• Title/Summary/Keyword: Vulnerability Identification

Search Result 66, Processing Time 0.021 seconds

Study on Strengthening the Maritime Sector Cybersecurity (해상 사이버보안 강화방안 연구)

  • Yoo, Yun-Ja;Park, Han-Seon;Park, Hye-Ri
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.238-239
    • /
    • 2019
  • Cyber attacks can be caused by all equipment that perform communication functions, and the link between ship and land due to the development of communication technology means that the ship sector as well as the land sector can be easily exposed to cyber threat vulnerability. In this paper, we analyze cyber threat trend changes to identify cyber security vulnerabilities in the maritime sector and propose measures to enhance cyber security through other industry case studies.

  • PDF

FunRank: Finding 1-Day Vulnerability with Call-Site and Data-Flow Analysis (FunRank: 함수 호출 관계 및 데이터 흐름 분석을 통한 공개된 취약점 식별)

  • Jaehyu Lee;Jihun Baek;Hyungon Moon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.305-318
    • /
    • 2023
  • The complexity of software products led many manufacturers to stitch open-source software for composing a product. Using open-source help reduce the development cost, but the difference in the different development life cycles makes it difficult to keep the product up-to-date. For this reason, even the patches for known vulnerabilities are not adopted quickly enough, leaving the entire product under threat. Existing studies propose to use binary differentiation techniques to determine if a product is left vulnerable against a particular vulnerability. Despite their effectiveness in finding real-world vulnerabilities, they often fail to locate the evidence of a vulnerability if it is a small function that usually is inlined at compile time. This work presents our tool FunRank which is designed to identify the short functions. Our experiments using synthesized and real-world software products show that FunRank can identify the short, inlined functions that suggest that the program is left vulnerable to a particular vulnerability.

Efficient Tag Authentication Scheme using Tag ID Identification Bits in RFID Environment (RFID 환경에서 태그 ID의 식별 비트를 이용한 효율적인 태그 인증 기법)

  • Jang, Bong-Im;Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.195-202
    • /
    • 2011
  • RFID(Radio Frequency IDentification) is a system to identify objects and its usage is being extended to distribution, healthcare, and air&port etc. RFID is a contactless system environment, and reducing tag authentication time is important because multiple tags are identified at the same time. Studies about RFID system so far is, however, mostly to improve security vulnerability in the tag authentication process. Therefore, this paper suggests an efficient scheme to decrease the time of tag authentication which is also safe for the security of tag authentication process. The proposed scheme cuts down on the tag ID search time because it searches only the classified relevant ID in the database, which is one of many components of RFID system, by using identification bits for tag ID search. Consequently, the suggested scheme decreases process time for tag ID authentication by reducing the processing time and the load of the database. It also brings performance improvement of RFID system as it improves the energy applicability of passive tag.

e-Passport Integrated Authentication Mechanisms with Improved Efficiency (효율성이 강화된 전자여권 통합 인증 메커니즘)

  • Lee, Dong-Bum;Go, Woong;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.53-63
    • /
    • 2009
  • e-Passport system is new type of emigration and immigration control system and it is a research to introduce the e-Passport Authentication Protocol with Improved Efficiency is lively proceeded over the entire world. The e-Passport's chip has a biometric information and personal identification information, Radio Frequency Identification(RFID) technology is used for communication with the Inspection System(IS). However, the feature of the RFID system may bring about various security threats such as eavesdropping, data forgeries, data alternation, cloning, biometric data-leakage. Therefore, in this paper, we analyse the e-Passport system's authentication protocol to protect vulnerability and proposed e-Passport system's authentication protocol reduce computation. Also, we compared their efficiency.

