• Title/Summary/Keyword: tamper

Search Result 108, Processing Time 0.032 seconds

Effective Utilization of Waste Landfill by Dynamic Compaction Pilot Test (동다짐에 의한 폐기물 매립장의 유효활용에 관한 연구)

  • Chun, Byung-Sik
    • Journal of the Korean GEO-environmental Society
    • /
    • v.1 no.1
    • /
    • pp.71-78
    • /
    • 2000
  • In this study, the evaluation for effective utilization of waste landfill was performed by field test to use waste landfill as construction site(Nangido in Seoul). This site had been formed by dredging the household waste, building debris and industrial waste for fifteen years(78'3~93'3). The site where dynamic compaction test was divided by 4 yards. Yard-1, 2 were not eliminated widening of cover soil and Yard-3, 4 were eliminated it. Dynamic Compaction Pilot Test was carried out by the 15ton heavy tamper with drop height of 20m in Yard-1, 3 and with drop height of 15m in Yard-2, 4. We evaluated the compaction efficiency, optimum compaction number and noise vibration through field test, monitoring. As a result, if the countermeasures against vibration and noise by the method utilize, the dynamic compaction method is suitable for using in waste landfill as a construction site among the ground improvement method.

  • PDF

BubbleDoc: Document Forgery and Tamper Detection through the Agent-Free File System-Awareness in Cloud Environment (BubbleDoc: 클라우드 환경에서의 agent-free 파일시스템 분석을 통한 문서 위/변조 탐지)

  • Jeon, Woo-Jin;Hong, Dowon;Park, Ki-Woong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.429-436
    • /
    • 2018
  • Electronic documents are efficient to be created and managed, but they are liable to lose their originality because copies are created during distribution and delivery. For this reason, various security technologies for electronic documents have been applied. However, most security technologies currently used are for document management such as file access privilege control, file version and history management, and therefore can not be used in environments where authenticity is absolutely required, such as confidential documents. In this paper, we propose a method to detect document forgery and tampering through analysis of file system without installing an agent inside the instance operating system in cloud computing environment. BubbleDoc monitors the minimum amount of virtual volume storage in an instance, so it can efficiently detect forgery and tampering of documents. Experimental results show that the proposed technique has 0.16% disk read operation overhead when it is set to 1,000ms cycle for monitoring for document falsification and modulation detection.

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

A CASE OF CONDUCT DISORDER CONFINED TO FAMILY CONTEXT (가정에 국한된 품행장애 1례)

  • Chung, Sun-Ju;Cho, Soo-Churl
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.8 no.2
    • /
    • pp.287-297
    • /
    • 1997
  • Conduct disorder has been subclassified by the symptom characteristics of socialization, aggression, or age of onset. In ICD-10, ‘Conduct disorder confined to family context’ has been developed as a distinct subtype. Which delineates the conduct problems which take place only in the family and related situation. These authors experienced a case which presents a child who shows aggressive and violent behavior to his parent and brother, severe tamper tantrum and destructiveness only in family. By through history taking, observation and treatment after admission, we could find that insecure and ambivalent attachment between parent and child due to chronic neglect and abuse, and inconsistent parental behavior contribute to many behavioral and emotional problems of this child. We reviewed the relationship between conduct disorder and family pathology and treatment strategy for conduct disorder with family problems.

  • PDF

A Study for Improvement of the Testing Methods for Quality Control of Recycled Aggregate (순환골재의 품질평가를 위한 시험방법 개선에 관한 실험적 연구)

  • Jaung, Jae-Dong;Lee, Do-Heun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.8 no.4
    • /
    • pp.105-114
    • /
    • 2008
  • This study investigates the saturation level of surface dryness, quantity of adhesive mortar, and the alien substance content of recycled aggregates for concrete to develop an adequate quality testing method for understanding the properties of recycled aggregates, which differ greatly from preexisting aggregates. For tests that measure the saturation level of surface dryness, where detail methods are applied differently according to the tester, various testing methods from across world were compared and analyzed. This study revealed that when measuring the saturation level of surface dryness of a certain sample, aggregates must be supplemented immediately whenever the height of the sample becomes lower than the measuring mold, and allowing the tamper to free fall on the sample will provide the most accurate results. When measuring the quantity of adhesive mortar of recycled aggregates for concrete, an acid solution was used, and since the quantity of adhesive mortar increases as the particle sizes gets smaller, the sample for testing should represent the entire granularity. Sulfuric acid solution is adequate for immersion, and the concentration should be 20% for best results. According to the alien substance content measurement, which was examined by the naked eye, the error range caused by the difference in particle size was neglectable, and therefore the sample should be $2.5{\sim}5.0mm$ in size concerning the accuracy and measuring time. Also, for coarse recycled aggregates, the sample should amount to 1kg for measuring alien substance content by the naked eye, which proves that assortment by the naked eye is the most adequate method for measuring the alien substance content of a recycled aggregate.

