• Title/Summary/Keyword: Target Signature

Search Result 87, Processing Time 0.023 seconds

Experimental Study of Drone Detection and Classification through FMCW ISAR and CW Micro-Doppler Analysis (고해상도 FMCW 레이더 영상 합성과 CW 신호 분석 실험을 통한 드론의 탐지 및 식별 연구)

  • Song, Kyoungmin;Moon, Minjung;Lee, Wookyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.2
    • /
    • pp.147-157
    • /
    • 2018
  • There are increasing demands to provide early warning against intruding drones and cope with potential threats. Commercial anti-drone systems are mostly based on simple target detection by radar reflections. In real scenario, however, it becomes essential to obtain drone radar signatures so that hostile targets are recognized in advance. We present experimental test results that micro-Doppler radar signature delivers partial information on multi-rotor platforms and exhibits limited performance in drone recognition and classification. Afterward, we attempt to generate high resolution profile of flying drone targets. To this purpose, wide bands radar signals are employed to carry out inverse synthetic aperture radar(ISAR) imaging against moving drones. Following theoretical analysis, experimental field tests are carried out to acquire real target signals. Our preliminary tests demonstrate that high resolution ISAR imaging provides effective measures to detect and classify multiple drone targets in air.

A Strengthened Android Signature Management Method

  • Cho, Taenam;Seo, Seung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1210-1230
    • /
    • 2015
  • Android is the world's most utilized smartphone OS which consequently, also makes it an attractive target for attackers. The most representative method of hacking used against Android apps is known as repackaging. This attack method requires extensive knowledge about reverse engineering in order to modify and insert malicious codes into the original app. However, there exists an easier way which circumvents the limiting obstacle of the reverse engineering. We have discovered a method of exploiting the Android code-signing process in order to mount a malware as an example. We also propose a countermeasure to prevent this attack. In addition, as a proof-of-concept, we tested a malicious code based on our attack technique on a sample app and improved the java libraries related to code-signing/verification reflecting our countermeasure.

Improved Shamir's CRT-RSA Algorithm: Revisit with the Modulus Chaining Method

  • Lee, Seungkwang;Choi, Dooho;Choi, Yongje
    • ETRI Journal
    • /
    • v.36 no.3
    • /
    • pp.469-478
    • /
    • 2014
  • RSA signature algorithms using the Chinese remainder theorem (CRT-RSA) are approximately four-times faster than straightforward implementations of an RSA cryptosystem. However, the CRT-RSA is known to be vulnerable to fault attacks; even one execution of the algorithm is sufficient to reveal the secret keys. Over the past few years, several countermeasures against CRT-RSA fault attacks have tended to involve additional exponentiations or inversions, and in most cases, they are also vulnerable to new variants of fault attacks. In this paper, we review how Shamir's countermeasure can be broken by fault attacks and improve the countermeasure to prevent future fault attacks, with the added benefit of low additional costs. In our experiment, we use the side-channel analysis resistance framework system, a fault injection testing and verification system, which enables us to inject a fault into the right position, even to within $1{\mu}s$. We also explain how to find the exact timing of the target operation using an Atmega128 software board.

A Study on the Development of a Lanchester-Type Model Incorporating Firing & Observing States in the Direct Fire Engagement (Firing State와 Observing State를 갖는 Lanchester형 전투모형에 관한 연구)

  • Ham Il-Hwan;Choe Sang-Yeong;Song Mun-Ho
    • Journal of the military operations research society of Korea
    • /
    • v.17 no.2
    • /
    • pp.44-53
    • /
    • 1991
  • This paper is aimed to develop a Lanchester type combat model for the direct-fire engagement. This model incorporates number of combatants, inter-firing time, detection time by movement, detection probability by the signature of fire, where the inter-firing time and the detection time are assumed to follow a negative exponential distribution. The approach to modeling is as follows : in the process of an engagement, a combatant takes one of the states('observing' state or 'firing' state), a combatant is initially in the observing state, if the combatant detects a target, he changes his state from 'observing' to 'firing' and will cause attrition to the opposing forces. Thus this transition mechanism is embodied into the differential equation form with each transition rate. A limited examination of the validity has been conducted by comparison with the Monte-Carlo simulation model 'BAGSIM', and with a traditional Deterministic Lanchester model.

