• Title/Summary/Keyword: memory protection

Search Result 159, Processing Time 0.028 seconds

A Study on the Qualities of the Security and Secretary (경호비서에게 요구되는 자질)

  • Park, Ok-cheol
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.2
    • /
    • pp.24-37
    • /
    • 2009
  • In the political and economic circles of our society, the security and secretary is always accompanying the society leaders, like shadows. The job of the security and secretary is a very difficult one that requires comprehensive and extensive capability and talent. From results of the prior studies, qualities of the security and secretary are divided into three groups. i.e. personal qualities, mental qualities and physical qualities. Each quality can be summarized as follows. Firstly, personal qualities mean honesty, responsibility, initiative, work ethic, sense of duty, modest attitude, kindness and loyalty. Secondly, mental qualities represent agility & composure, judgement, adaptability, memory, prediction, accuracy & reliability, observation and secret. Finally, physical qualities such as health, cleanliness, decent appearance, good feeling voice, physical strength and Martial arts for Protection. The security and secretary equipped with the above three requisites can be said to be the most ideal the security and secretary whom this age want and need.

  • PDF

Simplified Predicate Locking Scheme for Concurrency Control on R-tree

  • Ying Xia;Rim, Kee-Wook;Lee, Jae-Dong;Bae, Hae-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04b
    • /
    • pp.16-18
    • /
    • 2001
  • Despite extensive research on R-trees, most of the proposed schemes have not been integrated into existing DBMS due to the lack of protocol to provide consistency in concurrent environment. R-link tree is an acceptable data structure to deal with this issue., but still not enough. In this paper, we focus on a simplified predicate locking mechanism based on R-link tree for concurrency control and phantom protection. An in-memory operation control list (OCList) used to suspend some conflicting operations is designed here. The main features of this approach are (1) it can be implemented easily and do not need any extra information. (2) Only-one-lock is held when descending R-tree even when node split happens, while lock-coupling scheme is performed when ascending. No deadlocks are possible. (3) Searches and insertions are not unnecessarily restricted. (4) Insert and Delete phantom in R-link tree are avoid through beforehand predication.

  • PDF

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • Journal of the Semiconductor & Display Technology
    • /
    • v.6 no.2 s.19
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF

Countermeasures for BadUSB Vulnerability (BadUSB의 취약성 및 대응방안)

  • Choi, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.559-565
    • /
    • 2015
  • To defend against information leakage or malware inflow by USB memory, security technologies such as copy protection and device control have being researched and developed. However, countermeasure are insufficient despite being recognized as a fatal security-hole for BadUSB presented at the Black Hat Security Conference 2014. To solve this problem, the countermeasures for BadUSB vulnerability are proposed.

Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES

  • Lee, Seungkwang;Choi, Dooho;Choi, Yong-Je
    • ETRI Journal
    • /
    • v.37 no.5
    • /
    • pp.1012-1022
    • /
    • 2015
  • Conventional cryptographic algorithms are not sufficient to protect secret keys and data in white-box environments, where an attacker has full visibility and control over an executing software code. For this reason, cryptographic algorithms have been redesigned to be resistant to white-box attacks. The first white-box AES (WB-AES) implementation was thought to provide reliable security in that all brute force attacks are infeasible even in white-box environments; however, this proved not to be the case. In particular, Billet and others presented a cryptanalysis of WB-AES with 230 time complexity, and Michiels and others generalized it for all substitution-linear transformation ciphers. Recently, a collision-based cryptanalysis was also reported. In this paper, we revisit Chow and others's first WB-AES implementation and present a conditional re-encoding method for cryptanalysis protection. The experimental results show that there is approximately a 57% increase in the memory requirement and a 20% increase in execution speed.

MMU-less Memory Management for Stack Protection in Thread-based Operating System (MMU가 없는 Thread기반 운영체제에서 스택 보호를 위한 메모리 관리 기법)

  • Lee, Young-Rim;Kim, Young-Pil;Yoo, Chuck
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.409-413
    • /
    • 2006
  • 현재 많은 센서 네트워크 운영체제에서는 메모리 제약 때문에 스레드 스택을 공유한다. 하지만 대부분의 대상 플랫폼에서는 MMU가 없어서 하드웨어적으로 스택 보호가 이루어지기 어렵다. 이러한 문제를 해결하기 위해 본 논문에서는 운영체제 바이너리 코드 안에 존재하는 스택 연산 명령어들을 스택 보호 기능을 가진 래퍼 함수호출로 바꾸어 주었다. 이 래퍼 함수는 스택의 오버플로우/언더플로우를 관리해 주고 오리지널 코드에 있던 명령어를 실행한 후 원래 실행 흐름으로 돌아가게 한다. 본 논문에서는 이러한 동작을 수행하는 Post-Compile Processing Tool의 구조와 세부 메커니즘을 제안한다. 이 툴은 직접 바이너리를 조작하므로 개발의 유연성을 살리고, 정적인 조작만 가하기 때문에 실행시간 오버헤드가 적다. 또한 임베디드 플랫폼 환경과 같이 하드웨어 자원의 제약이 있는 구조에 적합하다.

