Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 16, Issue 6 - Dec 2006
Volume 16, Issue 5 - Oct 2006
Volume 16, Issue 4 - Aug 2006
Volume 16, Issue 3 - Jun 2006
Volume 16, Issue 2 - Apr 2006
Volume 16, Issue 1 - Feb 2006
Selecting the target year
User Transparent File Encryption Mechanisms at Kernel Level
Kim Jae-Hwan ; Park Tae-Kyou ; Cho Gi-Hwan ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 3~16
Encipherment in existing OS(Operating Systems) has typically used the techniques which encrypt and decrypt entirely a secret file at the application level with keys chosen by user In this mechanism it causes much overhead on the performance. However when a security-classified user-process writes a secret file, our proposed mechanism encrypts and stores automatically and efficiently the file by providing transparency to the user at the kernel level of Linux. Also when the user modifies the encrypted secret file, this mechanism decrypts partially the file and encrypts partially the file for restoring. When user reads only the part of the encrypted file, this mechanism decrypts automatically and partially the file. Therefore our proposed mechanism provides user much faster enciphering speed than that of the existing techniques at the application level.
A Behavior based Detection for Malicious Code Using Obfuscation Technique
Park Nam-Youl ; Kim Yong-Min ; Noh Bong-Nam ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 17~28
The appearance of variant malicious codes using obfuscation techniques is accelerating the spread of malicious codes around the detection by a vaccine. n a system does not patch detection patterns for vulnerabilities and worms to the vaccine, it can be infected by the worms and malicious codes can be spreaded rapidly to other systems and networks in a few minute. Moreover, It is limited to the conventional pattern based detection and treatment for variants or new malicious codes. In this paper, we propose a method of behavior based detection by the static analysis, the dynamic analysis and the dynamic monitoring to detect a malicious code using obfuscation techniques with the PE compression. Also we show that dynamic monitoring can detect worms with the PE compression which accesses to important resources such as a registry, a cpu, a memory and files with the proposed method for similarity.
Desing of Secure Adaptive Clustering Algorithm Using Symmetric Key and LEAP in Sensor Network
Jang Kun-Won ; Shin Dong-Gyu ; Jun Moon-Seog ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 29~38
Recent advances in wireless communication technology promotes many researches related to sensor network and brings several proposals to fit into various types of sensor network communication. The research direction for sensor network is divided into the method to maximize an energy efficiency and security researches that has not been remarkable so far. To maximize an energy efficiency, the methods to support data aggregation and cluster-head selection algorithm are proposed. To strengthen the security, the methods to support encryption techniques and manage a secret key that is applicable to sensor network are proposed, In. However, the combined method to satisfy both energy efficiency and security is in the shell. This paper is devoted to design the protocol that combines an efficient clustering protocol with key management algorithm that is fit into various types of sensor network communication. This protocol may be applied to sensor network systems that deal with sensitive data.
An Access Control Model for Privacy Protection using Purpose Classification
Na Seok-Hyun ; Park Seog ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 39~52
Recently purpose is used by an crucial part to security management when collecting data about privacy. The W3C(World Wide Web Consortium) describes a standard spec to control personal data that is provided by data providers who visit the web site. But they don't say anymore about security management about personal data in transit after data collection. Recently several researches, such as Hippocratic Databases, Purpose Based Access Control and Hippocratic in Databases, are dealing with security management using purpose concept and access control mechanism after data collection a W3C's standard spec about data collection mechanism but they couldn't suggest an efficient mechanism for privacy protection about personal data because they couldn't represent purpose expression and management of purposes sufficiently. In this paper we suggest a mechanism to improve the purpose expression. And then we suggest an accesscontrol mechanism that is under least privilege principle using the purpose classification for privacy protection. We classify purpose into Along purpose structure, Inheritance purpose structure and Stream purpose structure. We suggest different mechanisms to deal with then We use the role hierarchy structure of RBAC(Role-Based Access Control) for flexibility about access control and suggest mechanisms that provide the least privilege for processing the task in case that is satisfying using several features of purpose to get least privilege of a task that is a nit of business process.
A Study of Formalized Presentation of Worm based on time-based Behavioral sequences
Lee Min-Soo ; Shon Tae-Shik ; Cho Sang-Hyun ; Kim Dong-Soo ; Seo Jung-Taek ; Sohn Ki-Wook ; Moon Jong-Sub ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 53~64
Worm analysis report currently produced by anti-virus companies closely resemble those of virus report and do not properly characterize the specific attributes of worms. In this paper, we propose formalized presentation method based on time-based behavioral sequences to more accurately characterize worms. we define a format based on the behavior and communication patterns that occur between an infected host and a target host. we also propose a method for presently worm analysis data with that format. We also compare our framework with analysis data provided by Symantec.
Design and implementation of port scan detection improvement and algorithm connected with attack detection in IDS
Park Seong-Chul ; Ko Han-Seok ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 65~76
This paper deals with an effective algerian aimed at improving the port scan detection in an intrusion detection system (IDS). In particular, a detection correlation algerian is proposed to maximize the detection capability in the network-based IDS whereby the 'misuse' is flagged for analysis to establish intrusion profile in relation to the overall port scan detection process. In addition, we establish an appropriate system maintenance policy for port scan detection as preprocessor for improved port scan in IDS, thereby achieving minimum false positive in the misuse detection engine while enhancing the system performance.
