• Title/Summary/Keyword: cyber threats

Search Result 386, Processing Time 0.025 seconds

A Sanitizer for Detecting Vulnerable Code Patterns in uC/OS-II Operating System-based Firmware for Programmable Logic Controllers (PLC용 uC/OS-II 운영체제 기반 펌웨어에서 발생 가능한 취약점 패턴 탐지 새니타이저)

  • Han, Seungjae;Lee, Keonyong;You, Guenha;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.65-79
    • /
    • 2020
  • As Programmable Logic Controllers (PLCs), popular components in industrial control systems (ICS), are incorporated with the technologies such as micro-controllers, real-time operating systems, and communication capabilities. As the latest PLCs have been connected to the Internet, they are becoming a main target of cyber threats. This paper proposes two sanitizers that improve the security of uC/OS-II based firmware for a PLC. That is, we devise BU sanitizer for detecting out-of-bounds accesses to buffers and UaF sanitizer for fixing use-after-free bugs in the firmware. They can sanitize the binary firmware image generated in a desktop PC before downloading it to the PLC. The BU sanitizer can also detect the violation of control flow integrity using both call graph and symbols of functions in the firmware image. We have implemented the proposed two sanitizers as a prototype system on a PLC running uC/OS-II and demonstrated the effectiveness of them by performing experiments as well as comparing them with the existing sanitizers. These findings can be used to detect and mitigate unintended vulnerabilities during the firmware development phase.

A Study on Evaluation Parameters of Safety City Models (안전도시 모델의 평가지표에 관한 연구)

  • Joon-Hak Lee;Okkyung Yuh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.2
    • /
    • pp.1-13
    • /
    • 2023
  • As interest in urban safety has increased since COVID-19, various institutions have developed and used indicators that evaluate the safety city model. Yongsan-gu was ranked No. 1 in 2021 by Social Safety Index evaluation and was selected as the safest city in Korea. However, the Itaewon disaster in Yongsan-gu in 2022 caused many casualties. The study of indicators for evaluating cities' safety was necessary. This study aims to examine domestic and foreign safe city models and review the differences between each model and the indicators used to evaluate safe cities. As a result of collecting 11 safe city models and analyzing each evaluation index, safe city models can be classified into program-based safe city models, such as the World Health Organization's International safe community and the UN Office for Disaster Risk Reduction's International Safe city. Considering the diversification of threats to safety, it is reasonable to comprehensively consider digital security, health safety, infrastructure safety, personal safety, environmental safety, traffic safety, fire safety, crime safety, life safety, suicide, and infectious diseases when evaluating safe cities as evaluation parameters.

Summative Usability Assessment of Software for Ventilator Central Monitoring System (인공호흡기 중앙감시시스템 소프트웨어의 사용적합성 총괄평가)

  • Ji-Yong Chung;You Rim Kim;Wonseuk Jang
    • Journal of Biomedical Engineering Research
    • /
    • v.44 no.6
    • /
    • pp.363-376
    • /
    • 2023
  • According to the COVID-19, development of various medical software based on IoT(Internet of Things) was accelerated. Especially, interest in a central software system that can remotely monitor and control ventilators is increasing to solve problems related to the continuous increase in severe COVID-19 patients. Since medical device software is closely related to human life, this study aims to develop central monitoring system that can remotely monitor and control multiple ventilators in compliance with medical device software development standards and to verify performance of system. In addition, to ensure the safety and reliability of this central monitoring system, this study also specifies risk management requirements that can identify hazardous situations and evaluate potential hazards and confirms the implementation of cybersecurity to protect against potential cyber threats, which can have serious consequences for patient safety. As a result, we obtained medical device software manufacturing certificates from MFDS(Ministry of Food and Drug Safety) through technical documents about performance verification, risk management and cybersecurity application.The purpose of this study is to conduct a usability assessment to ensure that ergonomic design has been applied so that the ventilator central monitoring system can improve user satisfaction, efficiency, and safety. The rapid spread of COVID-19, which began in 2019, caused significant damage global medical system. In this situation, the need for a system to monitor multiple patients with ventilators was highlighted as a solution for various problems. Since medical device software is closely related to human life, ensuring their safety and satisfaction is important before their actual deployment in the field. In this study, a total of 21 participants consisting of respiratory staffs conducted usability test according to the use scenarios in the simulated use environment. Nine use scenarios were conducted to derive an average task success rate and opinions on user interface were collected through five-point Likert scale satisfaction evaluation and questionnaire. Participants conducted a total of nine use scenario tasks with an average success rate of 93% and five-point Likert scale satisfaction survey showed a high satisfaction result of 4.7 points on average. Users evaluated that the device would be useful for effectively managing multiple patients with ventilators. However, improvements are required for interfaces associated with task that do not exceed the threshold for task success rate. In addition, even medical devices with sufficient safety and efficiency cannot guarantee absolute safety, so it is suggested to continuously evaluate user feedback even after introducing them to the actual site.

