• Title/Summary/Keyword: Security technologies

Search Result 1,846, Processing Time 0.026 seconds

User behavior analysis in No Disk System Configuration (No Disk System 환경에서의 사용자 행위 분석)

  • Kim, Deunghwa;Namgung, Jaeung;Park, Jungheum;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.491-500
    • /
    • 2013
  • With the advent of big data and increased costs of SSD(HDD), domestic and foreign Internet cafes and organizations have adopted NDS(No Disk System) solution recently. NDS is a storage virtualization solution based on a kind of cloud computing. It manages Operating System and applications in the central server, which were originally managed by individual computers. This research will illustrate the way to analyze user's behaviors under NDS circumstance.

A Study of Memory Information Collection and Analysis in a view of Digital Forensic in Window System (윈도우 시스템에서 디지털 포렌식 관점의 메모리 정보 수집 및 분석 방법에 관한 고찰)

  • Lee Seok-Hee;Kim Hyun-Sang;Lim JongIn;Lee SangJin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.87-96
    • /
    • 2006
  • In this paper, we examine general digital evidence collection process which is according to RFC3227 document[l], and establish specific steps for memory information collection. Besides, we include memory dump process to existing digital evidence collection process, and examine privacy information through dumping real user's memory and collecting pagefile which is part of virtual memory system. Especially, we discovered sensitive data which is like password and userID that exist in the half of pagefiles. Moreover, we suggest each analysis technique and computer forensic process for memory information and virtual memory.

Differential Fault Analysis on Block Cipher ARIA-128 (블록 암호 ARIA-128에 대한 차분 오류 공격)

  • Park, Se-Hyun;Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.15-25
    • /
    • 2011
  • A differential fault analysis(DFA) is one of the most important side channel attacks on block ciphers. Most block ciphers, such as DES, AES, ARIA, SEED and so on., have been analysed by this attack. In 2008, Wei et al. proposed the first DFA on ARIA-128. Their attack can recover the 128-bit secrey key by about 45 faulty ciphertexts. In this paper, we propose an improved DFA on ARIA-128. We can recover the 12S-bit secret key by only 4 faulty ciphertexts with the computational complexity of O($2^{32}$).

Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution-Permutation Networks

  • Kang, Ju-Sung;Hong, Seok-Hie;Lee, Sang-Jin;Yi, Ok-Yeon;Park, Choon-Sik;Lim, Jong-In
    • ETRI Journal
    • /
    • v.23 no.4
    • /
    • pp.158-167
    • /
    • 2001
  • We examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical and provable security of these diffusion layers against differential and linear cryptanalysis. First, in terms of practical security, we show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are identical. We also study the optimal diffusion effect for some diffusion layers according to their constraints. Second, we obtain the results that the consecutive two rounds of SPN structure provide provable security against differential and linear cryptanalysis, i.e., we prove that the probability of each differential (resp. linear hull) of the consecutive two rounds of SPN structure with a maximal diffusion layer is bounded by $p^n(resp.q^n)$ and that of each differential (resp. linear hull) of the SDS function with a semi-maximal diffusion layer is bounded by $p^{n-1}(resp. q^{n-1})$, where p and q are maximum differential and linear probabilities of the substitution layer, respectively.

  • PDF

A Proposal of Digital Forensic Investigation Process Model (디지털 포렌식 수사 절차 모델 제안)

  • Shin Jae-Lyong;Lee Seok-Hee;Lee Sang-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.403-407
    • /
    • 2006
  • 완벽한 디지털 범죄 수사를 위해서는 우수한 디지털 포렌식 기술이 우선적으로 요구되겠지만, 범죄수사의 특성상 기술이외에도 법적, 제도적 측면들이 적절하게 조합되어야만 한다. 본 논문에서는 디지털 포렌식의 제도 및 정책적인 면에서 디지털 범죄 수사의 절차가 현실적으로 적용 가능하고, 범죄 해결에 효율적이며 합법성을 유지하면서 진행될 수 있도록 새로운 형태의 디지털 포렌식 절차를 제안하고자 한다.

