Cryptography and Security

All posts under tag "Cryptography and Security"

13 posts total
Sorted by date
Quantum Private Information Retrieval with Sublinear Communication   Complexity

Quantum Private Information Retrieval with Sublinear Communication Complexity

๋ณธ ๋…ผ๋ฌธ์€ ์–‘์ž ๊ฐœ์ธ ์ •๋ณด ๊ฒ€์ƒ‰ ํ”„๋กœํ† ์ฝœ ์— ๋Œ€ํ•œ ์‹ฌ๋„ ์žˆ๋Š” ๋ถ„์„์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ํ•ญ๋ชฉ์„ ๋น„๊ณต๊ฐœ๋กœ ๊ฒ€์ƒ‰ํ•˜๋Š” ๋ฐฉ๋ฒ•์œผ๋กœ, Chor, Kushilevitz, Goldreich ๋ฐ Sudan์˜ ์—ฐ๊ตฌ์—์„œ ์‹œ์ž‘๋œ ๋ถ„์•ผ์ž…๋‹ˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ๊ณต๊ฐœ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๊ฐ€ ๋ณดํŽธํ™”๋จ์— ๋”ฐ๋ผ ๋”์šฑ ์ค‘์š”ํ•ด์ง„ ์ด ์ฃผ์ œ๋ฅผ ๋‹ค๋ฃน๋‹ˆ๋‹ค. 1. ๊ฐœ์ธ ์ •๋ณด ๊ฒ€์ƒ‰ ํ”„๋กœํ† ์ฝœ์˜ ๋ฐฐ๊ฒฝ ๋ณธ ๋…ผ๋ฌธ์€ Chor, Kushilevitz, Goldreich ๋ฐ Sudan์˜ ์—ฐ๊ตฌ์—์„œ ์‹œ์ž‘๋œ ๊ฐœ์ธ ์ •๋ณด ๊ฒ€์ƒ‰ ๋ถ„์•ผ๋ฅผ ์†Œ๊ฐœํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ์„œ๋ฒ„๋กœ๋ถ€ํ„ฐ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ํ•ญ๋ชฉ์„ ๋น„๊ณต๊ฐœ๋กœ

Computational Complexity Quantum Physics Computer Science Cryptography and Security
Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of   Classical Ciphers

Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of Classical Ciphers

๋ณธ ๋…ผ๋ฌธ์€ ๊ณ ์ „ ์•”ํ˜ธ ํ•ด๋…์„ ์ž๋™ํ™”ํ•˜๊ธฐ ์œ„ํ•ด ๊ฐœ๋ฐœ๋œ ํ”„๋ ˆ์ž„์›Œํฌ 'ํฌ๋ฆฝํ†จ๋ฆฌ์‹œ์Šค'์˜ ์„ค๊ณ„์™€ ๊ตฌํ˜„ ๋ฐฉ๋ฒ•์„ ์ƒ์„ธํžˆ ๋‹ค๋ฃจ๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ํ”„๋กœ์ ํŠธ๋Š” ์ž๋ฐ” ์–ธ์–ด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•˜๋ฉฐ, ๋ฉ”๋ชจ๋ฆฌ ๊ด€๋ฆฌ์™€ ์ปฌ๋ ‰์…˜ ๊ด€๋ฆฌ์˜ ์šฉ์ด์„ฑ ๋•๋ถ„์— ํšจ์œจ์ ์ธ ๊ฐœ๋ฐœ ํ™˜๊ฒฝ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์‹œ์Šคํ…œ ์•„ํ‚คํ…์ฒ˜ ํฌ๋ฆฝํ†จ๋ฆฌ์‹œ์Šค์˜ ์‹œ์Šคํ…œ ์•„ํ‚คํ…์ฒ˜๋Š” ์•”ํ˜ธ ์ƒ์„ฑ ๋ฐ ํ…Œ์ŠคํŠธ๋ฅผ ์œ„ํ•œ ๋‚ด๋ถ€ ๋„๊ตฌ์™€ ๊ณต๊ฒฉ ๋ชจ๋“ˆ๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. ๊ฐ ๊ตฌ์„ฑ ์š”์†Œ ๊ฐ„ ์ƒํ˜ธ ์ž‘์šฉ์€ ์ž์„ธํžˆ ์„ค๋ช…๋˜์–ด ์žˆ์œผ๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด ํ”„๋ ˆ์ž„์›Œํฌ์˜ ์ „์ฒด์ ์ธ ๊ตฌ์กฐ๋ฅผ ์ดํ•ดํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ํŒจํ‚ค์ง€ ๊ตฌ์กฐ : ์ž๋ฐ” ํŒจํ‚ค์ง€ ๊ตฌ์กฐ๋Š” ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๋ชจ๋“ˆ

