• Title/Summary/Keyword: USB Storage

Search Result 47, Processing Time 0.029 seconds

A study on Multiple External Storage Configuration for the Android based Set-top Box System (안드로이드 기반 셋톱박스의 다중 외장 저장장치에 관한 연구)

  • Han, Kyung-Sik;Kim, In-Ki;Kim, Byung-Jun;Sonh, Seung-Il;Kang, Min-Goo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.653-655
    • /
    • 2013
  • This paper is the study of Multiple External Storage Configuration for the Android based Set-top Box system. Because of Mobile OS, Android has limitation in media streaming, recording and playing for Set-top box function with only support external storage device Micro-SD card. In this paper, we research for the Multiple External Storage configuration for external disk drive, USB Memory, SD card. in Android System with Multi-Volume Management system implementation.

  • PDF

USB security solution using 2 fator authentication (2차 인증방식을 이용한 USB보안 솔루션 (USS Solution))

  • Ko, Sang-Hyun;Han, Seok-Jin;Choi, Yoon-SU;Bae, Jong-Su;Lee, Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.267-270
    • /
    • 2017
  • As IT technology developed, storage media also developed. Among them, USB, which is a removable storage medium, is used not only to have several per person but also to work in various companies. Users store valuable and confidential data within USB. As time went on, the need for security increased. In order to solve this security problem, USB has been introduced to allow users to access internal files by inputting ID and password by embedding a security program in USB. However, the method of storing ID and Password inside is low confidentiality and high risk of information leakage. To solve these problems, we propose a 2 factor authentication system using Radius server in addition to login authentication. The proposed system not only improves the authenticity of the device, but also reduces the risk of infringement of personal information when lost. It also encrypts internal files to increase the confidentiality of internal information.

Implementation of Smart USB Memory based on Bluetooth (블루투스 기반 스마트 USB 메모리 구현)

  • Kang, Byeong-gwan;Woo, Seung-heon;Yu, Hyun-ju;Ju, Haein;Lee, Ju-won;Kang, Seong-in
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.522-524
    • /
    • 2015
  • A USB memory stick became common for secondary storage Unit.. But USB memory stick has critical problems as well. Such as personal information data leakage due to easy loss of the portable device. Therefore, User increased Repurchases of USB memory stick, and damage case of personal and company information data leakage increased. In this study, to prevent such loss and stolen, we propose Smart USB memory stick based on Bluetooth. Smart USB memory stick support the security and prevent the loss.

  • PDF

A Study on Security Solution for USB Flash Drive (USB 메모리를 위한 보안 솔루션에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.93-101
    • /
    • 2010
  • A USB flash drive is a portable storage device. For its promising moderate price, portability and high capacity USB flash drive users are increasing rapidly. Despite these advantages USB flash drives have critical problems as well. Such as personal information data leakage due to easy loss of the portable device. As these personal information leakage incidents increases various security measure solutions are produced and distributed. Despite these security measures and solutions it is not enough to perfectly protect personal data leakage. Hence the necessity of a more concrete, secure, user-friendly security measure solution is required. In this paper we provide you with portable USB flash drive security solution analysis and provide you with the latest secure, user-friendly security measure solutions.

A Study of Checking the Job History of External USB Media (외장형 USB 매체의 작업이력 점검 방법에 관한 연구)

  • Lee, Seongjae;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.753-761
    • /
    • 2017
  • Recently, malicious code infiltration and leakage of confidential documents using external USB medium are frequently occurring in each field. We investigate the media to investigate incidents using external USB media, but there are many difficulties in that they can be lost or damaged. Ultimately, in order to investigate cases of external USB media, it is necessary to conduct a direct analysis of the external USB media as well as the system to which the media is connected. This paper describes an analysis of the artifacts of Windows systems to which external USB media is connected, and how to check the job history on the media. Therefore, it is expected that the system can be used to analyze the job history of the USB medium even if the external USB medium is not secured.

Study on Hybrid Type Cloud System (하이브리드형 클라우드 시스템에 관한 연구)

  • Jang, Jae-Youl;Kim, Do-Moon;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.6
    • /
    • pp.611-618
    • /
    • 2016
  • The suggested paper studies communications network and system technology, designing data to sync to both USB memories and cloud storages at the same time, which would allow users to safely keep and manage data even in case of network troubles, affecting cloud storages, and/or loss of physical USB memories, resulting in lost data in the physical memory. The need of secure data management policy for cloud storage users form the basis of this study, offering solutions to network failures and loss of physical storage by creating hybrid cloud system. To provide convenience to windows users, the UI design should integrate that of windows explorer to maximize security and convenience.

