Abstract:
Disclosed herein are an apparatus and method for calculating a multiplicative inverse. The apparatus for calculating a multiplicative inverse includes a data input unit for receiving input data, a multiplicative inverse calculation unit for dividing an input degree-8 finite field corresponding to the input data into two first degree-4 finite fields so as to perform Advanced Encryption Standard (AES) encryption on the input data, and for performing a multiplicative inverse calculation on the first degree-4 finite fields in consideration of a circuit depth value (T-Depth) and qubit consumption of quantum gates in a quantum circuit, and a data output unit for outputting result data obtained by performing the multiplicative inverse calculation.
Abstract:
Disclosed are a method for providing a security service for a wireless device and an apparatus thereof. The method includes obtaining a wireless fingerprint of a wireless device, determining a wireless device type corresponding to the obtained wireless fingerprint by referring to a first database, determining a security policy corresponding to the determined wireless device type by referring to a second database, and applying the determined security policy to a service for the wireless device, so that the wireless device is provided with a tight security service.
Abstract:
An apparatus and a method for identifying a rogue device having a media access control (MAC) address counterfeited/forged when a wireless intrusion prevention system controls an access to an access point (AP) and a wireless terminal which are not applied are disclosed. The apparatus includes: a sensor unit configured to collect MAC addresses, RSSI values, and RF feature values based on RF signals of wireless terminals; an RF feature database configured to store the collected MAC addresses, RSSI values, and RF feature values; and a terminal identification unit configured to identify whether a MAC of any one of the wireless terminals is forged by comparing information of the RF feature database with the RSSI value and the RF feature value of any one of the wireless terminals according to a MAC verification request of any one of the wireless terminals from the sensor unit.
Abstract:
Disclosed herein is an apparatus for analyzing the vulnerability of a wireless local area network (LAN). The apparatus includes a collection unit, an analysis unit, and an attack unit. The collection unit collects packets transmitted and received in a wireless LAN service. The analysis unit analyzes the state of a network using the collected packets. The attack unit makes a wireless attack against an attack target using the state of the network, and controls the mode switching of a device driver based on an operating mode.
Abstract:
Disclosed herein are an intrusion response apparatus and method for a vehicle network. The intrusion response method for a vehicle network is performed by an intrusion response apparatus for the vehicle network, and includes receiving attack detection information about an intrusive attack on the vehicle network from an intrusion detection system, selecting at least one target electronic control unit that is to be instructed to respond to the intrusive attack from among multiple electronic control units, and sending a response instruction message to the at least one target electronic control unit so that the target electronic control unit responds to the intrusive attack.
Abstract:
Disclosed herein are a health device, a gateway device, and a method for securing a protocol using the health device and the gateway device. The method includes performing, by the health device and the gateway device, authentication and key exchange based on security session information; sending, by any one of the health device and the gateway device, an application message protected based on the security session information; and receiving, by a remaining one of the health device and the gateway device, the protected application message.
Abstract:
Disclosed herein are a user terminal and method for playing DRM content. The user terminal includes a common security platform. The common security platform includes a DRM application management unit and a security management unit. The DRM application management unit stores and executes a DRM application that requests authentication from a license server and receives a license, including a decryption key for decrypting encrypted DRM content. The DRM application is an application in a downloadable form. The security management unit decrypts the encrypted DRM content, provided by a content providing server, using the decryption key included in the license issued via the DRM application.
Abstract:
A method for detecting anomalies in a controller area network of a vehicle and an apparatus for the same. The method for detecting anomalies in a Controller Area Network (CAN) of a vehicle includes monitoring the controller area network of the vehicle and generating sequence trees for respective multiple sub-networks included in the controller area network at a time at which monitoring is performed, comparing at least one normal sequence tree, generated in accordance with the controller area network when a status of the vehicle is normal, with the generated sequence trees, and calculating differences between traffic proportions for respective nodes based on a result of the comparison between the sequence trees, and detecting an anomaly in the vehicle in consideration of the differences.
Abstract:
Disclosed herein is an onboard cybersecurity diagnostic system for a vehicle, which may include at least one In-Vehicle Network (IVN) security diagnostic sensor configured to detect and diagnose an Electronic Control Unit (ECU) attack command on a communication bus; at least one ECU configured to control an actuator based on sensor data collected from a sensor, autonomously diagnose the integrity of ECU electronic control software, and diagnose the integrity of ECU electronic control data by combining the sensor data with a security diagnostic packet received from the at least one IVN security diagnostic sensor; and a cyber dashboard configured to display a security problem in the event of the security problem in the integrity of the ECU electronic control software or the ECU electronic control data.
Abstract:
A WLAN terminal positioning apparatus includes a directional antenna module including a directional antenna, a first motor, and a second motor wherein the second motor is combined with a shaft of the first motor and the directional antenna is combined with a shaft of the second motor such that the directional antenna has a hemispherical search range, where an angle of the maximum signal strength of the signal received by the directional antenna from the WLAN terminal is measured while the first motor or the second motor is rotated, and an estimated physical position of the WLAN terminal is calculated using a directional direction of the directional antenna.