• Title/Summary/Keyword: key-code

Search Result 662, Processing Time 0.024 seconds

Cryptography Module Detection and Identification Mechanism on Malicious Ransomware Software (악성 랜섬웨어 SW에 사용된 암호화 모듈에 대한 탐지 및 식별 메커니즘)

  • Hyung-Woo Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Cases in which personal terminals or servers are infected by ransomware are rapidly increasing. Ransomware uses a self-developed encryption module or combines existing symmetric key/public key encryption modules to illegally encrypt files stored in the victim system using a key known only to the attacker. Therefore, in order to decrypt it, it is necessary to know the value of the key used, and since the process of finding the decryption key takes a lot of time, financial costs are eventually paid. At this time, most of the ransomware malware is included in a hidden form in binary files, so when the program is executed, the user is infected with the malicious code without even knowing it. Therefore, in order to respond to ransomware attacks in the form of binary files, it is necessary to identify the encryption module used. Therefore, in this study, we developed a mechanism that can detect and identify by reverse analyzing the encryption module applied to the malicious code hidden in the binary file.

MAC Layer Based Certificate Authentication for Multiple Certification Authority in MANET

  • Sekhar, J. Chandra;Prasad, Ramineni Sivarama
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.298-305
    • /
    • 2014
  • In this study, a novel Randomly Shifted Certification Authority Authentication protocol was used in ad hoc networks to provide authentication by considering the MAC layer characteristics. The nodes achieve authentication through the use of public key certificates issued by a CA, which assures the certificate's ownership. As a part of providing key management, the active CA node transfers the image of the stored public keys to other idle CA nodes. Finally the current active CA randomly selects the ID of the available idle CA and shifts the CA ownership by transferring it. Revoking is done if any counterfeit or duplicate non CA node ID is found. Authentication and integrity is provided by preventing MAC control packets, and Enhanced Hash Message Authentication Code (EHMAC) can be used. Here EHMAC with various outputs is introduced in all control packets. When a node transmits a packet to a node with EHMAC, verification is conducted and the node replies with the transmitter address and EHMAC in the acknowledgement.

Design of Data Encoding Algorithm for a Two Dimensional Bar Code (2차원 바코드를 위한 데이터 부호화 알고리즘 설계)

  • Jeon, Seong-Goo;Kim, Il-Hwan
    • Journal of Industrial Technology
    • /
    • v.25 no.B
    • /
    • pp.171-174
    • /
    • 2005
  • In this paper, we propose a new data encoding algorithm for a two-dimensional bar code system. In general, the one-dimensional bar code is just a key which can access detailed information to the host computer database. But the two-dimensional bar code is a new technology which can obtain high density information without access to the host computer database. We implemented the encoding algorithm for Data Matrix bar code which is the most widely used among the many kinds of two-dimensional bar codes in the field of marking using Digital Signal Processor (TMS320C31). The performance of the proposed algorithm is verified by comparing the imprinted symbols on the steel surfaces with the codes which are decoded by a bar code reader.

  • PDF

Software Code Attestation for IoT Devices by Bluetooth Low Energy (저전력 블루투스를 통한 사물 인터넷 장치의 소프트웨어적인 코드 검증)

  • Kim, GeunYoung;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1211-1221
    • /
    • 2016
  • In IoT environment, making sure of trust of IoT devices is the most important one than others. The security threats of nowadays almost stay at exposure or tampering of information. However, if human life is strongly connected to the Internet by IoT devices, the security threats will probably target human directly. In case of devices, authentication is verified using the device-known private key. However, if attacker can modify the device physically, knowing the private key cannot be the evidence of trust any more. Thus, we need stronger verification method like code attestation. In this paper, we use software-based code attestation for efficiency. We also suggest secure code attestation method against copy of original code and implement it on embedded device and analyze its performance.

APPLICATION OF UNCERTAINTY ANALYSIS TO MAAP4 ANALYSES FOR LEVEL 2 PRA PARAMETER IMPORTANCE DETERMINATION

  • Roberts, Kevin;Sanders, Robert
    • Nuclear Engineering and Technology
    • /
    • v.45 no.6
    • /
    • pp.767-790
    • /
    • 2013
  • MAAP4 is a computer code that can simulate the response of a light water reactor power plant during severe accident sequences, including actions taken as part of accident management. The code quantitatively predicts the evolution of a severe accident starting from full power conditions given a set of system faults and initiating events through events such as core melt, reactor vessel failure, and containment failure. Furthermore, models are included in the code to represent the actions that could mitigate the accident by in-vessel cooling, external cooling of the reactor pressure vessel, or cooling the debris in containment. A key element tied to using a code like MAAP4 is an uncertainty analysis. The purpose of this paper is to present a MAAP4 based analysis to examine the sensitivity of a key parameter, in this case hydrogen production, to a set of model parameters that are related to a Level 2 PRA analysis. The Level 2 analysis examines those sequences that result in core melting and subsequent reactor pressure vessel failure and its impact on the containment. This paper identifies individual contributors and MAAP4 model parameters that statistically influence hydrogen production. Hydrogen generation was chosen because of its direct relationship to oxidation. With greater oxidation, more heat is added to the core region and relocation (core slump) should occur faster. This, in theory, would lead to shorter failure times and subsequent "hotter" debris pool on the containment floor.

