• Title/Summary/Keyword: Security Test

Search Result 1,256, Processing Time 0.037 seconds

Attachment Representation of Preschool Children : Links to Attachment Security and Mother-Child Interaction Behavior (나레이티브를 통한 유아의 애착 표상 측정의 타당화 연구 : 애착 안정성, 어머니 유아 상호작용 행동과의 관계를 중심으로)

  • Park, Kyung Ja;Kwon, Yeon Hee
    • Korean Journal of Child Studies
    • /
    • v.26 no.4
    • /
    • pp.247-247
    • /
    • 2005
  • The attachment representation of 40 36- to 52-month-old upper-middle class children was analyzed in relation to their attachment security and mother-child interaction behaviors. Instruments were the Attachment Story Completion Task(Bretherton, Ridgeway, & Cassidy, 1990), the Attachment Q-set, and the Vocabulary test of the K-WIPPSI. Mother-child interaction behaviors were observed at home during semi-structured problem-solving situations. The Attachment Story Completion Task classified Korean preshoolers from these upper-middle class families as securely attached to their mothers. Girls' representation of their attachment relationship was more secure than boys. Preschoolers' attachment representation was significantly related to vocabulary ability. Attachment security correlated positively with preschool children's attachment representation. Mother-child interaction behaviors related significantly to preschool children's attachment representation.

  • PDF

Design of Security Vulnerability Analysis Target Monitoring Function for Effective Fuzzing Test in VxWorks Environment (VxWorks 환경에서 효과적인 퍼징 테스트를 위한 보안취약점 분석대상 모니터링 기능 설계)

  • An, Gae-Il;Song, Won-Jun;Choi, Yang-Seo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.407-408
    • /
    • 2019
  • 산업제어시스템에서 사용되는 소프트웨어의 보안취약점을 테스트하기 위한 방법으로 퍼징(Fuzzing)이 사용되고 있다. 퍼징 시스템은 크게 퍼징 대상을 테스트하는 퍼저(fuzzer)와 퍼징 대상을 모니터링하는 모니터링 모듈로 구성된다. 본 논문에서는 VxWorks 환경에서 효과적인 퍼징을 제공하기 위해 요구되는 퍼징 대상 모니터링 기능을 정의하고 모니터링 모듈을 설계한다.

Utilisation of IoT Systems as Entropy Source for Random Number Generation

  • Oguzhan ARSLAN;Ismail KIRBAS
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.77-86
    • /
    • 2024
  • Using random numbers to represent uncertainty and unpredictability is essential in many industries. This is crucial in disciplines like computer science, cryptography, and statistics where the use of randomness helps to guarantee the security and dependability of systems and procedures. In computer science, random number generation is used to generate passwords, keys, and other security tokens as well as to add randomness to algorithms and simulations. According to recent research, the hardware random number generators used in billions of Internet of Things devices do not produce enough entropy. This article describes how raw data gathered by IoT system sensors can be used to generate random numbers for cryptography systems and also examines the results of these random numbers. The results obtained have been validated by successfully passing the FIPS 140-1 and NIST 800-22 test suites.

A Study on the Method of Optimizing the Test Order of Explosive Detection System Using Analytic Hierarchy Process and Objective Rating (계층분석방법 및 객관적평가법을 활용한 폭발물탐지장비 시험순서 최적화 방법에 관한 연구)

