Abstract:
Disclosed herein are an apparatus and method for transmitting a covert message in wireless communication. The apparatus for transmitting a covert message in wireless communication may be configured to, in a covert message in which a data frame is composed of a Start Frame Delimiter (SFD), a header, a payload, and a Cyclic Redundancy Check (CRC), transmit the SFD of the covert message corresponding to a first sequence number masked with a preset SFD mask length, transmit the header of the covert message corresponding to a second sequence number masked with a preset header mask length, transmit the payload of the covert message corresponding to a third sequence number masked with a preset payload mask length, and transmit the CRC of the covert message corresponding to a fourth sequence number masked with a preset CRC mask length.
Abstract:
Disclosed herein is a method for transmitting information using a monitor brightness change. The method may include generating a transmission data frame structure for transmitting digital information, encoding the bit of the digital information, and converting the encoded bit of the digital information into a wireless signal that is a brightness change signal of blue (B) color, among red, green, and blue (RGB) for configuring colors on a monitor.
Abstract:
Disclosed herein are an apparatus and method for device authentication. The method for device authentication based on a certificate using a PUF, performed by an apparatus for device authentication based on a certificate using a PUF, includes acquiring previously stored first Challenge-Response-Pair (CRP) information corresponding to identification information received from a device that requests authentication and generating a certificate including a public key generated using the first CRP information; transmitting a message in which the certificate encrypted using the first response value of the first CRP information as a server secret key and the first challenge value of the first CRP information are included to the device; and authenticating the device by verifying an encrypted signature message received from the device through a secure channel.
Abstract:
Disclosed herein are an apparatus and method for detecting a malicious script. The apparatus includes one or more processors and executable memory for storing at least one program executed by the one or more processors. The at least one program is configured to extract token-type features, each of which corresponds to a lexical unit, and tree-node-type features of an abstract syntax tree from an input script, to train two learning models to respectively learn two pieces of learning data that are generated in consideration of features extracted respectively from the token-type features and the node-type features as having the highest frequency, and to detect whether the script is a malicious script based on the result of ensemble-based malicious script detection performed for the script, which is acquired using an ensemble detection model generated from the two learning models.
Abstract:
Disclosed herein are an apparatus and method for generating secret information. The apparatus includes a data communication unit for receiving a request to output a content value and outputting the content value; and a microcontroller unit for generating a Physically Unclonable Function (PUF) response based on the content value, calculating the characteristic value of the PUF response, and generating secret information using the PUF response, the error of which is corrected using the characteristic value.
Abstract:
The present invention provides an attack feature DNA generator comprising: an information processing unit collecting event information from a network environment; a factor extracting unit extracting normal factors and attack feature factors from the event information; a DNA generating unit analyzing correlation of the attack feature factor to the normal factor and generating an attack feature DNA which shows the correlation analysis result in a DNA structure; and a storing unit in which the event information and the attack feature DNA are stored. The present invention allows intuitively recognizing an ongoing attack type by comparing collected cyber-attack feature factors with cyber-attack feature DNAs.
Abstract:
Disclosed herein are an apparatus and method for inferring a cyberattack path based on attention. The apparatus includes memory in which at least one program is recorded and a processor for executing the program. The program generates test data required for generating an intelligent attack graph and generates an attack graph based on an intelligent attack path prediction model.
Abstract:
Disclosed herein are an apparatus for detecting unknown malware using a variable-length operation code (opcode) and a method using the apparatus. The method includes collecting opcode information from a detection target, generating a multi-pixel image having a variable length by performing feature engineering on the opcode information; and detecting unknown malware by inputting the multi-pixel image to a deep-learning model based on AI.
Abstract:
Disclosed herein are an apparatus and method for authenticating an IoT device. The method, performed by the IoT device authentication apparatus, includes transmitting, by the IoT device authentication apparatus, a random number to the IoT device and encrypting, by the IoT device authentication apparatus, the random number using a previously registered first white-box cryptography value through a white-box cryptography method; generating, by the IoT device, a first device response value from a previously registered first device challenge value using a Physical Unclonable Function (PUF) and encrypting, by the IoT device, the random number, received from the IoT device authentication apparatus, using the first device response value; and performing, by the IoT device authentication apparatus, authentication of the IoT device by checking whether the random number encrypted using the white-box cryptography method matches the random number encrypted using the PUF, which is received from the IoT device.
Abstract:
A method for secure distributed data management for dynamic data includes segmenting original data into multiple pieces, generating state information pertaining to row-based data configured with data blocks, and generating additional information for recovering the state information and the row-based data. The data blocks, corresponding to the segmented data, are stored in data servers, and each of the data servers stores data blocks selected at an interval corresponding to the number of data servers in order to store the segmented data.