• Title/Summary/Keyword: signature generation

Search Result 108, Processing Time 0.028 seconds

Privilege Delegation Protocol Providing Delegation Traceability Using ID-based Cryptosystem in X.509 Proxy Certificate Environment (X.509 대리 인증서 환경에서 위임 추적 기능을 제공하는 ID 기반 암호 시스템 기반 권한 위임 프로토콜)

  • Lee, Youn-Ho;Kim, Byung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.9_10
    • /
    • pp.441-451
    • /
    • 2008
  • Currently, the X.509 proxy certificate is widely used to delegate an entity's right to another entity in the computational grid environment. However it has two drawbacks: the potential security threat caused by intraceability of a delegation chain and the inefficiency caused by an interactive communication between the right grantor and the right grantee on the delegation protocol. To address these problems for computational grids, we propose a new delegation protocol without additional cost. We use an ID-based key generation technique to generate a proxy private key which is a means to exercise the delegated signing right. By applying the ID-based key generation technique, the proposed protocol has the delegation traceability and the non-interactive delegation property. Since the right delegation occurs massively in the computational grid environment, our protocol can contribute the security enhancement by providing the delegation traceability and the efficiency enhancement by reducing the inter-domain communication cost.

Automatic malware variant generation framework using Disassembly and Code Modification

  • Lee, Jong-Lark;Won, Il-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.131-138
    • /
    • 2020
  • Malware is generally recognized as a computer program that penetrates another computer system and causes malicious behavior intended by the developer. In cyberspace, it is also used as a cyber weapon to attack adversary. The most important factor that a malware must have as a cyber weapon is that it must achieve its intended purpose before being detected by the other's detection system. It requires a lot of time and expertise to create a single malware to avoid the other's detection system. We propose the framework that automatically generates variant malware when a binary code type malware is input using the DCM technique. In this framework, the sample malware was automatically converted into variant malware, and it was confirmed that this variant malware was not detected in the signature-based malware detection system.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.80-85
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

CO STUDY OF THE H II REGION SHARPLESS 301

  • JUNG JAE HOON;LEE JUNG-Kyu;YOON TAE SEOG;KANG YONG HEE
    • Journal of The Korean Astronomical Society
    • /
    • v.34 no.3
    • /
    • pp.157-166
    • /
    • 2001
  • The molecular cloud associated with the H II region S301 has been mapped in the J = 1-0 transitions of $^{12}CO$ and $^{13}CO$ using the 13.7 m radio telescope of Taeduk Radio Astronomy Observatory. The cloud is elongated along the north-south direction with two strong emission components facing the H II region. Its total mass is $8.7 {\times} 10^3 M{\bigodot}$. We find a velocity gradient of the molecular gas near the interface with the optical H II region, which may be a signature of interaction between the molecular cloud and the H II region. Spectra of CO, CS, and HCO+ exhibit line splitting even in the densest part of the cloud and suggests the clumpy structure. The radio continuum maps show that the ionzed gas is distributed with some asymmetry and the eastern part of the H II region is obscured by the molecular cloud. We propose that the S301 H II region is at the late stage of the champagne phase, but the second generation of stars has not yet been formed in the postshock layer.

  • PDF

A New Server-Aided Secret Computation(SASC) Protocol for RSA Signature Generation (RSA 서명생성을 위한 새로운 SASC(Server-Aided Secret Computation) 프로토콜)

  • 신준범;홍성민;이광형;윤현수;한상근
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.161-170
    • /
    • 1997
  • SASC(Server-Aided Secret Computation) 프로토콜은 클라이언트(스마트 카드)의 비밀정보를 공개하지 않으면서 서버(untrusted auxiliary device)에게 서명을 생성하는데 도움을 받도록 하는 프로토콜이다. RSA서명을 위한 최초의 SASC 프로토콜은 RSA-S1 으로서 그 실효성이 크기 때문에, 그 후로 SASC 프로토콜에 대한 연구가 많이 이루어져 왔다. 기존의 SASC 프로토콜들의 공통된 접근방식은, 클라이언트의 비밀정보를 서버로부터 감추기 위해, 비밀정보를 여러 조각으로 나누어 일부불만을 서버에게 전달하는 방식이었다. 그러나, 이러 한 접근방식은 클라이언트의 계산량은 줄어들지만 서버의 계산량과 통신량이 너무 많고, 능동적 공격(active attack)에 노출되기 쉽다는 단점을 가진다. 본 논문에서는 이러한 단점을 극복하기 위해 RSA서명 생성을 위한 새로운 방식의 SASC 프로토콜을 제안한다. 본 논문에서 제안하는 방식은 비밀정보를 서버로부터 감추기 위해 비밀정보에 난수들을 곱하거나 더하여 서버에게 전달하는 방식이다. 제안 프로토콜은 능동적 공격에 대해 안전하며, 안전성이 데이타의 개수에 의존하지 않으므로 서버의 계산량과 통신량이 매우 적다. 또한, 클라이언트가 수행해야 할 계산량도 기존 프로토콜들의 43%로 줄게 된다.

