• Title/Summary/Keyword: USB 저장장치

Search Result 44, Processing Time 0.027 seconds

A Study on Effective Information Transfer Technique between Personal Computer and Portable Equipment (개인용 컴퓨터와 휴대장치간의 효과적 정보 전송기법 연구)

  • Choi, Gyoo-Seok;Park, Jong-Jin;Kang, Jung-Jin;Kim, Woong Jae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.261-267
    • /
    • 2013
  • In this paper, the effective information transfer technique between computing device and portable device that is connected through USB interface has been studied. The proposed technique is realized by the method which portable device is perceived into optical media such as CD-ROM or CD-R/W through SCSI commands on USB interface. Through the proposed system in this study, we maximized user convenience by executing diverse works using stored data in a portable device without installing extra USB driver corresponding to portable device, when user data is transmitted between computing device and portable device. We conducted experimental tests to verify the performance of the proposed system through implementing of test system. As a result, we confirmed the technique is comparatively superior to existing method in transmitting speed and user convenience.

Vulnerability Analysis of Secure USB: Based on the Password Authentication of Product B (보안 USB 취약점 분석: B 제품 비밀번호 인증을 기반으로)

  • Lee, Kyungroul;Jang, Wonyoung;Lee, Sun-Young;Yim, Kangbin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.155-157
    • /
    • 2018
  • 사용자의 개인정보 및 기업의 기밀정보와 같인 데이터의 안전한 이동 및 저장을 위하여 저장장치 보안 기술이 등장하였으며, 보안 USB와 보안 디스크 제품이 대표적으로 등장하였다. 이러한 제품은 저장되는 데이터를 안전하게 보호하기 위하여 사용자 인증 기술 및 데이터 암호 기술, 접근 제어 기술 등의 보안 기술을 적용한다. 특히, 사용자 인증 기술은 비밀번호 인증 기술이 대표적으로 활용되며, 인증을 강화하기 위하여 지문 인증 및 홍체 인증이 활용되고 있다. 따라서 본 논문에서는 보안 USB 제품, 특히 B 제품을 기반으로 적용된 사용자 인증 기술을 분석하고 이를 통하여 발생 가능한 보안 취약점을 분석한다. 분석 결과, 제품 B에 적용된 비밀번호 인증에서 발생 가능한 취약점을 도출하였으며, 이를 통하여 사용자 인증을 우회하여 저장장치 내부에 저장된 데이터의 탈취 가능함을 검증하였다.

Process of Collection for a Removable Storage Device Image Using a Software (소프트웨어를 이용한 이동식 저장매체 이미지 수집 절차)

  • Baek, Hyun Woo;Jeon, Sang Jun;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.17-24
    • /
    • 2017
  • As the prevalence of removable device, critical intelligences are often stored in the removable device. For that reason, in seizure and search, the removable device became a important evidence of while it could be has a salient key for prove a crime. When we acquired a removable device for proof, we image it by a imaging device or software with a write protection. However, these are high-priced exclusive equipments and sometimes it could be out of order. In addition, we found that some secure USB and inbuilt vaccine USB are failed to connect to the imaging device. Therefore, in this paper, we provide a suitable digital evidence collection procedure for real.

USB Device Authentication Protocol based on OTP (OTP 기반의 USB 디바이스 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.8
    • /
    • pp.1735-1742
    • /
    • 2011
  • Now a days, as a mass-storage USB becomes comfortable to carry, function of USB is being developed fast. However, there is a problem that the personal information which is stored in USB could be exposed being used with negative purpose without other certification process. This paper suggests OTP(One-Time Password)-based certification protocol of USB to securely protect personal information stored in USB without additional certification information. The proposed OTP based certification protocol of USB not only demands low calculations but also prevents physical approach of USB of other network and does not allow unnecessary service access of user because it conducts simple action and uses one-way hash function. Therefore, communication overhead and service delay is improved. In the experiment, the proposed protocol compares and evaluates throughput of certification server according to the numbers of USB and delay time of packet certification with a device(USB driver) which simply save device and a device(USB Token) which can calculate by oneself. As a result, it is improved as the number of 12.5% in the certification delay time on average and is improved as the number of 10.8% in the throughput of certification server according to the numbers of USB.

Vulnerability Analysis Method of Software-based Secure USB (소프트웨어 기반 보안 USB에 대한 취약성 분석 방법론)

  • Kim, Minho;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo;Kim, Minsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1345-1354
    • /
    • 2012
  • The modern society with the wide spread USB memory, witnesses the acceleration in the development of USB products that applied secure technology. Secure USB is protecting the data using the method as device-based access control, encryption of stored files, and etc. In terms of forensic analyst, to access the data is a lot of troubles. In this paper, we studied software-based data en/decryption technology and proposed for analysis mechanism to validation vulnerability that secured on removable storage media. We performed a vulnerability analysis for USB storage device that applied security mechanism. As a result, we found vulnerabilities that extracts a source file without a password.

