• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.026 seconds

Integrity proof Method research in Mobile Forensic (모바일 포렌식 에서의 무결성 입증방안 연구)

  • Kim, Ki-Hwan;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.37-46
    • /
    • 2007
  • Lately, is trend that diffusion of Mobile information appliance that do various function by development of IT technology is increasing much. There is function that do more convenient and efficient life and business using portable phone that is Daepyo?? of Mobile information appliance, but dysfunction that is utilized by Beopjoe of pointed end engineering data leakage, individual's privacy infringement, threat and threat etc. relationship means to use Mobile Phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage Point is lacking about crime who use this portable phone. It is known that this digital Forensic field is Mobile Forensic. Is purposeful to verify actually about acquisition way of digital evidence that can happen in this treatise through portable phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

A Mechanism for the Secure IV Transmission in IPSec (IPSec에서 안전한 IV 전송을 위한 메커니즘)

  • Lee, Young-Ji;Park, Nam-Sup;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.156-164
    • /
    • 2002
  • IPSec is a protocol which provides data encryption, message authentication and data integrity on public and open network transmission. In IPSec, ESP protocol is used when it needs to provide data encryption, authentication and Integrity In real transmission packets. ESP protocol uses DES-CBC encryption mode when sender encrypts packets and receiver decrypts data through this mode IV is used at that time. This value has many tasks of attack during transmission by attacker because it is transferred clean and opened. If IV value is modified, then decryption of ESP data is impossible and higher level information is changed. In this paper we propose a new algorithm that it encrypts IV values using DES-ECB mode for preventing IV attack and checks integrity of whole ESP data using message authentication function. Therefore, we will protect attacks of IV and data, and guarantee core safe transmission on the public network.

A Practical Design and Implementation of Android App Cache Manipulation Attacks (안드로이드 앱 캐시 변조 공격의 설계 및 구현)

  • Hong, Seok;Kim, Dong-uk;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.205-214
    • /
    • 2019
  • Android uses app cache files to improve app execution performance. However, this optimization technique may raise security issues that need to be examined. In this paper, we present a practical design of "Android app cache manipulation attack" to intentionally modify the cache files of a target app, which can be misused for stealing personal information and performing malicious activities on target apps. Even though the Android framework uses a checksum-based integrity check to protect app cache files, we found that attackers can effectively bypass such checks via the modification of checksum of the target cache files. To demonstrate the feasibility of our attack design, we implemented an attack tool, and performed experiments with real-world Android apps. The experiment results show that 25 apps (86.2%) out of 29 are vulnerable to our attacks. To mitigate app cache manipulation attacks, we suggest two possible defense mechanisms: (1) checking the integrity of app cache files; and (2) applying anti-decompilation techniques.

Reliability Prediction of High Performance Mooring Platform in Development Stage Using Safety Integrity Level and MTTFd (안전무결성 수준 및 MTTFd를 활용한 개발단계의 고성능 지상체 신뢰도 예측 방안)

  • Min-Young Lee;Sang-Boo Kim;In-Hwa Bae;So-Yeon Kang;Woo-Yeong Kwak;Sung-Gun Lee;Keuk-Ki Oh;Dae-Rim Choi
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.3
    • /
    • pp.609-618
    • /
    • 2024
  • System reliability prediction in the development stage is increasingly crucial to reliability growth management to satisfy its target reliability, since modern system usually takes a form of complex composition and various complicated functions. In most cases of development stage, however, the information available for system reliability prediction is very limited, making it difficult to predict system reliability more precisely as in the production and operating stages. In this study, a system reliability prediction process is considered when the reliability-related information such as SIL (Safety Integrity Level) and MTTFd (Mean Time to Dangerous Failure) is available in the development stage. It is suggested that when the SIL or MTTFd of a system component is known and the field operational data of similar system is given, the reliability prediction could be performed using the scaling factor for the SIL or MTTFd value of the component based on the similar system's field operational data analysis. Predicting a system reliability is then adjusted with the conversion factor reflecting the temperature condition of the environment in which the system actually operates. Finally, the case of applying the proposed system reliability prediction process to a high performance mooring platform is dealt with.

