• Title/Summary/Keyword: Security Countermeasure

Search Result 381, Processing Time 0.035 seconds

Enhanced and Practical Alignment Method for Differential Power Analysis (차분 전력 분석 공격을 위한 향상되고 실제적인 신호 정렬 방법)

  • Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.93-101
    • /
    • 2008
  • Side channel attacks are well known as one of the most powerful physical attacks against low-power cryptographic devices and do not take into account of the target's theoretical security. As an important succeeding factor in side channel attacks (specifically in DPAs), exact time-axis alignment methods are used to overcome misalignments caused by trigger jittering, noise and even some countermeasures intentionally applied to defend against side channel attacks such as random clock generation. However, the currently existing alignment methods consider only on the position of signals on time-axis, which is ineffective for certain countermeasures based on time-axis misalignments. This paper proposes a new signal alignment method based on interpolation and decimation techniques. Our proposal can align the size as well as the signals' position on time-axis. The validity of our proposed method is then evaluated experimentally with a smart card chip, and the results demonstrated that the proposed method is more efficient than the existing alignment methods.

A Study on the Analysis of Accident Cases in Laboratories (실험실의 사고사례 분석에 관한 연구)

  • Lee, Keun-Won;Lee, Jung-Suk
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.5
    • /
    • pp.21-27
    • /
    • 2012
  • The loss of life and property due to accidents in the research facilities or the laboratories of the university occurs steadily and the necessity of laboratory accident prevention is proposed. Above all, the main work to laboratory accident prevention is a systematic analysis of laboratories accidents. Analyzing reports or researches on industrial accidents in Korea had been carried out but these researches or reports did not based on laboratory accidents analysis. To the establishment of the accident prevention countermeasure in laboratory, a questionnaire sheet has been developed in this study. The questionnaires to survey the accident cases were gathered by electronic mail and visit survey from the laboratories and universities. The data of accident cases from the questionnaires was analyzed and discussed on accident distribution by season, the type of accident classification, the type of occurrence, the objects that caused the accident and laboratory accident by the damage incurred etc.. These results of this study can be used as basic data to the safety security and laboratory accident prevention of the laboratory worker.

A Countermeasure Scheme Based on Whitelist using Bloom Filter against SIP DDoS Attacks (블룸필터를 사용한 화이트리스트 기반의 SIP 서버스 거부 공격 대응 기법)

  • Kim, Ju-Wan;Ryu, Jea-Tek;Ryu, Ki-Yeol;Roh, Byeong-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1297-1304
    • /
    • 2011
  • SIP(Session Initiation Protocol) has some security vulnerability because it works on the Internet. Therefore, the proxy server can be affected by the flooding attack such as DoS and service interruption. However, traditional schemes to corresponding Denial of Service attacks have some limitation. These schemes have high complexity and cannot protect to the variety of Denial of Service attack. In this paper, we newly define the normal user who makes a normal session observed by verifier module. Our method provides continuous service to the normal users in the various situations of Denial of Service attack as constructing a whitelist using normal user information. Various types of attack/normal traffic are modeled by using OPNET simulator to verify our scheme. The simulation results show that our proposed scheme can prevent DoS attack and achieve a low false rate and fast searching time.

A Study on Architectural Results and Specific Characters of according to an Agreement Method in Housing Complex Plan - Focused on the Bong Mu-dong Town House in Daegu (집합주택계획에서 협의방식을 통해 나타난 건축적 성과와 특성에 관한 연구 - 대구광역시 '봉무동 타운하우스'를 중심으로 -)

  • Lee Jeong-Ho;Yoon Young Do
    • Journal of the Korean housing association
    • /
    • v.17 no.1
    • /
    • pp.145-153
    • /
    • 2006
  • Making of agreement with participation subjects is important process laying stress on presentation and a reasonable design guide line to form space order grant and synthetic space in Housing Complex plan. This study analyzed residing application specific character of design guide line that is presented to architects in general planning laying stress on plan only of 'Bongmu-dong town house' and design agreement of by architectural result that appear analyze. Result that analyze is as following: 1) Confer in 18 plan contents and integrate design or was adjusted. Being main conduct and unit plan and residing only in plan many negotiations accomplish. Architect who confer most Designs of 5 architects is 'Jean Michel Wilmott' and 'Shigeru Ban' 2) contents that confer much in plan main conduct and unit generation were details plan. Contents that is conferred with many architects are about door/core/rooftop be and asked a question about proper size of entrance. Negotiation about size was expose to the tribe of knowledge about element that do furniture and detail of necessary each space in life style of our country. We must present furnitures or detail element that appear by emotion of our country and detailed item of furnitures' size etc.. in guide line. It is immediate that creation of guide that architects can approach easily for lacking abroad architects of interests by code difference in each country is pressing. 3) In residing plan 4 architects of 5 architects applied similarly guide line in design. Most architects look by active support that make synthetic housing complex. and this is construed that act positively to make by unified residing. That plan of woods or landscape architecture and security of green area space are thing to approach on 'Environment-friendly mode of life residing only' that is general planning subject of 'Bongmu-dong town house'. 4) common question items of architects guide line of though is refered definitely when make out effective interests plan. So that can overcome legislation difference, countermeasure to make understood construction code of our country is pressing

Actual Condition and Realization of Important on Laboratory Safety Management in Chemical Laboratories (화학물질 사용 실험실의 안전관리 실태와 인식도)

  • Lee, Keun-Won;Choi, Yi-Rac
    • Journal of the Korean Institute of Gas
    • /
    • v.16 no.2
    • /
    • pp.60-66
    • /
    • 2012
  • With diversification of research and development activity according to fusion of state-of-the-art technology, potential hazard and risk factors in new forms have been increased in the laboratories. Also, as there are many cases where the experimental condition is extremely high/low temperature and pressure, many many accidents producing loss of life and/or injuries occur due to the extreme condition. In this study, The common fact questionnaire as the survey tool for the establishment of the accident prevention countermeasure in laboratory have been developed to safety security of the laboratory workers. The current status of chemical materials and the realization of important on laboratory safety management using the questionnaire investigated by an electronic mail and visiting survey in the laboratories and universities. The collected data was analyzed with Excel program and it can be utilized as basic data for accident prevention in laboratories.

