• Title/Summary/Keyword: 공격 모델

Search Result 857, Processing Time 0.026 seconds

Key Recovery Algorithm for Randomly-Decayed AES Key Bits (랜덤하게 변형된 AES 키 비트열에 대한 키 복구 알고리즘)

  • Baek, Yoo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.327-334
    • /
    • 2016
  • Contrary to the common belief, DRAM which is used for the main memory of various computing devices retains its content even though it is powered-off. Especially, the data-retaining time can increase if DRAM is cooled down. The Cold Boot Attack, a kind of side-channel attacks, tries to recover the sensitive information such as the cryptographic key from the powered-off DRAM. This paper proposes a new algorithm which recovers the AES key under the symmetric-decay cold-boot-attack model. In particular, the proposed algorithm uses the strategy of reducing the size of the candidate key space by testing the randomness of the extracted AES key bit stream.

Application of Machine Learning Techniques for the Classification of Source Code Vulnerability (소스코드 취약성 분류를 위한 기계학습 기법의 적용)

  • Lee, Won-Kyung;Lee, Min-Ju;Seo, DongSu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.735-743
    • /
    • 2020
  • Secure coding is a technique that detects malicious attack or unexpected errors to make software systems resilient against such circumstances. In many cases secure coding relies on static analysis tools to find vulnerable patterns and contaminated data in advance. However, secure coding has the disadvantage of being dependent on rule-sets, and accurate diagnosis is difficult as the complexity of static analysis tools increases. In order to support secure coding, we apply machine learning techniques, such as DNN, CNN and RNN to investigate into finding major weakness patterns shown in secure development coding guides and present machine learning models and experimental results. We believe that machine learning techniques can support detecting security weakness along with static analysis techniques.

Whitelist-Based Anomaly Detection for Industrial Control System Security (제어시스템 보안을 위한 whitelist 기반 이상징후 탐지 기법)

  • Yoo, Hyunguk;Yun, Jeong-Han;Shon, Taeshik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.641-653
    • /
    • 2013
  • Recent cyber attacks targeting control systems are getting sophisticated and intelligent notoriously. As the existing signature based detection techniques faced with their limitations, a whitelist model with security techniques is getting attention again. However, techniques that are being developed in a whitelist model used at the application level narrowly and cannot provide specific information about anomalism of various cases. In this paper, we classify abnormal cases that can occur in control systems of enterprises and propose a new whitelist model for detecting abnormal cases.

Determinant Factors of Innovation Resistance of Social Media (소셜미디어 혁신저항 결정요인에 관한 연구)

  • Jeong, Hwa-Seob
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.6
    • /
    • pp.158-166
    • /
    • 2013
  • This study gave attention to the people who has resistance of the social media that tens to be the use as innovations. Therefore, this study examined the determinant factors of psychological resistance of the social media such as Twitter focused on students as none-users of social media. Total of 268 none-users participated in this study. The results were as follows. First, relative advantage influenced negatively on innovation resistance. Second, perceived complexity influenced significantly not on innovation resistance. Third, perceived risk influenced positively on innovation resistance. Therefore, social media related to social relationship should improve relative advantage, the other way, decrease perceived risk such as defamation and personal attack.

BCC Based Mobile WIMAX Initial Network Entry with Improved Security (보안성이 강화된 타원곡선 암호 기반의 Mobile WIMAX 초기 진입 구간)

  • Choi, Do-Hyun;Park, Jung-Oh;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1305-1314
    • /
    • 2011
  • Initial entry section has vulnerability which exposes plain text parameter in Mobile WIMAX environment which is the 4th generation technology. Each node message need to be encrypted to prevent the third party attack or message leakage. In this paper, we propose Mobile WIMAX initial entry section encryption using Elliptic Curve Cryptosystem. We have compared proposed model with existing model using OPNET simulator tool. He delay rate has increased little bit in initial entry section than before after the comparison, but it has shown more effective in average delay and throughput than encryption applied other existing model.

3D Animation Watermarking Using Position Interpolator (위치보간기를 이용한 3D 애니메이션 워터마킹)

  • Bae, Sung-Ho;Lee, Suk-Hwan;Kim, Jung-Hyun;Kwon, Ki-Ryong;Lee, Eung-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3C
    • /
    • pp.287-296
    • /
    • 2007
  • 3D keyframe animation is used widely in 3D graphics for real-time animation. This is a method that registers the animated key values in the important several frames among the entire frames and generates the rest frame by interpolator using the registered key values. This paper proposed the watermarking for 3D keyframe animation using PositionInterpolator. The proposed algorithm selects randomly the embedding meshes, which are transform nodes among the entire hierarchical structure. Then the watermark is embedded into keyValues of PositionInterpolator in selected transform node. Experimental results verified that the proposed algorithm has the robustness against geometrical attacks and timeline attacks.

