• Title/Summary/Keyword: Technology leak

Search Result 365, Processing Time 0.024 seconds

Analysis of the Password Leaking in Virtual Keyboard (가상키보드 비밀번호 유출 분석)

  • Yang, Hee-dong;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.827-835
    • /
    • 2022
  • In order to use online financial services, user authentication technology is necessary. Password check through keyboard typing is the most common technique. However, since it became known that key stokes on the keyboard can be intercepted easily, many Internet banking services and easy payment services have adopted the virtual keyboard. However, contrary to the expectation that the virtual keyboard will be safe, there is a risk that key strokes on the virtual keyboard can be leaked. In this paper, we analyzed the possibility of password leaking on the virtual keyboard and presented a password leaking method using mouse event hooking and screen capture in PC operating system. In addition, we inspected the possibility of password leak attacks on several famous Korea Internet banking websites and simple payment services, and as a result, we verified that the password input method through the virtual keyboard in the PC operating system is not secure.

A study of the hazard of fire and explosion due to electric charge by Gas-Solids flow in pipeline

  • Chung Jae Hee;Seo Dae Won;Koo Ja Hyeuk;Kim Sung Jun;An Heau Seak;Kim Joon Ho;Hong Sung Kyung;YAMAGUMA Mizuki;KODAMA Tsutomu
    • Journal of the Korean Institute of Gas
    • /
    • v.4 no.3 s.11
    • /
    • pp.33-38
    • /
    • 2000
  • When fire and explosion accidents have occurred due to a leak of the flammable gas involving the LNG & LPG in an industrialized society, it is a very important problem. Accordingly, in this paper, we have compared and analyzed the occurrence transition and the electrostatic energy according to dust supplies and pressure variations for the electric charge due to the gas-solids of pipe flow. As the experimental results, if dust amounts and the initial pressure increased, electric charge in the pipe and the exit increased. The Specific charge of $Fe_2O_3$ increased proportionally if the initial pressure increased but if the quantity of dust increased, the specific charge decreased. Energy increased significantly as the dust amounts and the initial pressure increased. The possibility of fire and explosion exist in the measuring point(M 1) and the Faraday cage if natural gas and LPG were used.

  • PDF

Electrochemical Characteristics of EDLC with various Organic Electrolytes (유기전해질에 따른 EDLC의 전기화학적 특성)

  • Yang Chun-Mo;Lee J.K.;Cho W.I.;Cho B.W.;Rim Byung-O
    • Journal of the Korean Electrochemical Society
    • /
    • v.4 no.3
    • /
    • pp.113-117
    • /
    • 2001
  • Specific capacitance and charge-discharge rate of EDLC using activated carbon electrode were affected by the compositions of electrolytes, the conditions of charge-discharge and physical properties of activated carbon materials. The activated carbon electrode was prepared by dip coating method. Charge-discharge test and electrochemical experiments were carried out for various kinds of organic electrolytes. Effects of charge and discharge current density on the specific capacitance were studied. Characteristics of leakage current, self-discharge and time-voltage curves in optimum conditions of organic electrolytes were compared with conventional $1M-Et_4NBF_4/PC$ electrolyte. The EDLC using MSP-20(specific surface area: $2000m^2/g$) electrode and $1M-LiPF_6/PC-DEC(1:1)$ was exhibited th highest specific capacitance of 130F/g and low polarization resistances. The EDLC using MSP-20 electrode at $1M-LiPF_6/PC-DEC(1:1)$ was small leak current of 0.0004A for 15min, long voltage retention of 0.8V after 100h and linear time-voltage curves with small IR-drop.

Selection of Transition Point through Calculation of Cumulative Toxic Load -Focused on Incheon Area- (누적독성부하 산정을 통한 주민소산 전환시점 선정에 관한 연구 -인천지역을 중심으로-)

