• Title/Summary/Keyword: Target Vulnerability

Search Result 123, Processing Time 0.023 seconds

Groundwater Vulnerability of Some Cemeteries in Gyeonggi Province (경기도 일부 공원묘역의 지하수 오염가능성)

  • Lee, Jae-Hwang;Lee, Jun-Soo;Kim, Kye-Hoon
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.41 no.5
    • /
    • pp.330-341
    • /
    • 2008
  • The purpose of this study was to investigate the vulnerability for groundwater contamination at the some cemeteries in Gyeonggi Province. Twenty-eight out of 43 cemeteries in Gyeonggi province were selected for this study. The DRASTIC model was applied to those cemeteries, and the reliance of the model was assessed using the water quality data of the target areas. The DRASTIC model was used for the assessment of the potential for groundwater contamination using hydrogeological factors. Seven factors including depth of water, net recharge, aquifer media, soil media, topography, impact of the vadose zone, hydraulic conductivity of the aquifer were assessed. The DRASTIC index of the study area ranged from 82 to 126 with an average value of $113.99(\pm11.48)$. The DRASTIC index was relatively greater in the northern Gyeonggi province than that in the southern area. The DRASTIC index was similar for the areas with the similar burial rate and burial density. This study demonstrated that burial rate and burial density should be considered along with the 7 basic factors for the evaluation of groundwater vulnerability of the cemeteries.

Automated Method for Detecting OOB Vulnerability of Heap Memory Using Dynamic Symbolic Execution (동적 기호 실행을 이용한 힙 메모리 OOB 취약점 자동 탐지 방법)

  • Kang, Sangyong;Park, Sunghyun;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.919-928
    • /
    • 2018
  • Out-Of-Bounds (OOB) is one of the most powerful vulnerabilities in heap memory. The OOB vulnerability allows an attacker to exploit unauthorized access to confidential information by tricking the length of the array and reading or writing memory of that length. In this paper, we propose a method to automatically detect OOB vulnerabilities in heap memory using dynamic symbol execution and shadow memory table. First, a shadow memory table is constructed by hooking heap memory allocation and release function. Then, when a memory access occurs, it is judged whether OOB can occur by referencing the shadow memory, and a test case for causing a crash is automatically generated if there is a possibility of occurrence. Using the proposed method, if a weak block search is successful, it is possible to generate a test case that induces an OOB. In addition, unlike traditional dynamic symbol execution, exploitation of vulnerabilities is possible without setting clear target points.

Seismic vulnerability assessment of existing private RC constructions in northern Algeria

  • Belhamdi, Nourredine;Kibboua, Abderrahmane;Tahakourt, Abdelkader
    • Earthquakes and Structures
    • /
    • v.22 no.1
    • /
    • pp.25-38
    • /
    • 2022
  • The RC private constructions represent a large part of the housing stock in the north part of Algeria. For various reasons, they are mostly built without any seismic considerations and their seismic vulnerability remains unknown for different levels of seismic intensity possible in the region. To support future seismic risk mitigation efforts in northern Algeria, this document assesses the seismic vulnerability of typical private RC constructions built after the Boumerdes earthquake (May 21, 2003) without considering existing seismic regulation, through the development of analytical fragility curves. The fragility curves are developed for four representative RC frames in terms of slight, moderate, extensive, and complete damage states suggested in HAZUS-MH 2.1, using nonlinear time history analyses. The numerical simulation of the nonlinear seismic response of the structures is performed using the SeismoStruct software. An original intensity measure (IM) is proposed and used in this study. It is the zone acceleration coefficient "A", through which the seismic hazard level is represented in the Algerian Seismic Regulations. The efficiency, practicality, and proficiency of the choice of IM are demonstrated. Incremental dynamic analyses are conducted under fifteen ground motion accelerograms compatible with the elastic target spectrum of the Algerian Seismic Regulations. In order to cover all the seismic zones of northern Algeria, the accelerograms are scaled from 0.1 to 2.5 in increments of 0.1. The results mainly indicate that private constructions built after the Boumerdes earthquake in the moderate and high seismic zones with four (04) or more storeys are highly vulnerable.