Framework Analysis Software Engineering Cryptography and Security Computer Science
Is Cloud Computing Steganography-proof?

Is Cloud Computing Steganography-proof?

: 1. ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์˜ ํŠน์„ฑ ๋ฐ ๋ณด์•ˆ ์œ„ํ˜‘ ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์€ ๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•ด ํŽธ๋ฆฌํ•˜๊ฒŒ ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋Š” ๊ณต์œ  ๊ฐ€๋Šฅํ•œ ์ปดํ“จํŒ… ๋ฆฌ์†Œ์Šค ๋ชจ๋ธ๋กœ, ์ดˆ๊ธฐ ๋น„์šฉ์„ ์ ˆ๊ฐํ•˜๊ณ  ์œ ์—ฐ์„ฑ์„ ๋†’์ด๋Š” ๋“ฑ์˜ ์žฅ์ ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. NIST๋Š” ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์˜ ํ•ต์‹ฌ ํŠน์„ฑ์œผ๋กœ ์˜จ๋””๋งจ๋“œ ์…€ํ”„ ์„œ๋น„์Šค, ๊ด‘๋ฒ”์œ„ํ•œ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ, ๋ฆฌ์†Œ์Šค ํ’€๋ง, ๋น ๋ฅธ ํ™•์žฅ์„ฑ, ์ธก์ • ๊ฐ€๋Šฅํ•œ ์„œ๋น„์Šค ๋“ฑ์„ ์ œ์‹œํ•ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์žฅ์ ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ…์€ ๋‹ค์–‘ํ•œ ๋ณด์•ˆ ์œ„ํ˜‘์— ๋…ธ์ถœ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ๋™๋งน์ด ์ •์˜ํ•œ 7๋Œ€ ์ฃผ์š” ์œ„ํ˜‘ ์ค‘ ์ผ๋ถ€๋Š” ์Šคํ…Œ๊ฐ€๋…ธ๊ทธ๋ž˜ํ”ผ์™€ ๊ด€๋ จ๋˜์–ด ์žˆ์œผ๋ฉฐ, ์ด

Cryptography and Security Computer Science
O Algoritmo usado no programa de criptografia PASME

