• Title/Summary/Keyword: Software Integrity

Search Result 251, Processing Time 0.028 seconds

Design of Cryptographic Hardware Architecture for Mobile Computing

  • Kim, Moo-Seop;Kim, Young-Sae;Cho, Hyun-Sook
    • Journal of Information Processing Systems
    • /
    • v.5 no.4
    • /
    • pp.187-196
    • /
    • 2009
  • This paper presents compact cryptographic hardware architecture suitable for the Mobile Trusted Module (MTM) that requires low-area and low-power characteristics. The built-in cryptographic engine in the MTM is one of the most important circuit blocks and contributes to the performance of the whole platform because it is used as the key primitive supporting digital signature, platform integrity and command authentication. Unlike personal computers, mobile platforms have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore special architecture and design methods for a compact cryptographic hardware module are required. The proposed cryptographic hardware has a chip area of 38K gates for RSA and 12.4K gates for unified SHA-1 and SHA-256 respectively on a 0.25um CMOS process. The current consumption of the proposed cryptographic hardware consumes at most 3.96mA for RSA and 2.16mA for SHA computations under the 25MHz.

Product data model for PLM system

  • Li, Yumei;Wan, Li;Xiong, Tifan
    • International Journal of CAD/CAM
    • /
    • v.11 no.1
    • /
    • pp.1-10
    • /
    • 2011
  • Product lifecycle management (PLM) is a new business strategy for enterprise's product R&D. A PLM system holds and maintaining the integrity of the product data produced throughout its entire lifecycle. There is, therefore, a need to build a safe and effective product data model to support PLM system. The paper proposes a domain-based product data model for PLM. The domain modeling method is introduced, including the domain concept and its defining standard along the product evolution process. The product data model in every domain is explained, and the mapping rules among these models are discussed. Mapped successively among these models, product data can be successfully realized the dynamic evolution and the historical traceability in PLM system.

  • PDF

Watermarking Algorithm to Authenticate Image Integrity on JPEG Compression (JPEG 압축 표준에서 이미지 무결성 인증을 위한 워터마킹 알고리즘)

  • Jo, Hyun-Wu;Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.302-305
    • /
    • 2011
  • 멀티미디어 콘텐츠는 디지털 데이터의 특성상 위 변조 또는 불법유통 등의 문제가 발생할 수 있다. 특히 의료 및 군사, 예술 분야 등 많은 부분에서 멀티미디어 데이터의 보안성이 중요한 이슈가 되고 있다. 본 논문에서는 이러한 기술적 요구에 맞추어 이미지의 무결성을 인증할 수 있는 워터마킹 알고리즘을 제안한다. 제안하는 알고리즘은 JPEG 이미지 압축 과정에서 추가적인 처리를 통해 이미지에 인증코드를 삽입하고, 디코딩 과정에서 삽입 인증코드 추출 및 비교 인증코드 재생성을 통해 이미지의 원본 여부를 블록 단위로 판단할 수 있다. 제안 알고리즘을 통해 생성된 JPEG 이미지 표준 인코딩 이미지 대비 2.44dB 의 화질 저하를 보였고 1.63%의 압축률 차이를 보였다.

Implementation of Rule Management System for Validating Spatial Object Integrity (공간 객체 무결성 검증을 위한 규칙 관리 시스템의 구현)

  • Go, Goeng-Uk;Yu, Sang-Bong;Kim, Gi-Chang;Cha, Sang-Gyun
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.12
    • /
    • pp.1393-1403
    • /
    • 1999
  • 공간 데이타베이스 시스템을 통하여 공유되는 공간 데이타는 무결성이 적절하게 유지되지 않는 한 전체 응용 시스템의 행위를 예측할 수 없게 되므로 데이타의 무결성 확인 및 유지는 필수적이다. 특히 공공 GIS에 저장된 공간 데이타는 토지 이용도 평가, 도시 계획, 자원 관리, 시설물 관리, 안전 관리, 국방 등 국가 전체 및 지역의 중요한 정책 결정을 위한 다양한 응용 시스템들에 의해 이용되므로 적절한 공간 객체의 무결성 확인이 더욱 더 필요하다. 본 논문에서는 능동(active) DBMS의 능동 규칙(active rule) 기법을 이용하여 공간 객체의 무결성 확인을 지원하기 위한 규칙 관리 시스템을 제시한다. 능동 규칙을 이용한 공간 객체의 무결성 확인은 응용 프로그래머를 무결성 확인에 대한 부담으로부터 자유롭게 할 수 있다. 본 시스템은 특정 DBMS에 종속되지 않는 독립적인 외부 시스템으로 존재하며, 능동 규칙 관리기, 규칙 베이스, 그리고 활성규칙 생성기의 3 부분으로 구성된다. 사용자가 공간 데이타베이스 응용 프로그램을 통해 공간 객체를 조작하고자 할 때, 본 시스템은 데이타베이스 트랜잭션을 단위로 조작되는 모든 공간 객체의 무결성 확인을 위해 응용 프로그램에 삽입될 무결성 제약조건 규칙들을 효율적으로 관리하는 역할을 한다.Abstract It is necessary that the integrity of spatial data shared through the spatial database system is validated and appropriately maintained, otherwise the activity of whole application system is unpredictable. Specially, the integrity of spatial data stored in public GIS has to be validated, because those data are used by various applications which make a decision on an important policy of the region and/or whole nation such as evaluation of land use, city planning, resource management, facility management, risk management/safety supervision, national defense. In this paper, we propose rule management system to support validating the integrity of spatial object, using the technique of active rule technique from active DBMS. Validating data integrity using active rules allows database application programmer to be free from a burden on validation of the data integrity. This system is an independent, external system that is not subject to specific DBMS and consists of three parts, which are the active rule manager, the rule base, and the triggered rule generator. When an user tries to manipulate spatial objects through a spatial database application program, this system serves to efficiently manage integrity rules to be inserted into the application program to validate the integrity constraints of all the spatial objects manipulated by database transactions.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

