• Title/Summary/Keyword: 보안통신 API

Search Result 47, Processing Time 0.026 seconds

An Implementation of JTAG API to Perform Dynamic Program Analysis for Embedded Systems (임베디드 시스템 동적 프로그램 분석을 위한 JTAG API 구현)

  • Kim, Hyung Chan;Park, Il Hwan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.2
    • /
    • pp.31-42
    • /
    • 2014
  • Debugger systems are necessary to apply dynamic program analysis when evaluating security properties of embedded system software. It may be possible to make the use of software-based debugger and/or DBI framework if target devices support general purpose operating systems, however, constraints on applicability as well as environmental transparency might be incurred thereby hindering overall analyzability. Analysis with JTAG (IEEE 1149.1) debugging devices can overcome these difficulties in that no change would be involved in terms of internal software environment. In that sense, JTAG API can facilitate to practically perform dynamic program analysis for evaluating security properties of target device software. In this paper, we introduce an implementation of JTAG API to enable analysis of ARM core based embedded systems. The API function set includes the categories of debugger and target device controls: debugging environment and operation. To verify API applicability, we also provide example analysis tool implementations: our JTAG API could be used to build kernel function fuzzing and live memory forensics modules.

File Formats with a Multi-Layer Structure and API Design (다중 레이어 구조로 된 보안 파일 포맷 및 API 설계)

  • Park, Jong-Moon;Yoon, Jeong-Ho;Jo, Hyeon-Tae;Kim, Ki-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.123-127
    • /
    • 2012
  • Since the propagation of computers and Internet along with proliferation of smartphones rise, a large amount of data is being produced and modified daily. As the usage of data soars, a way of securely storing data emerged as a new problem. In this paper, saving big-data by using hierarchical data structure with multi-layer form, to come up with new security file format and API by applying encryption on each layers, is introduced. Moreover, we expect to see shown file format in this paper to be used in various fields.

  • PDF

A Packet encryption scheme and extension of Cryptoki for connectionless packet network (고속 패킷 통신을 위한 패킷 암호 스킴과 Cryptoki 확장 방안)

  • Ko, Haeng-Seok;Park, Sang-Hyun;Kwon, Oh-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.83-92
    • /
    • 2007
  • In connectionless packet network, if a sender encrypts packets by block chaining mode and send it to receiver, the receiver should decrypt packets in encrypted order that is not received order. Therefore, the performance and efficiency are lowered for crypto communication system. To solve this problem, we propose packet encryption scheme for connectionless packet network that can decrypt the packets independently, even if the received order of packets are changed or packets are missed. The scheme makes new IV(Initial Vector) using IV that created by key exchange process and salt that made by random number. We propose extended Cryptoki API that added packet encryption/decryption functions and mechanism for improving convenience and performance. We implement the scheme and get result that the performance increased about $1.5{\sim}l5.6$ times compare with in case of implementing using Cryptoki API in the test environment.

Malware API Classification Technology Using LSTM Deep Learning Algorithm (LSTM 딥러닝 알고리즘을 활용한 악성코드 API 분류 기술 연구)

  • Kim, Jinha;Park, Wonhyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.259-261
    • /
    • 2022
  • Recently, malicious code is not a single technique, but several techniques are combined and merged, and only important parts are extracted. As new malicious codes are created and transformed, attack patterns are gradually diversified and attack targets are also diversifying. In particular, the number of damage cases caused by malicious actions in corporate security is increasing over time. However, even if attackers combine several malicious codes, the APIs for each type of malicious code are repeatedly used and there is a high possibility that the patterns and names of the APIs are similar. For this reason, this paper proposes a classification technique that finds patterns of APIs frequently used in malicious code, calculates the meaning and similarity of APIs, and determines the level of risk.

  • PDF

BcN을 위한 secure QoS 및 보안 기술 동향

  • 전용희
    • Information and Communications Magazine
    • /
    • v.21 no.8
    • /
    • pp.107-121
    • /
    • 2004
  • 광대역 통합망(BcN: Broadband convergence Networks)이란 통신$.$방송$.$인터넷이 융합된 품질 보장형 광대역 멀티미디어 서비스를 언제 어디서나 끊임없이 안전하게 이용할 수 있는 차세대 통합네트워크를 말한다. 이를 위하여 BcN 전달망은 서비스 품질(QoS: Quality of Service) 보장, 고도의 통신망 관리 기능과 보안(Security) 기능, IPv6 주소체계의 수용을 통하여 다양한 서비스를 쉽게 창출할 수 있는 개방형 망구조(Open API)를 도입한 통신망으로 유선ㆍ무선ㆍ방송 등의 다양한 가입자망의 특성을 통합하여 수용해야 하며, 표준 인터페이스를 통해 다양한 응용서비스의 개발 및 이용 환경을 제공할 수 있어야 한다.(중략)

