• Title/Summary/Keyword: comprehensive defense

Search Result 114, Processing Time 0.03 seconds

CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks

  • Yang, Chao;Guo, Yunfei;Hu, Hongchao;Liu, Wenyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6098-6122
    • /
    • 2018
  • Cache-based side-channel attacks have achieved more attention along with the development of cloud computing technologies. However, current host-based mitigation methods either provide bad compatibility with current cloud infrastructure, or turn out too application-specific. Besides, they are defending blindly without any knowledge of on-going attacks. In this work, we present CacheSCDefender, a framework that provides a (Virtual Machine Monitor) VMM-based comprehensive defense framework against all levels of cache attacks. In designing CacheSCDefender, we make three key contributions: (1) an attack-aware framework combining our novel dynamic remapping and traditional cache cleansing, which provides a comprehensive defense against all three cases of cache attacks that we identify in this paper; (2) a new defense method called dynamic remapping which is a developed version of random permutation and is able to deal with two cases of cache attacks; (3) formalization and quantification of security improvement and performance overhead of our defense, which can be applicable to other defense methods. We show that CacheSCDefender is practical for deployment in normal virtualized environment, while providing favorable security guarantee for virtual machines.

A Study on the Mechanism between 'National Crisis Management' and 'National Defense Elements'in the Perspective of Comprehensive Security - Focusing on the Principles, Problems, and Altenatives of'Integrated Defense'- (포괄안보 관점의 국가위기관리와 국가방위 요소간의 관계 연구 - 통합방위의 원칙, 문제, 그리고 대안을 중심으로 -)

  • Kim Tai Jin
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.115-126
    • /
    • 2022
  • This study studied the working relationship between national crisis management and national defense elements from a comprehensive security perspective. The elements of national defense are presented in the Integrated Defense Act. Therefore, by presenting the principles, problems, and alternatives of integrated defense, the study was conducted with the aim of protecting the lives and property of the people in the event of a national crisis and strengthen national security. As a theoretical background, an analysis frame was envisioned based on the four stages of crisis management in the 'Comprehensive Crisis Management Model' and the 'Basic Guidelines for National Crisis Management'. Through this, four domestic and foreign case studies were conducted. As a result of the study, it can be confirmed that related laws, organizations, and public awareness must be provided in order for the national defense elements at each stage of national crisis management to work well. For the completeness of national crisis management, it was suggested that the enactment of the Framework Act on National Crisis Management, the establishment of an integrated defense plan, linked training, C4I for communication, strengthening the capabilities of local government heads, and national defense elements of firefighters.

A Comprehensive Survey of TPM for Defense Systems

  • Cheol Ryu;Jae-Ho Lee;Do-Hyung Kim;Hyung-Seok Lee;Young-Sae Kim;Jin-Hee Han;Jeong-nyeo Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1953-1967
    • /
    • 2024
  • Lately, there has been a notable surge in the defense industry's efforts to develop highly advanced intelligent systems. These systems encompass sophisticated computing platforms that boast an impressive level of autonomy. However, it's important to acknowledge that these very systems are not impervious to vulnerabilities stemming from both hardware and software tampering. Within the context of this discourse, our focus of the survey is directed towards the hardware security module. This component stands out for its capability to offer a significantly heightened level of protection when compared to conventional software-based techniques. Through the lens of this paper, we embark on a comprehensive survey of Trusted Platform Module (TPM), a hardware security module, shedding light on its potential to fortify the defense against threats that emerge from various vectors of attack.

Innovative Management Strategy and Methodologies for Acquisition Programs of the Defense Weapon System (국방무기체계 획득사업의 혁신적 추진전략과 방법론)

  • Lee, Sang-Heon;Yoon, Bong-Kyoo
    • IE interfaces
    • /
    • v.20 no.3
    • /
    • pp.363-375
    • /
    • 2007
  • Under the fast technology changes and budget constraints, the organizations related to national defense face increased demands to develop innovative strategy and methodology to maximize performance with drastically reduced cost. In this context, the management of innovation and change in the defense acquisition area is vital to the Ministry of National Defense, related organizations and industries. In this paper, we discuss three comprehensive innovation strategies and methodologies for the defense acquisition area preparing for next-generation warfare; EVMS (earned value management system), PBL (performance based logistics) and SBA (simulation based acquisition). These collaborating innovative efforts enable us to tackle defense challenges for government and industries with a flexible and optimistic approach that maximizes productivity and performance with minimum cost.

Development of the Information Security Methodology for Defense Organization (국방조직의 정보보호 평가 방법론 개발)

  • Cho, Sung Rim;Choi, In Soo;Park, Ji Hoon;Shin, Woo Chang
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.77-90
    • /
    • 2013
  • As Cyber threats are rising, the scope of information Security (IS) is extending from technical protection of a single information system to organizational comprehensive IS capability. The ministry of National Defense (MND) has established the IS evaluation for defense organization in 'the Directive for Defense Informatization Affairs.' However, no information about an evaluation method, process and organization is provided. We surveyed information security management system (ISMS) and related best practices in public sector and other countries, and analysed the military information security affairs. Thus, this paper recommends the IS evaluation method and process. The trial IS evaluation is in progress this year and the MND will expand this IS evaluation to the entire organization.

