• Title/Summary/Keyword: Security Countermeasure

Search Result 380, Processing Time 0.024 seconds

Countermeasure for Detecting BAD USB based on Machine Recognition (기계 인지 기반 BAD USB 탐지 방안 연구)

  • Oh, Insu;Yim, Habin;Lee, Kyungroul;Yim, angbin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.45-46
    • /
    • 2017
  • 본 논문은 사람에 의하여 발생하는 패턴과 기계적으로 발생하는 패턴과의 차이점을 인지함으로써 BAD USB 탐지하는 방안을 제안한다. BAD USB는 펌웨어를 조작하여 악의적인 행위를 수행하는 공격으로, BAD USB를 탐지하기 위한 많은 연구가 진행되었지만, 펌웨어 내부에 존재하는 악성코드를 효과적으로 탐지하기에는 어려움이 존재한다. 따라서 본 논문에서는 사람에 의하여 나타나는 행위에 대한 패턴과 기계적으로 발생하는 패턴을 구분하여 악의적인 행위를 인지함으로써 BAD USB를 탐지하는 방안을 제안한다.

  • PDF

Countermeasure for Detecting IAT Hooking (IAT 후킹 탐지 방안에 대한 연구)

  • Yim, Habin;Oh, Insu;Lee, Kyungroul;Yim, Kangbin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.01a
    • /
    • pp.207-208
    • /
    • 2017
  • 악성코드는 매년 그 수가 증가하고 있으며, 악성코드의 공격기법이 지능적이고 복합적으로 진화함에 따라 이에 대한 분석과 대응이 요구된다. 하지만 일부 악성코드는 감염여부를 숨기기 위하여 분석에 대한 회피방법으로 루트킷을 통하여 방어자에 의한 악성코드의 코드 분석을 우회함으로써 은폐된 상태로 악의적인 공격을 수행한다. 따라서 본 논문에서는 유저레벨에서 IAT(Import Address Table)의 정보를 후킹하여 악성 행위를 수행하는 루트킷을 탐지하는 대응방안을 제안한다.

  • PDF

A Study on countermeasure for privacy in mobile office (모바일 오피스 개인정보 보호 방안에 대한 연구)

  • Park, Yongjoon;Lee, Yunjung
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.2
    • /
    • pp.178-188
    • /
    • 2015
  • The proliferation of devices such as tablets and smart phones, which are now used by many people in their daily lives, has led to a number of companies allowing employees to bring their own devices to work due to perceived productivity gains and cost savings. However, despite many advantage, security breaches (e.g., information leakage) can happen for various reasons (e.g., loss or theft of devices, and malicious code) and privacy breaches can happen by using personal devices for business. We should carefully scrutinize security threats in this area. We present the security threats analysis and the technical approach in this area, and discuss privacy threats and countermeasures.

A Study on the Security Technology of the Location based Tourism Information Service (위치 기반 관광 정보 서비스 보안 기술 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.2
    • /
    • pp.25-29
    • /
    • 2016
  • Owing to the change of economic trends, the importance of the tourism industry is growing more and more. In particular, the number of foreign tourists continues to increase and the type of tourists is being changed into FIT (Foreign Independent Traveler). Therefore it is an important issue to provide the effective information to foreign tourists. To solve these problems, a variety of IT technology is being used in the tourism information systems. Especially the location based tour information service is being emerged. This kinds of tourism information service is a type of LBS (Location Based Services). But if the security of the location based tourism information service is not guaranteed, it can lead to many dangers. In this paper, the trends of location based tourism information service are surveyed. Also the security threats and countermeasures for the location based tourism information service are analyzed. This paper suggests secret considerations for the location based tourism information service.

A Study on Security Threats and Countermeasure for WLAN Environment (무선랜 이용 환경별 보안위협 및 대응방안)

  • Park, Soon-Tai;Won, Yong-Geun;Baek, Jong-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1350-1353
    • /
    • 2010
  • 최근, 스마트폰 등 무선랜 이용가능 단말기의 출시와 저렴한 무선 AP(Access Point) 보급 확대로 무선랜 이용이 급속히 확대되고 있다. 그동안 국내 무선인터넷 환경은 이동통신사가 구축한 고비용 폐쇄적 3G 네트워크의 데이터 통신 위주로 이루어졌으며, 무선랜 이용은 일부 기업환경 및 호텔/식당 등의 고객용 무선랜, 개인용 무선랜 등으로 한정되어 사용되었다. 하지만 '10년 스마트폰의 폭발적인 확산으로 무선랜을 통해 빠르고 저렴하게 무선 인터넷을 사용할 수 있게 됨에 따라 가정, 공공시설 등에서 무선랜 구축/활용이 매우 증가하고 있다. 논문은 무선랜에 대한 물리적, 기술적, 관리적 보안위협을 살펴보고 구축, 관리, 이용 주체별 대응방안을 제시한다.

