• Title/Summary/Keyword: 위.변조 방지

Search Result 104, Processing Time 0.022 seconds

Proposal for systems of protecting and verifying fabrication on official documents using two-dimensional barcode (이차원바코드를 이용한 공문서 위${\cdot}$변조 방지 확인 시스템 제안)

  • Ryu, Ki-Hoon;Lim, Seon-Yeong;Hahn, Hee-Il
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2007.11a
    • /
    • pp.444-448
    • /
    • 2007
  • 이차원바코드 기술과 암호화 알고리즘을 이용하여 문서의 위${\cdot}$변조 등을 방지하고 문서의 상태를 기업체나 공공기관 등에서 쉽게 확인하여 판단할 수 있는 시스템을 제안한다. 모든 위${\codt}$변조 확인이 필요한 문서에 암호화된 이차원바코드를 첨부한다. 확인자 측에서는 첨부된 이차원 바코드를 바코드 리더기로 인식하거나 이차원 바코드의 사진을 관련 인터넷 웹 사이트를 통해 문서의 위${\cdot}$변조를 판단한다.

  • PDF

The Study on Software Tamper Resistance for Securing Game Services (게임 서비스 보호를 위한 소프트웨어 위변조 방지기술 연구)

  • Chang, Hang-Bae;Kang, Jong-Gu;Joe, Tae-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1120-1127
    • /
    • 2009
  • The commensurate number of the attacks and infringement targeting a vulnerability of the game service has been increasing constantly, due to the dramatic growth and expansion of the impact of the game industry. However, there exist no subsequent researches for the differentiated technology, which is to prevent the reverse function of the game service. Therefore, in this study, we examined the current status of infringement toward online game services which are provided in the market currently and designed the proper technical measures for a manipulation of the game service which is the most vulnerable part. We have encrypted an execution file and decrypted it in real time process. Furthermore, we conducted debugging, disassemble, and prevented a its own memory dump, also concealed the information to overcome the module dependency to preclude a manipulation.

  • PDF

A Study on the Cryptography Algorithm Performance Comparison Used in Modulation and Forgery (위·변조에서 사용되는 암호알고리즘 성능 비교에 대한 연구)

  • Lee, Jun Yeong;Chang, Nam Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.250-256
    • /
    • 2017
  • Recently, the use of mobile devices has increased in order to provide a variety of services, and thus there has been a surge in the number of application malicious attacks on the Android platform. To resolve the problem, the domestic financial sector has been introducing the app anti-tamper solution based on cryptographic algorithms. However, since the capacity of apps installed in smartphones continues to increase and environments with limited resources as wearables and IoTs spread, there are limitations to the processing speed of the anti-tamper solutions. In this paper, we propose a novel anti-tamper solution by using lightweight hash function LEA and LSH. We also present the test results of a simulation program that implements this method and compare the performance with anti-tamper solutions based on the previous cryptographic algorithms.

Fax Sender Verification Technique Based on Pattern Analysis for Preventing Falsification of FAX Documents (팩스 문서 위·변조 방지를 위한 패턴 분석 기반의 팩스 송신처 검증 기법)

  • Kim, Youngho;Choi, Hwangkyu
    • Journal of Digital Contents Society
    • /
    • v.15 no.4
    • /
    • pp.547-558
    • /
    • 2014
  • Recently, in the course of business processes a variety of abuse cases of fax documents is common in general corporate, government, and financial institutions. To solve this problem, it is necessary for a technique to prevent falsification of fax documents. In this paper, we propose a new fax sender verification technique based on pattern analysis to prevent falsification of fax documents only using the received fax document. In the proposed technique, the fax sender is verified by analyzing the communication signal patterns between the fax sender and receiver and image pattern in the received fax document. In this paper, we conduct the experiments that apply our technique to real-world fax systems, and then tamper-proof effects were confirmed from the experimental results.