  • Lee, Eun Ji;Han, Man Hyeong;Chon, Young Woo;Lee, Ik Mo;Hwang, Yong Woo
    • Journal of the Korean Society of Safety
    • /
    • v.35 no.6
    • /
    • pp.15-24
    • /
    • 2020
  • With the development of the chemical industry, the chemical accident is increasing every year, thereby increasing the risk of accidents caused by chemicals. The Ministry of Environment provides the criteria for determining shelter-in-place or outdoor evacuation by material, duration of accident, and distance from the toxic substance leak. However, it is hard to say that the criteria for determining the transition point are not clear. Transition point mean the time that evacuation method is switched from shelter-in-place to outdoor evacuation. So, the purpose of this study was to calculate appropriate transition point by comparing the cumulative toxic load. Namdong-gu in Incheon Metropolitan City was finally selected as the target area, considering the current status of the population of Incheon Metropolitan City in 2016 and the statistical survey of chemicals in 2016. The target materials were HCl, HF, and NH3. Modeling was simulated by ALOHA and performed assuming that the entire amount would be leaked for 10 min. Residents' evacuation scenarios were assumed to be shelter-in-place, immediate outdoor evacuation, and outdoor evacuation at an appropriate time after shelter-in-place. Based on the above method, the appropriate transition point from residents located in A(800 m away), B(1,200 m away), C(1,400 m away) and D(2,200 m away) was identified. In HCl, appropriate transition point was after 15 min, after 16 min, after 17 min, after 20 min in order by A, B, C and D. In HF, appropriate transition point was before 1 min or after 16 min, before 4 min or after 19 min, before 5 min or after 20 min, before 14 min or after 26 min in order by A, B, C and D. In NH3, appropriate transition point at A was before 4 min or after 16. Others are not in chemical cloud. This study confirmed the transition point to minimize the cumulative toxic load can be obtained by quantitative method. Through this, it might be possible to select evacuation method quantitatively that cumulative toxic load are minimal. In addition, if the shelter-in-place is maintained without transition to outdoor evacuation, the cumulative toxic load will increase more than outdoor evacuation. Therefore, it was confirmed that actions to reduce the concentration of chemicals in the room were necessary, such as conducting ventilation after the chemical cloud passed through the site.

Cluster exploration of water pipe leak and complaints surveillance using a spatio-temporal statistical analysis (스캔통계량 분석을 통한 상수도 누수 및 수질 민원 발생 클러스터 탐색)

  • Juwon Lee;Eunju Kim;Sookhyun Nam;Tae-Mun Hwang
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.37 no.5
    • /
    • pp.261-269
    • /
    • 2023
  • In light of recent social concerns related to issues such as water supply pipe deterioration leading to problems like leaks and degraded water quality, the significance of maintenance efforts to enhance water source quality and ensure a stable water supply has grown substantially. In this study, scan statistic was applied to analyze water quality complaints and water leakage accidents from 2015 to 2021 to present a reasonable method to identify areas requiring improvement in water management. SaTScan, a spatio-temporal statistical analysis program, and ArcGIS were used for spatial information analysis, and clusters with high relative risk (RR) were determined using the maximum log-likelihood ratio, relative risk, and Monte Carlo hypothesis test for I city, the target area. Specifically, in the case of water quality complaints, the analysis results were compared by distinguishing cases occurring before and after the onset of "red water." The period between 2015 and 2019 revealed that preceding the occurrence of red water, the leak cluster at location L2 posed a significantly higher risk (RR: 2.45) than other regions. As for water quality complaints, cluster C2 exhibited a notably elevated RR (RR: 2.21) and appeared concentrated in areas D and S, respectively. On the other hand, post-red water incidents of water quality complaints were predominantly concentrated in area S. The analysis found that the locations of complaint clusters were similar to those of red water incidents. Of these, cluster C7 exhibited a substantial RR of 4.58, signifying more than a twofold increase compared to pre-incident levels. A kernel density map analysis was performed using GIS to identify priority areas for waterworks management based on the central location of clusters and complaint cluster RR data.

Characterization of the 2 inch CNT-FED Fabricated by using a Vacuum In-Line Sealing Technology

  • Kwon, Sang-Jik;Kim, Tae-Ho;Cho, Euo-Sik;Shon, Byeong-Kyoo;Uh, Hyung-Soo;Lee, Jong-Duk;Cho, Sung-Hee;Lee, Chun-Gyoo
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2003.07a
    • /
    • pp.870-873
    • /
    • 2003
  • We have fabricated a carbon nanotube field emission display(CNT FED) panel with a 2 inch diagonal size by using screen printing method and vacuum in-line sealing technology. The sealing temperature of the panel was around 390 $^{\circ}C$ and the leak test was carried out for 72 hrs after sealing process. When field emission properties of fabricated and sealed CNT FED panel were characterized and compared with those of unsealed panel which was located in vacuum chamber of vacuum level similar with the sealed panel, the sealed panel showed more improved field emission properties.