  • Sun-Ju, Won;Hyun Su, Sim;Yong Soo, Kim
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.4
    • /
    • pp.793-810
    • /
    • 2022
  • Purpose: As improving the search performance of aviation security equipment is considered essential, this study proposes the need for research on how to find an optimized test sequence that can reduce test time and operator power during the search function test of explosive detection systems. We derive the weights and work difficulty adjustment factor required to find the optimized test order. Methods: First, after setting the test factors, the time of each test and the difficulty scale determined by the worker who performed the test directly were used to derive weights. Second, the work difficulty adjustment coefficient was determined by combining the basic weight adjustment factor and corresponding to the body part used by the test using objective rating. Then the final standard time was derived by calculating the additional weights for the changeability of the test factors. Results: The order in which the final standard time is minimized when 50 tests are performed was defined as the optimized order. 50 tests should be conducted without duplication and the optimal order of tests was obtained when compared to previously numbered tests. As a result of minimizing the total standard time by using Excel's solver parameters, it was reduced by 379.14 seconds, about 6.32 minutes. Conclusion: We tried to express it in mathematical formulas to propose a method for setting an optimized test sequence even when testing is performed on other aviation security equipment. As a result, the optimal test order was derived from the operator's point of view, and it was demonstrated by minimizing the total standard time.

Effects of Security Needs of Citizens Utilizing CCTV on the Life Satisfaction (CCTV를 통한 시민들의 안전욕구충족이 생활만족에 미치는 영향)

  • Park, Young-Man;Kim, Eun-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.7
    • /
    • pp.437-447
    • /
    • 2011
  • This study will compare and analyze the effect of satisfaction of security needs on life satisfaction according to sociodemographic features and will find the factors of security needs satisfaction and life satisfaction. a total of three humdred questionnaires was distributed to male and female who live in Seoul(Gang-dong, Gang-sue, Songpa-gu and Gand-buk) in Aug. and Sept., 2010 and over nineteen years old. Except making the wrong questionnaires, total questionnaires was sampled from 259 questionnaires using judgment sampling method after selecting. Data analysis be used by SPSSWIN 18.0 Version. The validity and reliability of questionnaires are verified for factorial analysis and reliability analysis and also T test and F test are used for finding for differences of life satisfaction and satisfaction of security needs. And, this study is tested the regression analysis for the effects on the life satisfaction and satisfaction of security. Utilizing CCTV on the Life Satisfaction, this study were drawn the conclusions as following. First, the satisfaction of security needs as demographic characteristics have the part of the difference. the result shows to different psychological needs as educational level at the group less than college graduates. Second, the result of satisfaction of security as demographic characteristics is significantly higher in the male group and life satisfaction as education is significantly higher in more than college graduates. Third, the satisfaction of security needs of citizens through the CCTV effects to life satisfaction. environmental needs and information needs are as high as life satisfaction.

Breaking character and natural image based CAPTCHA using feature classification (특징 분리를 통한 자연 배경을 지닌 글자 기반 CAPTCHA 공격)

  • Kim, Jaehwan;Kim, Suah;Kim, Hyoung Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1011-1019
    • /
    • 2015
  • CAPTCHA(Completely Automated Public Turing test to tell Computers and Humans Apart) is a test used in computing to distinguish whether or not the user is computer or human. Many web sites mostly use the character-based CAPTCHA consisting of digits and characters. Recently, with the development of OCR technology, simple character-based CAPTCHA are broken quite easily. As an alternative, many web sites add noise to make it harder for recognition. In this paper, we analyzed the most recent CAPTCHA, which incorporates the addition of the natural images to obfuscate the characters. We proposed an efficient method using support vector machine to separate the characters from the background image and use convolutional neural network to recognize each characters. As a result, 368 out of 1000 CAPTCHAs were correctly identified, it was demonstrated that the current CAPTCHA is not safe.

The Impacts of Perceived Attributes on Continuance of the Smart Phone App Store (스마트폰 앱스토어에 대한 지각특성이 지속이용에 미치는 영향)