A Study on Biometric Model for Information Security (정보보안을 위한 생체 인식 모델에 관한 연구)

  • Jun-Yeong Kim;Se-Hoon Jung;Chun-Bo Sim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.317-326
    • /
    • 2024
  • Biometric recognition is a technology that determines whether a person is identified by extracting information on a person's biometric and behavioral characteristics with a specific device. Cyber threats such as forgery, duplication, and hacking of biometric characteristics are increasing in the field of biometrics. In response, the security system is strengthened and complex, and it is becoming difficult for individuals to use. To this end, multiple biometric models are being studied. Existing studies have suggested feature fusion methods, but comparisons between feature fusion methods are insufficient. Therefore, in this paper, we compared and evaluated the fusion method of multiple biometric models using fingerprint, face, and iris images. VGG-16, ResNet-50, EfficientNet-B1, EfficientNet-B4, EfficientNet-B7, and Inception-v3 were used for feature extraction, and the fusion methods of 'Sensor-Level', 'Feature-Level', 'Score-Level', and 'Rank-Level' were compared and evaluated for feature fusion. As a result of the comparative evaluation, the EfficientNet-B7 model showed 98.51% accuracy and high stability in the 'Feature-Level' fusion method. However, because the EfficietnNet-B7 model is large in size, model lightweight studies are needed for biocharacteristic fusion.

Trends and Prospects of N. Korea Military Provocations After the Sinking of ROKS Cheon-an (천안함 폭침 이후 북한의 군사도발 양상과 전망)

