Abstract:
Disclosed herein are a one-way data transmission apparatus, a one-way data reception apparatus, and a one-way data transmission/reception method using the apparatuses. The one-way data transmission/reception method uses a one-way data transmission apparatus and a one-way data reception apparatus, and includes receiving data from a high-security zone through a one-way path, generating tag information of the data, sending a message in which the tag information is added to the data to the one-way data reception apparatus, receiving the message from the one-way data transmission apparatus, checking the tag information of the message, and transmitting the data to a low-security zone.
Abstract:
Disclosed herein are a telephone, a switchboard, and a method for sending a message between the telephone and the switchboard using a Dual Tone Multiple Frequency (DTMF) signal. The telephone includes a sensor interface unit for collecting sensing signals by being connected to sensors, a transmission unit for generating a message using the sensing signals, converting the message into a DTMF signal, and transmitting the DTMF signal and a telephone signal, and a power distribution unit for being supplied with power from the switchboard and distributing the power to operation units.
Abstract:
Disclosed herein are a dynamic memory management apparatus and method and a computer-readable storage medium for the same. The dynamic memory management method includes defining a shadow area mapped to a memory area, setting a coloring value in the shadow area, and permitting or denying access to the memory area based on the coloring value when accessing the memory area.
Abstract:
Disclosed herein are an apparatus and method for extracting memory map information from firmware. The apparatus includes one or more processors and executable memory for storing at least one program executed by the one or more processors. The at least one program retrieves memory-related data from firmware, sets a data structure by analyzing binary code based on the memory-related data, and retrieves a memory map structure from the firmware using the data structure.
Abstract:
Disclosed herein are an in-vehicle network apparatus and method. The in-vehicle network apparatus includes one or more processors and executable memory for storing at least one program executed by the one or more processors. The at least one program is configured to verify the integrity of software stored in advance in the executable memory, to generate a key table by sharing authentication information with a communication target, and to exchange an encrypted message with the communication target using the key table.
Abstract:
Disclosed herein are an apparatus and method for dynamic binary analysis on a hardware board. The method for dynamic binary analysis on a hardware board is performed using an apparatus for dynamic binary analysis on the hardware board, and includes generating information required for dynamic binary analysis based on information collected while interfacing with an embedded device, disassembling, by a software processing unit, the information required for dynamic binary analysis by receiving the information from a hardware processing unit while interfacing with the hardware processing unit, selecting a core platform of the embedded device based on results of the disassembly, and analyzing security vulnerabilities in the embedded device by performing dynamic binary analysis of the core platform.
Abstract:
Disclosed herein are a firmware watermarking method, firmware based on the method, and an apparatus for performing firmware watermarking, which can provide a basis for legally preparing for firmware modification attacks by embedding a watermark for original firmware in nonvolatile memory at the time of manufacturing embedded devices. The presented method is a firmware watermarking method performed by an apparatus for performing the firmware watermarking method, the method including generating an original watermark for firmware, and embedding the generated original watermark in the firmware.