  • PDF

Design of a Voting Mechanism considering Safety for Reliable System Using EPLD and Reliability Analysis

  • Ryoo, Dong-Wan;Lee, Hyung-Jik;Lee, Jeun-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.40.2-40
    • /
    • 2001
  • The protection system of the system communication, nuclear reactor and chemical reactor are representative of reliable system. This reliable system must be designed based on reliability as well as concept of safety, which is a failed system go a way of safe. Reliable system is composed of part of data acquisition, calculator, communication with redundancy, and a voter is important factor of reliability. Because it is serially connected. This paper presents a Design and Analysis of a Voting Mechanism considering Safety for reliable system Using EPLD. In the case of digital implementation a coincidence logic (voter) of reliable system, it needs CPU and memory, so increase a number of units. Therefore the failure rate and cost are increased on contrary when it is designed EPLD or FPGA.

  • PDF

An Overview of Cultural Heritage Research and Policy in Central Eurasia (유라시아 문화유산 연구와 정책 동향)

  • Park, Pilho
    • Korean Journal of Heritage: History & Science
    • /
    • v.48 no.3
    • /
    • pp.154-165
    • /
    • 2015
  • Common issues in research and policy on cultural heritage can be extracted among Eurasian countries although countries in the region show different colors of policies and studies. Among them one thing peculiar to Central Asian countries is that in general they do not have well delineated laws and regulations on the protection of cultural heritage. It may be because they had no enough time and experience to legislate and implement relevant laws and regulations ever since they got independence. Research on cultural heritage in Central Asian countries is often made in cooperation with foreign institutions. As shown in archaeological excavation projects in Central Asian countries, cooperative projects exceed noncooperative ones in terms of size and longevity. UNESCO, through its projects on the Serial and Transboundary World Heritage Nomination of the Silk Roads in Central Asia, also supports countries in Central Asia and others along the Silk Road in order to facilitate inclusion of their cultural heritages in the Tentative List of the World Heritage. With regard to activities on the protection of cultural heritage, while respective countries in Central Asia have made good efforts, they could not produce effective outcomes due to short of budget and specialized manpower. They have rich resources of cultural and documentary heritage but their registered heritages on the UNESCO's World Heritage List and Memory of the World are under-represented because of short of technology and experience among other things. A new trend in cultural heritage studies that combined cultural heritage with tourism has merged in recent years. While some critics have raised some negative questions, this new fashion became popular and will continue with the support of governments of Silk Road countries. In conclusion, Korean institutions are further encouraged to organize cooperative networks for research and policy with respective Eurasian countries.

Effects of Self-Administered Interview on Correct Recall and Memory Protection in the Situation of Delay and Misinformation (시간 지연과 오정보 제시 상황에서 초기 자기기입식 면담(SAI)이 정확 회상과 기억 보호에 미치는 영향)

  • Ham, Keunsoo;Kim, Yeaseul;Kim, Kipyung;Jeong, Hojin
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.1
    • /
    • pp.1-20
    • /
    • 2020
  • Witnesses will be exposed to a variety of misinformation after the witnessing of the event and state at the scene of the investigation after the delay period. This study was conducted to promote correct recall reporting without being affected by factors that against correct recall. Self-Administered Interview(SAI) is known to obtain eyewitness accounts quickly and accurately. Therefore, we performed a SAI to see if it reported more information than the control group that did not perform the SAI. Also, it also performed that correct information was maintained without being affected by misinformation and delay. Eighty-eight participants were asked to perform SAI or game after showing a video of mock crime. Misinformation was presented in the first or second session to see if it affected recall. An analysis of responses from the final test conducted in the second session by participants showed that groups that conducted SAI after a four-week delay reported more correct information than control groups, while there was no difference between incorrect- and confabulation information. In particular, the timing of presenting misinformation did not affect the amount of recall. This suggests that conducting the SAI immediately after witnessing the event protects correct information even after four weeks. Finally, the significance and limitations of this study, and subsequent studies were discussed.

  • PDF

Effects of Ginseng Radix on the ischemia-induced 4-vessel occlusion and cognitive impairments in the rat

  • Kim, Young-Ock
    • Journal of Ginseng Research
    • /
    • v.31 no.1
    • /
    • pp.44-50
    • /
    • 2007
  • Ginseng powerfully tonifies the original Qi. Ginseng used for insomnia, palpitations with anxiety, restlessness from deficient Qi and blood and mental disorientation. In order to investigate whether Ginseng cerebral ischemia-induced neuronal and cognitive impairments, we examined the effect of Ginseng on ischemia-induced cell death in the hippocampus, and on the impaired learning and memory in the Morris water maze and passive avoidance in rats. Ginseng when administered to rat at a dose of 200 mg/kg i.p. water extracts to 0 minutes and 90 minutes after 4-VO, significantly neuroprotective effects by 86.4% in the hippocampus of treated rats. For behavior test, rats were administered Ginseng (200mg/kg p.o.) daily for two weeks, followed by their training to the tasks. Treatment with Ginseng produced a marked improvement in escape latency to find the platform in the Morris water maze. Ginseng reduced the ischemia-induced learning disability in the passive avoidance. Consistent with behavioral data, treatments with Ginseng reduced jschemia-induced cell death in the hippocampal CA1 area. Oxidative stress is a causal factor in the neuropathogenesis of ischemic-reperfusion injury. Oxidative stress was examined in a rat model of global brain ischemia. The effects of Ginseng on lipid peroxidation (inhibition of the production of malondialdehyde, MDA) in different regions of the rat brain were studied. Ferrous sulfate and ascorbic acid (FeAs) were used to induce lipid peroxidation. The antiperoxidative effect showed 48-72% protection from tissue damage as compared with untreated animals. These results showed that Ginseng have a protective effect against ischemia-induced neuronal loss and learning and memory damage.