  • Kim, Sung-Man
    • Strategy21
    • /
    • s.34
    • /
    • pp.58-92
    • /
    • 2014
  • Even after S. Korea took 5.24 Measure(24 May 2014), N. Korea has not stopped raising provocations such as the shelling of Yeonpyeong Island, electronic and cyber attacks. To make matters worse, the communist country lunched long-range missiles(twice) and conducted 3rd nuclear test, escalating tensions which could possibly lead to an all-out war. Korean Government failed to respond properly. However, escalation into an all-out war was deterred by the CFC immediately carrying out its peacetime duty(CODA). The US made a rapid dispatch of its augmentation forces(Aircraft carrier, nuclear-powered submarine, strategic bomber, F-22) to the Korean Peninsula. In recognition of the importance of the Combined Forces Command, since May 2013 the Park Geun-Hye Administration has been pushing ahead with re-postponement of Wartime Operational Control Transfer(which initially meant the disassembling of the CFC as of 1 December 2015) More recently, there has been a series of unusual indicators from the North. Judging from its inventory of 20 nuclear weapons, 1,000 ballistic missiles and biochemical weapons, it is safe to say that N. Korea has gained at least war deterrence against S. Korea. Normally a nation with nuclear weapons shrink its size of conventional forces, but the North is pursuing the opposite, rather increasing them. In addition, there was a change of war plan by N. Korea in 2010, changing 'Conquering the Korean Peninsula' to 'Negotiation after the seizure of the Greater Seoul Metropolitan Area(GSMA)' and establishing detailed plans for wartime projects. The change reflects the chain reaction in which requests from pro-north groups within the South will lead to the proclamation of war. Kim, Jeong-Un, leader of N. Korean regime, sent threatening messages using words such as 'exercising a nuclear preemptive strike right' and 'burning of Seoul'. Nam, Jae-June, Director of National Intelligence Service, stated that Kim, Jung-Un is throwing big talks, saying communization of the entire Korean Peninsula will come within the time frame of 3 years. Kim, Gwan-Jin, Defense Minister, shared an alarming message that there is a high possibility that the North will raise local provocations or a full-fledged war whenever while putting much emphasis on defense posture. As for the response concept of the Korean Government, it has been decided that 'ROK·US Combined Local Provocation Counter-Measure' will be adopted to act against local provocations from the North. Major provocation types include ▲ violation of the Northern Limit Line(NLL) with mobilization of military ships ▲ artillery provocations on Northwestern Islands ▲ low altitude airborne intrusion ▲ rear infiltration of SOF ▲ local conflicts within the Military Demarcation Line(MDL) ▲ attacking friendly ships by submarines. Counter-measures currently established by the US involves the support from USFK and USFJ. In order to keep the sworn promise, the US is reinforcing both USFK and USFJ. An all-out war situation will be met by 'CFC OPLAN5027' and 'Tailored Expansion Deterrence Forces' with the CFC playing a central role. The US augmentation forces stands at 690,000 troops, some 160 ships, 2,000 aircraft and this comprise 50% of US total forces, which is estimated to be ninefold of Korean forces. The CFC needs to be in center in handling both local provocations and an all-out war situation. However, the combat power of S. Korean conventional forces is approximately around 80% of that of N. Korea, which has been confirmed from comments made by Kim, Gwan-Jin, Defense Minister, during an interpellation session at the National Assembly. This means that S. Korean forces are not much growing. In particular, asymmetric capabilities of the North is posing a serious threat to the South including WMD, cyber warfare forces, SOF, forces targeting 5 Northwestern Islands, sub-surface and amphibious assault forces. The presence of such threats urgently requires immediate complementary efforts. For complementary efforts, the Korean Government should consider ① reinforcement of Korean forces; putting a stoppage to shrinking military, acquisition of adequate defense budget, building a missile defense and military leadership structure validity review, ② implementation of military tasks against the North; disciplinary measures on the sinking of ROKS Cheon-an/shelling of Yeonpyeong Islands, arrangement of inter-Korean military agreements, drawing lessons from studies on the correlation between aid for N. Korea, execution of inter-Korean Summit and provocations from the North, and ③ bolstering the ROK·US alliance; disregarding wartime operational control transfer plan(disassembling of CFC) and creation of a combined division.

Proposal on for Response System to International Terrorism (국제 테러리즘의 대응체제 구축방안)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.99-131
    • /
    • 2005
  • Terrorism which became today's common phenomena over the world is one of the most serious threats the world confront. Although International society make and operate outstanding anti-terrorism system, terror would never end without solving fundamental problems. The main body of terrorism converts from nation to organization and from organization to cell, which makes it difficult for us to recognize the main body. Since the target of today's new terrorism is many and unspecified persons, terrorists will never hesitate to use mass destruction weapons such as nuclear, biological, chemical weapons, and also use cyber-technique or cyber-terrorism. So, effective counter-terrorism measures should be performed as follows. First, it must be better for international society should make long-time plan of solving fundamental problems of terrorism other than to operate directly on terror organization and its means. Second, preventive method should be made. The most effective method of eradicating terrorism is prevention. For this, it is necessary to remove environmental elements of terrorism and terrorist bases, and to stop inflow of money and mass destruction weapons to terrorists. Third, integrated anti-terror organization should be organized and operated for continuous counter-terrorism operations. Also international alliance for anti-terrorism should be maintained to share informations and measures. Fourth, concerned department in the government should prepare counter-terrorism plans in their own parts as follows and make efforts to integrate the plans. - Ministry of Government Administration and Home Affairs : conventional terror - Ministry of Health and Welfare : bio-terror - Ministry of Science and Technology : nuclear-terror Especially, they should convert their policy and operation from post-terror actions to pre-terror actions, designate terror as national disaster and organize integrated emergency response organization including civil, government, and military elements. In conclusion, pre-terror activities and remedy of fundamental causes is the best way to prevent terror. Also, strengthening of intelligence activities, international cooperations, and preventive and comprehensive counter-measures must not ignored.

  • PDF