O Algoritmo usado no programa de criptografia PASME

์ด ๋…ผ๋ฌธ์€ PASME ๋„๊ตฌ์˜ ํ•ต์‹ฌ ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ƒ์„ธํžˆ ์„ค๋ช…ํ•˜๊ณ  ์žˆ๋‹ค. ์ด ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ํฐ ์ˆ˜์˜ ์†Œ์ธ์ˆ˜ ๋ถ„ํ•ด๋ผ๋Š” ๊ณ„์‚ฐ์ ์œผ๋กœ ์–ด๋ ค์šด ๋ฌธ์ œ๋ฅผ ํ™œ์šฉํ•˜์—ฌ ๋ฐ์ดํ„ฐ๋ฅผ ์•ˆ์ „ํ•˜๊ฒŒ ์•”ํ˜ธํ™”ํ•œ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๊ธฐ์กด ์•”ํ˜ธํ™” ๋ฐฉ๋ฒ•๋“ค์˜ ํ•œ๊ณ„๋ฅผ ๊ทน๋ณตํ•˜๋ ค๋Š” ์‹œ๋„๊ฐ€ ์ด๋ฃจ์–ด์ง€๊ณ  ์žˆ์œผ๋ฉฐ, ํŠนํžˆ ๋นˆ๋„ ๋ถ„์„๊ณผ ๊ฐ™์€ ๊ณต๊ฒฉ์— ์ทจ์•ฝํ•œ ๊ณ ์ „์ ์ธ ์•”ํ˜ธํ™” ๋ฐฉ๋ฒ•๋“ค๋ณด๋‹ค ๋ณด์•ˆ์„ฑ์ด ํ–ฅ์ƒ๋˜์—ˆ๋‹ค. I. ์„œ๋ก  ์„œ๋ก ์—์„œ๋Š” ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ํ•„์š”์„ฑ๊ณผ ๋‹ค์–‘ํ•œ ์•”ํ˜ธํ™” ๊ธฐ๋ฒ•๋“ค์˜ ํ•œ๊ณ„๋ฅผ ์„ค๋ช…ํ•œ๋‹ค. ํŠนํžˆ, ๋ฌธ์ž ์ง‘ํ•ฉ ์ˆœ์„œ ๋ณ€๊ฒฝ์ด๋‚˜ ์ด์ง„ ๋ฉ”์‹œ์ง€์—์„œ ๋น„ํŠธ ์—ญ์ „ ๋“ฑ์˜ ๋ฐฉ๋ฒ•๋“ค์€ ๋นˆ๋„ ๋ถ„์„ ๊ณต๊ฒฉ์— ์ทจ์•ฝํ•˜๋‹ค๋Š” ์ ์„

Mathematics Computer Science Cryptography and Security
Device-Native Autonomous Agents for Privacy-Preserving Negotiations

Device-Native Autonomous Agents for Privacy-Preserving Negotiations

๋ณธ ๋…ผ๋ฌธ์€ ๊ธฐ์กด ํด๋ผ์šฐ๋“œโ€‘์ค‘์‹ฌ ํ˜‘์ƒ ํ”Œ๋žซํผ์ด ๊ฐ–๋Š” โ€œ๋ฐ์ดํ„ฐ ์ค‘์•™์ง‘์ค‘ โ†’ ๋ณด์•ˆ ์œ„ํ˜‘ โ†’ ์‚ฌ์šฉ์ž ์‹ ๋ขฐ ์ €ํ•˜โ€๋ผ๋Š” ๊ตฌ์กฐ์  ๋ฌธ์ œ๋ฅผ ๊ทผ๋ณธ์ ์œผ๋กœ ์žฌ๊ตฌ์„ฑํ•œ๋‹ค๋Š” ์ ์—์„œ ํ•™์ˆ ์ ยท์‚ฐ์—…์  ์˜์˜๋ฅผ ๊ฐ€์ง„๋‹ค. ์ฒซ ๋ฒˆ์งธ๋กœ, ๋””๋ฐ”์ด์Šคโ€‘๋„ค์ดํ‹ฐ๋ธŒ( deviceโ€‘native ) ์•„ํ‚คํ…์ฒ˜๋Š” ๋ชจ๋“  ํ˜‘์ƒ ๋กœ์ง๊ณผ ์ œ์•ฝ ์กฐ๊ฑด์„ ์‚ฌ์šฉ์ž์˜ ๋กœ์ปฌ ํ™˜๊ฒฝ์— ๊ฒฉ๋ฆฌํ•จ์œผ๋กœ์จ ๋ฐ์ดํ„ฐ ํƒˆ์ทจ ์œ„ํ—˜์„ ์ตœ์†Œํ™”ํ•œ๋‹ค. ์ด๋Š” ํŠนํžˆ GDPRยทCCPA ๋“ฑ ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ๊ทœ์ œ๊ฐ€ ๊ฐ•ํ™”๋˜๋Š” ํ˜„์žฌ ์ƒํ™ฉ์—์„œ ๋ฒ•์ ยท๊ทœ์ œ์  ์ปดํ”Œ๋ผ์ด์–ธ์Šค๋ฅผ ์ž์—ฐ์Šค๋Ÿฝ๊ฒŒ ์ถฉ์กฑํ•œ๋‹ค๋Š” ์žฅ์ ์ด ์žˆ๋‹ค. ๋‘ ๋ฒˆ์งธ๋กœ, ์ œ๋กœ ์ง€์‹ ์ฆ๋ช…(zeroโ€‘knowl

