Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 23, Issue 6 - Dec 2013
Volume 23, Issue 5 - Oct 2013
Volume 23, Issue 4 - Aug 2013
Volume 23, Issue 3 - Jun 2013
Volume 23, Issue 2 - Apr 2013
Volume 23, Issue 1 - Feb 2013
Selecting the target year
A Single Re-encryption key based Conditional Proxy Re-Encryption Scheme
Son, Junggab ; Oh, Heekuck ; Kim, SangJin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 147~155
DOI : 10.13089/JKIISC.2013.23.2.147
Proxy re-encryption scheme has advantage where plaintext does not get exposed during re-encryption process. This scheme is popular for sharing server-saved data in case of cloud computing or mobile office that uses server to save data. Since previous proxy re-encryption schemes can use re-encryption key over and over again, it may abuse re-encryption. To solve this problem, conditional proxy re-encryption scheme was proposed. But, it is computationally expensive generate the same number of re-encryption key with the number of condition values. In this paper, we propose an efficient conditional proxy re-encryption scheme in terms of re-encryption key generation. The proposed scheme uses only encryption and decryption process. Therefore it has advantage to generate one re-encryption key for one person. The proposed scheme is secure against chosen-ciphertext attack.
Dynamic User Reliability Evaluation Scheme for Social Network Service
Lee, Changhoon ; Jung, Youngman ; Jung, Jaewook ; Won, Dongho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 157~168
DOI : 10.13089/JKIISC.2013.23.2.157
The social network service is the bidirectional media that all of the users are be able to directly produce, process, and distribute the information without distinction of the producer and consumer. Over increasing the users rapidly, the users are be able to obtain and share the various information, but the problems occur due to the spread of unreliable information on the service. Moreover, it is spreading the problems violating the privacy and decreasing the reliability of the users by exploiting the open environment. Therefore, sensitive information can be delivered only to users which information producer can trust, and the users should get the information from the trustworthy users. Due to this necessity, it needs the efficient method can evaluates the reliability of the users. In this paper, we define the reliability in the service, make the trust parameter by using the function of the service, and propose the dynamic user reliability evaluation scheme evaluating the reliability of users. We draw the trust range on the reliability of users by analyzing the proposed reliability evaluation scheme.
An Efficient User Authentication Scheme with Mobile Device in Wireless Network Environment
Shin, Soobok ; Yeh, Hongjin ; Kim, Kangseok ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 169~179
DOI : 10.13089/JKIISC.2013.23.2.169
Recently, with rapid advances of mobile devices such as smart phone and wireless networking, a number of services using mobile device based wireless network have been explosively increasing. From the viewpoint of security, because wireless network is more vulnerable than wired network, strong security is required in wireless network. On the contrary, the security for mobile devices has to be efficient due to the restrictions of battery powered mobile device such as low computation, low memory space and high communication cost. Therefore, in this paper, we propose an efficient authentication scheme with mobile devices in wireless network environment. The proposed scheme satisfies security requirements for the service using mobile device and it is suitable in wireless network environment.
A system for detecting document leakage by insiders through continuous user authentication by using document reading behavior
Cho, Sungyoung ; Kim, Minsu ; Won, Jongil ; Kwon, SangEun ; Lim, Chaeho ; Kang, Brent ByungHoon ; Kim, Sehun ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 181~192
DOI : 10.13089/JKIISC.2013.23.2.181
There have been various techniques to detect and control document leakage; however, most techniques concentrate on document leakage by outsiders. There are rare techniques to detect and monitor document leakage by insiders. In this study, we observe user`s document reading behavior to detect and control document leakage by insiders. We make each user`s document reading patterns from attributes gathered by a logger program running on Microsoft Word, and then we apply the proposed system to help determine whether a current user who is reading a document matches the true user. We expect that our system based on document reading behavior can effectively prevent document leakage.
Methodology for digital investigation of illegal sharing using BitTorrent
Park, Soo-Young ; Chung, Hyun-Ji ; Lee, Sang-Jin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 193~201
DOI : 10.13089/JKIISC.2013.23.2.193
Sharing copyrighted files without copyright holder`s permission is illegal. But, a number of illegal file sharers using BitTorrent increase. However, it is difficult to find appropriate digital evidences and legal basis to punish them. And, there are no framework for digital investigation of illegal sharing using BitTorrent. Additionally, role of server in BitTorrent had been reduced than server in conventional P2P. So, It is difficult to apply investigation framework for illegal sharing using conventional P2P to investigation process of illegal sharing using BitTorrent. This paper proposes the methodology about punishing illegal sharer using BitTorrent by suggesting the digital investigation framework.
