Abstract:
An apparatus and method for collecting digital evidence from a target system to be analyzed at a remote location and then providing security in a remote digital forensic environment based on the collected digital evidence. The method of providing security includes making, by a security providing apparatus, an evidence collection request for collection of evidence of an evidence collection-target apparatus from an evidence collection agent in a remote digital forensic environment, collecting evidence data corresponding to the evidence collection request from the evidence collection agent, verifying the evidence data based on a signature value of the evidence data collected from the evidence collection agent, generating evidence analysis data based on the verified evidence data, verifying the evidence analysis data based on a signature value of the evidence analysis data, and providing security for the evidence collection-target apparatus based on results of the verification of the evidence analysis data.
Abstract:
The present invention relates to an apparatus and method that verify the integrity of applications installed on a smart device by using hash values of application information and related data securely stored in a cloud space, without installing an antivirus program that requires additional complicated operations. The method includes, when a terminal accesses the application integrity verification apparatus, receiving at least one initial value corresponding to an application currently being executed on the terminal from a given application developer server and then generating at least one reference hash value, receiving, from the terminal, at least one application hash value generated based on the application currently being executed on the terminal and data corresponding to the application, comparing the reference hash value with the application hash value, and verifying integrity of the application based on results of the comparison between the reference hash value and the application hash value.
Abstract:
The present invention relates to an apparatus and method for analyzing vulnerability of a Zigbee network. For this, the apparatus for analyzing vulnerability of a Zigbee network present invention includes an allocation supporting unit for analyzing an environment of a Zigbee network and allocating a plurality of analyzers to multiple channels of the Zigbee network. A public vulnerability inspection unit inspects the Zigbee network for predefined public vulnerability via the plurality of analyzers. A new vulnerability analysis unit analyzes new vulnerability of the Zigbee network via the plurality of analyzers.
Abstract:
In a method of selectively applying a data encryption function, a CoAP client and a CoAP server perform a DTLS handshake process. The CoAP client generates a CoAP message when the DTLS handshake process has been completed, and then indicates that encryption does not need to be applied to the CoAP message. The CoAP client generates only the authentication value of the CoAP message via a DTLS record layer protocol. The CoAP client sets the value of the specific field of a DTLS record layer protocol header to a specific value via the DTLS record layer protocol. The CoAP client sends the CoAP message and the authentication value to the CoAP server.
Abstract:
An apparatus and method for transferring network access information of smart household appliances are provided. The apparatus includes a detection unit for detecting whether a public IP address of an external interface of an indoor IP sharer has changed. An extraction unit is configured to, if the public IP address of the external interface has changed, extract network access information of a smart household appliance connected to an internal interface of the indoor IP sharer, the network access information being updated together with change in the public IP address. An encryption and generation unit encrypts the network access information using a pre-stored encryption key, and generates data to be transmitted to a smart grid service provider server using the encrypted information and an ID of a customer user. A transmission unit transmits the data generated by the encryption and generation unit to the smart grid service provider server.
Abstract:
In a digital evidence collection method, an evidence collection device sends an evidence collection request message requesting permission of evidence collection to a notarization server through a notarization agent. The notarization server sends a collection permission message permitting evidence collection to the evidence collection device through the notarization agent. The evidence collection device requests evidence data from an evidence collection target system through the notarization agent. The evidence collection target system transmits the evidence data to the notarization agent. The notarization agent encrypts the evidence data and transfers encrypted evidence data to the evidence collection device.