Computer Science Cryptography and Security
An Approach for Message Hiding using Substitution Techniques and Audio   Hiding in Steganography

An Approach for Message Hiding using Substitution Techniques and Audio Hiding in Steganography

: ๋ณธ ๋…ผ๋ฌธ์€ ์Šคํ…Œ๊ฐ€๋…ธ๊ทธ๋ž˜ํ”ผ๋ฅผ ์ด์šฉํ•œ ์ •๋ณด ์€๋‹‰ ๊ธฐ๋ฒ•์„ ๋‹ค๋ฃจ๊ณ  ์žˆ์œผ๋ฉฐ, ํŠนํžˆ 24๋น„ํŠธ BMP ์ด๋ฏธ์ง€ ํŒŒ์ผ์— ํ…์ŠคํŠธ๋‚˜ ์˜ค๋””์˜ค ๊ฐ™์€ ๋น„๋ฐ€ ๋ฉ”์‹œ์ง€๋ฅผ ์ˆจ๊ธฐ๋Š” ๋ฐฉ๋ฒ•์— ์ง‘์ค‘ํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” ์ •๋ณด ๋ณด์•ˆ์˜ ์ค‘์š”ํ•œ ํ•˜์œ„ ๋ถ„์•ผ๋กœ, ์Šคํ…Œ๊ฐ€๋…ธ๊ทธ๋ž˜ํ”ผ์™€ ์›Œํ„ฐ๋งˆํ‚น์„ ํ†ตํ•ด ๋ฐœ์ „ํ•ด ์™”์Šต๋‹ˆ๋‹ค. ๋…ผ๋ฌธ์€ ์•”ํ˜ธํ™” ๊ธฐ์ˆ ์—์„œ ์˜๊ฐ์„ ๋ฐ›์•„, ์ „์†ก๋œ ๋ฉ”์‹œ์ง€๋ฅผ ๋„์ฒญ์ž๋กœ๋ถ€ํ„ฐ ์•ˆ์ „ํ•˜๊ฒŒ ์ˆจ๊ธธ ์ˆ˜ ์žˆ๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” ๋‹จ์ˆœํžˆ ๋ฉ”์‹œ์ง€๋ฅผ ์•”ํ˜ธํ™”ํ•˜๋Š” ๊ฒƒ ์ด์ƒ์œผ๋กœ, ์‹ค์ œ ๋ฐ์ดํ„ฐ๋ฅผ ๋‹ค๋ฅธ ๋ฏธ๋””์–ด์— ์ˆจ๊ธฐ๋Š” ๋ฐฉ์‹์ž…๋‹ˆ๋‹ค. ์Šคํ…Œ๊ฐ€๋…ธ๊ทธ๋ž˜ํ”ผ ๊ธฐ๋ฒ•: ๋…ผ๋ฌธ์—์„œ ์ œ์•ˆ๋œ ์Šคํ…Œ๊ฐ€๋…ธ๊ทธ๋ž˜ํ”ผ ๊ธฐ๋ฒ•์€