New Pre-processing Method for Second-Order CPA on the IT Convergence Device (IT융합 디바이스에 대한 물리적 2차 CPA 공격을 위한 새로운 전처리 기법)

  • Lee, Chul-Hee;Hwang, Ah-Reum;Lee, Dong-Geon;Kim, Hyoung-Nam;Kim, Ho-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1369-1380
    • /
    • 2010
  • In this paper, we propose the efficient Second-Order Differential Power Analysis attack, which has ability to find significant information such as secret key in the devices consisting IT convergence environment such as Smartgrid, Advanced Metering Infrastructure(AMI) and ZigBee-based home networking service. This method helps to find the secret key easily at a device, even though it uses a countermeasure like masking which makes First-Order DPA attack harder. First, we present the performance results of our implementation which implements practical Second-Order DPA attack using the existing preprocessing function, and analyze it. Then we propose a stronger preprocessing function which overcomes countermeasures like masking. Finally, we analyze the results of the Second-Order CPA attack using proposed preprocessing function and verify that proposed scheme is very threatening to the security fields of IT convergence technology through the experimental results.

A Method to Improve Energy Efficiency Using a Function that Evaluate the Probability of Attempts to Verify a Report at Intermediate Node in USN (USN에서 중간 노드에서의 보고서 검증 시도 확률 평가 함수를 이용한 에너지 효율 향상 기법)

  • Lee, Hyun-Woo;Moon, Soo-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.21-29
    • /
    • 2011
  • Wireless sensor nodes operate in open environments. The deployed sensor nodes are very vulnerable to physical attacks from outside. Attackers compromise some sensor nodes. The compromised nodes by attackers can lead to false data injection into sensor networks. These attacks deplete the limited energy of sensor nodes. Ye et al. proposed the Statistical En-Route Filtering (SEF) as a countermeasure of the attacks. The sensor node in SEF examines the event reports based on certain uniform probability. Thus, the same energies are consumed in both legitimate reports and false reports. In this paper, we propose a method that each node controls the probability of attempts to verify a report to reduce energy consumption of sensor nodes. The probability is determined in consideration of the remaining energy of the node, the number of hops from the node to SINK node, the ratio of false reports. the proposed method can have security which is similar with SEF and consumes lower energy than SEF.

Vulnerability analysis of smart key for vehicle and countermeasure against hacking attack (차량용 스마트키 취약점 분석과 해킹공격 대응방안)

  • Kim, Seung-woo;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.302-305
    • /
    • 2017
  • With the development of new ICT technology, new technologies are being applied to automobiles. The smart key for vehicles is also a device to which ICT new technology is applied. Therefore, a cyber-hacking attack against a smart key of a vehicle is possible. The cyber attack on the smart key can cause an abnormal control of the vehicle. Vehicle control can lead to vehicle hijacking and vehicle control risks. In this paper, we analyze the vulnerability of smart key for vehicle. Analyze cyber attacks against smart keys in vehicles. Then, we conduct real hacking attacks on smart keys for vehicles and propose countermeasures. We conduct a hacking attack against the smart key for vehicle that has devised countermeasures and analyze countermeasures against cyber attack security. This paper will contribute to the prevention of vehicle deodorization and to the safety of the people.

  • PDF

VPN-Filter Malware Techniques and Countermeasures in IoT Environment (사물인터넷 환경에서의 VPN-Filter malware 기술과 대응방법)

  • Kim, Seung-Ho;Lee, Keun-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.231-236
    • /
    • 2018
  • Recently, a wide variety of IoT environment is being created due to the rapid development of information and communication technology. And accordingly in a variety of network structures, a countless number of attack techniques and new types of vulnerabilities are producing a social disturbance. In May of 2018, Talos Intelligence, the Cisco threat intelligence team has newly discovered 'VPN-Filter', which constitutes a large-scale IoT-based botnet, is infecting consumer routers in over 54 countries around the world. In this paper, types of IoT-based botnets and the attack techniques utilizing botnet will be examined and the countermeasure technique through EXIF metadata removal method which is the cause of connection method of C & C Server will be proposed by examining the characteristics of attack vulnerabilities and attack scenarios of VPN-Filter.

Survey on Analysis and Countermeasure for Hacking Attacks to Cryptocurrency Exchange (암호화폐 거래소 해킹 공격 분석 및 해결 방안 연구: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.1-6
    • /
    • 2019
  • As the value of technical information increases, hacking attacks are trying to steal technical information through hacking. Recently, hacking of cryptocurrency exchanges is much easier to monetize than existing technical information, making it a major attack target for hackers. In the case of technical information, it is required to seize the technical information and sell it to the black market for cashing.In the case of cryptocurrency, most hacking attacks are concentrated on cryptocurrency exchanges because it is easy to cash out and not easy to track when successful hacking. Although technology cannot be hacked, cryptocurrency transactions traded on cryptocurrency exchanges are not recorded on the blockchain which is simply internal exchanges, so insiders may manipulate the quotes and leave gaps or leak out. Therefore, this research analyzes the recent hacking attacks of cryptocurrency exchanges and proposes solutions to secure cryptocurrency trading.