Digital Forensic Investigation of Virtual Desktop Infrastructure
Jang, Sanghee ; Kim, Deunghwa ; Park, Jungheum ; Kang, Cheulhoon ; Lee, Sangjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 203~212
DOI : 10.13089/JKIISC.2013.23.2.203
Recently, cloud computing is one of the parts showing the biggest growth in the IT market and is expected to continue to grow into. Especially, many companies are adopting virtual desktop infrastructure as private cloud computing to achieve in saving the cost and enhancing the efficiency of the servers. However, current digital forensic investigation methodology of cloud computing is not systematized scientifically and technically. To do this, depending on the type of each cloud computing services, digital evidence collection system for the legal enforcement should be established. In this paper, we focus on virtual desktop infrastructure as private cloud computing and introduce the most widely used around the world desktop virtualization solutions of VMware, Citrix, and Microsoft. And We propose digital forensic investigation methodology for private cloud computing that is constructed by these solutions.
An analysis of vulnerability and the method to secure on Android SNS applications from alteration of the code segments
Lee, Sang Ho ; Ju, Da Young ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 213~221
DOI : 10.13089/JKIISC.2013.23.2.213
According to the rapid growth of the number of SNS(Social Networking Service) applications based on Android OS, the importance of its security is also raised. Especially, many applications using KaKaoTalk platform has been released in these days, and these are top ranked in the relative markets. However, security issues on SNS applications have not been resolved clearly. Therefore, it is crucial to provide means to cope with the security threats posed by code-segment modification in the development stage of Android OS based SNS applications. In this paper, we analyze the security threats by modifying SNS application code segments and suggest effective security techniques.
Integrity verification of VM data collected in private cloud environment and reliability verification of related forensic tools
Kim, Deunghwa ; Jang, Sanghee ; Park, Jungheum ; Kang, Cheulhoon ; Lee, Sangjin ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 223~230
DOI : 10.13089/JKIISC.2013.23.2.223
Recently, a large number of corporations are adopting cloud solution in order to reduce IT-related costs. By the way, Digital Trace should have admissibility to be accepted as digital evidence in court, and integrity is one of the factors for admissibility. In this context, this research implemented integrity verification test to VM Data which was collected by well-known private cloud solutions such as Citrix, VMware, and MS Hyper-V. This paper suggests the effective way to verify integrity of VM data collected in private cloud computing environment based on the experiment and introduces the error that EnCase fails to mount VHD (Virtual Hard Disk) files properly.
A Length-based File Fuzzing Test Suite Reduction Algorithm for Evaluation of Software Vulnerability
Lee, Jaeseo ; Kim, Jong-Myong ; Kim, SuYong ; Yun, Young-Tae ; Kim, Yong-Min ; Noh, Bong-Nam ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 231~242
DOI : 10.13089/JKIISC.2013.23.2.231
Recently, automated software testing methods such as fuzzing have been researched to find software vulnerabilities. The purpose of fuzzing is to disclose software vulnerabilities by providing a software with malformed data. In order to increase the probability of vulnerability discovery by fuzzing, we must solve the test suite reduction problem because the probability depends on the test case quality. In this paper, we propose a new method to solve the test suite reduction problem which is suitable for the long test case such as file. First, we suggested the length of test case as a measure in addition to old measures such as coverage and redundancy. Next we designed a test suite reduction algorithm using the new measure. In the experimental results, the proposed algorithm showed better performance in the size and length reduction ratio of the test suite than previous studies. Finally, results from an empirical study suggested the viability of our proposed measure and algorithm for file fuzzing.
Nuclear-related Software analysis based on secure coding
Jung, Da-Hye ; Choi, Jin-Young ; Lee, Song-Hee ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 243~250
DOI : 10.13089/JKIISC.2013.23.2.243
We have entered into an era of smart software system where the many kinds of embedded software, especially SCADA and Automotive software not only require high reliability and safety but also high-security. Removing software weakness during the software development lifecycle is very important because hackers exploit weaknesses which are source of software vulnerabilities when attacking a system. Therefore the coding rule as like core functions of MISRA-C should expand their coding focus on security. In this paper, we used CERT-C secure coding rules for nuclear-related software being developed to demonstrate high-safety software, and proposed how to remove software weakness during development.
