Abstract:
The present invention relates to an apparatus for code obfuscation and a method for the same. The apparatus for code obfuscation of the present invention comprises: an input unit for receiving executable codes of an Android application; a code structure analyzer for analyzing the inputted executable codes to divide into important codes, needed to be protected from application falsification attacks, and general codes except the important codes; a Dalvik to C code converter for converting the important codes into C codes to generate native codes; an obfuscator for obfuscating the native codes and the general codes; a self code protector for each adding falsification detection codes to the obfuscated native codes to encrypt the native codes and each adding loading routines to the encrypted native codes to generate the self-transformed native codes; a code combiner for combining the self-transformed native codes and the obfuscated general codes. According to the present invention, the apparatus reconfigures the important code part of an application to be obfuscated into a CPU command set and converts an important code from a managed code to a native code to eliminate structured code information, one among the reverse engineering vulnerabilities of the managed code, to obfuscate reverse engineering, thereby preventing the reverse engineering. Additionally, a self transformation-based code protection technique and a falsification detection technique are applied to the apparatus so as to protect an important code converted into a native code, thus improving resistance to reverse engineering analysis. [Reference numerals] (AA) Start; (BB) Managed code; (CC) Native code; (DD) End; (S210) Enter an execution code; (S220) Analyze the execution code to divide into important codes and general codes; (S230) Convert the important codes into C codes to generate native codes; (S240) Obfuscate the native codes; (S250) Add falsification detection codes to the obfuscated native codes to encrypt the native codes, and add loading routines to the encrypted native codes to generate self-transformed native codes; (S255) Obfuscate the general codes; (S260) Combine the self-transformed native codes and the obfuscated general codes; (S270) Transmit the combined self-transformed native codes and obfuscated general codes to a client
Abstract:
PURPOSE: A method for sharing a session key between wireless communication devices using a variable length of an authentication code is provided to increase usability in a state that an authentication method through an OOB(out-of-band) channel is used by using a short length of an authentication code. CONSTITUTION: A public key is generated using its own private key(S211,S212). A message including the public key and a first random number is generated(S215,S216). The message is encrypted by its own secret key(S217,S218). The message is exchanged with the encrypted message of an another party's terminal(S219). The encrypted message of another party's terminal is decoded by receiving a secret key of another party's terminal(S221-S224). An authentication ode is generated by calculating the first random number and a second random number(S226,S227). A parameter value is calculated from the authentication code(S228,S229). A session key is generated using the public key of another party's terminal included in the decoded message(S230,S231). [Reference numerals] (AA) ; (BB) ; (CC) Checking of OA=OB; (S211) Generation of a public key(PKA) using a private key(a); (S212) Generation of a public key(PKB) using a private key(b); (S213) Selection of a random number(NA) and a secret key(SKA); (S214) Selection of a random number(NB) and a secret key(SKB); (S215) Message generation(mA); (S216) Message generation(mB); (S217) Encoding the message(mA) using the secret key(SKA); (S218) Encoding the message(mB) using the secret key(SKB); (S219) Encoded message exchange; (S220) Secret key transmission; (S221) Decoding of an encoded message using the secrete key(SKA); (S222) Reflective offensive verification value(0) checking in the decoded message(m"A); (S223) Secrete key transmission; (S224) Decoding of an encoded message using the secrete key(SKB); (S225) Reflective offensive verification value(1) checking in the decoded message(m"B); (S226) Authentication code(CVA) generation; (S227) Authentication code(CVB) generation; (S228) Parameter(OA) generation; (S229) Parameter(OB) generation; (S230) Session key(KAB) generation using the public key(KPB); (S231) Session key(KAB) generation using the public key(KPA)
Abstract:
PURPOSE: A password authentication method of a user terminal and an apparatus thereof are provided to protect password information leakage from the third party by indirectly inputting a password through an authentication interface. CONSTITUTION: A setting unit(210) includes a password included in a keypad window and an image window overlapped with the keypad window. The setting unit receives an ID image and the password from a user. A window moving unit(220) moves the keypad window or the image window according to an operation of the user. A password determining unit(230) determines whether to overlap the keys corresponding to the password and an identifying image.
Abstract:
PURPOSE: A method and an apparatus for authenticating password of a user device are provided to prevent the exposure of password information. CONSTITUTION: A password icon corresponding to password among a plurality of icons and the traveling direction of the password icon are set(S100). The icons are successively carried according to the operation of a user(S110). If the traveling direction of the password icon and password icon are successively conformed, a password authentication device certifies password(S130).
Abstract:
A method for producing a highly stable polymer actuator is provided to allow the use of a polymer actuator at a low temperature and even after treatment at an extremely high temperature. A method for producing a highly stable polymer actuator comprises: a step(S11) of preparing an ionic polymer/metal composite comprising metal electrodes plated on both surfaces of a conductive polymer membrane; a step(S12) of removing water from the conductive polymer membrane of the ionic polymer/metal composite; and a step(S13) of swelling the ionic polymer/metal composite in a polar solvent having a higher boiling point and a lower freezing point than water. The polar solvent includes propylene carbonate.
Abstract:
A compound for a molecular electronic device is provided to be adequately applied to embody a fine molecular electronic device in several tens of nanometer level. A molecular electronic device is provided to prevent the short-circuiting phenomenon caused by poor coverage due to having a molecular active layer with excellent coverage. A compound for a molecular electronic device consists of a ferrocene disulfide compound represented by the formula(1), wherein each R1 and R2 is respectively C1-20 saturated or unsaturated hydrocarbon which may be substituted or unsubstituted by F. A method for preparing the compound comprises the steps of: (a) subjecting ferrocene to mono-lithiation using tertiary butyl lithium; (b) reacting the mono-lithiated ferrocene with Br(CH2)mBr(m is an integer from 1 to 20) to synthesize a bromoalkyl ferrocene compound(alkyl is (CH2)m); and (c) preparing a ferrocene disulfide compound having a (CH2)m-S-S-(CH2)nCH3 group from the bromoalkyl ferrocene compound using sodium thiosulfate pentahydrate and alkane thiol(alkane is CH3(CH2)n(n is an integer from 1-19)). A molecular electronic device comprises a first electrode, a second electrode formed on the first electrode, and a molecular active layer which is interposed between the first electrode and the second electrode, and is characterized in that the molecular active layer has a structure of the compound for the molecular electronic device being self-assembled at the first electrode.