A Techniques to Conceal Information Using Eojeol in Hangul Text Steganography (한글 텍스트 스테가노그래피에서 어절을 이용한 정보은닉 기법)

  • Ji, Seon Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.5
    • /
    • pp.9-15
    • /
    • 2017
  • In the Digital Age, All Data used in the Internet is Digitized and Transmitted and Received Over a Communications Network. Therefore, it is Important to Transmit Data with Confidentiality and Integrity, Since Digital Data may be Tampered with and Tampered by Illegal users. Steganography is an Efficient Method for Ensuring Confidentiality and Integrity Together with Encryption Techniques. I Propose a Hangul Steganography Method that Inserts a Secret Message based on a Changing Insertion Position and a Changing Eojeol Size in a Cover Medium. Considering the Insertion Capacity of 3.35% and the File Size Change of 0.4% in Hangul Text Steganography, Experimental Results Show that the Jaro_score Value needs to be Maintained at 0.946.

A Study of Network Forensic for IDS (IDS 관제를 위한 네트워크 포렌식 연구)

  • Lee, Gi-Sung;No, Si-Young;Park, Sang-Joon;Lee, Jong-Chan;Lee, Seong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.467-473
    • /
    • 2011
  • The Network-packet in this Paper to ensure the integrity of the legal evidence is effect that can have is to offer an Network-forensics system. The Paper proposed Network-forensics system in the company through legal disputes accident Networking and state agency (with investigative authority) for criminal investigations in networking for the effective and correct way to present a report of user-centric services through effective awareness can be improved.

A Delegation Model based on Agent in Distributed Systems

  • Kim, Kyu-Il;Lee, Joo-Chang;Choi, Won-Gil;Lee, Eun-Ju;Kim, Ung-Mo
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.82-88
    • /
    • 2007
  • Web services are the new building block of today's Internet, and provides interoperability among heterogeneous distributed systems. Recently in web services environment, security has become one of the most critical issues. The hackers attack one of fragile point and can misuse legitimate user privilege because all of the connected devices provide services for the user control and monitoring in real time. Also, the users of web services must temporarily delegate some or all of their rights to agents in order to perform actions on their behalf. This fact risks the exposure of user privacy information. In this paper, we propose secure delegation model based on SAML that provides confidentiality and integrity about the user information in distributed systems. In order to support privacy protection, service confidentiality, and assertion integrity, encryption and a digital signature mechanism is deployed. We build web service management server based on XACML, in order to manage services and policies of web service providers.

Implementation of Remote Physical Security Systems Using Smart Phone (스마트폰을 이용한 원격 물리적 보안 시스템의 구현)

  • Lee, Moon-Goo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.217-224
    • /
    • 2011
  • Existing wire based physical security system solutions show limitations in time and space. In order to solve these deficiencies, a remote physical security system has been implemented using smart phone based on mobile cloud computing technique. The security functions of mobile cloud computing technique include mobile device user authentication, confidentiality of communication, integrity of information, availability of system, and target system access control, authority management and secure hand off etc. Proposed system has been constructed as remote building management system using smart phone, and also has been efficient to reduce energy cost (5~30%), result of system average access and response time 7.082 second. This systems are evaluated to have high efficiency compared to performance.

Security Model for Tree-based Routing in Wireless Sensor Networks: Structure and Evaluation

  • Almomani, Iman;Saadeh, Maha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.4
    • /
    • pp.1223-1247
    • /
    • 2012
  • The need for securing Wireless Sensor Networks (WSNs) is essential especially in mission critical fields such as military and medical applications. Security techniques that are used to secure any network depend on the security requirements that should be achieved to protect the network from different types of attacks. Furthermore, the characteristics of wireless networks should be taken into consideration when applying security techniques to these networks. In this paper, energy efficient Security Model for Tree-based Routing protocols (SMTR) is proposed. In SMTR, different attacks that could face any tree-based routing protocol in WSNs are studied to design a security reference model that achieves authentication and data integrity using either Message Authentication Code (MAC) or Digital Signature (DS) techniques. The SMTR communication and processing costs are mathematically analyzed. Moreover, SMTR evaluation is performed by firstly, evaluating several MAC and DS techniques by applying them to tree-based routing protocol and assess their efficiency in terms of their power requirements. Secondly, the results of this assessment are utilized to evaluate SMTR phases in terms of energy saving, packet delivery success ratio and network life time.

Improved Application Test Data Range Selection Method in a Non-Personal Information Identification Environment (개인정보 비식별 환경에서의 개선된 응용프로그램 테스트 데이터 범위 선정 방법)

  • Baek, Song-yi;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.823-834
    • /
    • 2020
  • In the past, when the personal information leakage incident of the three card companies, the computer program development was followed by the same strict electronic financial supervision regulations as the operating environment. However, when developing a computerized program, the application data is being verified with the integrity of the test data being compromised because the identification of the scope of conversion of the test data associated with the application is unclear. Therefore, in this paper, we proved by presenting a process and algorithm for selecting a range of sufficient test data conversion targets associated with a specific application.