• Title/Summary/Keyword: Software countermeasures

Search Result 64, Processing Time 0.027 seconds

Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher

  • Marpaung, Jonathan A.P.;Ndibanje, Bruce;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.4
    • /
    • pp.237-245
    • /
    • 2014
  • In this study, software-based countermeasures against a side-channel cryptanalysis of the Rabbit stream cipher were developed using Moteiv's Tmote Sky, a popular wireless sensor mote based on the Berkeley TelosB, as the target platform. The countermeasures build upon previous work by improving mask generation, masking and hiding other components of the algorithm, and introducing a key refreshment scheme. Our contribution brings improvements to previous countermeasures making the implementation resistant to higher-order attacks. Four functional metrics, namely resiliency, robustness, resistance, and scalability, were used for the assessment. Finally, performance costs were measured using memory usage and execution time. In this work, it was demonstrated that although attacks can be feasibly carried out on unprotected systems, the proposed countermeasures can also be feasibly developed and deployed on resource-constrained devices, such as wireless sensors.

A Study on the Globalization Strategy of SW Industry in Gangwon Province (강원도 SW산업의 글로벌화전략에 관한 연구)

  • Eum, Kwang-Yeol;Hong, Jong-Min
    • International Commerce and Information Review
    • /
    • v.10 no.3
    • /
    • pp.437-458
    • /
    • 2008
  • In these days the global software market is experiencing diastrophism due to globalization, convergence, and the spread of web 2.0. In particular, today"s global economy has entered the so-called "Globalization 3.0" era, and the world is evolving into a flat world where labor, capital, and resources are moving freely. In this rapidly changing global economy, the growth of the Korean economy is in a state of continuous decline. Particularly software industry is also suffering continuously slow growth due to market saturation and low service earning, which require urgent countermeasures. Therefore, the purpose of this study is: 1) to analyze the current industrial condition of the software industry, which have special characteristics differ from manufacturing industry; and 2) to analyze the major obstacles of local companies working in the software industry in order to cope with the recent changes in the global market environment and 3) to draw out the strategy for the domestic software industry in gangwon province in order to promote local software industry and to achieve globalization.

  • PDF

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.

Secure Hardware Implementation of ARIA Based on Adaptive Random Masking Technique

  • Kang, Jun-Ki;Choi, Doo-Ho;Choi, Yong-Je;Han, Dong-Guk
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.76-86
    • /
    • 2012
  • The block cipher ARIA has been threatened by side-channel analysis, and much research on countermeasures of this attack has also been produced. However, studies on countermeasures of ARIA are focused on software implementation, and there are no reports about hardware designs and their performance evaluation. Therefore, this article presents an advanced masking algorithm which is strong against second-order differential power analysis (SODPA) and implements a secure ARIA hardware. As there is no comparable report, the proposed masking algorithm used in our hardware module is evaluated using a comparison result of software implementations. Furthermore, we implement the proposed algorithm in three types of hardware architectures and compare them. The smallest module is 10,740 gates in size and consumes an average of 47.47 ${\mu}W$ in power consumption. Finally, we make ASIC chips with the proposed design, and then perform security verification. As a result, the proposed module is small, energy efficient, and secure against SODPA.

The Causal Relationship between Information Security Countermeasures and Information System Misuse (정보보안대책과 정보시스템 오남용과의 인과적 관계)

  • Lee, Joontaik;Kim, Sanghoon
    • Journal of Information Technology Services
    • /
    • v.14 no.4
    • /
    • pp.81-104
    • /
    • 2015
  • Intentional information systems (IS) misuse is a serious problem in many organizations. This study aims at developing the theoretical framework of deterring IS misuse on the basis of Nagin's General Deterrence Theory (GDT) which is very famous in the area of socio-criminology. Applying GDT to the IS misuse situation could be reasoned that the perceived certainty and the perceived severity of sanctions associated with committing IS misuse have positive impact on deterring the deviant behaviors. Also, these two constructs (certainty of sanctions and severity of sanctions) could be inferred to be influenced by the four types of IS security countermeasures (security policies, security awareness program, monitoring practices and preventive security software) derived through critically reviewing IS security-relevant literature. The proposed research model and ten hypotheses were empirically analysed using structural equation modelling with the data collected by conducting a questionnaire survey of staff members in business organizations in Korea. As a result, it was found that five ones of ten hypotheses were supported. It is thought that this study makes theoretical contribution to expanding research area of IS security and also has strong implications for IS security management practices within organizations.