  • Lee, Kook-Yong
    • Korean Management Science Review
    • /
    • v.30 no.3
    • /
    • pp.33-54
    • /
    • 2013
  • The purpose of this study is to examine the relationships between Product Quality (Popularity, Playfulness) and Information Quality (Informativeness, Reliability), System Quality (Ease of Use, Security), Trust and Continuance Intention in Smart Phone Application Market. To identify these affecting relationships, the secondary data or past studies were collected and theoretically arranged. I made the theoretical proposed model to explain the relationships between the constructs, identify the operational definitions and 13 Hypotheses were established, there was executed the survey of 250 customers of Smart Phone Application Market. Using the collected data, previous performances to confirm the construct validity and internal consistency by Cronbach's a was executed and Partial Least Square Analysis to confirm the hypotheses in proposed model was conducted using the Smart-PLS Software. As the result of test that make the relations of used variables clear, we can get the conclusion as followings; First, Product Popularity has the positive effect on Informativeness, except reliability of Information. Second, it was significantly tested the effect on the Ease of use and Security by Product Playfulness. Third, Informativeness and Ease of Use, Security of App Store have the significantly positive effects on the Users' Trust directly. From the empirical test, I suggest the strategic advices in App Store Companies. To increase the Users' Continuance Intention or Loyalty, it would be developed that a variety of methods and ways to raise the Product Popularity and Playfulness, Informativeness, Ease of Use and Security of App Store. It is necessary for sticking the Users to raise the positive trust building and Continuance Intention.

Automated Method for Detecting OOB Vulnerability of Heap Memory Using Dynamic Symbolic Execution (동적 기호 실행을 이용한 힙 메모리 OOB 취약점 자동 탐지 방법)

  • Kang, Sangyong;Park, Sunghyun;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.919-928
    • /
    • 2018
  • Out-Of-Bounds (OOB) is one of the most powerful vulnerabilities in heap memory. The OOB vulnerability allows an attacker to exploit unauthorized access to confidential information by tricking the length of the array and reading or writing memory of that length. In this paper, we propose a method to automatically detect OOB vulnerabilities in heap memory using dynamic symbol execution and shadow memory table. First, a shadow memory table is constructed by hooking heap memory allocation and release function. Then, when a memory access occurs, it is judged whether OOB can occur by referencing the shadow memory, and a test case for causing a crash is automatically generated if there is a possibility of occurrence. Using the proposed method, if a weak block search is successful, it is possible to generate a test case that induces an OOB. In addition, unlike traditional dynamic symbol execution, exploitation of vulnerabilities is possible without setting clear target points.

Design and Implementation of Network Access Control based on IPv6 (IPv6 기반의 네트워크 접근제어 시스템 설계 및 구현)

  • Shin, HaeJoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6310-6316
    • /
    • 2014
  • The increase in the Internet and smart device users requires high-level network security. Network security consists of Web Firewall, Network Firewall, IPS, DDoS system, UTM (Unified Treat Management), VPN, NAC (Network Access Control), Wireless security, Mobile security, and Virtualization. Most network security solutions running on IPv4, and IPv6 network services are not sufficiently ready. Therefore, in this paper, this study designed and implemented important functions of Network Access Control (NAC), which include IPv6 host detection, isolation, blocking and domain assignment for the IPv6 network. In particular, domain assignment function makes 128 bits IPv6 address management easy. This system was implemented on a KISA IPv6 test-bed using well known devices. Finally, the test result showed that all IPv6 based wired and wireless devices were well-controlled (detection, blocking, isolation and domain assignment).

Detection of Source Code Security Vulnerabilities Using code2vec Model (code2vec 모델을 활용한 소스 코드 보안 취약점 탐지)

  • Yang, Joon Hyuk;Mo, Ji Hwan;Hong, Sung Moon;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.45-52
    • /
    • 2020
  • Traditional methods of detecting security vulnerabilities in source-code require a lot of time and effort. If there is good data, the issue could be solved by using the data with machine learning. Thus, this paper proposes a source-code vulnerability detection method based on machine learning. Our method employs the code2vec model that has been used to propose the names of methods, and uses as a data set, Juliet Test Suite that is a collection of common security vulnerabilities. The evaluation shows that our method has high precision of 97.3% and recall rates of 98.6%. And the result of detecting vulnerabilities in open source project shows hopeful potential. In addition, it is expected that further progress can be made through studies covering with vulnerabilities and languages not addressed here.