • Kim, Jun Sung;Jung, Jae Cheon
    • 시스템엔지니어링학술지
    • /
    • 제14권2호
    • /
    • pp.73-82
    • /
    • 2018
  • In this work, a hardware based cryptographic module for the cyber security of nuclear power plant is developed using a system engineering approach. Nuclear power plants are isolated from the Internet, but as shown in the case of Iran, Man-in-the-middle attacks (MITM) could be a threat to the safety of the nuclear facilities. This FPGA-based module does not have an operating system and it provides protection as a firewall and mitigates the cyber threats. The encryption equipment consists of an encryption module, a decryption module, and interfaces for communication between modules and systems. The Advanced Encryption Standard (AES)-128, which is formally approved as top level by U.S. National Security Agency for cryptographic algorithms, is adopted. The development of the cyber security module is implemented in two main phases: reverse engineering and re-engineering. In the reverse engineering phase, the cyber security plan and system requirements are analyzed, and the AES algorithm is decomposed into functional units. In the re-engineering phase, we model the logical architecture using Vitech CORE9 software and simulate it with the Enhanced Functional Flow Block Diagram (EFFBD), which confirms the performance improvements of the hardware-based cryptographic module as compared to software based cryptography. Following this, the Hardware description language (HDL) code is developed and tested to verify the integrity of the code. Then, the developed code is implemented on the FPGA and connected to the personal computer through Recommended Standard (RS)-232 communication to perform validation of the developed component. For the future work, the developed FPGA based encryption equipment will be verified and validated in its expected operating environment by connecting it to the Advanced power reactor (APR)-1400 simulator.

관통 손상 구멍으로부터의 제트-교차 흐름의 유동장 구조 (The Flow Field Structure of Jet-in-Cross Flow through the Perforated Damage Hole)

  • 이기영
    • 한국군사과학기술학회지
    • /
    • 제17권4호
    • /
    • pp.551-559
    • /
    • 2014
  • The influence of the battle damage hole on the velocity and vorticity flow field have been studied by using particle image velocimetry. Time averaged velocity and vorticity vector fields in the vicinity of jet are presented. The perforated damage hole on a wing created from a hit by anti-air artillery was modeled as a 10% chord size hole which positioned at quarter chord. At low angles of attack, the vorticity in the forward side of the jet is cancelled due to mixing with the wing surface boundary layer. Stretching of vorticity in the backside of the jet generates a semi-cylindrical vortical layer that enclosing a domain with slow moving reverse flow. Conversely, at higher the angles of attack, the jet vorticity advected away from the wing surface and remains mostly confined to the jet. The mean flow behind the jet has a wake-like structure.

자동차용 ECU의 CAN 메시지를 통한 자동차 공격 방법 연구 (Studies of the possibility of external threats of the automotive ECU through simulation test environment)

  • 이혜련;김경진;정기현;최경희;박승규;권도근
    • 한국컴퓨터정보학회논문지
    • /
    • 제18권11호
    • /
    • pp.39-49
    • /
    • 2013
  • 본 논문에서는 자동차의 내부 통신망(CAN)에 대한 보안 매커니즘이 매우 미비하여 외부로부터 위협 가능성이 높은 점을 검증하기 위한 방법으로 시중에서 쉽게 구입할 수 있는 자동차의 ECU(Electric Control Unit)을 이용하여 테스트 환경을 구축하여 CAN 메시지를 획득한 다음 자동차의 실제 ECU에 적용시켜 공격을 시도하는 방법을 제안한다. 최근 연구들 중에서는 자동차에서 누구나 쉽게 평문 상태의 CAN 메시지를 볼 수 있어 외부로부터 공격에 취약한 것을 보이기 위하여 실제 자동차에서 데이터를 분석한 내용을 가지고 공격을 성공시켰으나 차를 구입하여 고정시킨 상태에서 CAN 메시지를 추출하고, 이를 분석하여 공격을 시도함으로 공간적, 금전적, 시간적 비용을 발생시키는 단점을 가진다. 본 논문에서는 자동차의 외부 위협 가능성을 검증하기 위한 실험을 수행하기 위해 자동차의 ECU를 통해 찾아낸 CAN 메시지를 실제 자동차에 적용하되 무선 네트워크 환경을 갖추어 실험한 결과 제안한 방법을 통해 자동차에 공격이 가능함을 확인한다. 그 결과 기존 연구에서 발생하는 비용을 줄임과 동시에 자동차의 정보가 전혀 없는 상태에서 자동차 ECU의 공격 가능성을 보인다.

