Fig. 1. Tech. leakage cases in ‘Total life-cycle’ viewpoint
Fig. 2. Anti-Tamper Implementation Decision Process[15]
Table 1. Categories of FIPS 140-2 & ISO/IEC 19790[9-10]
Table 2. AT Requirement apply(From ISO/IEC 19790)
Table 3. Results of Comparative Evaluation
References
- H. J. Lee, "On the development of an Effective Defense Technology Security System," Defense & Technology, Korea Defense Industry Association, Nov. 2017, vol. 465.
- Department of Defense DIRECTIVE : Anti-Tamper(AT), DoD Directive 5200.47E, 2015.
- M. C. Park, W. K. Koo, D. G. Suh, I. S. Kim, D. H. Lee, “Two-stage tamper response in tamper-resistant software,” IET Software, Vol. 10, No. 3, pp. 81-88, 2016. DOI : http://dx.doi.org/10.1049/iet-sen.2014.0231
- M. H. Jang, Y. S. Ryu, H. K. Park, "A FPGA-Based scheme for protecting weapon system software technology," in Proc. ICCSA 2018, Melbourne, VIC, Austrailia, Jul. 2-5, 2018, pp. 148-157. DOI : https://doi.org/10.1007/978-3-319-95174-4_12
- Mikhail J. Atallah, Eric D. Bryant, and Martin R. Stytz, "A survey of anti-tamper technologies," CROSSTALK : The Journal of Defense Software Engineering, vol. 17, no. 11, pp. 12-16, 2004.
- H. K. Lee, W. S. Lee, Y. J. Oh, S. S. Park, “A Trend Analysis and Technology Application of Defense Technology Protection,” Journal of the KIMST, Vol. 20, No. 4, pp. 579-586, 2017. DOI : http://dx.doi.org/10.9766/KIMST.2017.20.4.579
- H. S. Chae, C. S. Lee, T. R. Kim, T. H. Kim, "The Design of the Response Method in Anti-tampering for UGV," in Proc. 2017 KIMST Fall Symposium, Daejeon, Republic of Korea, Nov. 14-15, 2017, pp. 819-820.
- M. W. Lee, J. C. Lee, "Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development," Journal of KAIS, Vol. 19, No. 12, pp. 99-109, 2018. DOI : https://doi.org/10.5762/KAIS.2018.19.12.99
- Information technology - Security techniques - Security requirements for cryptographic modules, ISO/IEC Standard, 19790, 2012.
- Security requirements for cryptographic modules, FIPS PUB 140-2, 2001
- S. J. Ahn, C. K. Jung, K. S. Oh, J. Y. Lee, "A Study on the Development of Defence Technology Protection System," Sungkyunkwan Univ. Univ-Industry Collabo, Director General for Defense Technology Control of DAPA, Oct. 2016.
- Department of Defense Instruction : Critical Program Information(CPI) Protection Within the Department of Defense, DoD Instruction 5200.39, 2008.
- United States Government Accountability Office, "DoD Needs to Better support program managers' implementation of AT protection," GAO-04-302, Mar. 2004.
- United States Government Accountability Office, "Department-wide Direction Is Needed for Implementation of the Anti-tamper Policy," GAO-08-91, Jan. 2008.
- Statement of Anti-Tamper(AT) Measures in the Letter of Offer and Acceptance(LOA), DSCA 00-07, 2000.
- M. G. Choi, J. H. Jeong, “A Study on the Policy of Cryptographic Module Verification Program,” Journal of KAIS, Vol. 12, No. 1, pp. 255-262, 2011. DOI: https://doi.org/10.5762/KAIS.2011.12.1.255
- K. S. Kou, I. W. Bae, S. J. Choi, G. S. Lee, “Analysis on New Cryptographic Module Validation Standard FIPS PUB 140-3 Changes,” Review of KIISC, Vol. 17, No. 6, pp. 41-56, 2007.