• Title/Summary/Keyword: Trusted environment

Search Result 122, Processing Time 0.026 seconds

A study on secure electronic financial transactions in the endpoint environment infected with malware (Malware에 감염된 Endpoint환경에서 안전한 전자금융거래)

  • Lee, YeonJae;Lee, HeeJo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.405-408
    • /
    • 2014
  • 유무선 인터넷이 보편화되고 이용이 확산되면서 금융권에서는 고객의 편의성 증진을 위해 영업점의 상당한 업무를 인터넷뱅킹과 모바일뱅킹 등을 이용하여 처리할 수 있는 IT환경을 제공하고 있다. 이러한 Endpoint 환경의 변화는 점점 더 지능화되고 있는 사이버 공격 기술로 보안 위협이 증대되고 있는 실정이다. 이를 해결하기 위한 방법 중의 하나로 본 연구에서는 Reverse sandboxing 기술과 화이트리스트 기반의 보안 기술이 내장된 커널 수준의 TSX(Trusted Security Extension)기술을 통하여 맬웨어가 감염된 상태에서도 안전하게 전자금융거래를 할 수 있는 Endpoint 환경을 제공한다.

Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services

  • Moon, Ki-Young;Park, Nam-Je;Chung, Kyo-Il;Sohn, Sung-Won;Ryou, Jae-Cheol
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.86-95
    • /
    • 2005
  • Location-based services or LBS refer to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless Internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless Internet, the LBS have reconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. However, there are fears that this new wealth of personal location information will lead to new security risks, to the invasion of the privacy of people and organizations. This paper describes a novel security approach on open LBS service to validate certificate based on current LBS platform environment using XKMS (XML Key Management Specification) and SAML (Security Assertion Markup Language), XACML (extensible Access Control Markup Language) in XML security mechanism.

Intel SGX Vulnerability Research Trends (Intel SGX 취약점 연구 동향)

  • Kim, Kyung-Ho;Kwon, Hyeok-Dong;Kim, Hyun-Jun;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.461-464
    • /
    • 2019
  • 2017년에 대표적인 프로세서 취약점인 Meltdown과 Spectre가 발표됨에 따라 Intel의 CPU에서 다양한 취약점이 노출되었다. 이 취약점은 하드웨어 기반으로 신뢰 할 수 있는 환경을 보장해주는 TEE(Trusted Execution Environment) 기술을 사용하는 Intel의 SGX(Software Guard Extensions)에서도 유효하다. 따라서 이러한 취약점을 이용하여 신뢰 할 수 있는 환경에서 데이터의 무결성 및 기밀성을 훼손하는 다양한 공격 연구가 활발히 이루어지고 있다. 본 논문에서는 Intel SGX의 다양한 공격 연구에 대한 최신 동향을 살펴보며, 이에 따른 향후 연구 전망을 제시하고자 한다.

The Future of Work: Trends of Decentralized Autonomous Organizations (일의 미래: 탈중앙자율조직 DAO)

  • S.M. Choi
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.1
    • /
    • pp.65-76
    • /
    • 2023
  • Decentralized autonomous organizations (DAOs) is an effective and secure means to enable direct collaboration between people who want to achieve common goals in a digital environment, where believing each other without intermediaries from trusted third parties is difficult. DAO can flexibly implement most of the roles previously performed by existing organizations and finally aim for a new structure that functions independently without human intervention. Despite its technical and legal uncertainties and problems, DAO is rapidly expanding. This study examines trends such as the concept, use cases, participation methods, and deficiencies of DAO, which is called the future of work and helps to understand upcoming considerations.

A Study Trend on DNN security by using Trusted Execution Environment (신뢰할 수 있는 수행 환경을 활용한 DNN 보안에 관한 연구 동향)

  • Kim, Youngju;Kang, Jeong-Hwan;Kwon, Dong-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.125-127
    • /
    • 2021
  • 심층 신경망 기술은 실시간 예측 서비스를 위한 다양한 응용 분야에 적용되고 있다. 그뿐만 아니라 최근에는 민감한 개인 정보나 중요 정보들도 이러한 심층 신경망 기술을 통해 처리되면서 보안에 관한 관심이 높아지고 있다. 본 논문에서는 이러한 심층 신경망의 보안을 위해 하드웨어 기반의 안전한 수행환경에서 심층 신경망을 수행함으로써 연산 과정을 보호하는 연구들과 안전한 수행환경 내에서도 효율적인 심층 신경망 처리 기술들을 살펴볼 것이다. 그리고 이러한 연구 동향을 토대로 앞으로의 심층 신경망 연산 보호 기술의 연구 방향에 대해 논하도록 하겠다.