Security and Privacy Mechanism using TCG/TPM to various WSN (다양한 무선네트워크 하에서 TCG/TPM을 이용한 정보보호 및 프라이버시 매커니즘)

  • Lee, Ki-Man;Cho, Nae-Hyun;Kwon, Hwan-Woo;Seo, Chang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.195-202
    • /
    • 2008
  • In this paper, To improve the effectiveness of security enforcement, the first contribution in this work is that we present a clustered heterogeneous WSN(Wareless Sensor Network) architecture, composed of not only resource constrained sensor nodes, but also a number of more powerful high-end devices acting as cluster heads. Compared to sensor nodes, a high-end cluster head has higher computation capability, larger storage, longer power supply, and longer radio transmission range, and it thus does not suffer from the resource scarceness problem as much as a sensor node does. A distinct feature of our heterogeneous architecture is that cluster heads are equipped with TC(trusted computing) technology, and in particular a TCG(Trusted Computing Group) compliant TPM (Trusted Platform Module) is embedded into each cluster head. According the TCG specifications, TPM is a tamper-resistant, self-contained secure coprocessor, capable of performing cryptographic functions. A TPM attached to a host establishes a trusted computing platform that provides sealed storage, and measures and reports the integrity state of the platform.

  • PDF

A study on Memory Analysis Bypass Technique and Kernel Tampering Detection (메모리 분석 우회 기법과 커널 변조 탐지 연구)

  • Lee, Haneol;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.661-674
    • /
    • 2021
  • Malware, such as a rootkit that modifies the kernel, can adversely affect the analyst's judgment, making the analysis difficult or impossible if a mechanism to evade memory analysis is added. Therefore, we plan to preemptively respond to malware such as rootkits that bypass detection through advanced kernel modulation in the future. To this end, the main structure used in the Windows kernel was analyzed from the attacker's point of view, and a method capable of modulating the kernel object was applied to modulate the memory dump file. The result of tampering is confirmed through experimentation that it cannot be detected by memory analysis tool widely used worldwide. Then, from the analyst's point of view, using the concept of tamper resistance, it is made in the form of software that can detect tampering and shows that it is possible to detect areas that are not detected by existing memory analysis tools. Through this study, it is judged that it is meaningful in that it preemptively attempted to modulate the kernel area and derived insights to enable precise analysis. However, there is a limitation in that the necessary detection rules need to be manually created in software implementation for precise analysis.

Security Proof for a Leakage-Resilient Authenticated Key Establishment Protocol

  • Shin, Seong-Han;Kazukuni Kobara;Hideki Imai
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.75-90
    • /
    • 2004
  • At Asiacrypt 2003, Shin et al., have proposed a new class for Authenticated Key Establishment (AKE) protocol named Leakage-Resilient AKE ${(LR-AKE)}^{[1]}$. The authenticity of LR-AKE is based on a user's password and his/her stored secrets in both client side and server side. In their LR-AKE protocol, no TRM(Tamper Resistant Modules) is required and leakage of the stored secrets from $.$my side does not reveal my critical information on the password. This property is useful when the following situation is considered :(1) Stored secrets may leak out ;(2) A user communicates with a lot of servers ;(3) A user remembers only one password. The other AKE protocols, such as SSL/TLS and SSH (based or PKI), Password-Authenticated Key Exchange (PAKE) and Threshold-PAKE (T-PAKE), do not satisfy that property under the above-mentioned situation since their stored secrets (or, verification data on password) in either the client or the servers contain enough information to succeed in retrieving the relatively short password with off-line exhaustive search. As of now, the LR-AKE protocol is the currently horn solution. In this paper, we prove its security of the LR-AKE protocol in the standard model. Our security analysis shows that the LR-AKE Protocol is provably secure under the assumptions that DDH (Decisional Diffie-Hellman) problem is hard and MACs are selectively unforgeable against partially chosen message attacks (which is a weaker notion than being existentially unforgeable against chosen message attacks).

Self Generable Conditionally Anonymous Authentication System for VANET (VANET를 위한 차량자체생성 조건부익명 인증시스템)

  • Kim, Sang-Jin;Lim, Ji-Hwan;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.105-114
    • /
    • 2009
  • Messages exchanged among vehicles must be authenticated in order to provide collision avoidance and cooperative driving services in VANET. However, digitally signing the messages can violate the privacy of users. Therefore, we require authentication systems that can provide conditional anonymity. Recently, Zhang et al. proposed conditionally anonymous authentication system for VANET using tamper-resistant hardware. In their system, vehicles can generate identity-based public keys by themselves and use them to sign messages. Moreover, they use batch verification to effectively verify signed messages. In this paper, we provide amelioration to Zhang et al.'s system in the following respects. First, we use a more efficient probabilistic signature scheme. Second, unlike Zhang et al., we use a security proven batch verification scheme. We also provide effective solutions for key revocation and anonymity revocation problems.

Practical Concerns in Enforcing Ethereum Smart Contracts as a Rewarding Platform in Decentralized Learning (연합학습의 인센티브 플랫폼으로써 이더리움 스마트 컨트랙트를 시행하는 경우의 실무적 고려사항)

  • Rahmadika, Sandi;Firdaus, Muhammad;Jang, Seolah;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.321-332
    • /
    • 2020
  • Decentralized approaches are extensively researched by academia and industry in order to cover up the flaws of existing systems in terms of data privacy. Blockchain and decentralized learning are prominent representatives of a deconcentrated approach. Blockchain is secure by design since the data record is irrevocable, tamper-resistant, consensus-based decision making, and inexpensive of overall transactions. On the other hand, decentralized learning empowers a number of devices collectively in improving a deep learning model without exposing the dataset publicly. To motivate participants to use their resources in building models, a decent and proportional incentive system is a necessity. A centralized incentive mechanism is likely inconvenient to be adopted in decentralized learning since it relies on the middleman that still suffers from bottleneck issues. Therefore, we design an incentive model for decentralized learning applications by leveraging the Ethereum smart contract. The simulation results satisfy the design goals. We also outline the concerns in implementing the presented scheme for sensitive data regarding privacy and data leakage.