A Development of a Seismic Vulnerability Model and Spatial Analysis for Buildings (건물에 대한 지진취약도 모델링 및 공간 분석)

  • Kim, Sang-Bin;Kim, Seong-Hoon
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.10
    • /
    • pp.9-18
    • /
    • 2020
  • The purpose of this study is to suggest a method of predicting seismic vulnerability and safety conditions of each building in a targeted area. The scope of this study includes 'developing a simulation model for precaution activities,' 'testing the validity of the developed model', From the facility point of view, target of this study is a local building system. According to the literature review, the number of earthquake prediction modeling and cases with GIS applied is extremely few and the results are not proficient. This study is conducted as a way to improve the previous researches. Statistic analyses are conducted using 348 domestic and international data. Finally, as a result of the series of statistical analyses, an adequate model is developed using optimization scale method. The ratio of correct expectation is estimated as 87%. In order to apply the developed model to predict the vulnerability of the several chosen local building systems, spatial analysis technique is applied. Gangnam-gu and Jongro-gu are selected as the target areas to represent the characteristics of the old and the new downtown in Seoul. As a result of the analysis, it is discovered that buildings in Gangnam-gu are relatively more dangerous comparing to those of Jongro-gu and Eunpyeong-gu.

The Application of the AHP Analysis Method to Prepare the Selection Standards for the Target Site of Check Dams (사방댐 대상지 선정 기준마련을 위한 AHP 분석기법의 적용)

  • Bea, Hyun-Seok;Lee, Kwang-Youn;Choi, Young-Jin;Lee, Jin-Ho;Woo, Choong-Shik;Chun, Kun-Woo
    • Journal of Korean Society of Forest Science
    • /
    • v.109 no.4
    • /
    • pp.446-453
    • /
    • 2020
  • By applying the Analytic Hierarchy Process(AHP) method, we calculated the weight of factors related to the selection of check dam sites and generated basic data related to the selection of the target site. As a result of the AHP classification, three evaluation items(Susceptibility, Vulnerability, and Constructability), 12 evaluation factors (Susceptibility 10, Vulnerability, and Constructability 1), and two-six evaluation criteria in each evaluation factor were selected. After calculating the relative importance by using the selected evaluation items, evaluation factors, and criteria, the vulnerability items such as medical facilities, facilities for the aged, educational facilities, and private homes were found to be higher than the other items. When the relative weight for deciding qualified sites was applied to the forest watersheds in the Gangwon region, 8,601 forest watersheds(35.2 % of the total forest watersheds) were found to be suitable for the installation of check dams.

Real-time Small Target Detection using Local Contrast Difference Measure at Predictive Candidate Region (예측 후보 영역에서의 지역적 대비 차 계산 방법을 활용한 실시간 소형 표적 검출)

  • Ban, Jong-Hee;Wang, Ji-Hyeun;Lee, Donghwa;Yoo, Joon-Hyuk;Yoo, Seong-eun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.2
    • /
    • pp.1-13
    • /
    • 2017
  • In This Paper, we find the Target Candidate Region and the Location of the Candidate Region by Performing the Morphological Difference Calculation and Pixel Labeling for Robust Small Target Detection in Infrared Image with low SNR. Conventional Target Detection Methods based on Morphology Algorithms are low in Detection Accuracy due to their Vulnerability to Clutter in Infrared Images. To Address the Problem, Target Signal Enhancement and Background Clutter Suppression are Achieved Simultaneously by Combining Moravec Algorithm and LCM (Local Contrast Measure) Algorithm to Classify the Target and Noise in the Candidate Region. In Addition, the Proposed Algorithm can Efficiently Detect Multiple Targets by Solving the Problem of Limited Detection of a Single Target in the Target Detection method using the Morphology Operation and the Gaussian Distance Function Which were Developed for Real time Target Detection.

