DOI QR코드

DOI QR Code

A Trend Analysis and Technology Application of Defense Technology Protection

방위산업 기술보호 동향분석 및 기법적용

  • Lee, Hyo Keun (Hanwha Corporation Defence R&D Center, Ammunition System Department) ;
  • Lee, Woon Soon (Hanwha Corporation Defence R&D Center, Ammunition System Department) ;
  • Oh, Yoo Jin (School of Mechanical Engineering, Korea University) ;
  • Park, ShinSuk (School of Mechanical Engineering, Korea University)
  • 이효근 ((주)한화 종합연구소 화력연구센터) ;
  • 이운순 ((주)한화 종합연구소 화력연구센터) ;
  • 오유진 (고려대학교 기계공학부) ;
  • 박신석 (고려대학교 기계공학부)
  • Received : 2017.02.17
  • Accepted : 2017.06.30
  • Published : 2017.08.05

Abstract

The defense industry has become a global industry, and military technology is actively being traded between countries to increase their military capabilities. The Republic of Korea has been ranked one of the top 10 countries for exports of military technology. To maintain competitive advantages in the global defense industry, it is essential to protect key technologies employed by exported weapon systems. Various techniques have been developed for protection of confidential technologies in weapon systems, and the U.S. DoD has been leading the development of the protection techniques. This paper reviews current anti-tampering techniques that prevent leakage of key technology from weapon exportation or pillage. Based on the protection techniques employed by the U.S. DoD Anti-Tamper Executive Agent, this paper suggests novel design methods for protection of confidential technologies. The proposed design methods were tested on an actual weapon system.

Keywords

References

  1. Dr. Mikhail J. Atallah, Eric D. Bryant, and Dr. Martin R. Stytz, "A survey of Anti-Tamper Technologies," CROSSTALK The Journal of Defense Software Engineering, pp. 13-16, November 2004.
  2. Gansler, J. S, "Implementation of Anti-Tamper(AT) Techniques," DoD memorandum, March 1994.
  3. Anderson, R, and M. Kuhn, "Tamper Resistance - A Cautionary Note. Proc. of Second Usenix Workshop on Electronic Commerce," Oakland, CA, pp. 1-11. Nov. 1996.
  4. Arbaugh, W, D. Farber, and J. Smith, "A Secure and Reliable Bootstrap Architecture. Proc. of the IEEE Symposium on Security and Privacy," Oakland, CA, 1997.
  5. Lt Col Art Huber, Jennifer M. Scott, "The Role and Nature of Anti-Tamper Techniques in U.S. Defense Acquisition 357," Acquisition Review Quarterly, Fall 1999.
  6. Alvaro Ortega Chamorro, "Physical Protection : Anti-Tamper Mechanisms in CC Security Evaluations," EPOCHE & ESPRI, Norway, 10ICCC.