  • PDF

Security-equipment building cause based on 「grounded theory」 approaches (융합보안 설비구축 원인에 대한 근거이론적 접근)

  • Lim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.69-75
    • /
    • 2016
  • The government is to prevent technology leakage in 2007, the Industrial Technology Protection Act was enacted and encouraging deployment of security equipment. in this study, corporate security equipment for the tried to determine the cause. In contrast to quantitative research, which is an existing research method, Barney G. Glaser & Anselm L. Strauss used a grounded theory as a kind of qualitative methodology in social science. As a result, it was found that the higher the government subsidy, the request from the representative or the client, the higher the efficiency through the prevention of technology leakage, the higher the sales increase, In the United States.

A Solution to Privacy Preservation in Publishing Human Trajectories

  • Li, Xianming;Sun, Guangzhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3328-3349
    • /
    • 2020
  • With rapid development of ubiquitous computing and location-based services (LBSs), human trajectory data and associated activities are increasingly easily recorded. Inappropriately publishing trajectory data may leak users' privacy. Therefore, we study publishing trajectory data while preserving privacy, denoted privacy-preserving activity trajectories publishing (PPATP). We propose S-PPATP to solve this problem. S-PPATP comprises three steps: modeling, algorithm design and algorithm adjustment. During modeling, two user models describe users' behaviors: one based on a Markov chain and the other based on the hidden Markov model. We assume a potential adversary who intends to infer users' privacy, defined as a set of sensitive information. An adversary model is then proposed to define the adversary's background knowledge and inference method. Additionally, privacy requirements and a data quality metric are defined for assessment. During algorithm design, we propose two publishing algorithms corresponding to the user models and prove that both algorithms satisfy the privacy requirement. Then, we perform a comparative analysis on utility, efficiency and speedup techniques. Finally, we evaluate our algorithms through experiments on several datasets. The experiment results verify that our proposed algorithms preserve users' privay. We also test utility and discuss the privacy-utility tradeoff that real-world data publishers may face.

QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing

  • Liu, Guoxiu;Yang, Geng;Wang, Haiwei;Dai, Hua;Zhou, Qiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3375-3400
    • /
    • 2018
  • With the advent of database-as-a-service (DAAS) and cloud computing, more and more data owners are motivated to outsource their data to cloud database in consideration of convenience and cost. However, it has become a challenging work to provide security to database as service model in cloud computing, because adversaries may try to gain access to sensitive data, and curious or malicious administrators may capture and leak data. In order to realize privacy preservation, sensitive data should be encrypted before outsourcing. In this paper, we present a secure and practical system over encrypted cloud data, called QSDB (queryable and secure database), which simultaneously supports SQL query operations. The proposed system can store and process the floating point numbers without compromising the security of data. To balance tradeoff between data privacy protection and query processing efficiency, QSDB utilizes three different encryption models to encrypt data. Our strategy is to process as much queries as possible at the cloud server. Encryption of queries and decryption of encrypted queries results are performed at client. Experiments on the real-world data sets were conducted to demonstrate the efficiency and practicality of the proposed system.

LTCC-based Packaging Method using Au/Sn Eutectic Bonding for RF MEMS Applications (RF MEMS 소자 실장을 위한 LTCC 및 금/주석 공융 접합 기술 기반의 실장 방법)

  • Bang, Yong-Seung;Kim, Jong-Man;Kim, Yong-Sung;Kim, Jung-Mu;Kwon, Ki-Hwan;Moon, Chang-Youl;Kim, Yong-Kweon
    • Proceedings of the KIEE Conference
    • /
    • 2005.11a
    • /
    • pp.30-32
    • /
    • 2005
  • This paper reports on an LTCC-based packaging method using Au/Sn eutectic bonding process for RF MEMS applications. The proposed packaging structure was realized by a micromachining technology. An LTCC substrate consists of metal filled vertical via feedthroughs for electrical interconnection and Au/Sn sealing rim for eutectic bonding. The LTCC capping substrate and the glass bottom substrate were aligned and bonded together by a flip-chip bonding technology. From now on, shear strength and He leak rate will be measured then the fabricated package will be compared with the LTCC package using BCB adhesive bonding method which has been researched in our previous work.

  • PDF