A Security Evaluation Criteria for Korean Cloud Computing Service
Kim, Kichul ; Heo, Ok ; Kim, Seungjoo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 251~265
DOI : 10.13089/JKIISC.2013.23.2.251
Cloud computing provided as a service type by sharing IT resources cannot be activated unless the issue of information security is solved. The enterprise attempts to maximize the efficiency of information and communication resources by introducing cloud computing services. In comparison to the United States and Japan, however, cloud computing service in korea has not been activated because of a lack of confidence in the security. This paper suggests core evaluation criteria and added evaluation criteria which is removed the redundancy of the security controls from existing ISMS for Korean cloud computing through a comparative analysis between domestic and foreign security controls of cloud certification scheme and guidelines and information security management system. A cloud service provider certified ISMS can minimize redundant and unnecessary certification assessment work by considering added evaluation criteria.
A Security Hole in Comparable Encryption
Kim, Sangjin ; Oh, Heekuck ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 267~271
DOI : 10.13089/JKIISC.2013.23.2.267
Comparable encryption allows a verifier to test whether given two ciphertexts from a probabilistic public key cryptosystem are encryption of the same message without decrypting them. Recently, Yang et al. proposed such scheme and Lee et al. and Tang independently modified Yang et al.`s system to restrict the entity who can perform the verification. However, the original Yang et al.`s scheme has a flaw that enables two ciphertexts which are not encryption of the same message to pass the test. In this paper, we concretely show the faults in all three schemes considered and analyze the effect of this flaw in the use of such schemes in applications.
Research on Advanced Electronic Records Management Technology Using Digital Forensics
Yoo, Hyunguk ; Shon, Taeshik ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 273~277
DOI : 10.13089/JKIISC.2013.23.2.273
Recently, according with a sudden increase of records produced and stored by digital way, it becomes more important to maintain reliability and authenticity and to ensure legal effect when digital records are collected, preserved and managed. On the basis of domestic legal procedure law and record management-related legislation, this paper considered judicial admissibility of evidence on electronic records managed by National Archives of Korea and drew potential problems when these are submitted to court as a evidence. Also, this paper suggested a plan applying digital forensics technique to electronic records management to ensure admissibility of evidence about electronic records stored in National Archives of Korea.
Study on Availability Guarantee Mechanism on Smart Grid Networks: Detection of Attack and Anomaly Node Using Signal Information
Kim, Mihui ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 279~286
DOI : 10.13089/JKIISC.2013.23.2.279
The recent power shortages due to surge in demand for electricity highlights the importance of smart grid technologies for efficient use of power. The experimental content for vulnerability against availability of smart meter, an essential component in smart grid networks, has been reported. Designing availability protection mechanism to boost the realization possibilities of the secure smart grid is essential. In this paper, we propose a mechanism to detect the availability infringement attack for smart meter and also to find anomaly nodes through analyzing smart grid structure and traffic patterns. The proposed detection mechanism uses approximate entropy technique to decrease the detection load and increase the detection rate with few samples and utilizes the signal information(CIR or RSSI, etc.) that the anomaly node can not be changed to find the anomaly nodes. Finally simulation results of proposed method show that the detection performance and the feasibility.
A Study on Security Evaluation Methodology for Industrial Control Systems
Choi, Myeonggil ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 287~298
DOI : 10.13089/JKIISC.2013.23.2.287
Industrial Control systems which are operated in the industrial infrastructure adopts the various functions and face various threats in these days. To assure the security of the industrial control systems, the security evaluation methodology should be necessarily developed. This study suggests the processes and methodology for evaluating control systems, verifies the effectiveness of processes and methodologies through development of security checklists. The results of the study will be utilized for operators, evaluators and obtainers of industrial controls and be basis for developing and assuring the industrial controls systems.