자바 보안과 암호

  • 조한진;이희규;김봉한;이재과
    • Information and Communications Magazine
    • /
    • v.17 no.3
    • /
    • pp.111-121
    • /
    • 2000
  • 인터넷의 발전과 함께 인터넷 환경에 적합하게 개발된 자바 언어는 독립적인 구조, 분산처리 능력, 그리고 이식성이 좋다는 특징을 가지고 있어, 국내외적으로 자바를 이용한 전자상거래 관련 기술의 개발이 활발하다, 그리고, 자바는 애플릿을 클라이언트에서 실행할 경우 발생할 수 있는 여러 가지 보안 문제에 노출되어 있기 때문에, 자바 개발자들은 JDK를 보안 문제에 중점을 두어 개발하고 있다. 한편, 보안 문제뿐만 아니라 암호에 관한 기술도 매우 중요시되고 있지만, 암호 및 인증 체계 기술은 미국에서 보유한 기술 중 인증기관 관련 기술로 미국 내에서 금수 기술로 분류되어, 미국과 캐나다를 제외한 세계 어느 지역에서도 기술 도입이 불가능한 상태이다. 이러한 이유로, 여러 기술 도입이 불가능한 상태이다. 이러한 이유로, 여러 기술 선진국에서는 Sun JCA의 구조에 바탕을 두고 Sun JCE와 호환되는 독자적인 JCE를 구현하기 위해 노력하고 있다. 본고에서는 JDK를 중심으로 자바 보안 모델과 암호 구조에 대하여 살펴본다. 2장에서는 자바의 보안 모델의 3요소에 대하여 알아보고, 3장에서는 여러 가지 보안 문제를 극복하려는 JDK 보안 구조의 변 ??대하여 살펴본다. 그리고 4장에서는 자바 보안 API에 대하여 자세히 살펴보며, 마지막으로 5장에서 결론을 맺는다.

  • PDF

생체인식기술

  • 김재성
    • TTA Journal
    • /
    • s.78
    • /
    • pp.69-76
    • /
    • 2001
  • 생체인식 분야는 IT 분야의 보안기술과 함께 발전속도가 빠른 분야 중에 하나로 상업적인 활성화와 이에 따른 사용자의 신뢰성을 확보하는 것이 무엇보다 중요하다. 이에 따라 서로 다른 생체인식 제품들의 상호호환성과 상호연동성을 고려한 개술개발을 위해 표준화된 생체인식 데이터와 API를 개발할 필요성이 크게 증가하였다. 국외의 경우 ANSI, NIST, IBIA, EU(European Union), AfB등의 기관을 통해 생체인식 제품들에 대한 표준을 연구하고 있으며 BioAPI, BAPI, HA-API 등과 같은 기술표준과 X9.84, CBEFF 등과 같은 보안기술 표준을 발표하였다. 그러나 2000년까지 국내에서는 인식 알고리즘에 대한 연구만 일부 학계 및 연구기관에 의해 진행되고 있었으며 표준화에 대한 연구는 전무한 상태였다. 2001년부터 2월 KBA(Korea Biometrics Association, 생체인식협의회)의 발족을 기점으로 KBA와 KISDA(Korea Information Security Agency, 한국정보보호진흥원)를 중심으로 생체인식 표준화에 대한 연구가 활기를 띄기 시작했다.

  • PDF

A Study on Contract Management Platform Based on Blockchain (블록체인 기반의 계약관리 플랫폼 연구)

  • Kim, Sunghwan;Kim, Younggon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.3
    • /
    • pp.97-103
    • /
    • 2019
  • Electronic contract systems are widely used to integrate and manage the contract management process based on the development of ICT technology. Recently, improvement methods using block chain technology are being studied. However, contract management systems have processing performance, security vulnerabilities, data entry, and service accessibility issues. In this paper, we propose a block - chain based contract management platform with block chain, smart contract, and Rest API. The suggested platform includes the RPBFT algorithm which solves the processing performance and security vulnerability of the existing consensus authentication algorithm, and the algorithm to prevent data entry and enhance transparency of participants. The block-chain-based contract management platform proposed in this paper provides a use environment with improved processing performance, security, reliability, and transparency, and can be used through API without burdening construction. Therefore, The effect can be expected.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

A Development of Analysis Tool and the Analysis of Vulnerabilities on the Program Source Code (프로그램 소스코드 취약성 분석 및 분석도구의 개발)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.27-34
    • /
    • 2004
  • The recent explosive use of the Internet and the development of computer communication technologies reveal serious computer security problem. Inspite of many studies on secure access to the system, generally, the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the Program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF