Browse > Article
http://dx.doi.org/10.5762/KAIS.2018.19.12.99

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development  

Lee, Min-Woo (Dept. of Systems Engineering, Ajou University)
Lee, Jae-Chon (Dept. of Systems Engineering, Ajou University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.19, no.12, 2018 , pp. 99-109 More about this Journal
Abstract
Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.
Keywords
Anti-Tampering; Technology Protection; Systems Engineering; Weapon Systems; Risk Management;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 S. J. Ahn, C. K. Jung, K. S. Oh, J. Y. Lee, "A Study on the Development of Defence Technology Protection System," Sungkyunkwan Univ. Univ-Industry Collabo, DAPA Director General for Defense Technology Control, Oct. 2016.
2 Department of Defense DIRECTIVE : Anti-Tamper(AT), DoD Directive 5200.47E, 2015.
3 H. K. Lee, W. S. Lee, Y. J. Oh, S. S. Park, "A Trend Analysis and Technology Application of Defense Technology Protection," Journal of the KIMST, Vol. 20, No. 4, pp. 579-586, 2017. DOI : http://dx.doi.org/10.9766/KIMST.2017.20.4.579
4 Mikhail J. Atallah, Eric D. Bryant, and Martin R. Stytz, "A survey of anti-tamper technologies," CROSSTALK : The Journal of Defense Software Engineering, vol. 17, no. 11, pp. 12-16, 2004.
5 Alvaro Ortega Chamorro, "Physical Protection : Anti-Tamper Mechanisms in CC Security Evaluations," EPOCHE & ESPRI, Norway, 10ICCC.
6 United States Government Accountability Office, "DoD Needs to Better support program managers' implementation of AT protection," GAO-04-302, Mar. 2004.
7 United States Government Accountability Office, "Departmentwide Direction Is Needed for Implementation of the Anti-tamper Policy," GAO-08-91, Jan. 2008.
8 H. J. Lee, "On the development of an Effective Defense Technology Protection System," Defense & Technology, Korea Defense Industry Association, Nov. 2017, vol. 465.
9 Air Force Pamphlet 63-113 : Program Protection Planning for life cycle management, Department of the Air Force, Oct. 2013.
10 Kristen Baldwin, Paul R Popick, John F Miller, and Jonathan Goodnight, "The United States Department of Defense revitalization of system security engineering through program protection," in Proc. Systems Conference (SysCon), 2012 IEEE International, 2012, pp. 1-7. DOI : https://doi.org/10.1109/syscon.2012.6189463
11 J. R. Lee, D. H. Lee, "A study on the application of the Anti-Tampering Technologies for Defense Critical Technology Protection," in Proc. 2013 KIMST General Symposium, Republic of Korea, Jeju, Jul. 4-5, 2013, pp. 78-79.
12 Department of Defense Risk, Issue, and Opportunity Management Guide for Defense Acquisition Programs, Office of the Deputy Assistant Secretary of Defense for Systems Engineering, Washington, D.C. Jan. 2017.
13 Systems Engineering Risk Management Guidebook, DAPA Acquisition Planning Bureau, Mar. 2018.
14 FIPS 140, Wikipedia, Available From : https://en.wikipedia.org/wiki/FIPS_140, (accessed Sep., 2, 2018)
15 H. S. Chae, C. S. Lee, T. R. Kim, T. H. Kim, "The Design of the Response Method in Anti-tampering for UGV," in Proc. 2017 KIMST Fall Symposium, Daejeon, Republic of Korea, Nov. 14-15, 2017, pp. 819-820.