Evaluation of Software Diagnostics for Secure Operational Environment in Nuclear I&C systems (원전 계측제어 시스템 보안성환경을 위한 진단기능 평가)

  • Yoo, Sung Goo;Seul, Namo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.107-112
    • /
    • 2016
  • Safety Critical Instrumentation and Control Systems perform those functions to maintain nuclear power plants' parameters within acceptable limits established for a design basis events and anticipated operating occurrence to ensure safety function. Those digitalized systems shall protect inadvertent and non-malicious behavior to ensure the reliable operation of systems, known as a Secure Development and Operational Environment(SDOE). SDOE would be established through managerial and technical controls. The objective of this paper is to evaluate the effectiveness of Cyclic Redundancy Checksum diagnostic, which is one of technical controls for SDOE, that can confirm the integrity of software of I&C systems to establish the secure environment. The results of this assessment would be the practical implementation of design and safety review of nuclear I&C systems.

Analysis of MSAS Correction Information and Performance in Korea (MSAS 보정정보 분석 및 국내 적용 시 성능 평가)

  • Jeong, Myeong-Sook;Kim, Jeong-Rae
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.4
    • /
    • pp.372-382
    • /
    • 2009
  • A GNSS software for processing the SBAS correction data is developed, and Japan MSAS correction data is analyzed. MSAS orbit correction data is analyzed and compared with WAAS data. MSAS ionosphere correction data is analyzed and the effect of the equatorial anomaly on the correction accuracy is discussed. Degradation due to receive delay of correction information and effect of the degradation on protection level analyzed using partial remove of MSAS correction information. Integrity and availability for precision approch using the MSAS system analyzed.

Factors Influencing the Efforts for Embedded Software Maintenance : A Case from Semiconductor Wafer Processing Line (임베디드 소프트웨어 유지보수 노력의 영향요인 연구 : 반도체 웨이퍼 가공라인 사례를 중심으로)

  • Cho, Namhyung;Kim, Chi Rin;Kim, Mi Ryang
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.211-221
    • /
    • 2017
  • The semiconductor industry develops and maintains software embedded in computer-controlled tools and facilities, to process and manufacture high-tech products. Upgrading embedded softwares for semiconductor processing robots and machinery is one of the basic activities that must be performed in order to maintain product quality and integrity. Maintenance and enhancement of embedded software consume a major portion of the total life cycle cost of a system. However, the area has been given little attention in the literature. 502 maintenance and enhancement cases, related to embedded softwares in wafer processing machines, were selected at random for analysis. Practical implications are also discussed.

Analysis and Countermeasure for BadUSB Vulnerability (BadUSB 취약점 분석 및 대응 방안)

  • Seo, Jun-Ho;Moon, Jong-Sub
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.359-368
    • /
    • 2017
  • As the BadUSB is a vulnerability, in which a hacker tampers the firmware area of a USB flash drive. When the BadUSB device is plugged into the USB port of a host system, a malicious code acts automatically. The host system misunderstands the act of the malicious behavior as an normal behaviour for booting the USB device, so it is hard to detect the malicious code. Also, an antivirus software can't detect the tampered firmware because it inspects not the firmware area but the storage area. Because a lot of computer peripherals (such as USB flash drive, keyboard) are connected to host system with the USB protocols, the vulnerability has a negative ripple effect. However, the countermeasure against the vulnerability is not known now. In this paper, we analyze the tampered area of the firmware when a normal USB device is changed to the BadUSB device and propose the countermeasure to verify the integrity of the area when the USB boots. The proposed method consists of two procedures. The first procedure is to verify the integrity of the area which should be fixed even if the firmware is updated. The verification method use hashes, and the target area includes descriptors. The second procedure is to verify the integrity of the changeable area when the firmware is updated. The verification method use code signing, and the target area includes the function area of the firmware. We also propose the update protocol for the proposed structure and verify it to be true through simulation.

Statistical Test for Performance Evaluation of Code Carrier Divergence Detection at a GBAS Reference Station (GBAS 기준국의 코드 반송파 발산 검출성능 평가를 위한 통계시험)

  • Yun, Young-Sun;Kim, Joo-Kyoung;Cho, Jeong-Ho;Heo, Moon-Beom;Nam, Gi-Wook
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.40 no.9
    • /
    • pp.760-770
    • /
    • 2012
  • In order to provide precision approach service based on GBAS, air navigation service providers should validate the GBAS system performance against international standard requirements and receive approval. The GBAS manufacturer should define integrity threat, analyze the integrity monitors and evaluate performance of the implemented monitors to verify integrity performance which is critical to the aircraft safety. This paper describes a statistical test result to evaluate performance of the code carrier divergence monitors implemented in KARI Integrity Monitor System software. The paper introduces analysis and test procedure which is developed for the performance evaluation and describes the analysis, the test scenario generation and the test results. The results show that the implemented monitors can detect the expected minimum detectable errors with satisfying the probability of missed detection requirements.