• Title/Summary/Keyword: disk attack

Search Result 24, Processing Time 0.026 seconds

Application of Flexible Sintered Brake Pad for TTX (한국형 틸팅열차용 Flexible 소결 브레이크 패드 적용 연구)

  • Ku, Seong-Mo;Lee, Dong-Kyun;Ko, Tae-Hwan;Na, Jong-Tae;Kim, Sang-Ho
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.597-603
    • /
    • 2010
  • Metallic sintered brake pads are often applied to Mid/High Speed Train due to its high strength and thermal characteristics. Because of its imbalance contact between discs and pads can greatly influence the life span, one sided wear, discs attack/crack and threat the safety of the train during operation. In this research, we analyzed pressure/temperature distribution between brake pads and disks. Analyzed data had been verified and modified to conduct further tests of Flexible brake pads with small/full-scale dynamo test. Flexible brake pads were installed to TTX train to conduct further tests to identify the differences between Rigid brake pads and Flexible brake pads. In result, Flexible brake pads showed outstanding disk thermal stability, one sided wear, noise and life of pad than rigid brake pad.

  • PDF

A Study for Detection of the Kernel Backdoor Attack and Design of the restoration system (커널 백도어 공격 탐지 및 복구시스템 설계에 관한 연구)

  • Jeon, Wan-Keun;Oh, Im-Geol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.3
    • /
    • pp.104-115
    • /
    • 2007
  • As soon as an intrusion is detected by kernel backdoor, the proposed method can be preserve secure and trustworthy evidence even in a damaged system. As an experimental tool, we implement a backup and analysis system, which can be response quickly, to minimize the damages. In this paper, we propose a method, which can restore the deleted log file and analyze the image of a hard disk, to be able to expose the location of a intruder.

  • PDF

Managing the Heterogeneous File System for Anti-Virus

  • Kim, Kyung-Su;Han, Seung-Jo;Kim, Pan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.3
    • /
    • pp.3-10
    • /
    • 1997
  • Computer viruses are increasing in number and are continually intellectualized as well. To cope with this problem, anti-virus tools such as a scanner and the monitoring program have been developed. But it is not guaranteed that these softwares will work in safety under MS-DOS' control. If the virus is run first, it can avoid the monitoring of anti-virus software or even can attack the anti-virus software. Therefore, anti-virus programs should be run before the system is infected. This paper presents a new PC starting mechanism which allows the PC system to start from a clean state after booting. For this mechanism, we build a new disk file system different from DOS' file system, and manage the two file systems heterogeneously. Our system is strong against boot viruses and recovers from infections automatically.

A Numerical Study of Turbulent Flow Around a Twin-Skeg Container Ship Model with Appendages

  • Kim, Hyoung-Tae;Lee, Pyung-Kuk;Kim, Hee-Taek
    • Journal of Ship and Ocean Technology
    • /
    • v.10 no.4
    • /
    • pp.12-23
    • /
    • 2006
  • In this paper, a numerical study is carried out to investigate the turbulent flow around a twin-skeg container ship model with rudders including propeller effects. A commercial CFD code, FLUENT is used with body forces distributed on the propeller disk to simulate the ship stem and wake flows with the propeller in operation. A multi-block, matching, structured grid system has been generated for the container ship hull with twin-skegs in consideration of rudders and body-force propeller disks. The RANS equations for incompressible fluid flows are solved numerically by using a finite volume method. For the turbulence closure, a Reynolds stress model is used in conjunction with a wall function. Computations are carried out for the bare hull as well as the hull with appendages of a twin-skeg container ship model. For the bare hull, the computational results are compared with experimental data and show generally a good agreement. For the hull with appendages, the changes of the stem flow by the rudders and the propellers have been analyzed based on the computed result since there is no experimental data available for comparison. It is found the flow incoming to the rudders has an angle of attack due to the influence of the skegs and thereby the hull surface pressure and the limiting streamlines are changed slightly by the rudders. The axial velocity of the propeller disk is found to be accelerated overall by about 35% due to the propeller operation with the rudders. The area and the magnitude of low pressure on the hull surface enlarge with the flow acceleration caused by the propeller. The propellers are found to have an effect on up to the position where the skeg begins. The propeller slipstream is disturbed strongly by the rudders and the flow is accelerated further and the transverse velocity vectors are weakened due to the flow rectifying effect of the rudder.

Weakness and Improvement of Cloud Shredder (Cloud Shredder에 대한 취약점 분석 및 개선 방안에 관한 연구)

  • Park, Minsu;Kang, Sunghoon;Kim, Seungjoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.401-409
    • /
    • 2013
  • Recently, almost all data has stored and managed in the shape of digital as development of IT infrastructure. Digital data is able to store the huge data in very small space. but if the disk should be stolen or lost, it would have many secure problems such as data leakage. Currently, digital data is protected by encryption method to prevent data leakage. However, the encryption method is not enough to protect data because the performance of attack system is higher and the attack methods is various. Therefore, there is a need for a new advanced data protection method. To solve secure problems, many research has been progressed like Cloud Shredder, which distributes data and then store. In this paper, We found out the problem of the Cloud Shredder and proposed an advanced method of digital data protection to solve those problem.