  • PDF

MoTE-ECC Based Encryption on MSP430

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.3
    • /
    • pp.160-164
    • /
    • 2017
  • Public key cryptography (PKC) is the basic building block for the cryptography applications such as encryption, key distribution, and digital signature scheme. Among many PKC, elliptic curve cryptography (ECC) is the most widely used in IT systems. Recently, very efficient Montgomery-Twisted-Edward (MoTE)-ECC was suggested, which supports low complexity for the finite field arithmetic, group operation, and scalar multiplication. However, we cannot directly adopt the MoTE-ECC to new PKC systems since the cryptography is not fully evaluated in terms of performance on the Internet of Things (IoT) platforms, which only supports very limited computation power, energy, and storage. In this paper, we fully evaluate the MoTE-ECC implementations on the representative IoT devices (16-bit MSP processors). The implementation is highly optimized for the target platform and compared in three different factors (ROM, RAM, and execution time). The work provides good reference results for a gradual transition from legacy ECC to MoTE-ECC on emerging IoT platforms.

Efficient Multi-site Testing Using ATE Channel Sharing

  • Eom, Kyoung-Woon;Han, Dong-Kwan;Lee, Yong;Kim, Hak-Song;Kang, Sungho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.13 no.3
    • /
    • pp.259-262
    • /
    • 2013
  • Multi-site testing is considered as a solution to reduce test costs. This paper presents a new channel sharing architecture that enables I/O pins to share automatic test equipment (ATE) channels using simple circuitry such as tri-state buffers, AND gates, and multiple-input signature registers (MISR). The main advantage of the proposed architecture is that it is implemented on probe cards and does not require any additional circuitry on a target device under test (DUT). In addition, the proposed architecture can perform DC parametric testing of the DUT such as leakage testing, even if the different DUTs share the same ATE channels. The simulation results show that the proposed architecture is very efficient and is applicable to both wafer testing and package testing.

Gene Expression Signatures for Compound Response in Cancers

  • He, Ningning;Yoon, Suk-Joon
    • Genomics & Informatics
    • /
    • v.9 no.4
    • /
    • pp.173-180
    • /
    • 2011
  • Recent trends in generating multiple, large-scale datasets provide new challenges to manipulating the relationship of different types of components, such as gene expression and drug response data. Integrative analysis of compound response and gene expression datasets generates an opportunity to capture the possible mechanism of compounds by using signature genes on diverse types of cancer cell lines. Here, we integrated datasets of compound response and gene expression profiles on NCI60 cell lines and constructed a network, revealing the relationship for 801 compounds and 341 gene probes. As examples, obtusol, which shows an exclusive sensitivity on a small number of colon cell lines, is related to a set of gene probes that have unique overexpression in colon cell lines. We also found that the SLC7A11 gene, a direct target of miR-26b, might be a key element in understanding the action of many diverse classes of anticancer compounds. We demonstrated that this network might be useful for studying the mechanisms of varied compound response on diverse cancer cell lines.

A Stream Ciphering Method using a Chaotic System

  • Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.433-436
    • /
    • 2010
  • In this paper, we presented a ciphering method whose target data is any kind of digital bit-stream. It uses a chaotic system as the main encrypting tool, MISR (Multi-Input Signature Register), and shift-and-rotation function, all of which are exclusive-ORed with the plaintext. Also, it incorporates a cipher text feedback mode such that part of the previously ciphered data is fed back to encrypt the current data. The encryption block size and the amount of feedback data are different at each ciphering operation. Experimental results with the image/video date showed that this method has enough speed and encryption effect with negligible latency time. Thus, we are expecting it to have various application areas that need high speed stream ciphering with high security level.

Region Based Object Tracking with Snakes (스네이크를 이용한 영역기반 물체추적 알고리즘)

  • Kim, Young-Sub;Han, Kyu-Bum;Baek, Yoon-Su
    • Proceedings of the KSME Conference
    • /
    • 2001.06b
    • /
    • pp.307-312
    • /
    • 2001
  • In this paper, we proposed the object-tracking algorithm that recognizes and estimates the any shaped and size objects using vision system. For the extraction of the object from the background of the acquired images, spatio-temporal filter and signature parsing algorithm are used. Specially, for the solution of correspondence problem of the multiple objects tracking, we compute snake energy and position information of the target objects. Through the real-time tracking experiment, we verified the effectiveness of the suggested tracking algorithm.

  • PDF

Study on the IR Measurement Scheme and Requirement for Its Evaluation from a Naval ship Considering the Meteorological Conditions (기상 조건에 따른 함정의 적외선 방사신호 성능 평가시 고려요소 및 계측 방안 연구)

  • Gil, Tae-Jun;Cho, Yong-Jin
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.44 no.4
    • /
    • pp.459-465
    • /
    • 2007
  • This paper deals with the development of measuring methodology and the requirement for its evaluation of the infrared radiation from a naval ship to optical sensors, considering the Meteorological conditions. Factors required for measuring the apparent temperature and infrared radiation are identified and two methods are suggested based on the measuring instruments carried by ship or aircraft. and target operation in the Meteorological conditions is considered. This study describes some factors affecting the IR signature. required instruments to obtain the IR signal considering the naval ship.