• 제목/요약/키워드: software protection

검색결과 504건 처리시간 0.022초

TUTUM Easy-seismic: 소방시설 내진설계 자동화 소프트웨어 개발 (TUTUM Easy-seismic: Development of a Seismic Design Automation Software for Building Fire Protection Systems)

  • 오창수;최준호
    • 한국화재소방학회논문지
    • /
    • 제33권5호
    • /
    • pp.140-148
    • /
    • 2019
  • '소방시설 내진설계 의무화'에 발맞추어 내진설계의 신뢰성과 효율성 향상을 위해서는 설계 자동화 소프트웨어 개발이 필수불가결하다. 본 연구에서 개발한 내진 설계 자동화 S/W는 소방청의 「소방시설의 내진설계 기준(이하 "국내 기준")」에 따른 흔들림 방지 버팀대(이하 "버팀대")의 자동 배치, 계산서 출력 및 그리고 물량 자동 산출 등의 기능을 제공한다. 또한, 자동화 S/W는 설계자의 수동설계와 비교하였을 때 약 3배 정도의 업무 속도를 단축시켜줄 뿐만 아니라 버팀대 등의 설계물량과 관련한 휴먼에러를 줄임으로써 설계안의 신뢰성을 높여준다. 뿐만 아니라 그동안 보수적으로 접근했던 소방시설의 내진설계방식에 있어 적어도 버팀대 사용에 대해서 컴퓨터 알고리즘을 이용한 최적의 내진설계를 수행할 수 있었다.

A Study on the Reactor Protection System Composed of ASICs

  • Kim, Sung;Kim, Seog-Nam;Han, Sang-Joon
    • 한국원자력학회:학술대회논문집
    • /
    • 한국원자력학회 1996년도 추계학술발표회논문집(1)
    • /
    • pp.191-196
    • /
    • 1996
  • The potential value of the Application Specific Integrated Circuits(ASIC's) in safety systems of Nuclear Power Plants(NPP's) is being increasingly recognized because they are essentially hardwired circuitry on a chip, the reliability of the system can be proved more easily than that of software based systems which is difficult in point of software V&V(Verification and Validation). There are two types of ASIC, one is a full customized type, the other is a half customized type. PLD(Programmable Logic Device) used in this paper is a half customized ASIC which is a device consisting of blocks of logic connected with programmable interconnections that are customized in the package by end users. This paper describes the RPS(Reactor Protection System) composed of ASICs which provides emergency shutdown of the reactor to protect the core and the pressure boundary of RCS(Reactor Coolant System) in NPP's. The RPS is largely composed of five logic blocks, each of them was implemented in one PLD, as the followings. A). Bistable Logic B). Matrix Logic C).Initiation Logic D). MMI(Man Machine Interface) Logic E). Test Logic.

  • PDF

HVDC시스템의 직류측 보호 모델 개발 (The Assessment and Development of Protection Models in HVDC DC side)

  • 이성두;김찬기
    • 전기학회논문지
    • /
    • 제59권10호
    • /
    • pp.1754-1760
    • /
    • 2010
  • The HVDC system consists of ac side and dc side through thyristor valve. ac side protection is similar to conventional ac system protection schemes but dc side protection is different from ac side of HVDC system. AC system don't have controller but HVDC system has controller that controls and protects system from faults and disturbance. This paper show protectional function of HVDC dc side such as asymmetry protection, ac/dc differential protection, dc overvoltage, dc overcurrent protection. Protection models is developed using RTDS software and assessment of protection models is also performed by RTDS system.

