• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.027 seconds

A Study on Estimation Model of Student using the Neural Network (신경회로망을 이용한 학습자 진단 모델에 관한 연구)

  • Kim, Hyun-Soo;Sohn, Keon-Tae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.11
    • /
    • pp.2915-2920
    • /
    • 1998
  • This paper propose a new model for evaluationg the whole course of study by using the neural network. Through the experiment, we get the result that our model could evaluate effectively teh state of whole knowledge, because the neural network had the characterisitics such as a generalization and the ability which overcame the weakness of itself.

  • PDF

A Study on the Weakness Categorization for Mobile Applications (모바일 애플리케이션을 위한 보안약점 분류에 대한 연구)

  • Son, Yun-Sik;Mun, Il-Yong;Ko, Seok-Hoon;Oh, Se-Man
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.434-436
    • /
    • 2012
  • 최근에 모바일 시장의 급격한 성장과 함께, 모바일 애플리케이션의 보안약점을 통해 개인의 민감한 정보가 유출되는 심각한 문제점이 새롭게 등장하고 있다. 특히, 오늘날의 소프트웨어는 인터넷 환경에서 데이터를 교환하기 때문에 해커에 의해 악의적인 공격을 받을 가능성이 항상 존재한다. 이러한 보안약점은 심각한 경제적 손실을 발생시키는 소프트웨어 보안 침해사고의 직접적인 원인이다. 따라서 초기 개발 단계에서 보안약점을 제거하는 것이 중요하다. 그러나 기존의 보안약점 목록은 모바일 환경의 특성을 반영하지 못하고 있다. 본 논문에서는 모바일 애플리케이션의 특성을 고려한 보안약점의 분류 기법에 대한 소개를 한다.

SECURE IDENTIFICATION AND SIGNATURE USING ZERO-KNOWLEDGE PROOFS AND BILINEAR PAIRINGS

  • Choi, Byung Mun;Lee, Young Whan
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.21 no.3
    • /
    • pp.403-411
    • /
    • 2008
  • In 2005, A. Saxena, B. Soh and S. Priymak [10] proposed a two-flow blind identification protocol. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. In 2008, Y. W. Lee [9] made a method of the active-intruder attack on their identification scheme and proposed a new zero-knowledge blind identification protocol for smart cards. In this paper, we give more simple and fast protocols than above protocols such that the prover using computationally limited devices such as smart cards has no need of computing the bilinear pairings. Computing the bilinear pairings is needed only for the verifier and is secure assuming the hardness of the Discrete-Logarithm Problem (DLP).

  • PDF

ZERO-KNOWLEDGE GROUP IDENTIFICATION AND HIDDEN GROUP SIGNATURE FOR SMART CARDS USING BILINEAR PAIRINGS

  • Lee, Young Whan;Choi, Byung Mun
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.20 no.4
    • /
    • pp.355-366
    • /
    • 2007
  • In this paper, we propose a new blind group identification protocol and a hidden group signature protocol as its application. These protocols involve many provers and one verifier such that (1) the statement of all the provers are proved simultaneously, (2) and also all the provers using computationally limited devices (e.g. smart cards) have no need of computing the bilinear pairings, (3) but only the verifier uses the bilinear pairings. A. Saxena et al. proposed a two-round blind (group) identification protocol in 2005 using the bilinear pairings. But it reveals weakness in the active-intruder attack, and all the provers as well as the verifier must have devices computing bilinear pairings. Comparing their results, our protocol is secure from the active-intruder attack and has more fit for smart cards. In particular, it is secure under only the assumption of the hardness of the Discrete-Logarithm Problem in bilinear groups.

  • PDF

Watermark Implementation for Real-Time H.264/AVC Encoding (실시간 H.264/AVC 인코딩용 워터마크 구현)

  • Hong, You-Pyo;Won, Chee-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.7C
    • /
    • pp.649-653
    • /
    • 2009
  • Although digital image has many advantages including digital image compression and various image processing techniques, the it has the weakness of easy manipulation which led to the development of many digital watermarking techniques. There are various types of digital watermarking algorithms for spatial and spectral domains. This paper presents a watermarking implementation for H.264/AVC codec which is adapted for many multimedia standards.