Countermeasures against Cyber terror in Korea (사이버테러의 현황과 대책에 관한 연구)

  • An, Chang-Hoon
    • Korean Security Journal
    • /
    • no.5
    • /
    • pp.211-241
    • /
    • 2002
  • Koreans are the most avid Internet surfers in the world according to Nielson/NetRatings(Reuters, August 2001) and most Internet connections are made through high-speed connections like Digital Subscriber Lines (DSLs). The result of such internet fervor is a nation that is fertile in both hackers and software companies(over 200 in the field of network security alone). However, by-product of Internet activity is cyber crime and the need to protect innocent users from the dangers of cyber criminals and cyber-terrorists be they are individuals or organized groups. Hence the Cyber Terror Response Team (CTRT) was organized in late 2000 with the mandate to fulfill that role. In these contexts, this study analyzes the actual conditions of cyber terror and suggests the countermeasures against cyber terror in Korea.

  • PDF

The Effect of Managerial Information Security Intelligence on the Employee's Information Security Countermeasure Awareness (경영진의 정보보안 지능이 조직원의 보안대책 인식에 미치는 영향)

  • Jin Young Han;Hyun-Sun Ryu
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.137-153
    • /
    • 2016
  • Organizations depend on smart working environments, such as mobile networks. This development motivates companies to focus on information security. Information leakage negatively affects companies. To address this issue, management and information security researchers focus on compliance of employees with information security policies. Countermeasures in information security are known antecedents of intention to comply information security policies. Despite the importance of this topic, research on the antecedents of information security countermeasures is scarce. The present study proposes information security intelligence as an antecedent of information security countermeasures. Information security intelligence adapted the concept of safety intelligence provided by Kirwan (2008). Information security intelligence consists of problem solving skills, social skills, and information security knowledge related to information security. Results show that problem solving skills and information security knowledge have positive effects on the awareness of employees of information security countermeasures.

Open Source Vulnerabilities Analysis and Countermeasures (오픈 소스 취약점 분석과 대응 방안)

  • Ryu, Seung-Min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.149-151
    • /
    • 2019
  • 오픈소스 활용이 증가함에 따라 같이 증가하는 보안 위험성에 대한 문제점을 제시하고자 한다. 오픈소스 활용의 생산성 향상과 비용 절감 대비 보안 취약점이 따르는 문제를 분석 하고자 한다. 본 논문에서는 널리 알려진 오픈소스의 취약점과 이를 해결할 방법에 대해서 소개하고자 한다. 오픈소스의 취약점 공격 방법과 해결 방안을 제시하고 이를 해결할 분석 도구를 소개하는 것을 목표로 한다.

Analysis of Traffic Card Big Data by Hadoop and Sequential Mining Technique (하둡과 순차패턴 마이닝 기술을 통한 교통카드 빅데이터 분석)

  • Kim, Woosaeng;Kim, Yong Hoon;Park, Hee-Sung;Park, Jin-Kyu
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.4
    • /
    • pp.187-196
    • /
    • 2017
  • It is urgent to prepare countermeasures for traffic congestion problems of Korea's metropolitan area where central functions such as economic, social, cultural, and education are excessively concentrated. Most users of public transportation in metropolitan areas including Seoul use the traffic cards. If various information is extracted from traffic big data produced by the traffic cards, they can provide basic data for transport policies, land usages, or facility plans. Therefore, in this study, we extract valuable information such as the subway passengers' frequent travel patterns from the big traffic data provided by the Seoul Metropolitan Government Big Data Campus. For this, we use a Hadoop (High-Availability Distributed Object-Oriented Platform) to preprocess the big data and store it into a Mongo database in order to analyze it by a sequential pattern data mining technique. Since we analysis the actual big data, that is, the traffic cards' data provided by the Seoul Metropolitan Government Big Data Campus, the analyzed results can be used as an important referenced data when the Seoul government makes a plan about the metropolitan traffic policies.

Development of Media Processing Board for Multi-Party Voice and Video Telephony using Open Source Software (공개소프트웨어 기반 다자간 음성 및 영상통화용 미디어처리보드 개발)

  • Song, HyeongMin;Kwon, JaeSik;Kim, JinHwan;Kim, DongGil
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.5
    • /
    • pp.105-113
    • /
    • 2019
  • Korean military uses 'Tactical information communication network' to exchange information between units. In this study, we developed a media processing board for multi-party voice and video telephony based on open source software. On the other hand, in order to apply open source software for weapon systems and parts that are mounted on weapon systems, appropriate review is required according to the weapon system software development and management manual of the Defense Acquisition Program Administration (DAPA). In this study, the analysis of the requirement items was performed and the appropriate countermeasures were proposed for the open software applied to the media processing board with respect to 'the guidelines for the application of weapon systems to open source software', an appendix to the DAPA's manual.