축산물등급판정확인서 발급 방법 개정 시행안내

  • 축산물등급판정소
    • KAPE Magazine
    • /
    • s.144
    • /
    • pp.4-5
    • /
    • 2008
  • 국내산 축산물의 품질에 대한 국민들의 관심이 높아짐에 따라 품질의 정도를 알려주는 "축산물등급판정확인서"(이하 확인서)의 이용이 많아지는 가운데, 미국산 쇠고기 수입재개의 계기로 언론에서도 확인서 위 변조 가능에 대해 관심을 나타내기도 했습니다. 축산물등급판정소는 확인서의 위 변조 유통을 방지하기 위하여 발급 방법을 8월1일부로 개정 시행하였음을 본고에서 알려드리고자 합니다.

  • PDF

Forgery Protection System and 2D Bar-code inserted Watermark (워터마크가 삽입된 이차원 바코드와 위.변조 방지 시스템)

  • Lee, Sang-Kyung;Ko, Kwang-Enu;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.6
    • /
    • pp.825-830
    • /
    • 2010
  • Generally, the copy protection mark and 2D bar-code techniques are widely used for forgery protection in printed public documents. But, it is hard to discriminate truth from the copy documents by using exisiting methods, because of that existing 2D-barcode is separated from the copy protection mark and it can be only recognized by specified optical barcord scanner. Therefor, in this paper, we proposed the forgery protection tehchnique for discriminating truth from the copy document by using watermark inserted 2D-barcord, which can be accurately distinguished not only by naked eye, but also by scanner. The copy protection mark consists of deformed patterns that are caused by the lowpass filter characteristic of digital I/O device. From these, we verified the performance of the proposed techniques by applying the histogram analysis based on the original, copy, and scanned copy image of the printed documents. Also, we suggested 2D-barcord confirmation system which can be accessed through the online server by using certification key data which is detected by web-camera, cell phone camera.

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme (익명 인증기법을 이용한 모바일 기반 차세대 본인확인수단에 관한 연구)

  • Park, Jeong Hyo;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.511-516
    • /
    • 2013
  • The cases of identification forgery and counterfeiting are increasing under the current identification system, which was established based on social conditions and administrative environments over 20 years ago. This leads to an increase of various criminal acts including illegal loan using fake ID and a number of damages caused out of good intentions that result in interference with the operations of public organizations. In addition, according to the advancement of information society, privacy protection has emerged as an important issue. However, ID card exposes individuals' personal information, such as names, resident registration numbers, photos, addresses and fingerprints, and thus the incidents associated with illegal use of personal information are increasing continuously. Accordingly, this study aimed at examining the issues of ID card forgery/counterfeiting and privacy protection and at proposing a next-generation identification system to supplement such weaknesses. The top priority has been set as prevention of forgery/counterfeiting and privacy protection in order to ensure the most important function of national identification system, which is user identification.

A Study on Website Forgery/Falsification Detection Technique using Images (이미지를 이용한 웹사이트 위·변조 탐지 기법 연구)

  • Shin, JiYong;Cho, Jiho;Lee, Han;Kim, JeongMin;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.16 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • In this paper, we propose a forgery/falsification detection technique of web site using the images. The proposed system captures images of the web site when a user accesses to the forgery/falsification web site that has the financial information deodorizing purpose. The captured images are compared with those of normal web site images to detect forgery/falsification. The proposed system calculates similarity factor of normal site image with captured one to detect whether the site is normal or not. If it is determined as normal, analysis procedure is finished. But if it is determined as abnormal, a message informs the user to prevent additional financial information spill and further accidents from the forgery web site.

Countermeasure of Mobile App tamper attack (모바일 앱 위·변조 공격 및 대응방안)

  • Jung, Hyun Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.37-40
    • /
    • 2015
  • Recently range of use also being increase along with smart phone users growing. And keep pace with hacking technician is increasing inter alia tamper technician has issued. This technician infringe integrity on three element of security of data. In this case reliability has deteriorated, the app itself has increased danger, and it's value has reduced. This can affect like take information even though don't have any authority to information or hemorrhage at large in this country. In other words, I has been arranged tamper's definition to.

  • PDF