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.

상용 여객기의 유동 및 공력 특성 해석 (Flow and Aerodynamic Characteristics Analyses of A Commercial Passenger Airplane)

  • 김양균;김성초;김정수;이기만;진학수
    • 대한기계학회:학술대회논문집
    • /
    • 대한기계학회 2007년도 춘계학술대회B
    • /
    • pp.2857-2861
    • /
    • 2007
  • Flow and aerodynamic characteristics were analyzed numerically for a commercial passenger airplane, Boeing 747-400, flying in the cruising condition. The model geometry with 100:1 in scale was obtained by the photo scanning measurement with the maximum error of 1.4% comparing with the real airplane dimension. The three-dimensional inviscid steady compressible governing equations were solved by the finite volume method in the unstructured grid system. The convective terms were treated by the Crank-Nicholson and first-order upwind schemes. In the computational results, the strong wing-tip vortices were clearly observed and the pressure contours on the airplane surface were suggested. The lift and drag forces in the wing with engines increase by 1.49% and 3.9%, respectively compared with the case without engines. The aerodynamic forces were estimated quantitatively for each element which consists of the airplane.

  • PDF

모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구 (Detection of Forgery of Mobile App and Study on Countermeasure)

  • 정현수;채규수
    • 중소기업융합학회논문지
    • /
    • 제5권3호
    • /
    • pp.27-31
    • /
    • 2015
  • 모바일 단말기의 발달로 스마트폰 사용자가 늘어남에 따라 개인적 용도에서부터 금전거래까지 사용범위 역시 늘어나는 추세이다. 이에 따라 모바일 단말기의 해킹기술들도 다양해지고, 정보의 위조, 변조가 최근 이슈가 되고 있다. 모바일 단말기내 앱 위 변조는 잘 알려진 앱을 비슷하게 만들어내 사용자를 속일 목적으로 사용하는 해킹기술이다. 위 변조는 보안의 3대 요소 중 무결성 침해에 해당된다. 앱의 신뢰성이 저하되고, 앱 자체의 위험성 증가와 가치가 떨어진다. 위 변조된 앱을 통해 마음대로 개인정보 및 자료를 탈취하고, 사용자의 금융 자산의 손실까지 가능하다. 본 논문에서는 모바일 단말기 내의 위 변조에 대해 알아보고, 앱의 위 변조 탐지 방법을 제시하고, 위 변조 공격에 대한 대응방안을 모색하였다.

  • PDF

Numerical technique for chloride ingress with cover concrete property and time effect

  • Lee, Bang Yeon;Ismail, Mohamed A.;Kim, Hyeok-Jung;Yoo, Sung-Won;Kwon, Seung-Jun
    • Computers and Concrete
    • /
    • 제20권2호
    • /
    • pp.185-196
    • /
    • 2017
  • Durability problems initiated from steel corrosion are unseen but critical issues, so that many researches are focused on chloride penetration evaluation. Even if RC (Reinforced Concrete) structures are exposed to normal environment, chloride ingress varies with concrete surface conditions and exposed period. This paper presents an analysis technique for chloride behavior evaluation considering time effect on diffusion and surface conditions assumed as double-layered system. For evaluation of deteriorated surface condition, field investigation was performed for concrete pavement exposed to deicing agent for 18 years. In order to consider enhanced surface concrete, chloride profiles in surface-impregnated concretes exposed to chloride attack for 2 years from previous research were investigated. Through reverse analysis, effectively deteriorated/enhanced depth of surface and the related reduced/enlarged diffusion coefficient in the depth are simulated. The proposed analysis technique was evaluated to handle the chloride behavior more accurately considering changes of chloride ingress within surface layer and decreased diffusion coefficient with time. For the concrete surface exposed to deicing agent, the deteriorated depth and enlarged diffusion coefficient are evaluated to be 12.5~15.0 mm and 200% increasing diffusion coefficient, respectively. The results in concrete containing enhanced cover show 10.0~12.5 mm of impregnated depth and 85% reduction of chloride diffusion in tidal and submerged conditions.