• Title/Summary/Keyword: Backdoor

Search Result 27, Processing Time 0.026 seconds

Development of the FMEA-based Backdoor Transaction Improvement Model (FMEA를 활용한 뒷문거래 개선모델 개발)

  • Ryou, Sungkook;Kim, Sunho;Kim, Chongman
    • Journal of the Korea Safety Management & Science
    • /
    • v.21 no.4
    • /
    • pp.7-15
    • /
    • 2019
  • This paper proposes the FMEA-based model to avoid backdoor transactions when purchasers select suppliers for products and services. In the model, backdoor transactions consist of two categories: backdoor selling and maverick buying. Both of which influence negative effects on cost savings due to not only uncompetitive advantage but also unusable purchasing leverage by unethical and misbehavior of purchase requestors. For the risk evaluation based on FMEA, three and five risk types of backdoor selling and maverick buying are identified respectively. Current risk priority numbers(RPN) based on those risk types are calculated by three categories: occurrence, detection and severity. Six risk mitigation strategies and fourteen mitigation tactics are identified to improve current RPN. In order to validate the model, questionnaires are collected from fifteen companies and statistically analyzed. The analysis result shows that the model reduces backdoor transaction risks and has no differences in reduction of backdoor transaction risks regardless of the type of purchasing organization units and existence of purchasing procedures in the organization.

A Study on Intrusion Protection Techniques against Linux Kernel Backdoor (리녹스 커널 백도어 침업에 대한 차단 기법 연구)

  • Kim, Jin-Taek;Kho, Jeong-Ho;Hong, Min-Seok;Son, Choul-Woong;Park, Beom;Lee, Do-Won;Lee, Geuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.201-207
    • /
    • 2009
  • As the existing backdoor worked at user mode, which is application mode, it was possible to check the existence of backdoor by the integrity check of system file. However, for the backdoor using kernel module, it is impossible to check its existence by the integrity check of system file. Even various programs were presented to protect this LKM Kernel backdoor, there is limitation in protection as they examine the changes on the system Call Table. This study, recognizing the danger of invasion through such LKM Kernel backdoor, will provide alternative for the limitation which the existing integrity check couldn't prevent intrusion through Kernel backdoor.

  • PDF

A Study of Action Research Analysis Methods Model of Backdoor Behavior based on Operating Mechanism Diagnosis (동작 메커니즘 진단을 기반으로 한 백도어(backdoor) 행동분석 방법 모델 연구)

  • Na, SangYeob;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.17-24
    • /
    • 2014
  • Form of backdoor penetration attacks "trapdoor" penetration points to bypass the security features and allow direct access to the data. Backdoor without modifying the source code is available, and even code generation can also be modified after compilation. This approach by rewriting the compiler when you compile the source code to insert a specific area in the back door can be due to the use of the method. Defense operations and the basic structure of the backdoor or off depending on the nature of the damage area can be a little different way. This study is based on the diagnosis of a back door operating mechanism acting backdoor analysis methods derived. Research purposes in advance of the attack patterns of malicious code can respond in a way that is intended to be developed. If we identify the structures of backdoor and the infections patterns through the analysis, in the future we can secure the useful information about malicious behaviors corresponding to hacking attacks.

Design and Implementation of the Linux Kernel Backdoor Intruder Tracing-Response System (리눅스 커널 백도어 침입자 추적대응시스템 설계 및 구현)

  • Jeon, Wan-Keun
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.43-50
    • /
    • 2005
  • This paper is about the method that chases the Linux kernel backdoor intruder and copes with the kernel backdoor attack. We have a limit to trace the hacker with the current log analysing method because the hacker generally removes the log file and use the forge IP information. I propose the solution to solve the problem with the DeFor system. Through the restoration of the deleted log file, analysis of it and full HDD image, promptly quick response, it is possible to trace hacker spot and reduce hacking damage.

  • PDF

Influence of YouTube Influencers' Characteristics on Consumer Response after the Controversy over 'Backdoor Advertisement' (유튜브 인플루언서의 정보원 특성이 뒷광고 논란 이후의 소비자 반응에 미치는 효과 연구)

  • Yu, Eun-Ah;Choi, Ji-Eun
    • Asia-Pacific Journal of Business
    • /
    • v.13 no.1
    • /
    • pp.141-152
    • /
    • 2022
  • Purpose - This study attempts to explore the factors that affect the consumer's response to the influencer's "backdoor advertisement" which has been a social media controversy recently. Accordingly, this study focuses on the importance of the information source's characteristics in influencer marketing, and demonstrates the impact of influencer credibility, attractiveness, and expertise on consumer responses after the influencer's sponsorship controversy. Design/methodology/approach - To this end, a study was conducted on adults who subscribed to one or more channels of influencers, and a virtual newspaper article was used in the survey. 196 sample data were collected and SPSS PROCESS Macro was used for data analysis. Findings - As a result, there was a negative impact on the credibility of the influencer which carried over to a negative reception of their shared content, while the attractiveness of the influencer had a positive impact on the reception of their shared content, even after the controversy over the influencer's backdoor advertisement. Research implications or Originality - This study contributes to the expansion of research on influencer marketing. Also, it provides insight into understanding and interpreting the phenomenon of influencers' backdoor advertisements and consumer reactions.

