DOI QR코드

DOI QR Code

TPM-Based Anti-Tampering Solutions to Protect Weapon Systems Technologies

TPM 기반 안티탬퍼링 솔루션을 통한 무기체계 기술 보호

  • J.H. Lee ;
  • D.H. Kim ;
  • H.S. Lee ;
  • J.H. Han ;
  • Y.S. Kim ;
  • C. Ryu ;
  • Y.S. Choi ;
  • Y.K. Lee ;
  • J.N. Kim
  • 이재호 (국방사이버전기술연구센터) ;
  • 김도형 (국방사이버전기술연구센터) ;
  • 이형석 (국방사이버전기술연구센터) ;
  • 한진희 (국방사이버전기술연구센터) ;
  • 김영세 (국방사이버전기술연구센터) ;
  • 류철 (국방사이버전기술연구센터) ;
  • 최예슬 (국방사이버전기술연구센터) ;
  • 이윤경 (국방사이버전기술연구센터) ;
  • 김정녀 (사이버보안연구본부 )
  • Published : 2024.10.01

Abstract

Protecting weapon system technologies is essential for national security. Advancements in artificial intelligence and South Korea's growing role in the global defense market underscore the importance of anti-tampering technologies. TPM-based anti-tampering ensures the integrity and confidentiality of weapon systems. This paper analyzes the concept of anti-tampering and the current standards and technologies related to TCG's TPM/TSS. With mandatory integration requirements for exported weapon systems, TPM-based anti-tampering solutions provide cost-effective, high-level security while effectively safeguarding K-Defense technologies.

Keywords

Acknowledgement

이 논문은 2023년 정부(방위사업청)의 재원으로 국방기술진흥연구소의 지원을 받아 수행된 연구임[KRIT-CT-22-051, 무기체계기술 보호기법 핵심기술 개발과제].

References

  1. 국방부, "국방혁신 4.0," 2023. 2. 28. 
  2. TCG, https://trustedcomputinggroup.org 
  3. TCG, TPM 2.0 Library Specification 
  4. TCG, TSS 2.0 Overview and Common Structures Specification 
  5. 배성은, "세계를 뛰어넘을 K-방산 전략," 아주경제, 2023. 11. 19. 
  6. 삼일PwC경영연구원, "W.E.A.P.O.N: 키워드로 보는 방위산업의 현재와 미래," Industry Focus, 2024. 7. 
  7. 국방기술진흥연구소, "AI 기반의 유.무인 복합전투체계 발전을 위한 제언," 이슈페이퍼, 제9호, 2023. 
  8. 국방기술진흥연구소, "유.무인 협업체계(MUM-T) 기술수준 평가," 이슈페이퍼, 제5호, 2022.
  9. G. Cohen, "Chinese Hackers Steal U.S. Fighter Jet Plans," The Wall Street Journal, 2014. 1. 22. 
  10. BBC News, "Iran Shows Off Alleged Downed US Drone." 2011. 12. 8. 
  11. Al Jazeera, "Iran Says It Hacked U.S. Drone, Shows Video," 2011. 12. 12. 
  12. B. Lendon, "Iran Claims It Captured, Copied US Drone," CNN, 2012. 12. 17. 
  13. The Hill, "ISIS Seized More Than 2,300 Humvees from Iraqi Forces," 2015. 5. 31. 
  14. Reuters, "Yemen's Houthis Seize U.S.-Made Weapons from Saudi-Led Coalition," 2019. 7. 19. 
  15. The New York Times, "Russia Captures U.S.-Supplied Weapons in Ukraine," 2022. 3. 1. 
  16. I.S. Bisht, "Russia Traded Captured Western Weapons for Iranian Drones: Report," The Defense Post, 2022. 11. 9. 
  17. What is Anti-Tamper-U.S. Department of Defense, https://at.dod.mil/What-Is-Anti-Tamper 
  18. 이민우 외, "무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법," 제19권 제12호, 2018, pp. 99-108. 
  19. W. Arthur, D. Challener, and K. Goldman, "A Practical Guide to TPM 2.0," Springer, 2015. 
  20. TCG, "TPM 2.0: A Brief Introduction," 2019. 6. 
  21. TCG, "Trusted Platform Module Library Part1: Architecture," 2014. 10. 
  22. TCG, "Protection Profile Automotive-Thin Specific TPM," Level 0 Ver. 1.0, 2018. 12. 
  23. TCG, "Protection Profile PC Client Specific TPM," Ver. 1.3, 2021. 9. 
  24. TCG, "TCG Mobile Reference Architecture," Ver. 2.45, 2023. 8. 
  25. Intel Trusted Execution Techonology(TXT), https://www.intel.com/content/www/us/en/developer/articles/tool/intel-trusted-execution-technology.html 
  26. ARM TrustZone, https://www.arm.com 
  27. AMD Secure Processor, https://www.amd.com 
  28. https://github.com/tpm2-software 
  29. https://github.com/tpm2-software/tpm2-tss 
  30. https://github.com/tpm2-software/tpm2-abrmd 
  31. https://sourceforge.net/projects/ibmtpm20tss 
  32. https://www.wolfssl.com/products/wolftpm 
  33. https://github.com/wolfSSL/wolfTPM 
  34. https://google.github.io/tpm-js 
  35. https://github.com/wolfSSL/wolfssl 
  36. 방위사업청, '23-37 국방기술기획서, 2023. 5. 
  37. 방위사업청, "무기체계 기술보호기법," 국방기술진흥연구소(RFP), https://www.ntis.go.kr 
  38. 방위사업청, "무기체계 소프트웨어 플랫폼 안티탬퍼링 기술," 국방기술진흥연구소(RFP), https://www.ntis.go.kr 
  39. 국방기술진흥연구소, "무기체계 기술 보호를 위한 안티탬퍼링 적용 방안 제언," 이슈페이퍼, 제10호, 2023.