HW 보안 모듈을 활용한 탬퍼링 대응 기술의 검증 및 평가 방안 조사

Vol. 34, No. 2, pp. 335-345, 4월. 2024
10.13089/JKIISC.2024.34.2.335, Full Text:
Keywords: Hardware Security, Software Security, Trusted Platform Module, Anti Tampering
Abstract

In the digital era, data security has become an increasingly critical issue, drawing significant attention. Particularly, anti-tampering technology has emerged as a key defense mechanism against indiscriminate hacking and unauthorized access. This paper explores case studies that exemplify the trends in the development and application of TPM (Trusted Platform Module) and software anti-tampering technology in today's digital ecosystem. By analyzing various existing security guides and guidelines, this paper identifies ambiguous areas within them and investigates recent trends in domestic and international research on software anti-tampering. Consequently, while guidelines exist for applying anti-tampering techniques, it was found that there is a lack of methods for evaluating them. Therefore, this paper aims to propose a comprehensive and systematic evaluation framework for assessing both existing and future software anti-tampering techniques. To achieve this, it using various verification methods employed in recent research. The proposed evaluation framework synthesizes these methods, categorizing them into three aspects (functionality, implementation, performance), thereby providing a comprehensive and systematic evaluation approach for assessing software anti-tampering technology in detail.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
이동호, 반영훈, 임재덕, 조해현, "Investigation of Verification and Evaluation Methods for Tampering Response Techniques Using HW Security Modules," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 2, pp. 335-345, 2024. DOI: 10.13089/JKIISC.2024.34.2.335.

[ACM Style]
이동호, 반영훈, 임재덕, and 조해현. 2024. Investigation of Verification and Evaluation Methods for Tampering Response Techniques Using HW Security Modules. Journal of The Korea Institute of Information Security and Cryptology, 34, 2, (2024), 335-345. DOI: 10.13089/JKIISC.2024.34.2.335.