Vulnerability Analysis on a VPN for a Remote Monitoring System

  • Kim Jung Soo;Kim Jong Soo;Park Il Jin;Min Kyung Sik;Choi Young Myung
    • Nuclear Engineering and Technology
    • /
    • v.36 no.4
    • /
    • pp.346-356
    • /
    • 2004
  • 14 Pressurized Water Reactors (PWR) in Korea use a remote monitoring system (RMS), which have been used in Korea since 1998. A Memorandum of Understanding on Remote Monitoring, based on Enhanced Cooperation on PWRs, was signed at the 10th Safeguards Review Meeting in October 2001 between the International Atomic Energy Agency (IAEA) and Ministry Of Science and Technology (MOST). Thereafter, all PWR power plants applied for remote monitoring systems. However, the existing method is high cost (involving expensive telephone costs). So, it was eventually applied to an Internet system for Remote Monitoring. According to the Internet-based Virtual Private Network (VPN) applied to Remote Monitoring, the Korea Atomic Energy Research Institute (KAERI) came to an agreement with the IAEA, using a Member State Support Program (MSSP). Phase I is a Lab test. Phase II is to apply it to a target power plant. Phase III is to apply it to all the power plants. This paper reports on the penetration testing of Phase I. Phase I involved both domestic testing and international testing. The target of the testing consisted of a Surveillance Digital Integrated System (SDIS) Server, IAEA Server and TCNC (Technology Center for Nuclear Control) Server. In each system, Virtual Private Network (VPN) system hardware was installed. The penetration of the three systems and the three VPNs was tested. The domestic test involved two hacking scenarios: hacking from the outside and hacking from the inside. The international test involved one scenario from the outside. The results of tests demonstrated that the VPN hardware provided a good defense against hacking. We verified that there was no invasion of the system (SDIS Server and VPN; TCNC Server and VPN; and IAEA Server and VPN) via penetration testing.

Hiding Shellcode in the 24Bit BMP Image (24Bit BMP 이미지를 이용한 쉘코드 은닉 기법)

  • Kum, Young-Jun;Choi, Hwa-Jae;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.691-705
    • /
    • 2012
  • Buffer overflow vulnerability is the most representative one that an attack method and its countermeasure is frequently developed and changed. This vulnerability is still one of the most critical threat since it was firstly introduced in middle of 1990s. Shellcode is a machine code which can be used in buffer overflow attack. Attackers make the shellcode for their own purposes and insert it into target host's memory space, then manipulate EIP(Extended Instruction Pointer) to intercept control flow of the target host system. Therefore, a lot of research to defend have been studied, and attackers also have done many research to bypass security measures designed for the shellcode defense. In this paper, we investigate shellcode defense and attack techniques briefly and we propose our new methodology which can hide shellcode in the 24bit BMP image. With this proposed technique, we can easily hide any shellcode executable and we can bypass the current detection and prevention techniques.

Naval ship's susceptibility assessment by the probabilistic density function

  • Kim, Kwang Sik;Hwang, Se Yun;Lee, Jang Hyun
    • Journal of Computational Design and Engineering
    • /
    • v.1 no.4
    • /
    • pp.266-271
    • /
    • 2014
  • The survivability of the naval ship is the capability of a warship to avoid or withstand a hostile environment. The survivability of the naval ship assessed by three categories (susceptibility, vulnerability and recoverability). The magnitude of susceptibility of a warship encountering with threat is dependent upon the attributes of detection equipment and weapon system. In this paper, as a part of a naval ship's survivability analysis, an assessment process model for the ship's susceptibility analysis technique is developed. Naval ship's survivability emphasizing the susceptibility is assessed by the probability of detection, and the probability of hit. Considering the radar cross section (RCS), the assessment procedure for the susceptibility is described. It's emphasizing the simplified calculation model based on the probability density function for probability of hit. Assuming the probability of hit given a both single-hit and multiple-hit, the susceptibility is accessed for a RCS and the hit probability for a rectangular target is applied for a given threat.

Analysis of Construction Plans of Rapid Charging Infrastructures based on Gas Stations in Rural Areas to Propagate Electric Vehicles (전기자동차 보급을 위한 농촌지역의 주유소 기반 급속 충전인프라 구축 방안 분석)

  • Kim, Solhee;Kim, Taegon;Suh, Kyo
    • Journal of Korean Society of Rural Planning
    • /
    • v.21 no.1
    • /
    • pp.19-28
    • /
    • 2015
  • As environmental concerns including climate change drive the strong regulations for car exhaust emissions, electric vehicles attract the public eye. The purpose of this study is to identify rural areas vulnerable for charging infrastructures based on the spatial distributions of the current gas stations and provide the target dissemination rates for promoting electric cars. In addition, we develop various scenarios for finding optimal way to expand the charging infrastructures through the administrative districts data including 11,677 gas stations, the number of whole national gas stations. Gas stations for charging infrastructures are randomly selected using the Monte Carlo Simulation (MCS) method. Evaluation criteria for vulnerability assessment include five considering the characteristic of rural areas. The optimal penetration rate is determined to 21% in rural areas considering dissemination efficiency. To reduce the vulnerability, the charging systems should be strategically installed in rural areas considering geographical characteristics and regional EV demands.