Browse > Article
http://dx.doi.org/10.9708/jksci.2017.22.05.029

An Analysis of Security Threats and Security Requirements on the Designated PC Solution  

Lee, Kyungroul (R&BD Center for Security and Safety Industries (SSI), Soonchunhyang University)
Lee, Sun-Young (Dept. of Information Security Engineering, Soonchunhyang University)
Yim, Kangbin (Dept. of Information Security Engineering, Soonchunhyang University)
Abstract
In this paper, we analyse security threats and security requirements about the designated PC solution which restricts usable PCs that are only an user own PCs or a registered PC for online banking or very important services. Accordingly, causable threats of the designated PC solution are classified a process, a network layer, a software module, and an environment of platform, and we draw security requirements based on analysed security threats. Results of this research are considered utilization of criteria for improving security of the designated PC solution and standards for giving hint of imposition of the designated PC solution.
Keywords
Designated PC solution; Security threat; Security requirement; Identification; Device authentication; User authentication;
Citations & Related Records
Times Cited By KSCI : 10  (Citation Analysis)
연도 인용수 순위
1 Kyung-Roul Lee and Kang-Bin Yim, "A New Analysis Method for Packed Malicious Codes", Journal of the Korea Navigation Institute(KONI), 16(3), pp. 488-494, Jun. 2012
2 Non Thiranant, Yvonne Tan Ying Hui, Taeyong Kim, and HoonJae Lee, "Challenge-Response Authentication with a Smartphone", In Proceedings of the Korea Society of Computer & Information(KSCI), 20(2), pp. 187-190, Jul. 2012
3 Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, and Dongho Won, "Analysis of Threats and Countermeasures on Mobile Smartphone", Journal of the Korea Society of Computer & Information(KSCI), 16(2), pp.153-163, Feb. 2011.   DOI
4 Seong-Yoon Shin and Kang-Ho Lee, "A Study of Definition of Security Requirements on Encryption and Audit Logging", Journal of the Korea Society of Computer & Information(KSCI), 19(9), pp.85-91, Sep. 2014.   DOI
5 Jae-Chan Moon and Seong-Je Cho, "Vulnerability Analysis and Threat Mitigation for Secure Web Application Development", Journal of the Korea Society of Computer & Information(KSCI), 17(2), pp.127-137, Feb. 2012.   DOI
6 Mi-Og Park, "Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity", Journal of the Korea Society of Computer & Information(KSCI), 18(2), pp.87-94, Feb. 2013.   DOI
7 Young-Back, Sung-Soo Kim, Kyung-Ho Chung, Soo-Yong Kim, Tae-Jin Yun, and Kwang-Seon Ahn, "A Vulnerability Analysis of Multi-Context RFID Mutual Authentication Protocol", Journal of the Korea Society of Computer & Information(KSCI), 18(10), pp.71-80, Oct. 2013.   DOI
8 Kangwon Lee, Kyungroul Lee, Jaecheon Byun, Sunghoon Lee, Hyobeom Ahn, and Kangbin Yim, "Extraction of Platform-unique Information as an Identifie", Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Application(JoWUA), 3(4), pp.85-99, Dec. 2012
9 Financial Security Agency(FSA), "Issue Report", 2012(1), Jan. 2012
10 Su-Mi Lee and Jarmo Seung, "Domestic Electronic Financial Status and Classification of Security Threats", Review of Korea Institute of Information Security and Cryptology(KIISC), 21(7), pp. 53-61, Nov. 2011
11 Neowiz games corporaion, "Internet connection blocking method through a fixed PC service using an IP address and hardware information", G06F 21/20, Nov. 2011
12 Jung-Yoon Kim and Hyoung-Kee Cho, "Weaknesses of the new design of wearable token system proposed by Sun et al.", Journal of the Korea Institute of Information Security and Cryptology(KIISC), 20(5), pp. 81-88, Oct. 2010
13 Kyungroul Lee and Kangbin Yim, "A Guideline for the Fixed PC Solution", In proceedings of Smart Convergence Technologies and Applications(SCTA), pp. 74-76, Aug. 2012
14 Telecommunications Technology Association(TTA), "Security Requirement for Virtual Keyboard", TTAK.KO-12.0180, Dec. 2011
15 Mikro Tik, "Packet Sniffer", Mikro Kifls SIA, 2004
16 Byung-Tak Kang and Huy Kang Kim, "A study on the vulnerability of OTP implementation by using MITM attack and reverse engineering", Journal of the Korea Institute of Information Security and Cryptology(KIISC), 21(6), pp. 83-99, Dec. 2011
17 YoungJae Maeng and DaeHun Nyang, "An Analysis of Replay Attack Vulnerability on Single Sign-On Solutions", Journal of the Korea Institute of Information Security and Cryptology(KIISC), 18(1), pp. 103-114, Feb. 2008
18 Yang-Seo Choi and Dong-Il Seo, "Privacy information exposure techniques and countermeasures through Social engineering attacks", Review of Korea Institute of Information Security and Cryptology(KIISC), 16(1), pp. 40-48, Feb. 2006
19 Dong Hwi Lee, Kyong-ho Choi, Dong Chun Lee, Kuinam J. Kim, and Sang Min Park, "Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique", Journal of Information and Security by Korea Information Assurance Society(KIAS), 6(4), pp. 171-177, Dec. 2006
20 Woochan Hong, Kwangwoo Lee, Seungjoo Kim, and Dongho Won, "Vulnerabilities Analysis of the OTP Implemented on a PC", Journal of the Korea Information Processing Society(KIPS) Transactions: Part C, 17-C(4), pp. 361-370, Aug. 2010
21 Jong-Ik Shim, Tae-Kyou Park, and Jin-Tae Kim, "Protecting Memory of Process Using Mandatory Access Control", Journal of the Korea Institute of Maritime Information & Communication Sciences, 15(9), pp. 1947-1954, Sep. 2011   DOI
22 Kyungroul Lee, Hyeungjun Yeuk, Habin Yim, and Kangbin Yim, "Security Assessment of the Designated PC Solution", The Korean Institute of Smart Media(KISM) Spring Conference, Apr. 2015
23 Hyeungjun Yeuk, Kyungroul Lee, Habin Yim, and Kangbin Yim, "An Analysis of the Vulnerability of the Designated PC solution", The Korean Institute of Smart Media(KISM) Spring Conference, Apr. 2015
24 Jonghoi Kim, Jinyoung Lee, and Seong-Je Cho, "A New Malware Propagation Technique based on the Send Function Hooking and Its Countermeasure", Journal of Korean Institute of Information Scientists and Engineers(KIISE): System and theory, 38(4), pp. 178-185, Aug. 2011