Title A Study on Major Advanced Case Analysis and Military Cyber Threat Response Measures Category Education
Author Kyung-Sang Sung, Wonshik Na Organigation ICCT2022
Abstract   Submit Date 2022
As national security expands into cyberspace, it is necessary to secure both physical and cyberspace to ensure national security and the safety of the people. Countries around the world are seeking to strengthen their defense capabilities and cyber security strategies by linking the private, public and defense sectors at the national strategy level. In this paper, after examining various cases to respond to cyber threats, the Korean military proposes cyber threats and necessary requirements when applying IoT technology to the military from three aspects

 

Title Experimental study to verify the safety and efficiency of the use of Beauty Care Device for facial skin Category Beauty & Health
Author KyungSang Sung1, Heejoo Im2, Seonggyu Kim3, Wonshik Na Organigation ICCIT2021
Abstract   Submit Date 2021
In this experimental research paper, we tried to objectively verify the safety and effectiveness of the LED Mask by analyzing the effect of improving pores, skin brightness, skin tone, sebum, etc. As a result of the experiment, when using the LED Mask according to the skin type, the effect of about 70% on the improvement and maintenance of the facial skin was proved, and the result of the questionnaire was also able to confirm the stability.

 

Title A Study on military cyber threat cases and countermeasures Category Security
Author Kyung-Sang Sung1, Hyun-Chang Lee 2, Wonshik Na Organigation ICCIT2020
Abstract   Submit Date 2020
As such, countries all over the world are seeking to strengthen their defense capacity and prepare reliable cybersecurity strategies by linking the private, public, and defense sectors at the national strategy level. This paper will look at the concept of the Fourth Industrial Revolution, case studies of intelligent cyber threats, model cases of countering cyber threats, and the status quo of Korea. Based on this, the paper will present countermeasures for the South Korean military that will allow it to actively transform its defense system.

 

Title A Study on the Implementation of a System Providing Reliable Malware Information Service Category Security
Author Kyung-Sang Sung, Wonshik Na Organigation IJEEE
Abstract   Submit Date 2019
Malware can be diagnosed several ways or even pass under the radar at times. This can cause confusion in the users, who do not welcome a flood of unorganized information in general. This paper proposes an extraction method that can provide reliable and established results in order to tackle the issue from the user's point of view. To guarantee the reliability of AVS and AVS against the malware, this paper tested malware that can actually be found in use. Such processes allow this paper to extract and provide the most reliable information to users.
In addition, this paper can help the students who study security establish the concept of malicious code. And research subjects are enough to prepare malicious code countermeasures for security graduate students.
Title A Secure EPC System based on Encryption Key using Matrix Puzzle Category Security
Author In-hwa Choi, Kyung-Sang Sung, Gi-Sung Lee Organigation AGST2016
Abstract   Submit Date 2016
A lot of researches have been in progress about the importance of EPCglobal Network and their encryption technologies, and various systems are presented as well. Nevertheless, regarding to the encryption schema, most of them mention that it is specified in X.509 and there are no concrete usage strategies yet. The study is about proposing and implementing methods of sending messages securely, verifying whether received messages are effective, encrypting for the secure sending and certifying between systems for the web-based service constituting EPCglobal Network. Also, we used Matrix Puzzle methods on the key creation scheme which ensures the messages through safe key management methods.

 

 

A study on the implementation of a system providing reliable malware information service

Kyung-Sang Sung, Wonshik Na The International Journal of Electrical Engineering & Education
(February 25, 2019)

Malware can be diagnosed through several ways or can even pass under the radar at times. This can cause confusion among the users, who do not welcome a flood of unorganized information in general. This paper proposes an extraction method that can provide reliable and established results in order to tackle the issue from the users’ point of view. To guarantee the reliability of Anti-virus Software (AVS) and AVS against the malware, this paper tested malware that can actually be found in use. Such processes allow this paper to extract and provide the most reliable information to users. In addition, this paper can help students, who study security, to establish the concept of malicious code. And research subjects are enough to prepare malicious code countermeasures for security graduate students.

 

System Design for the Safe store and Issue Service Assurance of the E-Document

Kyung-Sang SungJung-Jae KimHae-Seok Oh  January 2008

Certified e-Document Authority keep it with protection legal as a system a guarantee and identifies originality of an e-Record, It presume to be authenticity e-Records and contents of an e-Record prove what was not changed. But, e-Records has high medium degree of dependence and loss danger of information has very high problems. In addition, Because correction(attachment and deletion) and a revision of information are easy, a problem for integrity and the originality of an e-Record is caused. Existing system show the following inefficient. For the originality guarantee, an existing e-Documents encryption method accomplishes a encrypted process of a whole document with a symmetric key, if the information revised midway, the whole documents content must accomplish re-scanning and re-encryption process again. To get over such inefficient, this paper maximize efficiency which occurred at the time of partial information revision request by encryption and managing using the link information based on the linkage characteristics of the each page on the registered requested e-Documents, It was able to increase security configuration by minimizing problems on an information exposure through increasing complicated of the key management.

A Study on the E-Document Encrypted using the Effective key Management Method Tae-Wook KimKyung-Sang SungHae-Seok Oh DOI: 10.5762/KAIS.2009.10.5.1000

It also increases the competitive power of the nation. With all these merits of electronic documents, there exist threats to the security such as illegal outflow, destroying, loss, distortion, etc. Currently, the techniques to protect the electronic documents against illegal forgery, alteration or removal are not enough. Until now, various security technologies have been developed for electronic documents. However, most of them are limited to prevention of forgery or repudiation. Cryptography for electronic documents is quite heavy that direct cryptography is not in progress. Additionally, key management for encryption/decryption has many difficulties that security has many weak points. Security has inversely proportional to efficiency. It is strongly requested to adopt various cryptography technologies into the electronic document system to offer more efficient and safer services. Therefore, this paper presents some problems in cryptography technologies currently used in the existing electronic document systems, and offer efficient methods to adopt cryptography algorithms to improve and secure the electronic document systems. To validate performance of proposed method compare with the existing cryptographies, critical elements have been compared, and it has been proved that the proposed method gives better results both in security and efficiency.

A Study on the Encrypted Scheme Using Key Management Method Based on the Random Number Rearrangement for the Effective E-Document Management

Tae-Wook KimKyung-Sang SungJung-Jae Kim, Byoung-Muk Min, Hae-Seok Oh

The KIPS Transactions PartC 16C(5):575-582 · October 2009 with 12 Reads

With all merits of electronic documents, there exist threats to the security such as illegal outflow, destroying, loss, distortion, etc. The techniques to protect the electronic documents against illegal forgery, alteration, removal are strongly requested. Even though various security technologies have been developed for electronic documents, most of them are emphasized to prevention of forgery or repudiation. This paper presents some problems in cryptography technologies currently used in the existing electronic document systems, and offer efficient methods to adopt cryptography algorithms to improve and secure the electronic document systems. To validate performance of the proposed random rearrangement method comparing with the existing cryptographies, basic elements have been compared, and it has been proved that the proposed method gives better results both in security and efficiency.

+ Recent posts