A Multi-Perspective Benchmarking Framework for Estimating Usable-Security of Hospital Management System Software Based on Fuzzy Logic, ANP and TOPSIS Methods

  • Kumar, Rajeev;Ansari, Md Tarique Jamal;Baz, Abdullah;Alhakami, Hosam;Agrawal, Alka;Khan, Raees Ahmad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권1호
    • /
    • pp.240-263
    • /
    • 2021
  • One of the biggest challenges that the software industry is facing today is to create highly efficient applications without affecting the quality of healthcare system software. The demand for the provision of software with high quality protection has seen a rapid increase in the software business market. Moreover, it is worthless to offer extremely user-friendly software applications with no ideal security. Therefore a need to find optimal solutions and bridge the difference between accessibility and protection by offering accessible software services for defense has become an imminent prerequisite. Several research endeavours on usable security assessments have been performed to fill the gap between functionality and security. In this context, several Multi-Criteria Decision Making (MCDM) approaches have been implemented on different usability and security attributes so as to assess the usable-security of software systems. However, only a few specific studies are based on using the integrated approach of fuzzy Analytic Network Process (FANP) and Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) technique for assessing the significant usable-security of hospital management software. Therefore, in this research study, the authors have employed an integrated methodology of fuzzy logic, ANP and TOPSIS to estimate the usable - security of Hospital Management System Software. For the intended objective, the study has taken into account 5 usable-security factors at first tier and 16 sub-factors at second tier with 6 hospital management system softwares as alternative solutions. To measure the weights of parameters and their relation with each other, Fuzzy ANP is implemented. Thereafter, Fuzzy TOPSIS methodology was employed and the rating of alternatives was calculated on the foundation of the proximity to the positive ideal solution.

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

  • Park, Jaekwan;Suh, Yongsuk
    • Nuclear Engineering and Technology
    • /
    • 제46권1호
    • /
    • pp.47-54
    • /
    • 2014
  • The protection of nuclear safety software is essential in that a failure can result in significant economic loss and physical damage to the public. However, software security has often been ignored in nuclear safety software development. To enforce security considerations, nuclear regulator commission recently issued and revised the security regulations for nuclear computer-based systems. It is a great challenge for nuclear developers to comply with the security requirements. However, there is still no clear software development process regarding security activities. This paper proposes an integrated development process suitable for the secure development requirements and system security requirements described by various regulatory bodies. It provides a three-stage framework with eight security activities as the software development process. Detailed descriptions are useful for software developers and licensees to understand the regulatory requirements and to establish a detailed activity plan for software design and engineering.

ICT 환경에서 프로그램보호를 위한 소스코드 분석 사례 연구 (A Study on Analysis of Source Code for Program Protection in ICT Environment)

  • 이성훈;이동우
    • 융합정보논문지
    • /
    • 제7권4호
    • /
    • pp.69-74
    • /
    • 2017
  • 현재 우리 사회를 대변하고 있는 단어는 정보통신기술(ICT)일 것이다. 정보통신 기술의 발전으로 우리나라의 소프트웨어 산업은 양적으로, 질적으로 발전하고 있다. 이러한 소프트웨어 산업의 고도성장에 따른 문제점 중 하나는 소프트웨어에 대한 지적재산권 문제이며 이로 인해 다양한 유형의 분쟁들이 발생하고 있다는 점이다. 소프트웨어에 대한 대부분의 분쟁 중 응용 프로그램이 차지하는 비중이 상당히 많은 비율을 차지하고 있다. 이는 다양한 산업분야에서 필요로 하는 프로그램들이 수없이 개발되고 있기 때문에 자연스러운 현상이라 할 수 있다. 따라서 현재와 같은 고도화된 ICT 환경에서는 지적재산권에 대한 중요성이 점점 더 확장될 것이다. 본 연구에서는 프로그램에 대한 사례를 중심으로 하여 프로그램의 유사성 및 복제도 정도를 도출할 수 있는 방안을 소스 프로그램의 수준에서 제시하였다.

