• Title/Summary/Keyword: software vulnerability

Search Result 248, Processing Time 0.03 seconds

Difference in Injury of the Corticospinal Tract and Spinothalamic Tract in Patients with Putaminal Hemorrhage

  • Jang, Sung Ho;Seo, Jeong Pyo
    • The Journal of Korean Physical Therapy
    • /
    • v.31 no.6
    • /
    • pp.358-362
    • /
    • 2019
  • Purpose: We investigated the difference in injury of the corticospinal tract (CST) and the spinothalamic tract (STT) in patients with putaminal hemorrhage, using diffusion tensor tractography (DTT). Methods: Thirty one consecutive patients with PH and 34 control subjects were recruited for this study. DTT scanning was performed at early stage of PH (7-63 days), and the CST and STT were reconstructed using the Functional Magnetic Resonance Imaging of Brain (FMRIB) Software Library program. Injury of the CST and STT was defined in terms of the configuration or abnormal DTT parameters was more than 2 standard deviations lower than that of normal control subjects. Results: Among 31 patients, all 31 patients (100%) had injury of the CTS, whereas 25 patients (80.6%) had injury of the STT: the incidence of CST injury was significantly higher than that of STT (p<0.05). In detail, 20 (64.5%) of 31 patients showed a discontinuation of the CST in the affected hemisphere; in contrast, 14 patients (45.2%) of 31 patients showed a discontinuation of the STT in the affected hemisphere. Regarding the FA value, 6 (19.4%) of 31 patients and 2 (6.4%) of 31 patients were found to have injury in the CST and STT, respectively. In terms of the fiber number, the same injury incidence was observed in 11 patients (35.5%) in both the CST and STT. Conclusion: The greater vulnerability of the CST appears to be ascribed to the anatomical characteristics; the CST is located anteriorly to the center of the putamen compared with the STT.

Seismic Fragilities of Bridges and Transmission Towers Considering Recorded Ground Motions in South Korea (한국의 지반거동을 고려한 교량과 송전철탑의 지진취약도 분석)

  • Park, Hyo Sang;Nguyen, Duy-Duan;Lee, Tae-Hyung
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.20 no.7_spc
    • /
    • pp.435-441
    • /
    • 2016
  • The Korean peninsula has known as a minor-to-moderate seismic region. However, some recent studies had shown that the maximum possible earthquake magnitude in the region is approximately 6.3-6.5. Therefore, a seismic vulnerability assessment of the existing infrastructures considering ground motions in Korea is necessary. In this study, we developed seismic fragility curves for a continuous steel box girder bridge and two typical transmission towers, in which a set of seven artificial and natural ground motions recorded in South Korea is used. A finite element simulation framework, OpenSees, is utilized to perform nonlinear time history analyses of the bridge and a commercial software, SAP2000, is used to perform time history analyses of the transmission towers. The fragility curves based on Korean ground motions were then compared with the fragility curves generated using worldwide ground motions to evaluate the effect of the two ground motion groups on the seismic fragility curves of the structures. The results show that both non-isolated and base-isolated bridges are less vulnerable to the Korean ground motions than to worldwide earthquakes. Similarly to the bridge case, the transmission towers are safer during Korean motions than that under worldwide earthquakes in terms of fragility functions.

Security-Reverse-Attack Engineering Life-cycle Model for Attack System and Attack Specification Models (공격시스템을 위한 보안-역-공격공학 생명주기 모델과 공격명세모델)

  • Kim, Nam-Jeong;Kong, Mun-Soo;Lee, Gang-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.17-27
    • /
    • 2017
  • Recently, as cyber attacks have been activated, many such attacks have come into contact with various media. Research on security engineering and reverse engineering is active, but there is a lack of research that integrates them and applies attack systems through cost effective attack engineering. In this paper, security - enhanced information systems are developed by security engineering and reverse engineering is used to identify vulnerabilities. Using this vulnerability, we compare and analyze lifecycle models that construct or remodel attack system through attack engineering, and specify structure and behavior of each system, and propose more effective modeling. In addition, we extend the existing models and tools to propose graphical attack specification models that specify attack methods and scenarios in terms of models such as functional, static, and dynamic.

Emulation-Based Fuzzing Techniques for Identifying Web Interface Vulnerabilities in Embedded Device Firmware (임베디드 디바이스 펌웨어의 웹 인터페이스 취약점 식별을 위한 에뮬레이션 기반 퍼징 기법)

  • Heo, Jung-Min;Kim, Ji-Min;Ji, Cheong-Min;Hong, Man-Pyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1225-1234
    • /
    • 2019
  • The security of the firmware is more important because embedded devices have become popular. Network devices such as routers can be attacked by attackers through web application vulnerabilities in embedded firmware. Therefore, they must be found and removed quickly. The Firmadyne framework proposes a dynamic analysis method to find vulnerabilities after emulating firmware. However, it only performs vulnerability checks according to the analysis methods defined in the tool, thus limiting the scope of vulnerabilities that can be found. In this paper, fuzzing is performed in emulation-based environment through fuzzing, one of the software security test techniques. We also propose a Fabfuzz tool for efficient emulation based fuzzing. Experiments have shown that in addition to the vulnerabilities identified in existing tools, other types of vulnerabilities have been found.

