Articular impaction of olecranon fracture is associated with poor postoperative clinical outcome
K Alex Kim, Seung-Yong Sung, Yu-Seong Lee, T. Park, Eunju Lee, Sanghoon Jeon, Ji-Sup Kim
IF 4.6
The Bone & Joint Journal
Articular impaction in olecranon fractures is associated with worse postoperative outcomes, with inadequate impaction reduction contributing to increased step-off and poorer function. Achieving optimal impaction reduction and minimizing residual step-off are critical to improving clinical and radiological outcome.
6P Association between metabolic dysfunction-associated steatotic liver disease and breast cancer risk in Korean women: A nationwide population-based cohort study
JH Chin, J.A. Lee, H.S. Lee, Sanghoon Jeon, D.R. Kim, Y.J. Lee, S.Y. Bae, W.C. Park, C. H. Yoon
A Vehicle-in-the-Loop Simulation-Based Framework for Automotive Cybersecurity Evaluation
Bo-Sik Kang, Sanghoon Jeon
IF 3.6
IEEE Access
As connected and autonomous vehicle technology advances, in-vehicle communication networks have become increasingly exposed to cybersecurity threats due to their connectivity with external environments. In response, international regulations and standards, such as the UNR.155 and ISO/SAE 21434, have been reinforced, underscoring the need for systematic and rigorous security evaluations. However, cybersecurity experiments on public roads pose significant safety challenges, whereas legacy testbeds and software-only simulations often fail to capture the dynamic behavior of actual vehicles. This study proposes a vehicle-in-the-loop simulation (VILS)-based framework to address these limitations, enabling real-time integration between physical vehicles and virtual driving environments. By synchronizing control inputs and state feedback, the framework allows for safe, repeatable testing of diverse cyberattack scenarios under realistic conditions. The experimental results reveal that VILS captures physical responses and network-level anomalies across attack types, supporting comprehensive quantitative and qualitative assessments. The framework demonstrates high consistency and analytical precision across repeated trials. These results validate VILS as a practical and robust alternative for improving the accuracy and reliability of real-vehicle cybersecurity evaluations.
Articular impaction of olecranon fracture is associated with poor postoperative clinical outcome
K Alex Kim, Seung-Yong Sung, Yu-Seong Lee, T. Park, Eunju Lee, Sanghoon Jeon, Ji-Sup Kim
IF 4.6
The Bone & Joint Journal
Articular impaction in olecranon fractures is associated with worse postoperative outcomes, with inadequate impaction reduction contributing to increased step-off and poorer function. Achieving optimal impaction reduction and minimizing residual step-off are critical to improving clinical and radiological outcome.
6P Association between metabolic dysfunction-associated steatotic liver disease and breast cancer risk in Korean women: A nationwide population-based cohort study
JH Chin, J.A. Lee, H.S. Lee, Sanghoon Jeon, D.R. Kim, Y.J. Lee, S.Y. Bae, W.C. Park, C. H. Yoon
A Vehicle-in-the-Loop Simulation-Based Framework for Automotive Cybersecurity Evaluation
Bo-Sik Kang, Sanghoon Jeon
IF 3.6
IEEE Access
As connected and autonomous vehicle technology advances, in-vehicle communication networks have become increasingly exposed to cybersecurity threats due to their connectivity with external environments. In response, international regulations and standards, such as the UNR.155 and ISO/SAE 21434, have been reinforced, underscoring the need for systematic and rigorous security evaluations. However, cybersecurity experiments on public roads pose significant safety challenges, whereas legacy testbeds and software-only simulations often fail to capture the dynamic behavior of actual vehicles. This study proposes a vehicle-in-the-loop simulation (VILS)-based framework to address these limitations, enabling real-time integration between physical vehicles and virtual driving environments. By synchronizing control inputs and state feedback, the framework allows for safe, repeatable testing of diverse cyberattack scenarios under realistic conditions. The experimental results reveal that VILS captures physical responses and network-level anomalies across attack types, supporting comprehensive quantitative and qualitative assessments. The framework demonstrates high consistency and analytical precision across repeated trials. These results validate VILS as a practical and robust alternative for improving the accuracy and reliability of real-vehicle cybersecurity evaluations.
