• Title/Summary/Keyword: Secure Programming

Search Result 70, Processing Time 0.026 seconds

Security of Web Applications: Threats, Vulnerabilities, and Protection Methods

  • Mohammed, Asma;Alkhathami, Jamilah;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.167-176
    • /
    • 2021
  • This is the world of computer science and innovations. In this modern era, every day new apps, webs and software are being introduced. As well as new apps and software are being introduced, similarly threats and vulnerable security matters are also increasing. Web apps are software that can be used by customers for numerous useful tasks, and because of the developer experience of good programming standards, web applications that can be used by an attacker also have multiple sides. Web applications Security is expected to protect the content of critical web and to ensure secure data transmission. Application safety must therefore be enforced across all infrastructure, including the web application itself, that supports the web applications. Many organizations currently have a type of web application protection scheme or attempt to build/develop, but the bulk of these schemes are incapable of generating value consistently and effectively, and therefore do not improve developers' attitude in building/designing stable Web applications. This article aims to analyze the attacks on the website and address security scanners of web applications to help us resolve web application security challenges.

A Design and Analysis of PKCS #11 supporting the KCDSA mechanism (KCDSA 메커니즘을 제공하는 PKCS #11 설계 및 분석)

  • 김명희;김은환;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.141-151
    • /
    • 2004
  • According to the improvemnent of electronic commerce, the requirements of security devices are becoming increasingly pervasive. The security API must design easily and securely to support a compatibility feature between security devices. It is chosen the PKCS #11 interface by RSA Labs that shows the compatibility and extensibility standards of many application product and implementation, and supported KCDSA mechanism which is a korean digital signature standard. And the PKCS #11 security API defines new key management function which provides more secure key management ability. We suggest the object attributes and templates of KCDSA private and public key object, generate and verify digital signature using KCDSA mechanism. The PKCS #11 supporting KCDSA mechanism is designed, implemented using C-Language, tested a performance, and analyzed the security and compatibiltiy feature.

A Novel Dynamic Optimization Technique for Finding Optimal Trust Weights in Cloud

  • Prasad, Aluri V.H. Sai;Rajkumar, Ganapavarapu V.S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2060-2073
    • /
    • 2022
  • Cloud Computing permits users to access vast amounts of services of computing power in a virtualized environment. Providing secure services is essential. There are several problems to real-world optimization that are dynamic which means they tend to change over time. For these types of issues, the goal is not always to identify one optimum but to keep continuously adapting to the solution according to the change in the environment. The problem of scheduling in Cloud where new tasks keep coming over time is unique in terms of dynamic optimization problems. Until now, there has been a large majority of research made on the application of various Evolutionary Algorithms (EAs) to address the issues of dynamic optimization, with the focus on the maintenance of population diversity to ensure the flexibility for adapting to the changes in the environment. Generally, trust refers to the confidence or assurance in a set of entities that assure the security of data. In this work, a dynamic optimization technique is proposed to find an optimal trust weights in cloud during scheduling.

A Survey on UAV Network for Secure Communication and Attack Detection: A focus on Q-learning, Blockchain, IRS and mmWave Technologies

  • Madhuvanthi T;Revathi A
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.779-800
    • /
    • 2024
  • Unmanned Aerial Vehicle (UAV) networks, also known as drone networks, have gained significant attention for their potential in various applications, including communication. UAV networks for communication involve using a fleet of drones to establish wireless connectivity and provide communication services in areas where traditional infrastructure is lacking or disrupted. UAV communication networks need to be highly secured to ensure the technology's security and the users' safety. The proposed survey provides a comprehensive overview of the current state-of-the-art UAV network security solutions. In this paper, we analyze the existing literature on UAV security and identify the various types of attacks and the underlying vulnerabilities they exploit. Detailed mitigation techniques and countermeasures for the protection of UAVs are described in this paper. The survey focuses on the implementation of novel technologies like Q-learning, blockchain, IRS, and mmWave. This paper discusses network simulation tools that range in complexity, features, and programming capabilities. Finally, future research directions and challenges are highlighted.

Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users (DApp 사용자의 프라이버시 보호 강화를 위한 공개형 블록체인 플랫폼 보안구조 강화방안)

  • Hwang, Seonjin;Ko, DongHyun;Bahk, Taeu;Choi, Yoon-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.1-9
    • /
    • 2020
  • Along with the growth of Blockchain, DApp (Distributed Application) is getting attention. As interest in DApp grows, market size continues to grow and many developers participate in development. Many developers are using API(Application Programming Interface) services to mediate Blockchain nodes, such as Infura, for DApp development. However, when using such a service, there is a serious risk that the API service operator can violate the user's privacy by 1 to 1 matching the account address of the Transaction executed by the DApp user with the IP address of the DApp user. It can have an adverse effect on the reliability of public Blockchains that need to provide users with a secure DApp service environment. The proposed Blockchain platform is expected to provide user privacy protection from API services and provide a reliable DApp use environment that existing Blockchain platforms did not provide. It is also expected to help to activate DApp and increase the number of DApp users, which has not been activated due to the risk of an existing privacy breach.