  • PDF

Forensics Analysis through Spool(SPL, SHD) File Recover (프린터 스풀(SPL, SHD) File 복구를 통한 포렌식 분석)

  • Choi Joon-Ho;Lee Sang-Jin;Lim Jong-In
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.408-411
    • /
    • 2006
  • 본 논문에서는 원활한 프린터 작업을 위해 컴퓨터와 프린터 사이의 대기시간을 없애기 위한 수단으로 사용되고 있는 스풀작업에 대한 설명과, 포렌식 수사에 있어서 중요한 정보를 가지고 있는 스풀작업정보를 가지고 있는 SHD, SPL 파일의 구조와 분석방법, 스풀 파일을 복구하는 절차와 방법을 제시하였다. SHD, SPL 파일에서 알아낼 수 있는 용의자가 인쇄한 문서의 제목과, 내용, 문서를 인쇄한 시간 정보를 획득하고, 이를 컴퓨터 범죄 수사에 활용하는 방안을 제시하였다.

  • PDF

The method of recovery for deleted record in Oracle Database (Oracle 데이터베이스의 삭제된 레코드 복구 기법)

  • Choi, Jong-Hyun;Jeong, Doo Won;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.947-955
    • /
    • 2013
  • Most of the enterprise information is stored in the database. Therefore, in order to investigate the company's criminal behavior, forensic analysis is important for the database and delete record is a need to develop recovery techniques. This paper is explained structure of the oracle database tablespace file and analyzed system tables that stored table information. Further, we suggests a method of recovery for deleted record in oracle tablespace.

Trends of Intelligent Public Safety Service Technologies (지능형 치안 서비스 기술 동향)

  • Bang, J.S.;Park, W.J.;Yoon, S.Y.;Sin, J.H.;Lee, Y.T.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.1
    • /
    • pp.111-122
    • /
    • 2019
  • As society develops, the demand for safety and security services increases. Developed nations such as the United States use advanced technology to lower crime rate and promote intelligent security services. First, this article examines intelligent systems that are used for monitoring and detecting crimes and dangerous situations. Recently, we have been studying technologies that enable preemptive responses through prediction of crime and hazardous situations. In this paper, we examine the cases of security services based on a crime/risk prediction model and explain the structure and major technologies of an intelligent security system. In addition, we propose a direction for technological development for achieving future security services.

Digital Technologies for Learning a Foreign Language in Educational Institutions

  • Olha Byriuk;Tetiana Stechenko;Nataliya Andronik;Oksana Matsnieva;Larysa Shevtsova
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.89-94
    • /
    • 2024
  • The main purpose of the study is to determine the main elements of the use of digital technologies for learning a foreign language in educational institutions. The era of digital technologies is a transition from the traditional format of working with information to a digital format. This is the era of the total domination of digital technologies. Digital technologies have gained an unprecedented rapid and general distribution. In recent years, all spheres of human life have already undergone the intervention of digital technologies. Therefore, it is precisely the educational industry that faces a difficult task - to move to a new level of education, where digital technologies will be actively used, allowing you to conveniently and quickly work in the information field for more effective learning and development. The study has limitations and they relate to the fact that the practical activities of the process of using digital technologies in the system of preparing the study of a foreign language were not taken into account.

The Method of Recovery for Deleted Record in the Unallocated Space of SQLite Database (SQLite 데이터베이스의 비 할당 영역에 잔존하는 삭제된 레코드 복구 기법)

  • Jeon, Sang-Jun;Byun, Keun-Duck;Bang, Je-Wan;Lee, Guen-Gi;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.143-154
    • /
    • 2011
  • SQLite is a small sized database engine largely used in embedded devices and local application software. The availability of portable devices, such as smartphones, has been extended over the recent years and has contributed to growing adaptation of SQLite. This implies a high likelihood of digital evidences acquired during forensic investigations to include SQLite database files. Where intentional deletion of sensitive data can be made by a suspect, forensic investigators need to recover deleted records in SQLite at the best possible. This study analyzes data management rules used by SQLite and the structure of deleted data in the system, and in turn suggests a recovery Tool of deleted data. Further, the study examines major SQLite suited software as it validates feasible possibility of deleted data recovery.