Computer Science Cryptography and Security
No Image

Visual Secret Sharing Scheme using Grayscale Images

: ๋ณธ ๋…ผ๋ฌธ์€ ํšŒ์ƒ‰์กฐ ์ด๋ฏธ์ง€์— ๋Œ€ํ•œ ์‹œ๊ฐ ๋น„๋ฐ€ ๋ถ„๋ฐฐ(VSS) ๋ฐฉ์‹์˜ ๊ฐœ์„ ์ ์„ ์ œ์‹œํ•˜๋ฉฐ, ํŠนํžˆ ํ”ฝ์…€ ํ™•์žฅ ๋ฌธ์ œ์™€ ์žฌ๊ตฌ์„ฑ๋œ ์ด๋ฏธ์ง€์˜ ํ’ˆ์งˆ ์ €ํ•˜๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ์ƒˆ๋กœ์šด ์ ‘๊ทผ๋ฒ•์„ ์†Œ๊ฐœํ•œ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” ๊ธฐ์กด VSS ๋ฐฉ์‹์—์„œ ๋ฐœ์ƒํ•˜๋Š” ์ฃผ์š” ๋ฌธ์ œ์ ๋“ค์„ ๊ทน๋ณตํ•˜๊ณ ์ž ํ•˜๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด ๋ณด๋‹ค ์•ˆ์ •์ ์ด๊ณ  ํšจ๊ณผ์ ์ธ ๋น„๋ฐ€ ์ •๋ณด ๊ณต์œ  ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•œ๋‹ค. 1. ๋ฐฐ๊ฒฝ ๋ฐ ๋ฌธ์ œ ์ธ์‹ ๋น„๋ฐ€ ๋ถ„๋ฐฐ ๊ธฐ๋ฒ•์€ ๋‹ค์–‘ํ•œ ์‘์šฉ ๋ถ„์•ผ์—์„œ ํ™œ์šฉ๋˜๋ฉฐ, ํŠนํžˆ ์›Œํ„ฐ๋งˆํ‚น๊ณผ ๊ฐ™์€ ์ •๋ณด ์€๋‹‰ ๊ธฐ์ˆ ์— ๋„๋ฆฌ ์‚ฌ์šฉ๋œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ด๋“ค ๋ฐฉ์‹ ์ค‘ ์ผ๋ถ€๋Š” ์žฌ๊ตฌ์„ฑ๋œ ์ด๋ฏธ์ง€์˜ ํ’ˆ์งˆ ์ €ํ•˜์™€ ํ”ฝ์…€ ํ™•์žฅ ๋ฌธ์ œ๋ฅผ ์•ผ

Computer Vision Computer Science Cryptography and Security
No Image

Cryptographic Hardening of d-Sequences

๋ณธ ๋…ผ๋ฌธ์€ d ์‹œํ€€์Šค๋ฅผ ์ด์šฉํ•˜์—ฌ ๋žœ๋ค ์ˆซ์ž ์ƒ์„ฑ๊ธฐ(RNG)์˜ ๋ฌด์ž‘์œ„์„ฑ์„ ๊ฐ•ํ™”ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” RNG์˜ ์ถœ๋ ฅ์— ๋‹ค๋Œ€์ผ ๋งคํ•‘์„ ์ ์šฉํ•จ์œผ๋กœ์จ ์—ญ ๊ณผ์ •์˜ ๋ณต์žก์„ฑ์„ ์ฆ๊ฐ€์‹œํ‚ค๊ณ , ์ด๋ฅผ ํ†ตํ•ด ์‹œํ€€์Šค์˜ ๋ฌด์ž‘์œ„์„ฑ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š” ์•„์ด๋””์–ด๋ฅผ ์ค‘์‹ฌ์œผ๋กœ ์ง„ํ–‰๋˜์—ˆ์Šต๋‹ˆ๋‹ค. 1. ๋ฌด์ž‘์œ„์„ฑ ์ธก์ • ๊ธฐ์ค€ ๋ฌด์ž‘์œ„์„ฑ์€ ํ™•๋ฅ ์  ๊ด€์ ๊ณผ ๋ณต์žก์„ฑ ๊ด€์ ์—์„œ ์ธก์ •๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ž์ƒ๊ด€ ํ•จ์ˆ˜๋ฅผ ์ฃผ์š”ํ•œ ๋ฌด์ž‘์œ„์„ฑ ์ธก์ • ๊ธฐ์ค€์œผ๋กœ ์‚ฌ์šฉํ•˜์˜€์Šต๋‹ˆ๋‹ค. ์ด๋Š” ์‹œํ€€์Šค์˜ ์ž๊ธฐ ์œ ์‚ฌ์„ฑ์„ ๋‚˜ํƒ€๋‚ด๋ฉฐ, ์ข‹์€ ๋ฌด์ž‘์œ„ ์‹œํ€€์Šค๋Š” ๋Œ€๋žต ์ด์ง„ ๊ฐ’์„ ๊ฐ€์ง€๋Š” ์ž์ƒ๊ด€ ํ•จ์ˆ˜๋ฅผ ๊ฐ€์ง‘๋‹ˆ

Computer Science Cryptography and Security
On the impossibility of non-static quantum bit commitment between two   parties