Weakness and its Improvement about IS-95/cdma2000 Mobile Communication System (IS-95/cdma2000 이동통신 시스템의 취약성과 개선방안)

  • Kim Keon-Woo;Hong Do-Won
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.185-189
    • /
    • 2006
  • 최근 ESN과 IMSI 불법복제에 의해 IS-95/cdma2000 이동통신 서비스 정상가입 사용자와 단말의 피해가 확인되고 있다. 이는 정상 가입자의 요금증가, SMS를 통한 휴대폰 결재, 정상단말의 착발신 장애 등의 문제를 일으키고 있다. 이러한 불법복제 단말의 서비스 접근과 정상단말 신원확인을 위해 이동통신 사업자는 파워온 등록, 착신, 발신시에 인증 메커니즘을 적용하지만, 여전히 CDMA/cdma2000 시스템에는 취약점이 존재하는 것으로 분석되고 이의 대응책이 요구된다. 이에 본 논문에서는 파워온 인증, 발신인증, 착신인증이 도입된 이동통신 시스템에서 정상단말과 불법복제 단말이 동일 기지국내에 위치할 때와 서로다른 기지국에 위치할 때, 각각 불법복제 단말에 의해 발생할 수 있는 취약점과 대응방안을 분석하고자 한다.

  • PDF

Efficient USN Routing Protocol using Sub-Clustering

  • Jeong, Su-Hyung;Yoo, Hae-Young
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.466-469
    • /
    • 2008
  • The existing routing protocols in USN environment, PEGASIS is more efficient than LEACH, which is a hierarchical routing protocol, for network configuration based on power consumption. Despite its merit that it can reduce energy consumption per node, however, the PEGASIS protocol also has a weakness that it is less responsive to frequent changes that occur in the configuration of sensor network due to BS nodes that keep changing, which is a typical characteristic of the sensor network. To address this problem, this paper proposes to select sub-cluster heads and have them serve as intermediate nodes. This paper presents and analyses that this method can resolve the aforementioned problem of the PEGASIS algorithm.

Study on Security Weakness of Barcode Devices (바코드를 이용하는 기기에서의 보안적 취약점 탐구)

  • Park, Beom-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.189-192
    • /
    • 2017
  • 마트, 식당, 도서관 등 우리 주변 많은 곳에서 바코드가 사용되고 있다. 바코드는 주로 ISBN, Code128, Code39 등의 형식이 쓰이는데 그중 Code 128은 ASCII Code를 기반으로 하기 때문에 ASCII Code 0번부터 32번까지의 제어 문자를 바코드에 담을 수 있다. 제어 문자는 본래 프린터 또는 통신 접속구 등 주변 장치에 정보를 전달하기 위하여 사용되는 문자를 뜻하지만 Windows상에서 입력될 시 전혀 다른 역할을 한다. 주로 바코드 기기에서 입력 값을 검증하지 않으므로 이를 이용해 제어 문자를 담은 바코드를 태깅해 명령 프롬포트를 열고 명령을 실행할 수 있다. 또한 대부분의 바코드 인식 프로그램이 DB를 사용하고, 보안이 다른 프로그램들에 비해 취약하다는 점에서 SQL Injection 공격 가능성을 제시한다.

Object-Oriented Business Process Modeling : Contract-Collaboration Net Model (객체지향 비즈니스 프로세스 모델링 : 계약-협동 네트 모형)

  • Kim, Chang-Ouk;Jun, Jin;Kim, Sung-Shick
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.27 no.1
    • /
    • pp.37-46
    • /
    • 2001
  • Business process(workflow) analysis has been recognized as a core step to building information systems. However, most analysts have recognized that deriving consistent business process artifacts even in a simple business domain is very difficult, since most analysis methods give the designers narrative and/or diagrammatic tools that do not support rigorous analysis rules. This often generates inconsistent analysis results, leading to create useless information systems and resulting in tremendous budget wastes. To overcome this weakness, this paper presents a declarative business process modeling method called contract-collaboration net(cc-net), which is not only somewhat formal but also useful to the practitioners. A case study on bank domain is presented to illustrate our approach.

  • PDF

A Study on the Strategic Management of University Library (대학도서관 경영전략에 관한 연구)

  • 박인웅
    • Journal of Korean Library and Information Science Society
    • /
    • v.30 no.3
    • /
    • pp.97-116
    • /
    • 1999
  • The purpose of this paper is to develop a model of the strategic management of university library in Korea. The model from this study is summarized as follows: 1. External environment is divide into opportunities and threats. 2) Internal environment is divide into strengths and weakness. We can formulate a management strategy on the basis of library environment element from environment analysis and library situation. 2. Formulation of strategic management are formulated through three stages. 1) Library strategy: $\circled1$Growth strategy $\circled2$Stability $\circled3$Retrenchment 2) Business(competition) strategy 3) Functional strategy: $\circled1$Material organization strategy $\circled2$Collection strategy $\circled3$Reference service strategy $\circled4$Human resource management strategy $\circled5$marketing strategy 3. Implementation of strategic management 1) The chief of strategy implementation 2) Programs, budgets and procedures 3) Structure and strategy implementation 4) culture and strategy implementation 4. Evaluation and control of strategy implementation.

  • PDF