A Study on RFID Privacy Protection in Insecure Channel
Park Jang-Su ; Lee Im-Yeong ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 77~86
As a core technology in the ubiquitous environment, RFID (Radio Frequency Identification) technology takes an important role. RFID technology provides various information about objects or surrounding environment by attaching a small electronic tag on the object, thus, it means the remote control recognition technology. However, the problems which never happened before can be generated on the point of security and privacy due to the feature that RFID technology can recognize the object without any physical contact. In order to solve these problems, many studies for the RFID recognition technology are going on the progress. The currently running study is the secure communication channel between database and reader applying the recognition technology in the insecure communication channel between reader and tag. But, the purpose of this paper is to settle a privacy problem, which is insecurity of communication between database and reader channel by suggesting providing a user with authentication protocol in order to give information to an authorized entity.
Conditional Access Control for Encrypted SVC Bitstream
Won Yong-Geun ; Bae Tae-Meon ; Ro Yong-Man ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 87~99
In this paper, we propose a method of conditional access control for encrypted SVC(scalable video coding) bitstream. The main purpose of the proposition is to provide a SVC suitable encryption algorithm and a efficient method for conditional access control using encrypted SVC bitstream. We analyzed requirements for conditional access control of a SVC bitstream. And based on the analysis, we proposed encryption algorithm suitable for SVC bitstream and a method of conditional access control of the encryped bitstream. The proposed conditional access control for encrypted SVC bitstream is performed by bitsream extraction and selective decryption. We verified the usefulness of the proposed method through experiments.
Design of DRM Frame for Digital Contents Protection in Network
Kim Jong-Woo ; Han Seung-Jo ; Yang Won-Il ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 101~113
This study is intended to provide more secure contents authentication and user authentication by applying public key algorithm and hardware binding to the DRM system. The proposed system is capable of protecting distributed contents and copyrights as well as resetting any interoperability issues among those involved in transparent and secure contents distribution. The proposed algorithm also affords transparency in the DRM distribution system and protection from unauthorized distribution.
Performance Evaluation of Various Normalization Methods and Score-level Fusion Algorithms for Multiple-Biometric System
Woo Na-Young ; Kim Hak-Il ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 115~127
The purpose of this paper is evaluation of various normalization methods and fusion algorithms in addition to pattern classification algorithms for multi-biometric systems. Experiments are performed using various normalization functions, fusion algorithms and pattern classification algorithms based on Biometric Scores Set-Releasel(BSSR1) provided by NIST. The performance results are presented by Half Total Error Rate (WTER). This study gives base data for the study on performance enhancement of multiple-biometric system by showing performance results using single database and metrics.
Design and Implementation of BioAPI v2.0 based BSP Conformance Test Suite
Jang Ji-Hyeon ; Lee Dong-Geun ; Kim Jae-Sung ; Kim Hak-Il ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 129~141
The purpose of this paper is to design Conformance Test Suite for BSP(Biometric Service Provider) based on BioAPI(Biometric Application Programming Interface) v2.0. The proposed BioAPI Conformance Test Suite enables users to test BSP with framework independently. A test scheduling tool has been embodied to use Test Assertion in the form of XML. In order to demonstrate the performance of the Conformance Test Suite, the experiment was performed by using both verification and identification BSPs. As the results of this experiment, we were able to determinate whether BSPs based on BioAPI v2.0 satisfied standard requirements or not.
A Secure Masking-based ARIA Countermeasure for Low Memory Environment Resistant to Differential Power Attack
Yoo Hyung-So ; Kim Chang-Kyun ; Park Il-Hwan ; Moon Sang-Jae ; Ha Jae-Cheol ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 143~155
ARIA is a 128-bit block cipher, which became a Korean Standard in 2004. According to recent research, this cipher is attacked by first order DPA attack. In this paper, we propose a new masking technique as a countermeasure against first order DPA attack and apply it to the ARIA. The proposed method is suitable for low memory environment. By using this countermeasure, we verified that it is secure against first order DPA attack. In addition, our method based on precomputation of inverse table can reduce the computational cost as increasing the number of S-BOX masking.
Privacy Framework in Ubiquitous Computing Environments
Hong Seng-Phil ; Lee Chul-Soo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 157~164
An Improved Spreading Model for Internet Worms
Shin Weon ; Rhee Kyung-Hvune ;
Journal of the Korea Institute of Information Security and Cryptology, volume 16, issue 3, 2006, Pages 165~172
There are various threats as side effects against the growth of information technology, and malicious codes such as Internet worms may bring about confusions to upset a national backbone network. In this paper, we examine the existed spreading models and propose a new worm spreading model on Internet environment. We also predict and analyze the spreading effects of high-speed Internet worms. The proposed model leads to a better prediction of the worm spreading since various factors are considered.