On the impossibility of non-static quantum bit commitment between two parties

๋ณธ ๋…ผ๋ฌธ์€ ์–‘์ž ๋น„ํŠธ ์ปค๋ฐ‹๋จผํŠธ(QBC) ํ”„๋กœํ† ์ฝœ์˜ ๋ณด์•ˆ์„ฑ๊ณผ ํ•œ๊ณ„์— ๋Œ€ํ•ด ์‹ฌ๋„ ์žˆ๊ฒŒ ๋ถ„์„ํ•ฉ๋‹ˆ๋‹ค. QBC๋Š” ์•”ํ˜ธํ™”์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜๋Š”๋ฐ, ์ด๋Š” ์ „์†ก์ž๊ฐ€ ์ˆ˜์‹ ์ž์—๊ฒŒ 0 ๋˜๋Š” 1 ์ค‘ ํ•˜๋‚˜์˜ ๋น„ํŠธ๋ฅผ ์•ฝ์†ํ•˜๋Š” ๊ณผ์ •์ž…๋‹ˆ๋‹ค. ์ด ํ”„๋กœ์„ธ์Šค๋Š” ๋ฐ”์ธ๋”ฉ ์†์„ฑ๊ณผ ๊ฐ์ถ”๋Š” ์†์„ฑ์„ ๋™์‹œ์— ์ถฉ์กฑํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. ๋ฐ”์ธ๋”ฉ ์†์„ฑ์€ ์ „์†ก์ž๊ฐ€ ์ปค๋ฐ‹๋จผํŠธ ๋‹จ๊ณ„ ์ดํ›„์— ์•ฝ์†ํ•œ ๋น„ํŠธ ๊ฐ’์„ ๋ณ€๊ฒฝํ•  ์ˆ˜ ์—†์Œ์„ ์˜๋ฏธํ•˜๋ฉฐ, ๊ฐ์ถ”๋Š” ์†์„ฑ์€ ์ˆ˜์‹ ์ž์—๊ฒŒ ์ปค๋ฐ‹๋จผํŠธ ๋‹จ๊ณ„ ์ด์ „์—๋Š” ์•ฝ์†๋œ ๋น„ํŠธ ๊ฐ’์ด ์•Œ๋ ค์ง€์ง€ ์•Š์Œ์„ ๋‚˜ํƒ€๋ƒ…๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋‘ ๊ฐ€์ง€ ์†์„ฑ์„ ๋™์‹œ์— ์ถฉ์กฑํ•˜๋Š” ๊ณ ์ „์  ๋น„ํŠธ ์ปค๋ฐ‹๋จผํŠธ ํ”„๋กœํ† ์ฝœ

Quantum Physics Computer Science Cryptography and Security
Exposing Hidden Interfaces: LLM-Guided Type Inference for Reverse Engineering macOS Private Frameworks

Exposing Hidden Interfaces: LLM-Guided Type Inference for Reverse Engineering macOS Private Frameworks

MOTIF๋Š” ํฌ๊ฒŒ ๋‘ ๊ฐ€์ง€ ํ•ต์‹ฌ ์š”์†Œ๋กœ ๊ตฌ์„ฑ๋œ๋‹ค. ์ฒซ ๋ฒˆ์งธ๋Š” Objectiveโ€‘C ๋Ÿฐํƒ€์ž„ ์ •๋ณด๋ฅผ ํ™œ์šฉํ•ด ๋ฉ”์„œ๋“œ ํ˜ธ์ถœ ๊ด€๊ณ„์™€ ํด๋ž˜์Šค ๊ณ„์ธต ๊ตฌ์กฐ๋ฅผ ์ถ”์ถœํ•˜๋Š” โ€˜๋ฉ”ํƒ€๋ฐ์ดํ„ฐ ์ˆ˜์ง‘ ๋ชจ๋“ˆโ€™์ด๋‹ค. ์ด ๋ชจ๋“ˆ์€ dyld shared cache์™€ Machโ€‘O ๋ฐ”์ด๋„ˆ๋ฆฌ๋ฅผ ๋™์ ์œผ๋กœ ๋กœ๋“œํ•˜๊ณ , objc getClass, method getImplementation ๋“ฑ์˜ ๋Ÿฐํƒ€์ž„ API๋ฅผ ํ˜ธ์ถœํ•ด ์‹ค์ œ ๋ฉ”๋ชจ๋ฆฌ ์ฃผ์†Œ์™€ ์‹ฌ๋ณผ ์ •๋ณด๋ฅผ ์ˆ˜์ง‘ํ•œ๋‹ค. ์ˆ˜์ง‘๋œ ๋ฐ์ดํ„ฐ๋Š” ๊ทธ๋ž˜ํ”„ ํ˜•ํƒœ๋กœ ์ •๊ทœํ™”๋˜์–ด ์ดํ›„ ๋‹จ๊ณ„์— ์ „๋‹ฌ๋œ๋‹ค. ๋‘ ๋ฒˆ์งธ๋Š” ํŒŒ์ธํŠœ๋‹๋œ ๋Œ€ํ˜• ์–ธ์–ด ๋ชจ๋ธ(LLM)์ด๋‹ค. ์—ฐ๊ตฌํŒ€์€