Analysis of Self-driving Environment Using Threat Modeling (위협 모델링을 이용한 자율 주행 환경 분석)

  • Min-Ju Park;Ji-Eun Lee;Hyo-Jeong Park;Yeon-sup Lim
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.77-90
    • /
    • 2022
  • Domestic and foreign automakers compete to lead the autonomous vehicle industry through continuously developing self-driving technologies. These self-driving technologies are evolving with dependencies on the connection between vehicles and other objects such as the environment of cars and roads. Therefore, cyber security vulnerabilities become more likely to occur in the self-driving environment, so it is necessary to prepare for them carefully. In this paper, we model the threats in autonomous vehicles and make the checklist to securely countermeasure them.

A Study of Countermeasures for Advanced Persistent Threats attacks by malicious code (악성코드의 유입경로 및 지능형 지속 공격에 대한 대응 방안)

  • Gu, MiSug;Li, YongZhen
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.37-42
    • /
    • 2015
  • Due to the advance of ICT, a variety of attacks have been developing and active. Recently, APT attacks using malicious codes have frequently occurred. Advanced Persistent Threat means that a hacker makes different security threats to attack a certain network of a company or an organization. Exploiting malicious codes or weaknesses, the hacker occupies an insider's PC of the company or the organization and accesses a server or a database through the PC to collect secrets or to destroy them. The paper suggested a countermeasure to cope with APT attacks through an APT attack process. It sought a countermeasure to delay the time to attack taken by the hacker and suggested the countermeasure able to detect and remove APT attacks.

  • PDF

A Study on the Security Evaluations and Countermeasure of Exposure Notification Technology for Privacy-Preserving COVID-19 Contact Tracing (COVID-19 동선 추적에서의 프라이버시 보호를 위한 Exposure Notification 기술에 대한 보안성 평가 및 대응 방안 연구)

  • Lee, Hojun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.929-943
    • /
    • 2020
  • Various methods are being presented to identify the movements of COVID-19 infected persons and to protect personal privacy at the same time. Among them, 'Exposure Notification' released by Apple and Google follows a decentralized approach using Bluetooth. However, the technology must always turn on Bluetooth for use, which can create a variety of security threats. Thus, in this paper, the security assessment of 'Exposure Notification' was performed by applying 'STRIDE' and 'LINDDUN' among the security threat modeling techniques to derive all possible threats. It also presented a new Dell that derived response measures with security assessment results and improved security based on them.

A Study on Risk Analysis Methode Using Case-Based Reasoning (사례기반 추론을 이용한 위험분석방법 연구)

  • Lee, Hyeak-Ro;Ahn, Seong-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.135-141
    • /
    • 2008
  • The risk enlargement of cyber infringement and hacking is one of the latest hot issues. To solve the problem, the research for Security Risk Analysis, one of Information Security Technique, has been activating. However, the evaluation for Security Risk Analysis has many burdens; evaluation cost, long period of the performing time, participants’ working delay, countermeasure cost, Security Management cost, etc. In addition, pre-existing methods have only treated Analyzing Standard and Analyzing Method, even though their scale is so large that seems like a project. the Analyzing Method have no option but to include assessors’ projective opinion due to the mixture using that both qualitative and quantitative method are used for. Consequently, in this paper, we propose the Security Risk Analysis Methodology which manage the quantitative evaluation as a project and use Case-Based Reasoning Algorithm for define the period of the performing time and for select participants.

Vulnerability Analysis of Insider Attack on TPM Command Authorization Protocol and Its Countermeasure (TPM 명령어 인가 프로토콜에 대한 내부자 공격 취약점 분석 및 대응책)

  • Oh, Doo-Hwan;Choi, Doo-Sik;Kim, Ki-Hyun;Oh, Soo-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.3
    • /
    • pp.1356-1366
    • /
    • 2011
  • The TPM(Trusted Platform Module) is a hardware chip to support a trusted computing environment. A rightful user needs a command authorization process in order to use principal TPM commands. To get command authorization from TPM chip, the user should perform the OIAP(Object-Independent Authorization Protocol) or OSAP(Object-Specific Authorization Protocol). Recently, Chen and Ryan alerted the vulnerability of insider attack on TPM command authorization protocol in multi-user environment and presented a countermeasure protocol SKAP(Session Key Authorization Protocol). In this paper, we simulated the possibility of insider attack on OSAP authorization protocol in real PC environment adopted a TPM chip. Furthermore, we proposed a novel countermeasure to defeat this insider attack and improve SKAP's disadvantages such as change of command suructures and need of symmetric key encryption algorithm. Our proposed protocol can prevent from insider attack by modifying of only OSAP command structure and adding of RSA encryption on user and decryption on TPM.