• 제목/요약/키워드: Space Security

검색결과 977건 처리시간 0.024초

강제적 접근제어를 통한 프로세스 메모리 보호 (Protecting Memory of Process Using Mandatory Access Control)

  • 심종익;박태규;김진태
    • 한국정보통신학회논문지
    • /
    • 제15권9호
    • /
    • pp.1947-1954
    • /
    • 2011
  • 널리 사용되고 있는 윈도우 운영체제의 보안 취약성으로 인한 다양한 형태의 공격에 의한 침입, 자료 유출 및 무단 변조 등의 문제점이 발생되고 있다. 본 논문에서는 윈도우 운영체제의 커널 수준에서 허가되지 않은 사용과 침입을 차단하고, 프로세스 메모리에 대한 접근을 강제적으로 제어할 수 있는 다중등급보안(Multi Level Security) 시스템을 구현하였다. 신뢰성 컴퓨터 시스템 평가기준(TCSEC)의 B1 등급에서 요구하는 대부분의 기능을 윈도우 운영체제 커널에 구현하였으며, 이를 확장하여 주요 프로세스의 메모리에 대한 변조를 차단하기 위한 기능을 보안 커널에 추가하였다.

안전한 보안명령 전달을 위한 비행종단시스템용 암호화 장치 설계 요구사항 (The cryptographic module design requirements of Flight Termination System for secure cryptogram delivery)

  • 황수설;김명환;정혜승;오창열;마근수
    • 한국위성정보통신학회논문지
    • /
    • 제10권3호
    • /
    • pp.114-120
    • /
    • 2015
  • 본 논문에서는 우주발사체에 적용되는 비행종단시스템의 보안명령 입력을 위한 암호화 장치의 개념설계 결과와 개발 요구조건을 보였다. 암호화 장치는 명령신호를 생성하고 암호화하기 위한 명령생성장치와 암호화 명령신호를 연계장치에 입력하기 위한 명령입력장치로 구분하여 개발되도록 설계하였으며, 미국 NIST의 권고안과 한국인터넷진흥원(KISA)의 권고안을 참고하여 보안등급과 암호 알고리즘, 암호키 관리방안 등을 설정하였다. 암호화 장치는 AES-256 블록 암호화가 적용된 비밀키 알고리즘과 SHA-256의 해쉬 알고리즘을 적용하여 기밀성, 무결성, 가용성이 확보되도록 설계되었다. 설계된 암호화 장치는 우주발사체에 탑재되는 비행종단시스템의 보안명령 입력 용도로 활용되어 비행종단명령의 보안성과 비행종단시스템의 신뢰성 향상에 기여할 것으로 판단된다.

An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism

  • Zhang, Xiao;Wang, Chengqi;Zheng, Zhiming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권3호
    • /
    • pp.1785-1801
    • /
    • 2017
  • In recent years, image encryption algorithms have been developed rapidly in order to ensure the security of image transmission. With the assistance of our previous work, this paper proposes a novel chaotic image encryption algorithm based on self-adaptive model and feedback mechanism to enhance the security and improve the efficiency. Different from other existing methods where the permutation is performed by the self-adaptive model, the initial values of iteration are generated in a novel way to make the distribution of initial values more uniform. Unlike the other schemes which is on the strength of the feedback mechanism in the stage of diffusion, the piecewise linear chaotic map is first introduced to produce the intermediate values for the sake of resisting the differential attack. The security and efficiency analysis has been performed. We measure our scheme through comprehensive simulations, considering key sensitivity, key space, encryption speed, and resistance to common attacks, especially differential attack.

AIT: A method for operating system kernel function call graph generation with a virtualization technique

  • Jiao, Longlong;Luo, Senlin;Liu, Wangtong;Pan, Limin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권5호
    • /
    • pp.2084-2100
    • /
    • 2020
  • Operating system (OS) kernel function call graphs have been widely used in OS analysis and defense. However, most existing methods and tools for generating function call graphs are designed for application programs, and cannot be used for generating OS kernel function call graphs. This paper proposes a virtualization-based call graph generation method called Acquire in Trap (AIT). When target kernel functions are called, AIT dynamically initiates a system trap with the help of a virtualization technique. It then analyzes and records the calling relationships for trap handling by traversing the kernel stacks and the code space. Our experimental results show that the proposed method is feasible for both Linux and Windows OSs, including 32 and 64-bit versions, with high recall and precision rates. AIT is independent of the source code, compiler and OS kernel architecture, and is a universal method for generating OS kernel function call graphs.

스마트폰을 이용한 원격 물리적 보안 시스템의 구현 (Implementation of Remote Physical Security Systems Using Smart Phone)

  • 이문구
    • 한국컴퓨터정보학회논문지
    • /
    • 제16권2호
    • /
    • pp.217-224
    • /
    • 2011
  • 기존의 유선상의 물리적 보안 시스템은 시간적, 공간적 제약을 갖는다. 이러한 문제점을 해결하기 위해서 본 연구는 스마트폰을 이용한 원격 물리적 보안 시스템을 구현 하였으며, 연구는 모바일 클라우드 컴퓨팅 기술을 기반으로 구현되었다. 모바일 클라우드 컴퓨팅 기술에서 요구되는 사용자 인증, 통신의 비밀성, 정보의 무결성, 시스템의 가용성, 접근제어 및 권한관리 그리고 안전한 핸드오프 등의 보안 기술을 구현하였다. 구현된 시스템은 계측, 감시, 제어를 통한 에너지 비용 절감 (5~30%)의 효율성을 갖는다. 본 시스템의 평균 접속 및 응답 시간 측정결과 값도 약 7.082초 이내로서 성능 대비 효율성이 높은 것으로 평가된다.