  • PDF

A Feature-Based Malicious Executable Detection Approach Using Transfer Learning

  • Zhang, Yue;Yang, Hyun-Ho;Gao, Ning
    • Journal of Internet Computing and Services
    • /
    • v.21 no.5
    • /
    • pp.57-65
    • /
    • 2020
  • At present, the existing virus recognition systems usually use signature approach to detect malicious executable files, but these methods often fail to detect new and invisible malware. At the same time, some methods try to use more general features to detect malware, and achieve some success. Moreover, machine learning-based approaches are applied to detect malware, which depend on features extracted from malicious codes. However, the different distribution of features oftraining and testing datasets also impacts the effectiveness of the detection models. And the generation oflabeled datasets need to spend a significant amount time, which degrades the performance of the learning method. In this paper, we use transfer learning to detect new and previously unseen malware. We first extract the features of Portable Executable (PE) files, then combine transfer learning training model with KNN approachto detect the new and unseen malware. We also evaluate the detection performance of a classifier in terms of precision, recall, F1, and so on. The experimental results demonstrate that proposed method with high detection rates andcan be anticipated to carry out as well in the real-world environment.

An Efficient BIST for Mixed Signal Circuits (혼성 신호 회로에 대한 효과적인 BIST)

  • Bang, Geum-Hwan;Gang, Seong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.8
    • /
    • pp.24-33
    • /
    • 2002
  • For mixed signal circuits that integrate both analog and digital blocks onto the same chip, testing the mixed circuits has become the bottleneck. Since most of mixed signal circuits are functionally tested, mixed signal testing needs expensive automatic test equipments for test input generation and response acquisition. In this paper, a new efficient BIST is developed which can be used for mixed signal circuits. In the new BIST, only faults on embedded resistances, capacitances and its combinations are considered. To guarantee the quality of chips, the new BIST performs both voltage testing and phase testing. Using these two testing modes, all the faults are detected. In order to support this technique, the voltage detector and the phase detector are developed. Experimental results prove the efficiency of the new BIST.

Generation and Assessment of DEM from InSAR and Differential InSAR (영상 레이더 간섭기법 및 차분간섭기법을 이용한 수치고도모델 생성과 정확도 평가)

  • Kim Jeong woo;Kim Chang Oh
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.23 no.2
    • /
    • pp.147-156
    • /
    • 2005
  • SAR interferometry (InSAR) is a technique to generate 3-Dimentional spatial information using complex data pairs observed by antennas at different locations. In case of the Two-pass differential SAR inteferometry (DInSAR), the topographic phase signature can be separated from the contribution of surface deformation in the interferometric phase. In this study, InSAR and DInSAR were implemented with ERS- l/2 tandem pair to produce DEM. The accuracy of the Resulting DEMs was analyzed.

Design of Document-HTML Generation Technique for Authorized Electronic Document Communication (공인전자문서 소통을 위한 Document-HTML 문서 생성 기법의 설계)

  • Hwang, Hyun-Cheon;Kim, Woo-Je
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.1
    • /
    • pp.51-59
    • /
    • 2021
  • Electronic document communication based on a digital channel is becoming increasingly important with the advent of the paperless age. The electronic document based on PDF format does not provide a powerful customer experience for a mobile device user despite replacing a paper document by providing the content integrity and the independence of various devices and software. On the other hand, the electronic document based on HTML5 format has weakness in the content integrity as there is no HTML5 specification for the content integrity despite its enhanced customer experience such as a responsive web technology for a mobile device user. In this paper, we design the Document-HTML, which provides the content integrity and the powerful customer experience by declaring the HTML5 constraint rules and the extended tags to contain the digital signature based on PKI. We analyze the existing electronic document that has been used in the major financial enterprise to develop a sample. We also verify the Document-HTML by experimenting with the sample of HTML electronic communication documents and analyze the PKI equation. The Document-HTML document can be used as an authorized electronic document communication and provide a powerful customer experience in the mobile environment between an enterprise and a user in the future.