-
公开(公告)号:US20220269777A1
公开(公告)日:2022-08-25
申请号:US17518373
申请日:2021-11-03
Inventor: Dong-Wook KANG , Dae-Won KIM , Ik-Kyun KIM , Sang-Su LEE , Jin-Yong LEE , Byeong-Cheol CHOI , Yong-Je CHOI
Abstract: Disclosed herein are an apparatus and method for detecting violation of control flow integrity. The apparatus includes memory for storing a program and a processor for executing the program, wherein the processor multiple branch identifier registers to which identifiers of branch targets are written, a set branch identifier instruction configured to command an identifier of a branch target to be written to a branch identifier register at a predetermined sequence number, among the multiple branch identifier registers, and a check branch identifier instruction configured to command a signal indicating detection of a control flow hijacking attack to be issued based on whether a value written to the branch identifier register at the predetermined sequence number is identical to a value of an identifier of a branch target at the predetermined sequence number, wherein the program detects whether a control flow is hijacked based on the multiple branch identifier registers.
-
公开(公告)号:US20230004499A1
公开(公告)日:2023-01-05
申请号:US17737174
申请日:2022-05-05
Inventor: Yong-Je CHOI , Dae-Won KIM , Sang-Su LEE , Byeong-Cheol CHOI , Dong-Wook KANG , Yang-Seo CHOI
IPC: G06F12/0873 , G06F12/0868
Abstract: Disclosed herein are an apparatus and method for extracting memory map information from firmware. The apparatus includes one or more processors and executable memory for storing at least one program executed by the one or more processors. The at least one program retrieves memory-related data from firmware, sets a data structure by analyzing binary code based on the memory-related data, and retrieves a memory map structure from the firmware using the data structure.
-
公开(公告)号:US20240406209A1
公开(公告)日:2024-12-05
申请号:US18398643
申请日:2023-12-28
Inventor: Yong-Je CHOI , Dae-Won KIM , Sang-Su LEE , Byeong-Cheol CHOI , Seung-Kwang LEE
IPC: H04L9/40
Abstract: Disclosed herein are a method for countering an asynchronous attack on a supply chain security protocol and an apparatus for the same. The method includes, in a supply chain security protocol performed by a terminal device into which a dielet is inserted and an authentication server, performing a self-generation mode in which a counter value within the dielet is registered in the authentication server, performing a read-out mode in which whether an asynchronous attack occurs is detected by comparing the counter values respectively stored in the dielet and the authentication server when a message for communication is sent, and replacing a message for the communication with a random value when an asynchronous attack is detected.
-
公开(公告)号:US20230004680A1
公开(公告)日:2023-01-05
申请号:US17738524
申请日:2022-05-06
Inventor: Yong-Je CHOI , Dae-Won KIM , Sang-Su LEE , Byeong-Cheol CHOI , Dong-Wook KANG , Ik-Kyun KIM , Yang-Seo CHOI
Abstract: Disclosed herein are an apparatus and method for verifying the integrity of a hardware board. The apparatus includes one or more processors and execution memory for storing at least one program that is executed by the processors, wherein the program is configured to compare images of components arranged on a verification target board and a source board in a first image, obtained by photographing the verification target board, and in a second image prestored for the source board, as to whether images of the components are identical to each other, and compare first firmware extracted from the verification target board with second firmware of the source board, as to whether first firmware is identical to second firmware and verify integrity of the verification target board based on whether the images are identical to each other and on whether the pieces of firmware are identical to each other.
-
-
-