A Randomness Test by the Entropy (Entropy에 의한 Randomness 검정법)

  • 최봉대;신양우;이경현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1991.11a
    • /
    • pp.105-133
    • /
    • 1991
  • 본 논문에서는 임의의 이진 난수발생기의 source가 $BMS_{p}$ 이거나 M-memory를 갖는 마르코프연쇄로 모델화 되었을 경우에 비트당 entropy와 관련이 있는 새로운 randomness에 관한 통계적 검정법을 제안한다. 기존에 알려진 이진 난수발생기의 randomness검정법이 0또는 1의 분포의 편향성(bias)이나 연속된 비트간의 상관성(correlation)중의 한 종류만의 non-randomness를 추적해낼 수 있는 반면에 새로운 검정법은 위의 두가지 검정을 통과하였을 때 암호학적으로 중요한 측도인 비트당 entropy 를 측정하여 암호학적인 약점을 검정할 수 있다. 또한 대칭(비밀키) 암호시스템의 통계적 결점을 바탕으로 하여 키를 찾는 공격자의 최적 전략( optimal strategy)문제를 분석하여 이 최적 전략이 이진 수열의 비트당 entropy와 밀접한 관계가 있음을 보이고 이 비트당 entropy와 관련이 있는 새로운 통계량을 도입하여 이진 난수 발생기의 source의 이진수열이 다음 3가지 경우, 즉, i.i.d. symmetric인 경우, $BMS_{p}$ 인 경우, M-memory를 갖는 마르코프연쇄인 경우의 각각에 대하여 특성을 조사하고 새로운 통계량의 평균과 분산을 구한다. 이때 구한 새로운 통계량은 잘 알려진 중심 극한 정리에 의하여 근사적으로 정규분포를 따르므로 위의 평균과 분산을 이용하여 스트림 암호시스템에서 구성요소로 많이 사용되는 몇 몇 간단한 이진 난수 발생기에 적용하여 통계적 검정을 실시함으로써 entropy 관점의 검정법이 새로운 randomness 검정법으로 타당함을 보인다.

  • PDF

Guidance Law of Missiles for Control Impact-Time-and-Angle by Flight Path Angle in Three Dimensional Space (3차원 공간에서의 비행 경로각을 이용한 비행시간 및 충돌각 제어 유도법칙)

  • Jin, Sheng-Hao;Lee, Chun-Gi;Yang, Bin;Hwan, Chung-Won;Park, Seung-Yub
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.8-15
    • /
    • 2012
  • This paper on the assumption that the target is stationary and the velocity of missile is fixed value. In three dimensional space. Using flight path angle to simultaneous control impact-time-and-angle base on a homing guidance law. The independent variable in the nonlinear engagement model is the flight path angle of the missile. The propose homing guidance law can see the controllability of impact-time-and-angle. And also can see the processing of the missile arrive at the target. It is applied to several salvo attack scenarios. The performance of the proposed guidance law is verified by simulations.

Method to Obtain Asymmetric Authenticated Key Exchange Protocols from Symmetric Ones (대칭형 인증 및 키 교환 프로토콜을 이용한 비대칭형 프로토콜의 설계 기법)

  • 양대헌
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.179-187
    • /
    • 2004
  • Password authenticated key exchange protocols for the symmetric model are easier to design, analyze and are more efficient than ones for the asymmetric model, but they are most likely to be broken by server's compromise. Though the protocols with provable security for the asymmetric model such as PAK-X and SNAPI-X are introduced, they need large amount of computation compared with the standard Diffie-Hellman key exchange. We present a systematic and efficient way to transform password authenticated key exchange protocols for the symmetric model into protocols for the asymmetric model. Thus, an efficient protocol for the asymmetric model can be constructed by a systematic protocol with low computation.

The Scheme for Generate to Active Response Policy in Intrusion Detection System (침입 탐지 도구에서 능동 대응 정책 생성 방안)

  • Lee Jaw-Kwang;Paek Seung-Hyun;Oh Hyung-Geun;Park Eung-Ki;Kim Bong-Han
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.151-159
    • /
    • 2006
  • This paper studied active response policy generation scheme in intrusion detection system. We considered seven requirements of intrusion detection system for active response with components as the preceding study We presented the scheme which I can generate signature with a base with integrate one model with NIDS and ADS. We studied detection of the Unknown Attack which was active, and studied scheme for generated to be able to do signature automatically through Unknown Attack detection.

  • PDF