Fig. 1. Examples of Anti-Tampering technique[4](a) Tamper indicating devices(Seal & Labels)(b) Coating(Encapsulation materials)
Fig. 2. Anti-Tamper Evaluation Points(EP) for Programs[10]
Fig. 3. Risk Management Process Overview[13]
Fig. 4. Evaluation Matrix for Anti-Tampering application
Fig. 5. SysML Activity diagram of Anti-Tampering tech.
Table 1. Leakage scenario and result by weapon itself
Table 2. Detail measurements about ‘The Importance’
Table 3. Detail measurements about ‘The Vulnerability’
Table 4. Classification of Anti-Tampering techniques(based on the concept of risk mitigation)
Table 5. Security levels of FIPS 140-2[15]
Table 6. Evaluation Matrix of Guided Missile’s CTEs
Table 7. Evaluation Matrix of Guided Rocket’s CTEs
References
- S. J. Ahn, C. K. Jung, K. S. Oh, J. Y. Lee, "A Study on the Development of Defence Technology Protection System," Sungkyunkwan Univ. Univ-Industry Collabo, DAPA Director General for Defense Technology Control, Oct. 2016.
- Department of Defense DIRECTIVE : Anti-Tamper(AT), DoD Directive 5200.47E, 2015.
- J. R. Lee, D. H. Lee, "A study on the application of the Anti-Tampering Technologies for Defense Critical Technology Protection," in Proc. 2013 KIMST General Symposium, Republic of Korea, Jeju, Jul. 4-5, 2013, pp. 78-79.
- H. K. Lee, W. S. Lee, Y. J. Oh, S. S. Park, "A Trend Analysis and Technology Application of Defense Technology Protection," Journal of the KIMST, Vol. 20, No. 4, pp. 579-586, 2017. DOI : http://dx.doi.org/10.9766/KIMST.2017.20.4.579
- Mikhail J. Atallah, Eric D. Bryant, and Martin R. Stytz, "A survey of anti-tamper technologies," CROSSTALK : The Journal of Defense Software Engineering, vol. 17, no. 11, pp. 12-16, 2004.
- Alvaro Ortega Chamorro, "Physical Protection : Anti-Tamper Mechanisms in CC Security Evaluations," EPOCHE & ESPRI, Norway, 10ICCC.
- United States Government Accountability Office, "DoD Needs to Better support program managers' implementation of AT protection," GAO-04-302, Mar. 2004.
- United States Government Accountability Office, "Departmentwide Direction Is Needed for Implementation of the Anti-tamper Policy," GAO-08-91, Jan. 2008.
- H. J. Lee, "On the development of an Effective Defense Technology Protection System," Defense & Technology, Korea Defense Industry Association, Nov. 2017, vol. 465.
- Air Force Pamphlet 63-113 : Program Protection Planning for life cycle management, Department of the Air Force, Oct. 2013.
- Kristen Baldwin, Paul R Popick, John F Miller, and Jonathan Goodnight, "The United States Department of Defense revitalization of system security engineering through program protection," in Proc. Systems Conference (SysCon), 2012 IEEE International, 2012, pp. 1-7. DOI : https://doi.org/10.1109/syscon.2012.6189463
- H. S. Chae, C. S. Lee, T. R. Kim, T. H. Kim, "The Design of the Response Method in Anti-tampering for UGV," in Proc. 2017 KIMST Fall Symposium, Daejeon, Republic of Korea, Nov. 14-15, 2017, pp. 819-820.
- Department of Defense Risk, Issue, and Opportunity Management Guide for Defense Acquisition Programs, Office of the Deputy Assistant Secretary of Defense for Systems Engineering, Washington, D.C. Jan. 2017.
- Systems Engineering Risk Management Guidebook, DAPA Acquisition Planning Bureau, Mar. 2018.
- FIPS 140, Wikipedia, Available From : https://en.wikipedia.org/wiki/FIPS_140, (accessed Sep., 2, 2018)