Abstract:
Disclosed herein are an apparatus and method for detecting violation of control flow integrity. The apparatus includes memory for storing a program and a processor for executing the program, wherein the processor multiple branch identifier registers to which identifiers of branch targets are written, a set branch identifier instruction configured to command an identifier of a branch target to be written to a branch identifier register at a predetermined sequence number, among the multiple branch identifier registers, and a check branch identifier instruction configured to command a signal indicating detection of a control flow hijacking attack to be issued based on whether a value written to the branch identifier register at the predetermined sequence number is identical to a value of an identifier of a branch target at the predetermined sequence number, wherein the program detects whether a control flow is hijacked based on the multiple branch identifier registers.
Abstract:
Disclosed herein are a lightweight intrusion detection method and apparatus for a vehicle network. The lightweight intrusion detection method may include collecting Ethernet packets from a domain gateway of a vehicle that provides a mirroring port, performing a primary intrusion detection check on the Ethernet packets using a rule-based intrusion detection technique, and performing a secondary intrusion detection check on the Ethernet packets using a machine learning-based intrusion detection technique when no intrusion attack is detected as a result of the primary intrusion detection check.
Abstract:
An apparatus and a method for tracing a flight plan status are disclosed. The apparatus for tracing a flight plan status includes: a flight plan structure generation unit configured to generate a flight plan status transition structure based on received flight plan information; a flight plan setting unit configured to set a flight plan status based on a flight message transferred through an aeronautical fixed telecommunication network; and a flight plan tracing unit configured to trace the flight plan status included in the flight plan status transition structure based on the set flight plan status.
Abstract:
Disclosed herein are a method for countering an asynchronous attack on a supply chain security protocol and an apparatus for the same. The method includes, in a supply chain security protocol performed by a terminal device into which a dielet is inserted and an authentication server, performing a self-generation mode in which a counter value within the dielet is registered in the authentication server, performing a read-out mode in which whether an asynchronous attack occurs is detected by comparing the counter values respectively stored in the dielet and the authentication server when a message for communication is sent, and replacing a message for the communication with a random value when an asynchronous attack is detected.
Abstract:
Disclosed herein are an apparatus and method for verifying the integrity of a hardware board. The apparatus includes one or more processors and execution memory for storing at least one program that is executed by the processors, wherein the program is configured to compare images of components arranged on a verification target board and a source board in a first image, obtained by photographing the verification target board, and in a second image prestored for the source board, as to whether images of the components are identical to each other, and compare first firmware extracted from the verification target board with second firmware of the source board, as to whether first firmware is identical to second firmware and verify integrity of the verification target board based on whether the images are identical to each other and on whether the pieces of firmware are identical to each other.
Abstract:
Disclosed herein are a method for managing an access control list based on an automotive Ethernet and an apparatus for the same. The method includes analyzing a new access control rule that is input to a vehicle in which the automotive Ethernet is applied, searching for any one target unit to manage the new access control rule in consideration of at least one of a destination and an application target corresponding to the new access control rule, and storing the new access control rule by transmitting a storage request message corresponding to the new access control rule to the target unit.
Abstract:
Disclosed herein is a method for securing an indirect function call according to an embodiment of the present invention. The method may include searching for an instruction that indirectly calls a function in intermediate representation code, calculating the number of functions that have to be allowed to be indirectly called based on the found instruction, identifying the address of a function loaded at the N-th lowest address arbitrarily set in advance, among the functions, the number of which is calculated, identifying indexes for selecting callee functions to be indirectly called based on the found instruction, determining whether to allow the function to be called using the identified indexes, and determining, when the function is allowed to be called, whether to allow the function to be called using the address of a callee function, the memory address of which is N-th lowest, among the callee functions.
Abstract:
Disclosed herein are a method for replacing vehicle parts using an in-vehicle network based on an automotive Ethernet and a system for the same. The method is configured such that a vehicle diagnosis module included in a vehicle performs vehicle self-diagnosis, such that the vehicle and a vehicle manufacturer server perform an authentication process for a new part when a vehicle part is replaced based on a vehicle part replacement agreement procedure between the terminal of a vehicle owner and the maintenance terminal of a vehicle maintenance company, and such that the terminal of the vehicle owner checks whether replacement of the vehicle part is performed normally by requesting an integrity check result from each of the vehicle and the vehicle manufacturer server when the maintenance terminal transmits a part replacement completion message to the terminal of the vehicle owner after completion of the authentication process.
Abstract:
An apparatus and method for determining the location of a mobile object are disclosed. The apparatus includes a GPS module unit, a mobile communication module unit, a USN module unit, and a control module unit. The GPS module unit receives a GPS signal including the coordinate information of the current location of a mobile object. The mobile communication module unit is operated when the GPS module unit has received the GPS signal, and transmits the coordinate information of the current location of the mobile object and the ID of the mobile object to a location estimation apparatus. The USN module unit is operated when the GPS module unit fails to receive the GPS signal, and broadcasts a beacon signal carrying the ID of the mobile object. The control module unit operates any one of the mobile communication module unit and the USN module unit.
Abstract:
Disclosed herein are a method and apparatus for randomizing the address space layout of an embedded system based on hardware. The method is configured such that the hardware loader of the embedded system randomly arranges the respective address regions of multiple peripheral devices and memory using a random number each time a program is loaded, such that the respective random start addresses of the multiple peripheral devices and the memory, which are set based on the randomly arranged address regions, are recorded in an address table, and such that program code loaded into the memory is reengineered based on the address table so as to match the randomly arranged address regions.