  • PDF

Fragility assessment for electric cabinet in nuclear power plant using response surface methodology

  • Tran, Thanh-Tuan;Cao, Anh-Tuan;Nguyen, Thi-Hong-Xuyen;Kim, Dookie
    • Nuclear Engineering and Technology
    • /
    • v.51 no.3
    • /
    • pp.894-903
    • /
    • 2019
  • An approach for collapse risk assessment is proposed to evaluate the vulnerability of electric cabinet in nuclear power plants. The lognormal approaches, namely maximum likelihood estimation and linear regression, are introduced to establish the fragility curves. These two fragility analyses are applied for the numerical models of cabinets considering various boundary conditions, which are expressed by representing restrained and anchored models at the base. The models have been built and verified using the system identification (SI) technique. The fundamental frequency of the electric cabinet is sensitive because of many attached devices. To bypass this complex problem, the average spectral acceleration $S_{\bar{a}}$ in the range of period that cover the first mode period is chosen as an intensity measure on the fragility function. The nonlinear time history analyses for cabinet are conducted using a suite of 40 ground motions. The obtained curves with different approaches are compared, and the variability of risk assessment is evaluated for restrained and anchored models. The fragility curves obtained for anchored model are found to be closer each other, compared to the fragility curves for restrained model. It is also found that the support boundary conditions played a significant role in acceleration response of cabinet.

Application Consideration of Machine Learning Techniques in Satellite Systems

  • Jin-keun Hong
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.48-60
    • /
    • 2024
  • With the exponential growth of satellite data utilization, machine learning has become pivotal in enhancing innovation and cybersecurity in satellite systems. This paper investigates the role of machine learning techniques in identifying and mitigating vulnerabilities and code smells within satellite software. We explore satellite system architecture and survey applications like vulnerability analysis, source code refactoring, and security flaw detection, emphasizing feature extraction methodologies such as Abstract Syntax Trees (AST) and Control Flow Graphs (CFG). We present practical examples of feature extraction and training models using machine learning techniques like Random Forests, Support Vector Machines, and Gradient Boosting. Additionally, we review open-access satellite datasets and address prevalent code smells through systematic refactoring solutions. By integrating continuous code review and refactoring into satellite software development, this research aims to improve maintainability, scalability, and cybersecurity, providing novel insights for the advancement of satellite software development and security. The value of this paper lies in its focus on addressing the identification of vulnerabilities and resolution of code smells in satellite software. In terms of the authors' contributions, we detail methods for applying machine learning to identify potential vulnerabilities and code smells in satellite software. Furthermore, the study presents techniques for feature extraction and model training, utilizing Abstract Syntax Trees (AST) and Control Flow Graphs (CFG) to extract relevant features for machine learning training. Regarding the results, we discuss the analysis of vulnerabilities, the identification of code smells, maintenance, and security enhancement through practical examples. This underscores the significant improvement in the maintainability and scalability of satellite software through continuous code review and refactoring.

Development of comprehensive earthquake loss scenarios for a Greek and a Turkish city: seismic hazard, geotechnical and lifeline aspects

  • Pitilakis, Kyriazis D.;Anastasiadis, Anastasios I.;Kakderi, Kalliopi G.;Manakou, Maria V.;Manou, Dimitra K.;Alexoudi, Maria N.;Fotopoulou, Stavroula D.;Argyroudis, Sotiris A.;Senetakis, Kostas G.
    • Earthquakes and Structures
    • /
    • v.2 no.3
    • /
    • pp.207-232
    • /
    • 2011
  • The development of reliable earthquake mitigation plans and seismic risk management procedures can only be based on the establishment of comprehensive earthquake hazard and loss scenarios. Two cities, Grevena (Greece) and D$\ddot{u}$zce (Turkey), were used as case studies in order to apply a comprehensive methodology for the vulnerability and loss assessment of lifelines. The methodology has the following distinctive phases: detailed inventory, identification of the typology of each component and system, evaluation of the probabilistic seismic hazard, geotechnical zonation, ground response analysis and estimation of the spatial distribution of seismic motion for different seismic scenarios, vulnerability analysis of the exposed elements at risk. Estimating adequate earthquake scenarios for different mean return periods, and selecting appropriate vulnerability functions, expected damages of the water and waste water systems in D$\ddot{u}$zce and of the roadway network and waste water system of Grevena are estimated and discussed; comparisons with observed earthquake damages are also made in the case of D$\ddot{u}$zce, proving the reliability and the efficiency of the proposed methodology. The results of the present study constitute a sound basis for the development of efficient loss scenarios for lifelines and infrastructure facilities in seismic prone areas. The first part of this paper, concerning the estimation of the seismic ground motions, has been utilized in the companion paper by Kappos et al. (2010) in the same journal.