A RESEARCH ON SEAMLESS PLATFORM CHANGE OF REACTOR PROTECTION SYSTEM FROM PLC TO FPGA

  • Yoo, Junbeom;Lee, Jong-Hoon;Lee, Jang-Soo
    • Nuclear Engineering and Technology
    • /
    • 제45권4호
    • /
    • pp.477-488
    • /
    • 2013
  • The PLC (Programmable Logic Controller) has been widely used to implement real-time controllers in nuclear RPSs (Reactor Protection Systems). Increasing complexity and maintenance cost, however, are now demanding more powerful and cost-effective implementation such as FPGA (Field-Programmable Gate Array). Abandoning all experience and knowledge accumulated over the decades and starting an all-new development approach is too risky for such safety-critical systems. This paper proposes an RPS software development process with a platform change from PLC to FPGA, while retaining all outputs from the established development. This paper transforms FBD designs of the PLC-based software development into a behaviorally-equivalent Verilog program, which is a starting point of a typical FPGA-based hardware development. We expect that the proposed software development process can bridge the gap between two software developing approaches with different platforms, such as PLC and FPGA. This paper also demonstrates its effectiveness using an example of a prototype version of a real-world RPS in Korea.

Development Process of FPGA-based Departure from Nucleate Boiling Ratio Algorithm Using Systems Engineering Approach

  • Hwang, In Sok;Jung, Jae Cheon
    • 시스템엔지니어링학술지
    • /
    • 제14권2호
    • /
    • pp.41-48
    • /
    • 2018
  • This paper describes the systems engineering development process for the Departure from Nucleate Boiling Ratio (DNBR) algorithm using FPGA. Current Core Protection Calculator System (CPCS) requirement and DNBR logic are analyzed in the reverse engineering phase and the new FPGA based DNBR algorithm is designed in the re-engineering phase. FPGA based DNBR algorithm is developed by VHSIC Hardware Description Language (VHDL) in the implementation phase and VHDL DNBR software is verified in the software Verification & Validation phase. Test cases are developed to perform the software module test for VHDL software modules. The APR 1400 simulator is used to collect the inputs data in 100%, 75%, and 50% reactor power condition. Test input signals are injected to the software modules following test case tables and output signals are compared with the expected test value. Minimum DNBR value from developed DNBR algorithm is validated by KEPCO E&C CPCS development facility. This paper summarizes the process to develop the FPGA-based DNBR calculation algorithm using systems engineering approach.

Efficient Anonymous Broadcast Encryption with Adaptive Security

  • Zhou, Fu-Cai;Lin, Mu-Qing;Zhou, Yang;Li, Yu-Xi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4680-4700
    • /
    • 2015
  • Broadcast encryption is an efficient way to distribute confidential information to a set of receivers using broadcast channel. It allows the broadcaster to dynamically choose the receiver set during each encryption. However, most broadcast encryption schemes in the literature haven't taken into consideration the receiver's privacy protection, and the scanty privacy preserving solutions are often less efficient, which are not suitable for practical scenarios. In this paper, we propose an efficient dynamic anonymous broadcast encryption scheme that has the shortest ciphertext length. The scheme is constructed over the composite order bilinear groups, and adopts the Lagrange interpolation polynomial to hide the receivers' identities, which yields efficient decryption algorithm. Security proofs show that, the proposed scheme is both secure and anonymous under the threat of adaptive adversaries in standard model.

소스코드 기반의 정밀도 높은 실행 흐름 보호 기법 (Precise control flow protection based on source code)

  • 이종협;김용승
    • 정보보호학회논문지
    • /
    • 제22권5호
    • /
    • pp.1159-1168
    • /
    • 2012
  • 기존의 Control Flow Integrity(CFI)와 Control Flow Locking(CFL) 기법은 프로그램이 개발자의 의도대로만 실행되도록 강제하여 실행 흐름의 무결성을 제공하고 안전한 프로그램 실행을 보장한다. 하지만, 함수 호출 문맥을 인지하는 보호 기법을 제공하지 않아 정밀도가 떨어지고 이를 악용한 공격을 허용하는 취약점을 가지고 있다. 본 논문에서는 이러한 문제점들을 해결하는 Source-code CFI(SCFI) 시스템을 제안한다. 제안한 시스템에서는 정밀도 높은 CFI 기능을 제공하여 프로그램의 안전성을 높인다.