A Study on Behavior-Based Cybersecurity Training and Simulation Environment Construction for Nuclear System
수원대학교/정보보호학과, Gyeong-mi Noh, Redland Wellington Park, Sanghoon Jeon
Jouranl of Information and Security
정보통신기술의 발전으로 원자력시설과 같은 국가 핵심 기반시설이 사이버 공격의 위협에 더욱 노출되고 있다. 이러한 사 이버 공격은 방사성 물질 유출이나 발전소 운영 중단과 같은 치명적인 결과를 초래할 수 있다. 그러나 현재 시행되고 있는 사 이버보안 훈련 프로그램은 주로 도상훈련 방식에 의존하고 있어, 실시간 시스템 상호작용과 종합적인 대응 전략을 충분히 다 루지 못하는 한계를 지닌다. 본 연구는 이러한 한계를 극복하고 실질적인 대응 역량을 강화하기 위해 PC 기반 사이버보안 훈 련 모델을 제안한다. 제안된 훈련 모델은 Bad USB 기반 Human Interface Device (HID) 공격, Command Prompt Bomb 공격, Task Manager 조작 공격의 세 가지 시나리오를 활용하여 현실적인 사이버 위협을 모사한다. 또한, 탐지 및 분석, 격리, 제거 및 복구, 후속 조치의 사이버보안 단계별 훈련 절차를 설계하여, 참가자가 실제 보안 사고에 대응할 수 있는 능력을 학습할 수 있도록 구성하였다. PC 기반 훈련 모델은 범용적인 사이버보안 훈련 프로그램을 제공하며, 원자력시설을 포함한 주요 인프라 의 보안 체계를 강화하는 데 기여할 수 있다.
Performance Analysis of AES, RSA, and Hybrid-Based Database Encryption and Decryption
수원대학교 정보보호학과 학부생, E. Kim, Sanghoon Jeon
Jouranl of Information and Security
데이터베이스는 중요한 정보를 저장·관리하는 핵심 IT 자산이며, 이를 보호하기 위한 대표적인 기술 중 하나가 암호화 기 술이다. 본 연구에서는 AES, RSA, 그리고 두 방식을 결합한 하이브리드 암호 시스템을 구현하고, 데이터베이스(MySQL, SQLite)와 데이터 유형(텍스트, 이미지)에 따른 암·복호화 성능을 비교 및 분석하였다. 특히, 텍스트 데이터셋(FIFA, Top5) 및 이미지 데이터셋(GTSRB, Chest_xray)을 사용하여 데이터 특성과 크기에 따른 성능 차이를 실험적으로 평가하였다. 실험 결 과, AES는 모든 조건에서 가장 짧은 처리 시간과 낮은 메모리 사용량을 보였으며, 하이브리드 방식은 중간 수준, RSA는 가장 낮은 성능을 나타냈다. 데이터 유형별로는 텍스트가 이미지보다 일관되게 빠르고 경량이었고, 데이터베이스별로는 SQLite가 MySQL보다 전반적으로 우수했다. 이러한 경향은 알고리즘 구조, 데이터 처리 과정의 복잡성, DBMS의 동작 방식 차이에 기 인한다. 본 연구의 성능 비교 결과는 데이터베이스 보안 기능 구현 시 효율적인 암호화 방식 선택을 위한 근거를 제공하며, 제 안한 하이브리드 방식은 보안성과 성능의 균형을 위한 실질적 참고 자료가 될 수 있다.
Multi-Factor Authentication for In-Vehicle Secure OTA Protocol
H.T. Kim, Sanghoon Jeon
IF 3.6
IEEE Access
As advancements in vehicle electronics and intelligence accelerate, the number of electronic control units (ECUs) is rapidly increasing, thereby heightening the likelihood of errors and cyberattacks. Original equipment manufacturers (OEMs) are adopting over-the-air (OTA) updates to manage software and firmware remotely to counter these threats, . However, OTA updates pose critical security vulnerabilities, as the communication network is equally accessible to attackers. The single authentication architecture centered on the central gateway (CGW), commonly adopted in prior studies, has structural limitations that significantly reduce its defensive performance against internal network intrusions or CGW compromises. This study proposes a secure OTA protocol to overcome these limitaions by performing ECU-level multi-factor authentication and replacing the CGW-dependent architecture. The proposed approach mitigates the risk of single points of failure in centralized architectures by enabling each ECU to perform mutual authentication directly with the update server. Furthermore, it is designed to be implemented using low-cost security modules on resource-constrained ECUs. The experimental results show that the proposed protocol effectively defends against malicious internal updates while minimizing computational and memory overhead, confirming its applicability to real-world vehicular environments. These findings contribute to enhancing OTA security in the coming era of software-defined vehicles(SDVs).