A Study on Analysis of Hidden Areas of Removable Storage Device from a Digital Forensics Point of View (디지털 포렌식 관점에서 이동식 저장매체의 은닉영역 분석 연구)

  • Hong, Pyo-gil;Lee, Dae-sung;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.111-113
    • /
    • 2021
  • USB storage devices, which are represented by removable storage media, are widely used even nowadays when cloud services are common. However, since they are cases where hidden areas are created and exploited in USB storage devices. This research is needed to detect and analyze them from an Anti-forensic point of view. In this paper, we analyze a program that can be exploited as Anti-forensic because it can create a hidden partition and store files there, and the file system created by it from a digital forensic point of view.

  • PDF

Analysis on Vulnerability of Secure USB Flash Drive and Development Protection Profile based on Common Criteria Version 3.1 (보안 USB 플래시 드라이브의 취약점 분석과 CC v3.1 기반의 보호프로파일 개발)

  • Jeong, Han-Jae;Choi, Youn-Sung;Jeon, Woong-Ryul;Yang, Fei;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.99-119
    • /
    • 2007
  • The USB flash drive is common used for portable storage. That is able to store large data and transfer data quickly and carry simply. But when you lose your USB flash drive without any security function in use, all stored data will be exposed. So the new USB flash drive supported security function was invented to compensate for the problem. In this paper, we analyze vulnerability of 6 control access program for secure USB flash drives. And we show that exposed password on communication between secure USB flash drive and PC. Also we show the vulnerability of misapplication for initialization. Further we develop a protection profile for secure USB flash drive based on the common criteria version 3.1. Finally, we examine possible threat of 6 secure USB flash drives and supports of security objectives which derived from protection profile.

A study on Multiple External Storage Configuration for the Android based Set-top Box System (안드로이드 기반 셋톱박스의 다중 외장 저장장치에 관한 연구)

  • Han, Kyung-Sik;Kim, In-Ki;Kim, Byung-Jun;Sonh, Seung-Il;Kang, Min-Goo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.653-655
    • /
    • 2013
  • This paper is the study of Multiple External Storage Configuration for the Android based Set-top Box system. Because of Mobile OS, Android has limitation in media streaming, recording and playing for Set-top box function with only support external storage device Micro-SD card. In this paper, we research for the Multiple External Storage configuration for external disk drive, USB Memory, SD card. in Android System with Multi-Volume Management system implementation.

  • PDF

A Case Study of USB OS Usage Problems (USB OS 사용의 문제점 연구)

  • An, KwangEun;Seo, Dongmahn
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.977-979
    • /
    • 2016
  • 기술의 발달과 함께 휴대용 저장장치의 용량은 기하급수적으로 증가하였다. 이 증가량은 거대한 운영체제를 전부 담고도 충분히 다른 공간을 확보할 수 있는 수준에 이르러 있다. 본 논문에서는 USB OS 사용 시 운영체제와 사용자의 경험에서 나오는 문제점들을 기술하고 이를 극복할 수 있는 방법을 다룬다.

Design and Implemente high pitch FPD Image quality test system by using USB (USB를 이용한 고정세 FPD 화질 테스트 시스템 설계 및 구현)

  • Cho, Dae-Hyun;Kim, Gun-Hong;Lee, Dong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.273-274
    • /
    • 2007
  • 최근에 각광받는 영상표시 장치인 LCD와 PDP는 Progressive 방식으로 영상을 표시하며 화질 또한 SD에서 HD로 바뀌었다. 따라서 대용량의 데이터를 빠른 시간에 FPD 패널로 전송해야 하며 이를 위해 LVDS 전송 방법을 사용한다. 대부분의 화질 테스트 장비들은 빠른 데이터 전송을 위해 내부에 저장되어 있는 특정 패턴들만 LVDS 신호로 바꾸어 패널로 전송하게 되며 저장되어 있는 영상을 움직이는 것도 제한적이다. 하지만 LCD 패널의 응답속도, PDP 패널의 DFC등을 테스트 하기 위해서는 다양한 패턴이 필요하며 영상의 움직임 또한 자유롭게 조절할 수 있어야 한다. 따라서 본 논문에서는 다양한 패턴을 다운로드받아서 표시할 수 있는 테스트 장비를 설계하고 USB를 통해 테스트 장치 컨트롤 및 이미지 다운로드를 할 수 있는 프로그램을 설계하여 고정세 FPD의 화질을 테스트 할 수 있는 시스템을 구현하고자 한다.

  • PDF