A Study on Identification of the Heat Vulnerability Area Considering Spatial Autocorrelation - Case Study in Daegu (공간적 자기상관성을 고려한 폭염취약지역 도출에 관한 연구 - 대구광역시를 중심으로)

  • Seong, Ji Hoon;Lee, Ki Rim;Kwon, Yong Seok;Han, You Kyung;Lee, Won Hee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.4
    • /
    • pp.295-304
    • /
    • 2020
  • The IPCC (Intergovernmental Panel on Climate Change) recommended the importance of preventive measures against extreme weather, and heat waves are one of the main themes for establishing preventive measures. In this study, we tried to analyze the heat vulnerable areas by considering not only spatial characteristics but also social characteristics. Energy consumption, popu lation density, normalized difference vegetation index, waterfront distance, solar radiation, and road distribution were examined as variables. Then, by selecting a suitable model, SLM (Spatial Lag Model), available variables were extracted. Then, based on the Fuzzy theory, the degree of vulnerability to heat waves was analyzed for each variable, and six variables were superimposed to finally derive the heat vulnerable area. The study site was selected as the Daegu area where the effects of the heat wave were high. In the case of vulnerable areas, it was confirmed that the existing urban areas are mainly distributed in Seogu, Namgu, and Dalseogu of Daegu, which are less affected by waterside and vegetation. It was confirmed that both spatial and social characteristics should be considered in policy support for reducing heat waves in Daegu.

Phonological awareness skills in terms of visual and auditory stimulus and syllable position in typically developing children (청각적, 시각적 자극제시 방법과 음절위치에 따른 일반아동의 음운인식 능력)

  • Choi, Yu Mi;Ha, Seunghee
    • Phonetics and Speech Sciences
    • /
    • v.9 no.4
    • /
    • pp.123-128
    • /
    • 2017
  • This study aims to compare the performance of syllable identification task according to auditory and visual stimuli presentation methods and syllable position. Twenty-two typically developing children (age 4-6) participated in the study. Three-syllable words were used to identify the first syllable and the final syllable in each word with auditory and visual stimuli. For the auditory stimuli presentation, the researcher presented the test word only with oral speech. For the visual stimuli presentation, the test words were presented as a picture, and asked each child to choose appropriate pictures for the task. The results showed that when tasks were presented visually, the performances of phonological awareness were significantly higher than in presenting with auditory stimuli. Also, the performances of the first syllable identification were significantly higher than those of the last syllable identification. When phonological awareness task are presented by auditory stimuli, it is necessary to go through all the steps of the speech production process. Therefore, the phonological awareness performance by auditory stimuli may be low due to the weakness of the other stages in the speech production process. When phonological awareness tasks are presented using visual picture stimuli, it can be performed directly at the phonological representation stage without going through the peripheral auditory processing, phonological recognition, and motor programming. This study suggests that phonological awareness skills can be different depending on the methods of stimulus presentation and syllable position of the tasks. The comparison of performances between visual and auditory stimulus tasks will help identify where children may show weakness and vulnerability in speech production process.

A Study on the Covert Channel Detection in the TCP/IP Header based on the Support Vector Machine (Support Vector Machine 기반 TCP/IP 헤더의 은닉채널 탐지에 관한 연구)

  • 손태식;서정우;서정택;문종섭;최홍민
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.35-45
    • /
    • 2004
  • In explosively increasing internet environments, information security is one of the most important consideration. Nowadays, various security solutions are used as such problems countermeasure; IDS, Firewall and VPN. However, basically internet has much vulnerability of protocol itself. Specially, it is possible to establish a covert channel using TCP/IP header fields such as identification, sequence number, acknowledge number, timestamp and so on. In this Paper, we focus cm the covert channels using identification field of IP header and the sequence number field of TCP header. To detect such covert channels, we used Support Vector Machine which has excellent performance in pattern classification problems. Our experiments showed that proposed method could discern the abnormal cases(including covert channels) from normal TCP/IP traffic using Support Vector Machine.