The Evolution of Drone and Air Defense Technologies: Implications for the Future Battlefield

  • Kim Seung-Hyun
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.286-298
    • /
    • 2024
  • The rapid advancement of drone technology has significantly altered the landscape of modern warfare, presenting both opportunities and challenges for military forces worldwide. As drones become increasingly sophisticated, capable of performing complex missions such as reconnaissance, surveillance, and precision strikes, the development of effective air defense systems has become a critical priority. This study examines the current state of drone and air defense technologies, analyzing their impact on military strategies, tactics, and the future battlefield environment. By exploring the patterns of technological evolution, the limitations of existing air defense systems, and the potential consequences of drone proliferation, this research highlights the need for adaptive, innovative approaches to counter emerging threats. The findings underscore the importance of investing in advanced detection and interception capabilities, developing comprehensive counter-drone doctrines, and fostering international cooperation to address the ethical and legal challenges posed by the military use of drones. As the competition between drone and air defense technologies continues to intensify, policymakers and military leaders must proactively engage in shaping the future of warfare to ensure national security and stability in an increasingly complex world.

A Study on the Improvement of the Defense-related International Patent Classification using Patent Mining (특허 마이닝을 이용한 국방관련 국제특허분류 개선 방안 연구)

  • Kim, Kyung-Soo;Cho, Nam-Wook
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.1
    • /
    • pp.21-33
    • /
    • 2022
  • Purpose: As most defense technologies are classified as confidential, the corresponding International Patent Classifications (IPCs) require special attention. Consequently, the list of defense-related IPCs has been managed by the government. This paper aims to evaluate the defense-related IPCs and propose a methodology to revalidate and improve the IPC classification scheme. Methods: The patents in military technology and their corresponding IPCs during 2009~2020 were utilized in this paper. Prior to the analysis, patents are divided into private and public sectors. Social network analysis was used to analyze the convergence structure and central defense technology, and association rule mining analysis was used to analyze the convergence pattern. Results: While the public sector was highly cohesive, the private sector was characterized by easy convergence between technologies. In addition, narrow convergence was observed in the public sector, and wide convergence was observed in the private sector. As a result of analyzing the core technologies of defense technology, defense-related IPC candidates were identified. Conclusion: This paper presents a comprehensive perspective on the structure of convergence of defense technology and the pattern of convergence. It is also significant because it proposed a method for revising defense-related IPCs. The results of this study are expected to be used as guidelines for preparing amendments to the government's defense-related IPC.

A Study on Readiness Assessment for The Acquisition of High Quality Weapon System (고품질 무기체계 획득을 위한 성숙도평가 방안 소개)

  • Kim, Hyun Woo;Woo, Soon;Jang, Bong Ki
    • Journal of Korean Society for Quality Management
    • /
    • v.41 no.3
    • /
    • pp.395-404
    • /
    • 2013
  • Purpose: Technology readiness assessment(TRA) used as a standard readiness assessment tool in the acquisition program of weapon system has some limitations in the comprehensive understanding of the complex system. Therefore, this research is intended to suggest a holistic maturity assessment method for the acquisition of high quality weapon system. Methods: Technology readiness level(TRL), manufacturing readiness level(MRL), integration readiness level(IRL) and system readiness level(SRL) developed to assess system maturities in the various aspects are compared and analyzed to draw an improvement avenue for the current readiness assessment method. Results: TRL, MRL, IRL and SRL have large differences in their maturity targets during the acquisition life cycle: technological performance, manufacturing capability, interface between components and total system, respectively. They complement one another's shortcomings Conclusion: To achieve a successful acquisition of high quality weapon system, multi-dimensional readiness assessment is required. Therefore, comprehensive readiness assessment using TRL, MRL, IRL and SRL will contribute to the acquisition of high quality weapon system through the accurate maturity information of overall system.

Proposed CCPS model for comprehensive security management of CCTV (영상정보처리기기(CCTV)의 포괄적 보안관리를 위한 암호·인증·보호·체계(CCPS) 모델 제안)

  • Song, Won-Seok;Cho, Jun-Ha;Kang, Seong-Moon;Lee, MinWoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.657-660
    • /
    • 2021
  • A video information processing system (CCTV) requires comprehensive administrative, physical, and technical security management to collect, transmit and store sensitive information. However, there are no regulations related to video information processing, certification methods for the technology used, and application standards suitable for security technology. In this paper, we propose a cryptography, certification, protection, system (CCPS) model that can protect the system by including encryption technology for application to the video information processing system and authentication measures for the technology used in the system configuration.

  • PDF

Age-dependent root canal instrumentation techniques: a comprehensive narrative review

  • Solomonov, Michael;Kim, Hyeon-Cheol;Hadad, Avi;Levy, Dan Henry;Itzhak, Joe Ben;Levinson, Oleg;Azizi, Hadas
    • Restorative Dentistry and Endodontics
    • /
    • v.45 no.2
    • /
    • pp.21.1-21.12
    • /
    • 2020
  • The aim of this article was to review age-dependent clinical recommendations for appropriate root canal instrumentation techniques. A comprehensive narrative review of canal morphology, the structural characteristics of dentin, and endodontic outcomes at different ages was undertaken instead of a systematic review. An electronic literature search was carried out, including the Medline (Ovid), PubMed, and Web of Science databases. The searches used controlled vocabulary and free-text terms, as follows: 'age-related root canal treatment,' 'age-related instrumentation,' 'age-related chemo-mechanical preparation,' 'age-related endodontic clinical recommendations,' 'root canal instrumentation at different ages,' 'geriatric root canal treatment,' and 'pediatric root canal treatment.' Due to the lack of literature with practical age-based clinical recommendations for an appropriate root canal instrumentation technique, a narrative review was conducted to suggest a clinical algorithm for choosing the most appropriate instrumentation technique during root canal treatment. Based on the evidence found through the narrative review, an age-related clinical algorithm for choosing appropriate instrumentation during root canal treatment was proposed. Age affects the morphology of the root canal system and the structural characteristics of dentin. The clinician's awareness of root canal morphology and dentin characteristics can influence the choice of instruments for root canal treatment.