• Title/Summary/Keyword: Secure System

Search Result 3,555, Processing Time 0.033 seconds

Security Audit System for Secure Router

  • Doo, So-Young;Kim, Ki-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1602-1605
    • /
    • 2005
  • An audit tracer is one of the last ways to defend an attack for network equipments. Firewall and IDS which block off an attack in advance are active way and audit tracing is passive way which analogizes a type and a situation of an attack from log after an attack. This paper explains importance of audit trace function in network equipment for security and defines events which we must leave by security audit log. We design and implement security audit system for secure router. This paper explains the reason why we separate general audit log and security audit log.

  • PDF

A Design and Implementation of Secure Messenger System for Secure message transmission (안전한 메시지 전송을 위한 Secure Messenger System 설계 및 구현)

  • 최상수;황성하;최용준;고정호;이강수;김소연
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.11a
    • /
    • pp.315-320
    • /
    • 2001
  • 최근 인터넷을 기반으로 하는 정보통신 인프라의 발달에 따라 다양한 서비스가 등장하였으며 이들 서비스들을 통합하여 제공하는 인스턴트 메시징 서비스가 등장하여 그 수요가 급증하고 있다. 그러나, 기존의 인스턴트 메시징 서비스들은 전송되는 메시지에 대하여 어떠한 보안장치도 제공되지 않아서 제 3자에 의한 개인정보 유출 및 차용이 문제점으로 부각되고 있다. 따라서 본 논문에서는 기존의 인스턴트 메시징 구조에 사용자 인증 기능 및 암호화 기능을 조합하여 안전한 메시지 전송을 위한 SMS(Secure Messenger System)를 설계하고 개발하였다.

  • PDF

The Trusted Path Authentication System between the User and the Secure OS (사용자와 시스템간의 신뢰경로가 보장되는 인증시스템)

  • Doo, So-Young;Ko, Jong-Gook;Un, Sung-Kyong;Kim, Jeong-Nyeo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10b
    • /
    • pp.961-964
    • /
    • 2001
  • 인증시스템은 보안운영체제시스템을 구성하기 위한 중요한 서브시스템 중의 하나이다. 본 논문에서는 사용자가 시스템에 접근하기 위해서 가장 먼저 거치게 되는 인증 절차 수행에 있어서 허가된 사용자의 접근만을 허용하고, 인증요청 메시지의 진위 여부를 확인시켜주는 기능과 사용자가 입력하는 중요 정보가 다른 사용자에게 유출되지 않도록 보장하는 기능을 추가한 다 단계 사용자 인증방법을 소개한다. 본 논문에서는 역할기반의 접근제어 시스템을 커널 내부에 구성하고, 사용자인증에 비밀번호와 하드웨어 장치인 스마트카드를 사용함으로써 강화된 사용자 인증 시스템을 구현하였다.

  • PDF

SeBo: Secure Boot System for Preventing Compromised Android Linux

  • Kim, Tong Min;Kim, Se Won;Yoo, Chuck
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.6
    • /
    • pp.335-343
    • /
    • 2015
  • As the usage of mobile devices becomes diverse, a number of attacks on Android also have increased. Among the attacks, Android can be compromised by flashing a new image of compromised Android Linux. In order to solve this problem, we propose SeBo (Secure Boot System) which prevents compromised Android Linux by guaranteeing secure boot environment for mobile devices based on ARM TrustZone architecture. SeBo checks the hash value of the Android Linux image before the Android Linux executes. SeBo detects all the attacks within 5 seconds. Moreover, since SeBo only trusts the Secure Bootloader from Secure World, SeBo can reduce the additional overhead of checking the Normal Bootloader from Normal World.