A Study on Key Backup Mechanism for MTM based Mobile Trusted Computing Environment (MTM 기반의 모바일 신뢰 컴퓨팅을 위한 안전한 키 백업 방안에 대한 연구)

  • Dong-Wan Kang;Sung-Ik Jun;Im-Yeong Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1554-1558
    • /
    • 2008
  • 현대의 서비스들은 점차 온라인화 되어가고 있으며, 특히 무선 통신의 발전은 따라 현대 사회인들에게 다양한 모바일 기기들을 사용하여 여러 서비스를 제공 받을 수 있도록 하였다. 하지만 모바일 단말기의 분실 및 불법적인 복제와 점차 증가하고 있는 모바일 악성코드로 인한 모바일 환경의 보안 위협은 기존의 소프트웨어 보안으로는 감당할 수 없게 되었다. 이에 안전한 모바일 환경을 위해 하드웨어 모듈 기반의 신뢰 컴퓨팅이 제안되었다. 이는 하드웨어 보안 모듈로 하여금 보안 시스템의 중추적인 역할을 하도록 하여 전체 보안 수준을 하드웨어 수준으로 높이는 장점을 가지고 있다. 하지만 이러한 하드웨어 기반의 보안 시스템에서는 사용자의 암호 및 단말기 이동에 따른 적절한 키의 백업과 복구 방안이 필요하다. 본 논문에서는 이러한 MTM기반의 모바일 신뢰 컴퓨팅에서의 키 백업에 대한 보안 요구사항과 메커니즘에 대한 분석을 제시한다.

A Study of Data Security System Based PKI on Wireless Internet Environment (무선 인터넷 환경에서의 PKI 기반 데이터 보호 시스템에 대한 연구)

  • Kim, Young-Ho;Chae, Cheol-Joo;Choi, Sang-Wook;Lee, Jae-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.233-236
    • /
    • 2008
  • Wire wireless integrated service of BcN(Broadband convergence Network) is expanding. Information Security issue is highlighted for opposing attack of getting information illegally on wire wireless network. The user of PKI(Public Key Infrastructure) cipher system among Information security technology receives various security services about authentication, confidentiality, integrity, non-repudiation and access control etc. A mobile client and server are loaded certificate and wireless internet cryptography module for trusted data send receive. And data sends receives to each other after certification process through validity check of certificate. Certificate and data security system is researched through PKI on wireless network environment and data security system in this paper.

  • PDF

Test on the Security and Performance on the Basis of the Access Control Policy Implemented by Secure OS (안전한 운영체제 접근제어 정책에 대한 보안성 및 성능 시험)

  • Kim, Jeong-Nyeo;Sohn, Sung-Won;Lee, Chelo-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.5
    • /
    • pp.773-780
    • /
    • 2003
  • SecuROS(Secure & Reliable Operating System) prevents and blocks possible system cracking by implementing additional security functions in FreeBSD 4.3 operating system (OS) kernel, including access control, user authentication, audit trail, encryption file system and trusted channel. This paper describes access control technique, which is one of core technologies of SecuROS, introduces the implementations of DAC, MAC and RBAC, all of which are corresponding access control policies, and show security and results of performance measurement on the basis of application of access control policies. Finally, security and performance between conventional OS environment and environment adopting access control policy is described.

Ensuring Anonymity for LBSs in Smartphone Environment

  • Alzaabi, Mohammed;Yeun, Chan-Yeob;Martin, Thomas Anthony
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.121-136
    • /
    • 2011
  • With the rapid growth of GPS-enable Smartphones, the interest on using Location Based Services (LBSs) has increased significantly. The evolution in the functionalities provided by those smartphones has enabled them to accurately pinpoint the location of a user. Because location information is what all LBSs depend on to process user's request, it should be properly protected from attackers or malicious service providers (SP). Additionally, maintaining user's privacy and confidentiality are imperative challenges to be overcome. A possible solution for these challenges is to provide user anonymity, which means to ensure that a user initiating a request to the SP should be indistinguishable from a group of people by any adversary who had access to the request. Most of the proposals that maintain user's anonymity are based on location obfuscation. It mainly focuses on adjusting the resolution of the user's location information. In this paper, we present a new protocol that is focused on using cryptographic techniques to provide anonymity for LBSs users in the smartphone environment. This protocol makes use of a trusted third party called the Anonymity Server (AS) that ensures anonymous communication between the user and the service provider.

A Secure Location-Based Service Reservation Protocol in Pervasive Computing Environment

  • Konidala M. Divyan;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.669-685
    • /
    • 2003
  • Nowadays mobile phones and PDAs are part and parcel of our lives. By carrying a portable mobile device with us all the time we are already living in partial Pervasive Computing Environment (PCE) that is waiting to be exploited very soon. One of the advantages of pervasive computing is that it strongly supports the deployment of Location-Based Service(s) (LBSs). In PCE, there would be many competitive service providers (SPs) trying to sell different or similar LBSs to users. In order to reserve a particular service, it becomes very difficult for a low-computing and resource-poor mobile device to handle many such SPs at a time, and to identify and securely communicate with only genuine ones. Our paper establishes a convincing trust model through which secure job delegation is accomplished. Secure Job delegation and cost effective cryptographic techniques largely help in reducing the burden on the mobile device to securely communicate with trusted SPs. Our protocol also provides users privacy protection, replay protection, entity authentication, and message authentication, integrity, and confidentiality. This paper explains our protocol by suggesting one of the LBSs namely“Secure Automated Taxi Calling Service”.

  • PDF