Computer Science Framework Cryptography and Security
No Image

A Novel Attack against Android Phones

๋ณธ ๋…ผ๋ฌธ์€ ์•ˆ๋“œ๋กœ์ด๋“œ ์Šค๋งˆํŠธํฐ์˜ ๋ณด์•ˆ ์ทจ์•ฝ์ ์„ ์ง‘์ค‘์ ์œผ๋กœ ๋ถ„์„ํ•˜๊ณ , ์ด๋ฅผ ์•…์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์ƒˆ๋กœ์šด ๊ณต๊ฒฉ ๊ธฐ๋ฒ•์„ ์ œ์‹œํ•ฉ๋‹ˆ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” 2011๋…„ 1๋ถ„๊ธฐ์— ๊ฐ€์žฅ ๋งŽ์ด ํŒ๋งค๋œ ์šด์˜์ฒด์ œ์ธ ์•ˆ๋“œ๋กœ์ด๋“œ๋ฅผ ๋Œ€์ƒ์œผ๋กœ ํ•˜๋ฉฐ, ํŠนํžˆ ์Šค๋งˆํŠธํฐ ์‚ฌ์šฉ์ž๋“ค์ด ์ง๋ฉดํ•˜๊ฒŒ ๋  ์ž ์žฌ์ ์ธ ์œ„ํ˜‘์— ๋Œ€ํ•ด ๊ฒฝ๊ฐ์‹ฌ์„ ๋ถˆ๋Ÿฌ์ผ์œผํ‚ค๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ทจ์•ฝ์ ์˜ ์‹ฌ๊ฐ์„ฑ ๋ณธ ๋…ผ๋ฌธ์—์„œ ์ œ์‹œ๋œ ๊ณต๊ฒฉ ๊ธฐ๋ฒ•์€ ๋งค์šฐ ์น˜๋ช…์ ์ž…๋‹ˆ๋‹ค. ์ด๋Š” ๋‹จ์ˆœํžˆ ์•…์„ฑ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ์„ค์น˜ํ•˜๋Š” ๋ฐ ๊ทธ์น˜์ง€ ์•Š๊ณ , ์‚ฌ์šฉ์ž์˜ ์ธ์‹ ์—†์ด ์ด๋ฃจ์–ด์ง‘๋‹ˆ๋‹ค. ์ฆ‰, ์‚ฌ์šฉ์ž๊ฐ€ ์–ด๋– ํ•œ ๊ถŒํ•œ๋„ ๋ถ€์—ฌํ•˜์ง€ ์•Š์•„๋„ ์•…์„ฑ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์ด ์ž๋™์œผ๋กœ ์„ค

Computer Science Cryptography and Security

< Category Statistics (Total: 743) >

Electrical Engineering and Systems Science
7
General
272
General Relativity
7
HEP-EX
5
HEP-PH
12
HEP-TH
5
MATH-PH
3
NUCL-TH
1
Quantum Physics
10

Start searching

Enter keywords to search articles

โ†‘โ†“
โ†ต
ESC
โŒ˜K Shortcut