Direct Current Control Method Based On One Cycle Controller for Double-Frequency Buck Converters

  • Luo, Quanming;Zhi, Shubo;Lu, Weiguo;Zhou, Luowei
    • Journal of Power Electronics
    • /
    • 제12권3호
    • /
    • pp.410-417
    • /
    • 2012
  • In this paper, a direct current control method based on a one-cycle controller (DCOCC) for double frequency buck converters (DF buck) is proposed. This control method can make the average current through the high frequency and low frequency inductors of a DF buck converter equal. This is similar to the average current control method. However, the design of the loop compensator is much easier when compared with the average current control. Since the average current though the high frequency and low frequency inductors is equivalent, the current stress of the high frequency switches and the switch losses are minimized. Therefore, the efficiency of the DF buck converter is improved. Firstly, the operation principle of DCOCC is described, then the small signal models of a one cycle controller and a DF buck converter are presented based on the state space average method. Eventually, a system block diagram of the DCOCC controlled DF buck is established and the compensator is designed. Finally, simulation and experiment results are given to verify the correction of the theory analysis.

OTP를 이용한 인터넷뱅킹 시스템의 다중 채널 인증 기법 (A Multichannel Authentication Technique In The Internet Banking System Using OTP)

  • 윤승구;박재표
    • 디지털산업정보학회논문지
    • /
    • 제6권4호
    • /
    • pp.131-142
    • /
    • 2010
  • Due to the development of the Internet, Internet banking that we are liberated from time and space has evolved into banking system. So modern life became comfortable. However, Dysfunction (malicious Information leakage and hacking etc.) of the Internet development has become a serious social problem. According to this, The need for security is rapidly growing. In this paper, we proposed the Internet Banking Authentication System using a dual-channel in OTP(One Time Password) authentication. This technology is that A user transfer transaction information to Bank through one Internet channel then bank transfer transaction information to user using the registered mobile phone or smart phone. If user confirm transaction information then bank request user's OTP value. User create OTP value and transfer to bank and bank authenticate them throgth the ARS. If authentication is pass then transaction permitted. Security assessment that the proposed system, the security requirement that the confidentiality and integrity, authentication, repudiation of all of the features provide a key length is longer than the current Internet banking systems, such as using encryption, the security provided by the Financial Supervisory Service Level 1 rating can be applied to more than confirmed.

지능형 사이버공격 대비 상황 탄력적 / 실행 중심의 사이버 대응 메커니즘 (A situation-Flexible and Action-Oriented Cyber Response Mechanism against Intelligent Cyber Attack)

  • 김남욱;엄정호
    • 디지털산업정보학회논문지
    • /
    • 제16권3호
    • /
    • pp.37-47
    • /
    • 2020
  • The In the 4th industrial revolution, cyber space will evolve into hyper-connectivity, super-convergence, and super-intelligence due to the development of advanced information and communication technologies, which will connect the nation's core infrastructure into a single network. As applying the 4th industrial revolution technology to the cyber attack technique, it is evolving in an intelligent and sophisticate method. In order to response intelligent cyber attacks, it is difficult to guarantee self-defense in cyberspace by policy-oriented, preplanned-centric and hierarchical cyber response strategies. Therefore, this research aims to propose a situation-flexible & action-oriented cyber response mechanism that can respond flexibly by selecting the most optimal smart security solution according to changes in the cyber attack steps. The proposed cyber response mechanism operates the smart security solutions according to the action-oriented detailed strategies. In addition, artificial intelligence-based decision-making systems are used to select the smart security technology with the best responsiveness.

Videogames in Cybersecurity: Philosophical and Psychological Review of Possible Impact

  • Bogdan, Levyk;Maletska, Mariia;Khrypko, Svitlana;Leonid, Kryvyzyuk;Olga, Dobrodum;Pasko, Katerina
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.249-256
    • /
    • 2021
  • An issue of security and threat is urgent as well as it concerns everyone: a person, community, state, etc. Today, the question of cybersecurity has become especially relevant due to general digitalization and the spread of the cyberculture. In terms of it, the growing popularity of videogames can be observed. Their impact on society differs significantly, therefore, it needs thorough consideration. The purpose of the article is to disclose the role of videogames in cybersecurity. To achieve the stated purpose, such methods as analysis, synthesis, systematization and practical involvement of videogames have been used. As a result, three levels of possible threat of videogames has been distinguished: videogames as a possibly dangerous software, as a tool of propaganda and spread of stereotypes, as a space for the creation of virtual communities. In conclusion, it is stated that videogames can be not only a threat, but also a tool for strengthening the cybersecurity.

CCTV 영상보안 위한 AES 암호 알고리듬의 효율적인 구현 (An Efficient Implementation of AES Encryption Algorithm for CCTV Image Security)

  • 강민섭
    • 한국인터넷방송통신학회논문지
    • /
    • 제21권2호
    • /
    • pp.1-6
    • /
    • 2021
  • 본 논문에서는 C# 언어를 이용하여 CCTV 영상보안 시스템의 효율적인 구현을 제안한다. 제안한 방법에서는 AES 알고리듬의 각 라운드 과정에서 요구되는 지연시간의 최소화를 위한 합성체 기반의 S-Box를 설계하고, 이를 기반으로 한 영상보안 시스템을 GF(((22)2)2) 상에서 구현한다. 또한, 메모리 공간의 최소화를 위해서 각 라운드 변환 및 키 스케쥴링 과정에서 필요한 S-Box를 공동으로 사용하도록 설계한다. 성능평가를 통하여 기존의 방법 보다 제안한 방법이 보다 효율적임을 확인하였다. 제안한 CCTV 영상보안 시스템은 Visual Studio 2010을 사용하여 C# 언어로 구현하였다.