A Study on the Design of a Secure Client-Sever System (Secure 클라이언트-서버 시스템 설계에 관한 연구)

  • 이상렬
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.4
    • /
    • pp.91-96
    • /
    • 1998
  • In this paper we designed a secure client-server system to be able to protect messages between client and server using cryptography We authenticated each other using a asymmetric encryption algorithm on the logon procedure and minimized the time to encrypt and decrypt messages using a symmetric encryption algorithm on exchanging messages. We proved that it is possible to make a digital signature on our secure client-server system. And we suggested the efficient key management method to generate and distribute cryptograpic key securely.

  • PDF

Synchronization and Secure Communication Application of Chaos Based Malasoma System (카오스 기반 Malasoma 시스템의 동기화 및 보안 통신 응용)

  • Jang, Eun-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.747-754
    • /
    • 2017
  • Chaos-based secure communication systems are alternative of standard spread-spectrum systems that enable spreading the spectrum of the information signals and encrypting information signals with simple and inexpensive chaotic circuitry. In secure communication area, like Lorenz, Chua, Rossler, Duffing etc, classical systems are widely used. Malasoma chaotic system is topologically simple but their dynamical behaviors are non-linear synchronization and secure communication applications has not seen in paper. This paper aims for introducing a new chaotic system which is able to use as alternative to classical chaotic systems into secure communication fields. In addition, this new model simulates a synchronous communication system using P-C (Pecora-Carroll) method by verifying security with chaos signal through simulation. Modelling, synchronization and secure communication applications of Malasoma are realized respectively in MATLAB-Simulink environment. Retrieved results show that this novel chaotic system is able to use in secure communication fields.

The Blocking of buffer overflow based attack for Linux kernel (리눅스 시스템의 버퍼 오버플로우 공격 대응 기법)

  • Kim, Jeong-Nyeo;Jeong, Gyo-Il;Lee, Cheol-Hun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.385-390
    • /
    • 2001
  • In this paper, we describe a blocking method of buffer overflow attack for secure operating system. Our team developed secure operating system using MAC and ACL access control added on Linux kernel. We describe secure operating system (SecuROS) and standardized Secure utility and library. A working prototype able to detect and block buffer overflow attack is available.

  • PDF

The ISDF Framework: Towards Secure Software Development

  • Alkussayer, Abdulaziz;Allen, William H.
    • Journal of Information Processing Systems
    • /
    • v.6 no.1
    • /
    • pp.91-106
    • /
    • 2010
  • The rapid growth of communication and globalization has changed the software engineering process. Security has become a crucial component of any software system. However, software developers often lack the knowledge and skills needed to develop secure software. Clearly, the creation of secure software requires more than simply mandating the use of a secure software development lifecycle; the components produced by each stage of the lifecycle must be correctly implemented for the resulting system to achieve its intended goals. This study demonstrates that a more effective approach to the development of secure software can result from the integration of carefully selected security patterns into appropriate stages of the software development lifecycle to ensure that security designs are correctly implemented. The goal of this study is to provide developers with an Integrated Security Development Framework (ISDF) that can assist them in building more secure software.

Efficient Techniques to Secure User Data in the Secure OS for a Multi-user Environment (다중 사용자 환경을 위한 보안운영체제의 효율적인 사용자 자원 보호 방법)

  • Ahn, Sun-Il;Han, Sang-Yong
    • The KIPS Transactions:PartC
    • /
    • v.12C no.7 s.103
    • /
    • pp.999-1006
    • /
    • 2005
  • The Secure OS is an operating system which adds security functions to the existing operating system, in order to secure a system from sorority problems originated from inherent frailty of applications or operating systems. With the existing Secure Oses for it is difficult to set an effective security policy securing personal resources in a multi-user environment system. To solve this problem in this paper we present two Techniques to secure user data efficiently in the RBAC-based Secure OS for a multi-user environment. Firstly we utilizes object's owner information in addition to object's filename. Secondly we make use of meta symbol('$\ast$'), which is able to describe multiple access targets. In addition this paper gives some examples to show advantages from these techniques. And these features are implemented in an solaris-based Secure OS called Secusys.