Browse > Article
http://dx.doi.org/10.9766/KIMST.2017.20.4.579

A Trend Analysis and Technology Application of Defense Technology Protection  

Lee, Hyo Keun (Hanwha Corporation Defence R&D Center, Ammunition System Department)
Lee, Woon Soon (Hanwha Corporation Defence R&D Center, Ammunition System Department)
Oh, Yoo Jin (School of Mechanical Engineering, Korea University)
Park, ShinSuk (School of Mechanical Engineering, Korea University)
Publication Information
Journal of the Korea Institute of Military Science and Technology / v.20, no.4, 2017 , pp. 579-586 More about this Journal
Abstract
The defense industry has become a global industry, and military technology is actively being traded between countries to increase their military capabilities. The Republic of Korea has been ranked one of the top 10 countries for exports of military technology. To maintain competitive advantages in the global defense industry, it is essential to protect key technologies employed by exported weapon systems. Various techniques have been developed for protection of confidential technologies in weapon systems, and the U.S. DoD has been leading the development of the protection techniques. This paper reviews current anti-tampering techniques that prevent leakage of key technology from weapon exportation or pillage. Based on the protection techniques employed by the U.S. DoD Anti-Tamper Executive Agent, this paper suggests novel design methods for protection of confidential technologies. The proposed design methods were tested on an actual weapon system.
Keywords
Defense Technology Protection; Anti-Tampering; Core Technology Leakage Prevention; ATEA(Anti-Tamper Executive Agency);
Citations & Related Records
연도 인용수 순위
  • Reference
1 Dr. Mikhail J. Atallah, Eric D. Bryant, and Dr. Martin R. Stytz, "A survey of Anti-Tamper Technologies," CROSSTALK The Journal of Defense Software Engineering, pp. 13-16, November 2004.
2 Gansler, J. S, "Implementation of Anti-Tamper(AT) Techniques," DoD memorandum, March 1994.
3 Anderson, R, and M. Kuhn, "Tamper Resistance - A Cautionary Note. Proc. of Second Usenix Workshop on Electronic Commerce," Oakland, CA, pp. 1-11. Nov. 1996.
4 Arbaugh, W, D. Farber, and J. Smith, "A Secure and Reliable Bootstrap Architecture. Proc. of the IEEE Symposium on Security and Privacy," Oakland, CA, 1997.
5 Lt Col Art Huber, Jennifer M. Scott, "The Role and Nature of Anti-Tamper Techniques in U.S. Defense Acquisition 357," Acquisition Review Quarterly, Fall 1999.
6 Alvaro Ortega Chamorro, "Physical Protection : Anti-Tamper Mechanisms in CC Security Evaluations," EPOCHE & ESPRI, Norway, 10ICCC.