A Study for Detection of the Kernel Backdoor Attack and Design of the restoration system (커널 백도어 공격 탐지 및 복구시스템 설계에 관한 연구)

  • Jeon, Wan-Keun;Oh, Im-Geol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.3
    • /
    • pp.104-115
    • /
    • 2007
  • As soon as an intrusion is detected by kernel backdoor, the proposed method can be preserve secure and trustworthy evidence even in a damaged system. As an experimental tool, we implement a backup and analysis system, which can be response quickly, to minimize the damages. In this paper, we propose a method, which can restore the deleted log file and analyze the image of a hard disk, to be able to expose the location of a intruder.

  • PDF

Study of Hardware AES Module Backdoor Detection through Formal Method (정형 기법을 이용한 하드웨어 AES 모듈 백도어 탐색 연구)

  • Park, Jae-Hyeon;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.739-751
    • /
    • 2019
  • Security in embedded devices has become a significant issue. Threats on the sup-ply chain, like using counterfeit components or inserting backdoors intentionally are one of the most significant issues in embedded devices security. To mitigate these threats, high-level security evaluation and certification more than EAL (Evaluation Assurance Level) 5 on CC (Common Criteria) are necessary on hardware components, especially on the cryptographic module such as AES. High-level security evaluation and certification require detecting covert channel such as backdoors on the cryptographic module. However, previous studies have a limitation that they cannot detect some kinds of backdoors which leak the in-formation recovering a secret key on the cryptographic module. In this paper, we present an expanded definition of backdoor on hardware AES module and show how to detect the backdoor which is never detected in Verilog HDL using model checker NuSMV.

Practical Malware Development And Analysis Method (실전 악성코드 개발 및 분석 방법)

  • Kim, Kyung-min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.434-437
    • /
    • 2017
  • After the first malware, the brain virus, was founded in 1986, various types of malwares have been created Including worm, dropper, trojan, backdoor, rootkit and downloader. Especially in recent years, driver-type malware have made then more difficult to analyze. therefore, malware analyst require competitive skills. To analyze malware well, you need to know how it works and have to do it by yourself. So in this paper, we develop the dropper, backdoor, trojan, rootkit and driver similar to malware distributed in the real world. It shows the execution behavior on the virtual environment system We propose a method to analyze malware quickly and effectively with static analysis and dynamic analysis.

  • PDF

Detection of Loadable Kernel Module Rootkit (Loadable Kernel Module Rootkit 탐지에 관한 연구)

  • Lee, Kye-Chan;Wee, Kyu-Bum
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.2133-2136
    • /
    • 2003
  • 해커들은 공격당한 시스템에서 공격자의 흔적을 숨기는 많은 테크닉을 오랫동안 개발해 왔다. 자신의 모습을 감추고 보다 용이한 재침입을 위해, 최근의 백도어(Backdoor)는 커널(Kenel) 구조와 코드 자체를 변경할 수 있는 기능을 가지고 있어서, 우리는 더 이상 커널 자체를 신뢰할 수 없게 되었다. 이 논문에서는 LKM(Loadable Kernel Module) Rootkit에 대한 체계적인 분석을 통해 이에 대한 보다 향상된 대응책을 찾고자 한다.

  • PDF

The analysis of value chains for the chestnut industry in Chungcheongnam-do

  • Lee, Bo-Hwi;Ji, Dong-Hyun;Kang, Kil-Nam;Kim, Se-Bin
    • Korean Journal of Agricultural Science
    • /
    • v.45 no.2
    • /
    • pp.298-307
    • /
    • 2018
  • The aim of this study was to enhance the value of the chestnut industry by analyzing the value chain structure. Based on the value chain theory, it is divided into primary activities and support activities. Thus, in total, 27 subjects from Gongju, Buyeo, and Cheongyang were interviewed and self-administered questionnaire. Regarding the value chain structure of the chestnut industry, the primary activities consisted of production followed by cultivation and storing, sorting and packaging, transportation and marketing sales. The support activities were divided into production infrastructure, policy, R&D, and systematization. The primary activities are able to maximize profits through cost reductions. The production was divided into general and environmentally friendly cultivation. Depending on the labor force, it is family-centered labor. However, the installation of harvest nets depends on a hired labor force (40 - 60%) such that it would be necessary to have a mechanized harvest to replace the manpower for the cost reduction. Transportation, marketing sales, and backdoor selling (38.1%) were higher than the existing channels (31.0%) using the National Agricultural Cooperative Federation. The enhancement of value could be created by maximizing profits through the reinforcement of the links between each subject. The production showed strong connections with cultivation/storing, sorting/packing, and backdoor selling and the National Forestry Cooperative Federation. The processing stage is a very simple structure, it would be necessary to have R&D and to support promotions, infrastructure, machines, and sales increases, which should be expanded by connections with other industries like the food industry.