Reply-Type based Agent Generation of Legacy Service on One-way data transfer system
Kim, Kyoung-Ho ; Chang, Yeop ; Kim, Hee-Min ; Yun, Jeong-Han ; Kim, Woo-Nyon ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 299~305
DOI : 10.13089/JKIISC.2013.23.2.299
Physical One-way Transfer, one of network Separating Network Technologies, shut off intrusion possibilities by removing data transfer line from external network to internal network. Physical One-way Transfer technology can not support legacy services based duplex transmission. Legacy services operating need agent for extra service with the support. But, Agent development have problems with adding cost and open internal protocols. In this papers, We analyzed legacy services between Control network and OA network in working SCADA systems, and based on the results obtained from the analysis, categorized the legacy services into three forms. We propose an agent generation method of the three service categories for Physical One-Way Transfer System. In addition, we design an automatic generation tool using the proposed method.
SG-RBAC : Role Based Access Control Model for Smart Grid Environment
Lee, Woomyo ; Lee, Gunhee ; Kim, Sinkyu ; Seo, Jungtaek ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 307~318
DOI : 10.13089/JKIISC.2013.23.2.307
Smart grid is composed of variable domains including different systems, and different types of the access control are needed in the multiple domain. Therefore, the access control model suitable for the smart grid environment is required to minimize access control error and deny the unauthorized access. This paper introduce the access control requirements in the smart grid environment and propose the access control model, SG-RBAC, satisfied with the requirements. SG-RBAC model imposes constraints on the access right activation according to the user property, the role property, and the system property. It also imposes constraints on the delegation and the inheritance of access right according to temporal/spatial information and a crisis occurrence.
Digital Evidence Acquisition Scheme using the Trusted Third Party in Smart Grid Infrastructure
Cho, Youngjun ; Choi, Jaeduck ; Kim, Sinkyu ; Seo, Jungtaek ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 319~328
DOI : 10.13089/JKIISC.2013.23.2.319
Considerable number of major countries have put great efforts to leverage the efficiency of power consumption using Smart Grid in order to resolve the critical issues with drastical growing demands regarding electricity, the crisis of environmental pollution and so on. There has been increasing number of researches to construct Smart Grid in Korea as well. The threats of cyber terror attacks which might cause national crisises in terms of economy and society have been climbing up because of the fact that Smart Grid employs bi-directional communications embedding the cyber threats from existing/legacy communication networks. Consequently, it is required to build concrete response processes including investigation and analysis on cyber breaches into Smart Grid. However, the digital evidence acquisition techniques do not suffice to be deployed in Smart Grid systems despite of the fact that the techniques, against cyber breaches into well-known networks, have been studied in plenty of time. This work proposes a novel digital evidence acquisition scheme appropriate to Smart Grid systems through intensive investigation of the evidence acquisition requirements in Smart Grid and the historical evidence acquisition methods.
Classification of ICS abnormal behavior in terms of security
Na, Jung-Chan ; Cho, Hyun-Sook ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 329~337
DOI : 10.13089/JKIISC.2013.23.2.329
Cyber threats of the ICS(Industrial Control System) has been researched on the level to the threat to the network service as well as a specific system, even if the extent of damage was not intended. Although some range of "security" just include the protection of systems against the deliberate attacks of terrorists or cyber hackers, often more damage is done by carelessness, and equipment failures than by those deliberate attacks. This paper presented a taxonomy for classifying all abnormal behaviors of ICS, including deliberate attacks, inadvertent mistakes, equipment failures, and software problems. The classification criteria of ICS abnormal behaviors was selected to highlight commonalities and important features of deliberate attacks as well as inadvertent actions.
Development of Low Latency Secure Communication Device for Legacy SCADA
Choi, Moon-Suk ; Kim, Chung-Hyo ; Lim, You-Seok ; Ju, Seong-Ho ; Lim, Yong-Hun ; Jeon, Kyung-Seok ;
Journal of the Korea Institute of Information Security and Cryptology, volume 23, issue 2, 2013, Pages 339~346
DOI : 10.13089/JKIISC.2013.23.2.339
As the need for security of SCADA systems is increasing, significant progress has been made in research on security of control protocol. However, very few security solutions were adapted to legacy SCADA system. The reasons for non-adoption are latency, cost and key management problem. We propose a low latency, economic security Solution to solve these issues. The proposed solution performs security function in data link layer and has minimum overhead to minimize latency. Furthermore, we try to solve the key management problem by providing systematic security keys and key distribution method.