ETRI-Knowledge Sharing Plaform

ENGLISH

성과물

논문 검색
구분 SCI
연도 ~ 키워드

상세정보

학술대회 Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device
Cited 0 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
저자
정보흥, 김정녀
발행일
201012
출처
International Conferences on Security Technology (SecTech) 2010 / Disaster Recovery and Business Continuity (DRBC) 2010 (CCIS 122), v.122, pp.68-73
DOI
https://dx.doi.org/10.1007/978-3-642-17610-4_8
협약과제
10MS3900, 고신뢰 자율제어 SW를 위한 CPS(Cyber Physical Systems)핵심기술 개발, 박승민
초록
Illegal or unintentional file transmission of important data is a sensitive and main security issue in embedded and mobile devices. Within restricted resources such as small memory size and low battery capacity, simple and efficient method is needed to lessen much effort for preventing this illegal activity. Therefore, we discuss a protection technique taking into account these considerations. In our method, sample bytes are extracted from an important file and then it is used to prohibit illegal file transfer and modification. To avoid attacker's easy prediction about the selection position of the sample bytes, it is selected within whole extent of the file by equal distribution and at the random location. To avoid huge increase of the number of the sample bytes, candidate sampling area size of the file is chosen carefully after the analysis of the length and number of files. Also, considering computational overhead to calculate the number and position of the sample bytes to be selected, we propose three types of sampling methods. And we will show the evaluation result of these methods and recommend proper sampling approach to embedded device with low computational power. With the help of this technique, it has advantages that data leakage can be protected and prohibited effectively and the device can be managed securely within low overhead. © 2010 Springer-Verlag.
KSP 제안 키워드
Area size, Battery capacity, Computational Power, Data Leakage, Embedded Devices, Equal distribution, File Transfer, File transmission, Memory size, Mobile devices, Sampling approach