A Study of Model on the Optimal Allocation of Budget for the Efficiency of the University Evaluation (대학 평가개선을 위한 예산 최적화 배분 Model 연구)

  • Choi, Bum Soon;Lim, Wang Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.7
    • /
    • pp.165-174
    • /
    • 2013
  • Recently, many universities in Korea have been faced with critical crisis such as the decrease in the number of freshmen, the pressure for tuition cuts, M&A between universities and so on. Nobody has expected that universities will have this kind of difficulties. The universities are making attempts to innovate the quality of education to secure high level of education and to meet social needs to overcome these internal and external environment of crisis. For this innovation, the universities have sought to reduce the budget as well as conducted the self-evaluation to figure out their relative positions annually. Innovations cannot have having the limitation without education funds. Budget spent in universities have influences directly or indirectly on the structural improvement of the finance and on the growth of universities. The purpose of this study is to explore the decision-making method to find the optimal budget allocation so as to minimize the execution budget and to maximize the management evaluation by taking the advantage to analyse the relationship between the evaluation and the budget. Therefore, in this paper, we implement the development of the mathematical model for the University Evaluation and Budget Allocation Optimization in the form of the linear programming.

Study on the Development of the Displacement and Strain Distribution Measurement Algorithm to the Open Hole Tension Test by Using the Digital Image Correlation (이미지 상관법을 이용한 원공 인장 시편 변위 및 변형율 측정을 위한 알고리즘 개발에 관한 연구)

  • Choi, In Young;Kang, Young June;Hong, Kyung Min;Lee, Hak Seong;Kim, Seong Jong
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.33 no.2
    • /
    • pp.121-128
    • /
    • 2016
  • The mechanical jointing method is very important in the machine parts and structure. They are used by the bolts and rivet because it is very convenient to replace the parts and the structure. However, the mechanical jointing methods using the bolt and rivet needed the open hole. The machine parts life cycle is reduced because this open hole created the stress concentration. Therefore, the measurement methods are needed to evaluate phenomenon of the stress concentration. This paper discusses the development of the measurement algorithm using the digital image correlation methods to measure the strain distribution of the open hole. To implement the measurement algorithm using the DIC, the LabVIEW 2010 programming tool was used. To measure the strain distribution of the open hole, the tensile specimens having an open hole are made by using the aluminum 6061-T6. To secure the reliability of measurement result using the DIC, the DIC measurement results and FEM analysis results were compared.

Efficient Dynamic Time Warping Using 2nd Derivative Operator (2차 미분 연산자를 이용한 효과적인 Dynamic Time Warping)

  • Kim, Se-Hoon;Choi, Hyung-Il;Rhee, Yang-Won;Jang, Seok-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.61-69
    • /
    • 2011
  • Dynamic Time Warping based on Dynamic Programming is the one of the most widely been used to compare the similarity of two patterns. DTW algorithm has two known problems. The one is singularities. And the another problem is the accuracy of the warping path with patterns. Therefore, this paper suggest the solution for DTW algorithm to use a 2nd derivative operator. Laplacian of Gaussian is a kind of a 2nd derivative operator. Consequently, our suggestion method to apply to this operator, more efficient to solve the singularities problems and to secure a accuracy of the warping path. And the result shows a superior ability of this suggested method.

An Optimization of the Planned Target Sequencing Problem Using Scheduling Method (스케줄링을 이용한 계획표적 사격순서의 최적화 방안)

  • Hwang, Won-Shik;Lee, Jae-Yeong
    • Journal of the military operations research society of Korea
    • /
    • v.33 no.1
    • /
    • pp.105-115
    • /
    • 2007
  • It is essential to give a fatal damage to the enemy force by using prompt and accurate fire in order to overcome the lack of artillery force. During the artillery fire operations, minimizing the firing time will secure the adapt ability in tactical operation. In this paper, we developed a mathematical model to schedule the artillery fire on the multiple targets to decrease total fire operation time. To design a program to describe a real firing situation, we consider many possible circumstances of changes such as commander's intention, firing constraints, target priority, and contingency plan to make a fire plan in an artillery unit. In order to work out the target sequencing problem, MIP is developed and the optimum solution is obtained by using ILOG OPL. If this analytical model is applied to a field artillery unit, it will improve the efficiency of the artillery fire force operations.

A Study on an Operational Optimization Algorithm of Software Basic Education (소프트웨어 기초 교육의 최적 운영 알고리즘에 관한 연구)

  • Goo, Eun-Hee;Woo, Chan-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.587-592
    • /
    • 2019
  • The importance of software technologies is becoming more prominent because of the competition to secure a competitive edge in software, which has been intensified since the emergence of smartphones and IoT. Thus, to assure the initiative in the global software industry and to foster superior human resources, there is a growing need for outstanding software development professionals. This paper analyzes the factors that affect the basic perception of software, the need for software development, and the enhancement of software coding ability based on a compulsory software class, which aims to increase the workforce of the converged software industry. The analysis shows that among other technical practices to enhance coding ability, learner-centered technical contents showed the most positive effect regarding the recognition and motive of development and are an essential factor in improving coding skills. The findings indicate that the need for program development and active involvement in the development of the program are the most important factors in improving the practical ability. The analysis presents meaningful results by suggesting a methodology for improving software development capabilities.