Unpacking Technique for In-memory malware injection technique (인 메모리 악성코드 인젝션 기술의 언 패킹기법)

  • Bae, Seong Il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.19-26
    • /
    • 2019
  • At the opening ceremony of 2018 Winter Olympics in PyeongChang, an unknown cyber-attack occurred. The malicious code used in the attack is based on in-memory malware, which differs from other malicious code in its concealed location and is spreading rapidly to be found in more than 140 banks, telecommunications and government agencies. In-memory malware accounts for more than 15% of all malicious codes, and it does not store its own information in a non-volatile storage device such as a disk but resides in a RAM, a volatile storage device and penetrates into well-known processes (explorer.exe, iexplore.exe, javaw.exe). Such characteristics make it difficult to analyze it. The most recently released in-memory malicious code bypasses the endpoint protection and detection tools and hides from the user recognition. In this paper, we propose a method to efficiently extract the payload by unpacking injection through IDA Pro debugger for Dorkbot and Erger, which are in-memory malicious codes.

Cold Boot Attack on Encrypted Containers for Forensic Investigations

  • Twum, Frimpong;Lagoh, Emmanuel Mawuli;Missah, Yaw;Ussiph, Najim;Ahene, Emmanuel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3068-3086
    • /
    • 2022
  • Digital Forensics is gaining popularity in adjudication of criminal cases as use of electronic gadgets in committing crime has risen. Traditional approach to collecting digital evidence falls short when the disk is encrypted. Encryption keys are often stored in RAM when computer is running. An approach to acquire forensic data from RAM when the computer is shut down is proposed. The approach requires that the investigator immediately cools the RAM and transplant it into a host computer provisioned with a tool developed based on cold boot concept to acquire the RAM image. Observation of data obtained from the acquired image compared to the data loaded into memory shows the RAM chips exhibit some level of remanence which allows their content to persist after shutdown which is contrary to accepted knowledge that RAM loses its content immediately there is power cut. Results from experimental setups conducted with three different RAM chips labeled System A, B and C showed at a reduced temperature of -25C, the content suffered decay of 2.125% in 240 seconds, 0.975% in 120 seconds and 1.225% in 300 seconds respectively. Whereas at operating temperature of 25℃, there was decay of 82.33% in 60 seconds, 80.31% in 60 seconds and 95.27% in 120 seconds respectively. The content of RAM suffered significant decay within two minutes without power supply at operating temperature while at a reduced temperature less than 5% decay was observed. The findings show data can be recovered for forensic evidence even if the culprit shuts down the computer.

Analysis of the Impact of Host Resource Exhaustion Attacks in a Container Environment (컨테이너 환경에서의 호스트 자원 고갈 공격 영향 분석)

  • Jun-hee Lee;Jae-hyun Nam;Jin-woo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.87-97
    • /
    • 2023
  • Containers are an emerging virtualization technology that can build an isolated environment more lightweight and faster than existing virtual machines. For that reason, many organizations have recently adopted them for their services. Yet, the container architecture has also exposed many security problems since all containers share the same OS kernel. In this work, we focus on the fact that an attacker can abuse host resources to make them unavailable to benign containers-also known as host resource exhaustion attacks. Then, we analyze the impact of host resource exhaustion attacks through real attack scenarios exhausting critical host resources, such as CPU, memory, disk space, process ID, and sockets in Docker, the most popular container platform. We propose five attack scenarios performed in several different host environments and container images. The result shows that three of them put other containers in denial of service.

Unguided Rocket Trajectory Analysis under Rotor Wake and External Wind (로터 후류와 외풍에 따른 무유도 로켓 궤적 변화 해석)

  • Kim, Hyeongseok;Chae, Sanghyun;Yee, Kwanjung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.1
    • /
    • pp.41-51
    • /
    • 2018
  • Downwash from helicopter rotor blades and external winds from various maneuvering make an unguided rocket change its trajectory and range. For the prediction of the trajectory and range, it is essential to consider the downwash effect. In this study, an algorithm was developed to calculate 6-Degree-Of-Freedom(6 DOF) forces and moments exerting on the rocket, and total flight trajectory of a 2.75-inch unguided rocket in a helicopter downwash flow field. Using Actuator Disk Model(ADM) analysis result, the algorithm could analyze the entire trajectory in various initial launch condition such as launch angle, launch velocity, and external wind. The algorithm that considered the interference between a fuselage and external winds could predict the trajectory change more precisely than inflow model analysis. Using the developed algorithm, the attitude and trajectory change mechanism by the downwash effect were investigated analyzing the effective angle of attack change and characteristics of pitching stability of the unguided rocket. Also, the trajectory and range changes were analyzed by considering the downwash effect with external winds. As a result, it was concluded that the key factors of the rocket range change were downwash area and magnitude which effect on the rocket, and the secondary factors were the dynamic pressure of the rocket and the interference between a fuselage and external winds. In tailwind case which was much influential on the range characteristics than other wind cases, the range of the rocket rose as increasing the tailwind velocity. However, there was a limit that the range of the rocket did not increase more than the specific tailwind velocity.

A Numerical Study on Flow Characteristics of Second Throat Exhaust Diffuser with Shock Cone Shape (램 구조물 형상에 따른 이차목 디퓨저의 유동 특성에 관한 수치적 연구)

  • Yu, Seongha;Jo, Seonghwi;Kim, Hongjip;Ko, Youngsung;Na, Jaejeong
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2017.05a
    • /
    • pp.346-351
    • /
    • 2017
  • A numerical study has been conducted to investigate flow characteristics of STED with ram structure shape. By increasing the attack angle of shock cone, vacuum pressure is increased because of oblique shock at ram structure and separation point moved to the downstream of the second throat. By increasing blockage ratio, expansion wave angle is increased at ram structure while vacuum pressure is constant.

  • PDF