Motion-induced error reduction for high-speed dynamic digital fringe projection system
Sanghoon Jeon, H. J. Lee, Jaesung Lee, B.H. Kang, Byung-Wook Jeon, Jun Young Yoon, Jae‐Sang Hyun
arXiv (Cornell University)
In phase-shifting profilometry (PSP), any motion during the acquisition of fringe patterns can introduce errors because it assumes both the object and measurement system are stationary. Therefore, we propose a method to pixel-wise reduce the errors when the measurement system is in motion due to a motorized linear stage. The proposed method introduces motion-induced error reduction algorithm, which leverages the motor's encoder and pinhole model of the camera and projector. 3D shape measurement is possible with only three fringe patterns by applying geometric constraints of the digital fringe projection system. We address the mismatch problem due to the motion-induced camera pixel disparities and reduce phase-shift errors. These processes are easy to implement and require low computational cost. Experimental results demonstrate that the presented method effectively reduces the errors even in non-uniform motion.
MQTree: Secure OTA Protocol Using MQTT and MerkleTree
Yunje Shin, Sanghoon Jeon
IF 3.5
Sensors
The escalating advancement in Software-Defined Vehicles (SDVs) necessitates a formidable strategy for firmware updates, where traditional methods often fall short of guaranteeing absolute integrity. Although decentralization has been explored in studies for firmware integrity verification using blockchain technology, it lacks comprehensive validation in the context of automotive over-the-air (OTA) updates. By recognizing the limitations of current practices and the partial validation of decentralized approaches, such as blockchain, in the automotive sector, our study introduces a novel mechanism for firmware over-the-air (FOTA) updates. This mechanism is grounded in the widely adopted message queuing telemetry transport (MQTT) protocol, integral to the Internet of Things (IoT) domain, and leverages Merkle tree-based blockchain verification to fortify the fidelity and efficiency of firmware updates. Our proposed solution not only prioritizes the stability crucial to automotive OTA updates but also ensures that performance is not compromised. This dual focus on reliability and efficiency represents a significant stride forward in the development of secure, scalable SDV firmware update protocols.
Motion-induced error reduction using velocity profiles in phase-shifting profilometry systems
Sanghoon Jeon, Jae‐Sang Hyun
Phase-shifting profilometry has limitations in that any motion during the capture process can introduce errors. In this paper, we propose a method to reduce motion-induced errors at the pixel level by leveraging the velocity profile of the linear stage and the pinhole model of the camera and the projector when the digital fringe projection system is in motion on a linear stage. Our approach utilizes only three fringe patterns, applying geometric constraints of the digital fringe projection system. It consists of camera pixel correction and phase shift error correction. Experimental results demonstrate that the proposed method effectively reduces motion-induced errors, resulting in improved quality.
Comparative Analysis and Validation of CSRF Defense Mechanisms in Spring Security and Apache Shiro
Jj-oh Kim, 수원대학교/정보보호학과, Da-yeon Namgoong, Sanghoon Jeon
Jouranl of Information and Security
본 논문은 웹 애플리케이션의 증가로 인해 소프트웨어 내 보안 취약점을 이용한 사이버 공격이 증가하고 있다. CSRF(Cros s-Site Request Forgery) 공격은 특히 웹 사용자와 개발자에게 심각한 위협으로, 사전에 예방해야하는 공격이다. CSRF는 사용 자의 동의 없이 비정상적인 요청을 통해 공격을 수행하는 기법으로, 이러한 공격으로부터 웹 애플리케이션을 보호하기 위한 방법은 매우 중요하다. 본 논문에서는 Spring Security와 Apache Shiro 두 프레임워크를 통해 CSRF 방어에 대한 성능을 비교 분석하고 검증하여, 효과적으로 적용 가능한 프레임워크를 제안한다. 실험 결과, 두 프레임워크 모두 CSRF 공격 방어에 성공 하였으나, Spring Security는 평균 2.55초로 Apache Shiro의 5.1초보다 더 빠르게 요청을 처리하였다. 이러한 성능 차이는 내부 처리 방식과 최적화 수준의 차이에서 비롯되었으며, 시스템 자원 사용 측면에서는 두 프레임워크 간에 차이가 없었다. 따라서 높은 성능과 효율적인 요청 처리가 요구되는 환경에서는 Spring Security가 더 적합하며, Apache Shiro는 개선이 필요하다. 이 결과는 웹 애플리케이션의 보안 아키텍처 설계 시 중요한 참고 자료로 활용되기를 기대한다.