A Study of File Format-Aware Fuzzing against Smartphone Media Server Daemons (스마트폰 미디어 서버 데몬에 대한 파일 포맷 인식 기반의 퍼징 연구)

  • Shin, MinSik;Yu, JungBeen;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.541-548
    • /
    • 2017
  • The smartphone operates the media server daemon to handle audio service requests. Media server daemons, running with a high privilege in the background, caused many vulnerabilities to applications most frequently used in smart devices including smartphones. Fuzzing is a popularly used methodology to find software vulnerabilities. Unfortunately, fuzzing itself is not much effective in such format-strict environments as media services. In this paper, we propose a file format-aware fuzzing in order to efficiently detect vulnerabilities of media server daemon. We acquired a remote arbitrary code execution vulnerability on iOS/tvOS/MacOS/watchOS, and we verified the effectiveness by comparing our methodology with the fuzzers FileFuzz and ZZUF.

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

Spatially Distributed Model for Soil Loss Vulnerability Assessment in Mekong River Basin

  • Thuy, H.T.;Lee, Giha;Lee, Daeeop;Sophal, Try
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.188-188
    • /
    • 2016
  • The Mekong which is one of the world's most significant rivers plays an extremely important role to South East Asia. Lying across six riparian countries including China, Myanmar, Thailand, Laos, Cambodia and Vietnam and being a greatly biological and ecological diversity of fishes, the river supports a huge population who living along Mekong Basin River. Therefore, much attention has been focused on the giant Mekong Basin River, particularly, the soil erosion and sedimentation problems which rise critical impacts on irrigation, agriculture, navigation, fisheries and aquatic ecosystem. In fact, there have been many methods to calculate these problems; however, in the case of Mekong, the available data have significant limitations because of large area (about 795 00 km2) and a failure by management agencies to analyze and publish of developing countries in Mekong Basin River. As a result, the Universal Soil Loss Equation (USLE) model in a GIS (Geographic Information System) framework was applied in this study. The USLE factors contain the rainfall erosivity, soil erodibility, slope length, steepness, crop management and conservation practices which are represented by raster layers in GIS environment. In the final step, these factors were multiplied together to estimate the soil erosion rate in the study area by using spatial analyst tool in the ArcGIS 10.2 software. The spatial distribution of soil loss result will be used to support river basin management to find the subtainable management practices by showing the position and amount of soil erosion and sediment load in the dangerous areas during the selected 56- year period from 1952 to 2007.

  • PDF

Separation of Concerns Security Model of Component using Grey Box (그레이박스를 사용한 컴포넌트의 관심사 분리 보안 모델)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.163-170
    • /
    • 2008
  • As the degree of dependency and application of component increases, the need to strengthen security of component is also increased as well. The component gives an advantage to improve development productivity through its reusable software. Even with this advantage, vulnerability of component security limits its reuse. When the security level of a component is raised in order to improve this problem, the most problematic issue will be that it may extend its limitation on reusability. Therefore, a component model concerning its reusability and security at the same time should be supplied. We suggest a Separation of Concerns Security Model for Extension of Component Reuse which is integrated with a wrapper model and an aspect model and combined with a reuse model in order to extend its security and reusability by supplying information hiding and easy modification, and an appropriate application system to verify the model's compatibility is even constructed. This application model gives the extension of component function and easy modification through the separation of conceits, and it raise its security as doll as extends its reusability.

  • PDF

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

Unlocking Shared Bike System by Exploiting an Application Log (애플리케이션 로그를 이용한 공유 자전거 시스템의 잠금장치 해제 방법)

  • Cho, Junwan;Lee, Jeeun;Kim, Kwangjo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.719-728
    • /
    • 2019
  • Recently, there has been a growing market for shared mobility businesses that share 'transport' such as cars and bikes, and many operators offer a variety of services. However, if the fare can not be charged normally because of security vulnerability, the operator can not continue the business. So there should be no security loopholes. However, there is a lack of awareness and research on shared mobility security. In this paper, we analyzed security vulnerabilities exposed in application log of shared bike service in Korea. We could easily obtain the password of the bike lock and the encryption key of the AES-128 algorithm through the log, and confirmed the data generation process for unlocking using software reverse engineering. It is shown that the service can be used without charge with a success rate of 100%. This implies that the importance of security in shared mobility business and new security measures are needed.