Research on Applying Code Signing Technology to National PKI (코드 서명 기술의 국내 PKI 적용 방안 비교 연구)

  • Lee, Rae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.27-40
    • /
    • 2004
  • Nowadays most web rages provide various services by downloading the applications program such as ActiveX Control or Java Applet. To provide code integrity and publisher authentication of downloaded software in internet, we need code signing technology. In this paper, Authenticode technology of Microsoft is lust analyzed. Based on the analysis, we propose code signing certificate profile and applying method for National Public Key Infrastructure.

Revising the Korean Newspaper Advertising Code of Ethics: An Empirical Investigation Leveraging Expert Interviews and Analytic Hierarchy Process (AHP) Surveys

  • Yoo, Seung-Chul;Kang, Seung-Mi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.135-148
    • /
    • 2023
  • The Code of Ethics for Newspaper Advertising in Korea, first implemented in 1976 and subsequently revised in 1976, 1996, and 2021, is a critical regulatory instrument for the country's advertising sector. However, the specialized domain of "advertising ethics," particularly the "code of advertising ethics," remains under-explored. This research addresses this scholarly gap, providing an empirical analysis of the 2021 amendment's revision trajectory. This study employs a robust methodological approach, integrating expert interviews and small-group AHP-based surveys. This approach allows for a comprehensive understanding of the revision needs, referencing existing ethical codes studies, and comparing similar ethics codes nationally and internationally. The research further investigates key challenges such as personal data protection and copyright issues in the rapidly evolving digital media landscape, while preserving the existing code's inherent value. The findings are expected to significantly contribute to the emerging field of advertising ethics in Korea, offering practical implications for future code revisions.

The Improved UCI Identifier Syntax for Convergence Digital Contents (융합 디지털콘텐츠에 적합한 UCI 식별자 구문구조 개선)

  • Kang, Sang-ug;Park, Sanghyun;Lim, Gyoo Gun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.9
    • /
    • pp.82-88
    • /
    • 2016
  • The proposed new UCI syntax is compatible with the existing identifier and defines fixed length in such cases as printable ID, bar code and QR code which may entail better usage of identifier itself. For the compatibility, the identifiable metadata "key" is used for the existing UCI identifier and "UCI" element of metadata is defined for the new UCI identifier. The new UCI identifier plays roles of the resolution service and representation, and the old UCI identifier plays a role of internal DB management. Also, the object code has two types, meaningless and meaningful. The meaningful object code type can be used according the content classification standards in various field as comics, games, advertisement etc. The standardization activities can be supported by the root agency of UCI.

An efficient Broadcast Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크에서의 효율적 Broadcast Authentication 방안)

  • Moon Hyung-Seok;Lee Sung-Chang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.6 s.348
    • /
    • pp.23-29
    • /
    • 2006
  • It is difficult to apply conventional security algorithms to the wireless sensor networks composed of nodes that have resource constraints such as memory, computing, power resources limitation. Generally, shared key based algorithms with low resource consumption and short key length are used for broadcast packets in authentication of base station. But it is not suitable that all the nodes hold the same shared key only for packet authentication. Recently, broadcast authentication algorithm for sensor network is proposed, which uses key chain generation by one-way hash function, Message Authentication Code generation by each keys of the key chains and delayed key disclosure. It provides suitable authentication method for wireless sensor networks but may leads to inefficient consequence with respect to network conditions such as broadcast ratio, key chain level, and so on. In this paper, we propose an improved broadcast authentication algorithm that uses key chain link and periodical key disclosure. We evaluated the performance of proposed algorithm using TOSSIM(TinyOS Simulator) in TinyOS. The results show that the proposed algorithm ensures low authentication delay, uses memory and computing resource of receiving nodes efficiently and reduces the amount of packet transmitting/receiving.

Numerical Simulation of High-Velocity Oblique Impacts of Yawed Long Rod Projectile Against Thin-Plate (Yaw 를 가진 긴 관통자와 경사판재의 고속충돌 수치해석)

  • Yoo, Yo-Han
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.26 no.7
    • /
    • pp.1426-1437
    • /
    • 2002
  • Using the Lagrangian explicit time-integration finite element code NET3D which can treat three-dimensional high-velocity impact problems, oblique penetration processes of long rod projectile with yaw against thin plate are simulated. Through the comparison of simulation result with experimental result and other code's computational result, the adaptability and accuracy of NET3D is evaluated under the complex situation in which yaw angle and oblique angle exist simultaneously. Main research contents to be handled in this paper include the followings. First, the accuracy and efficiency estimation of NET3D code result obtained from the oblique penetration simulations of long rod projectile with yaw against thin plate. Second, the effect of increasing impact velocity. Third, the effect of initial yaw for the spaced-plate target. Residual velocities, residual lengths, angular velocities, and final deformed configurations obtained from the NET3D computations are compared with the experimental results and other code's computational results such as Eulerian code MESA and Lagrangian code EPIC. As a result of comparisons, it has been found that NET3D code is superior to EPIC code and MESA code in the prediction capability of residual velocity and residual length of penetrator. The key features obtained from the experiment can be successfully reproduced through NET3D simulations. Throughout the study, the applicability and accuracy of NET3D as a metallic armor system design tool is verified.