Design of the Memory Error Test Module at a Device Driver of the Linux (리눅스 디바이스 드라이버 내의 메모리 오류 테스트 모듈 설계)

  • Jang, Seung-Ju
    • The KIPS Transactions:PartA
    • /
    • v.14A no.3 s.107
    • /
    • pp.185-190
    • /
    • 2007
  • The necessity of error test module is increasing as development of embedded Linux device driver. This paper proposes the basic concept of freed memory error test module in the Linux device driver and designs error test module. The USB device driver is designed for freed memory error test module. I insert the test code to verify the USB device driver. I test the suggested error test module for the USB storage device driver. I experiment error test in this module.

For Android-based VDI solutions, USB Redirection Technique (안드로이드 기반 VDI 솔루션에서의 USB 리다이렉션 적용 기법)

  • Lee, Jun-ha;Bae, Byoungmin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.606-608
    • /
    • 2014
  • The Study on the technique of applying the method USB redirection on Linux-based SPICE-GTK VDI solution for in (Virtual Desktop Infrastructure) VDI solution for Android-based USB redirection in this paper. VDI solutions are developed according to the development of many of the latest Android-based devices, but a VDI solution that supports USB redirection is limited. Also does not support USB redirection of Android to use the SPICE VDI solution. Therefore, the text presents the techniques applied to the Android-based VDI solutions applied to analyze the way USB redirection of SPICE-GTK VDI solution based on Linux. G PRO smartphone devices to install and use Linux-based VDI server to a test of the method applied in this paper, and the USB redirection applied VDI clients using a USB storage device, USB redirection is done playing files results you can check

  • PDF

Analysis on Vulnerability of Secure USB Flash Drive and Development Protection Profile based on Common Criteria Version 3.1 (보안 USB 플래시 드라이브의 취약점 분석과 CC v3.1 기반의 보호프로파일 개발)

  • Jeong, Han-Jae;Choi, Youn-Sung;Jeon, Woong-Ryul;Yang, Fei;Won, Dong-Ho;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.99-119
    • /
    • 2007
  • The USB flash drive is common used for portable storage. That is able to store large data and transfer data quickly and carry simply. But when you lose your USB flash drive without any security function in use, all stored data will be exposed. So the new USB flash drive supported security function was invented to compensate for the problem. In this paper, we analyze vulnerability of 6 control access program for secure USB flash drives. And we show that exposed password on communication between secure USB flash drive and PC. Also we show the vulnerability of misapplication for initialization. Further we develop a protection profile for secure USB flash drive based on the common criteria version 3.1. Finally, we examine possible threat of 6 secure USB flash drives and supports of security objectives which derived from protection profile.

Analysis and Countermeasure for BadUSB Vulnerability (BadUSB 취약점 분석 및 대응 방안)

  • Seo, Jun-Ho;Moon, Jong-Sub
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.359-368
    • /
    • 2017
  • As the BadUSB is a vulnerability, in which a hacker tampers the firmware area of a USB flash drive. When the BadUSB device is plugged into the USB port of a host system, a malicious code acts automatically. The host system misunderstands the act of the malicious behavior as an normal behaviour for booting the USB device, so it is hard to detect the malicious code. Also, an antivirus software can't detect the tampered firmware because it inspects not the firmware area but the storage area. Because a lot of computer peripherals (such as USB flash drive, keyboard) are connected to host system with the USB protocols, the vulnerability has a negative ripple effect. However, the countermeasure against the vulnerability is not known now. In this paper, we analyze the tampered area of the firmware when a normal USB device is changed to the BadUSB device and propose the countermeasure to verify the integrity of the area when the USB boots. The proposed method consists of two procedures. The first procedure is to verify the integrity of the area which should be fixed even if the firmware is updated. The verification method use hashes, and the target area includes descriptors. The second procedure is to verify the integrity of the changeable area when the firmware is updated. The verification method use code signing, and the target area includes the function area of the firmware. We also propose the update protocol for the proposed structure and verify it to be true through simulation.