• Title/Summary/Keyword: Security essential information

Search Result 491, Processing Time 0.031 seconds

GoAsap: A Proposal for a Golang New Version Detection and Analysis System from a Static Analysis Perspective (GoAsap: 정적분석 관점에서 바라보는 Golang 신버전 탐지·분석시스템 제안)

  • Hyeongmin Kang;Yoojae Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.707-724
    • /
    • 2024
  • Recently, Golang has been gaining attention in programming language rankings each year due to its cross-compilation capabilities and high code productivity. However, malware developers have also been increasingly using it to distribute malware such as ransomware and backdoors. Interestingly, Golang, being an open-source language, frequently changes the important values and configuration order of a crucial structure called Pclntab, which includes essential values for recovering deleted symbols whenever a new version is released. While frequent structural changes may not be an issue from a developer's perspective aiming for better code readability and productivity, it poses challenges in cybersecurity, as new versions with modified structures can be exploited in malware development. Therefore, this paper proposes GoAsap, a detection and analysis system for Golang executables targeting the new versions, and validates the performance of the proposed system by comparing and evaluating it against six existing binary analysis tools.

Plan of Information System for Combined Treatment of the Oriental and the Western Medicine (한.양방 협진 정보시스템 구축방안 연구)

  • Yea, Sang-Jun;Jang, Hyun-Chul;Kim, Chul;Kim, Jin-Hyun;Kim, Sang-Kyun;Song, Mi-Young
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.13 no.3
    • /
    • pp.19-28
    • /
    • 2009
  • Background : Recently, Medical Act was amended to encourage the induction of combined treatment between Oriental Medicine doctors and Western doctors. As yet, the information infra for combined treatment has not been studied. Objectives : This study aimed to design the architecture of information system for combined treatment of the Oriental and the Western Medicine. Methods : First, we defined the information of combined treatment through the analysis of research trends from the inside and outside of the country. Because the data compatibility is very important, the definition of information must be ahead of anything else. Second, we designed the architecture of information system based on the prior definition. Results : We classified the information for combined treatment by subject such as law, clinic, research, manpower, facilities, and education. In this paper information system examined in three aspects. First the infra layer is organized as hardware, netware, and security. Second is data warehouse layer for the storing, filtering, and extraction of data. Third is service layer which is related to data transmission. And Finally all information for combined treatment is provided through the portal system for medical consumer, political planner, and R&D researcher. Conclusion : In this paper, we studied the essential factors of combined treatment information in the view point of information system. But the detailed design and implementation of information system must be followed to effect this results.

  • PDF

Identity-Exchange based Privacy Preserving Mechanism in Vehicular Networks (차량 네트워크에서 신원교환을 통해 프라이버시를 보호하는 방법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1147-1157
    • /
    • 2014
  • Intelligent transportation system (ITS) is realized through a highly ephemeral network, i.e. vehicular ad hoc network (VANET) which is on its way towards the deployment stage, thanks to the advancements in the automobile and communication technologies. However, it has not been successful, at least to date, to install the technology in the mass of vehicles due to security and privacy challenges. Besides, the users of such technology do not want to put their privacy at stake as a result of communication with peer vehicles or with the infrastructure. Therefore serious privacy measures should be taken before bringing this technology to the roads. To date, privacy issues in ephemeral networks in general and in VANET in particular, have been dealt with through various approaches. So far, multiple pseudonymous approach is the most prominent approach. However, recently it has been found out that even multiple pseudonyms cannot protect the privacy of the user and profilation is still possible even if different pseudonym is used with every message. Therefore, another privacy-aware mechanism is essential in vehicular networks. In this paper, we propose a novel identity exchange mechanism to preserve conditional privacy of the users in VANET. Users exchange their pseudonyms with neighbors and then use neighbors' pseudonyms in their own messages. To this end, our proposed scheme conditionally preserves the privacy where the senders of the message can be revoked by the authorities in case of any dispute.

Research of Secret Communication Using Quantum key Distribution and AES (양자키 교환과 AES를 이용한 비밀통신 연구)

  • Choung, Young-Chul;Rim, Kwang-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.1
    • /
    • pp.84-90
    • /
    • 2014
  • Secret communication has developed from analogue communication to digital one. Secret communication which is based on digital communication has been designed succeeding safety of one-time pad. One-time pad's safety is attributed to the security of secret key's mutual storage and mutual synchronization that is the key's interchange basis is one of the essential factors. This manuscript examines mathematical stability of BB84 algorithm which is one of the quantum cryptography system, and conducts transmission of quantum key. The created key suggests One-time Pad algorithm which interchanges ciphertext implemented AES's 64th round.

Blockchain-based Lightweight Mutual Authentication Protocol for IoT Systems

  • Choi, Wonseok;Kim, Sungsoo;Han, Kijun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.1
    • /
    • pp.87-92
    • /
    • 2020
  • Various devices, which are powerful computer and low-performance sensors, is connected to IoT network. Accordingly, applying mutual authentication for devices and data encryption method are essential since illegal attacks are existing on the network. But cryptographic methods such as symmetric key and public key algorithms, hash function are not appropriate to low-performance devices. Therefore, this paper proposes blockchain-based lightweight IoT mutual authentication protocol for the low-performance devices.

The Design and Implementation of Messenger Authentication Protocol to Prevent Smartphone Phishing (스마트폰 피싱에 안전한 메신저 인증 프로토콜 설계 및 구현)

  • Yu, Byung-Seok;Yun, Sung-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.4
    • /
    • pp.9-14
    • /
    • 2011
  • Phishing is an attack to theft an user's identity by masquerading the user or the device. The number of phishing victims are sharply increased due to wide spread use of smart phones and messenger programs. Smart phones can operate various wi-fi based apps besides typical voice call and SMS functions. Generally, the messenger program such as Kakao Talk or Nate On is consisted of client and server functions. Thus, the authentication between the client and the server is essential to communicate securely. In this paper, we propose the messenger authentication protocol safe against smart phone phishing. To protect communications among clients, the proposed method provides message encryption and authentication functions.

Study on Development of GIS based Maritime Boundary Delimitation Support System (GIS 기반의 해양경계획정 지원시스템 개발에 관한 연구)

  • Lee, Dong-Chul;Kim, Kye-Hyun;Park, Yong-Gil
    • Journal of Ocean Engineering and Technology
    • /
    • v.26 no.4
    • /
    • pp.23-29
    • /
    • 2012
  • Korea has maritime jurisdiction over an area 4.5 times larger than the nation's inland area, but negotiations with surrounding nations on the maritime boundary delimitation have still not been completed satisfactorily. In particular, maritime boundary delimitation has become an important issue in terms of maritime security and resource exploration. Considering national interests, the delimitation of the maritime boundary is essential. However, no system to help the decision-makers involved in maritime boundary delimitation has yet been systematically constructed. Therefore, the aim of this study was the development of a system to support such decision-making. In this study, considerations related to maritime boundary delimitation were investigated through expert advice and international precedents. Based on these considerations, data were collected from several organizations, and a spatial database was systematically constructed. Finally, MBDSS (maritime boundary delimitation support system) was developed to support maritime boundary delimitation. This GIS-based system provides visual information about the considerations for the maritime boundary delimitation. Thus, it could help decision-makers to choose appropriate boundaries during the negotiation. Furthermore, this system is expected to be utilized as a scientific tool on the delimitation of maritime boundaries.

Design and Implementation of Building Control System based 3D Modeling (3D 모델링 기반 빌딩관제시스템의 설계 및 구현)

  • Moon, Sang Ho;Kim, Byeong Mok;Lee, Gye Eun
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.673-682
    • /
    • 2020
  • Buildings are becoming more and more high-rise and large-scale in recent years, so in the event of a disaster such as a fire, enormous human and economic damage is expected. Therefore, management, security, and fire control are essential for large buildings in the city. Because these large buildings are very complex outside and inside, they need a three-dimensional control based on 3D modeling rather than a simple flat-oriented control. To do this, this paper designed and implemented a building control system based on 3D modeling. Specifically, we designed a 3D building / facility editing module for 3D modeling of buildings, a 3D based control module for building control, and a linkage module that connects information such as firefighting equipment, electrical equipment and IoT equipment. Based on this design, a building control system based on 3D modeling was implemented.

Design and Implementation of The Spam I-Mail filtering System (컨텐츠 필터를 이용한 스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.465-468
    • /
    • 2003
  • E-mail, one of the oldest services in internet becomes very important and essential way to communicate with development of internet. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or bad things, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

Research on the Issuing and Management Model of Certificates based on Clustering Using Threshold Cryptography in Mobile Ad Hoc Networking (이동 Ad Hoc 네트워킹에서 Threshold Cryptography를 적용한 클러스터 기반의 인증서 생성 및 관리 모델연구)

  • Park, Bae-Hyo;Lee, Jae-Il;Hahn, Gene-Beck;Nyang, Dae-Hun
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2004
  • A mobile ad hoc network(MANET) is a network where a set of mobile devices communicate among themselves using wireless transmission without the support of a fixed network infrastructure. The use of wireless links makes MANET susceptible to attack. Eavesdroppers can access secret information, violating network confidentiality, and compromised nodes can launch attack from within a network. Therefore, the security for MANET depends on using the cryptographic key, which can make the network reliable. In addition, because MANET has a lot of mobile devices, the authentication scheme utilizing only the symmetric key cryptography can not support a wide range of device authentication. Thereby, PKI based device authentication technique in the Ad Hoc network is essential and the paper will utilize the concept of PKI. Especially, this paper is focused on the key management technique of PKI technologies that can offer the advantage of the key distribution, authentication, and non-reputation, and the issuing and managing technique of certificates based on clustering using Threshold Cryptography for secure communication in MANET.