메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학위논문
저자정보

이호준 (고려대학교, 고려대학교 정보보호대학원)

지도교수
이상진
발행연도
2021
저작권
고려대학교 논문은 저작권에 의해 보호받습니다.

이용수1

표지
AI에게 요청하기
추천
검색

이 논문의 연구 히스토리 (2)

초록· 키워드

오류제보하기
COVID-19 감염이 확산되면서 이에 대응하기 위한 다양한 방법들이 제시되고 있다. 그 중 최근에는 ICT 기술을 기반으로 하여 접촉자를 추적하는 기술이 제안되어 세계 각국에서 이를 사용하고 있다. 빠르고 정확하게 접촉자를 추적할 수 있다는 장점이 있지만 이러한 기술들은 개인 정보 유출 등의 보안 위협에 노출되어 있다. 접촉자 추적 기술은 추적 방식에 따라 다양한 유형으로 분류가 가능한데 각각의 유형에 따라 발생 가능한 위협도 다양하다. 본 논문에서는 다양한 유형의 접촉자 추적 기술에서 공통적으로 발생하는 프로세스들을 확인하고 이 과정에서 발생할 수 있는 위협을 식별하였다. 이를 통해 다양한 유형의 접촉자 추적 기술 모두에 적용 가능한 공통된 평가 기준을 도출하였으며, 이를 실제 공개된 접촉자 추적 기술에 적용하여 유형 별 비교 분석을 수행하였다. 이러한 연구는 여러 유형 간의 비교를 통해 안전하고 효과적인 접촉자 추적 기술을 선택하는데 도움이 될
수 있을 것이다.

목차

국문 요약 ···············································································································1
1. 서론 ····················································································································2
2. 관련 연구 ··········································································································4
2.1. 접촉자 추적 기술 ···················································································4
2.1.1. 블루투스 기반 중앙집중형 방식 ············································4
2.1.1.1. ROBERT ······································································5
2.1.1.2. NTK ··············································································5
2.1.1.3. BlueTrace ····································································6
2.1.2. 블루투스 기반 탈중앙형 방식 ················································7
2.1.2.1. DP-3T ··········································································7
2.1.2.2. Exposure Notification ···············································7
2.1.3. 위치정보 기반 방식 ··································································8
2.1.3.1. KOR 방식 ····································································9
2.2. 보안 위협 모델링 ·················································································10
2.2.1. STRIDE ·····················································································10
2.2.2. LINDDUN ·················································································11
3. Attack Library 구축 ····················································································13
3.1. 내부자 위협 ···························································································13
3.1.1. DUCT 무결성 위배 ································································13
3.1.2. DUCT 기밀성 위배 ································································13
3.2. 외부자 위협 ···························································································14
3.2.1. 릴레이/리플레이 공격 ·····························································14
3.2.2. 자원 고갈 공격 ········································································14
3.2.3. Service Server DoS ·······························································15
3.2.4. 외부자에 의한 거짓 감염 공격 ············································15
3.2.5. Service Server 가장 공격 ·····················································15
3.2.6. 블루투스 중간자 공격 ····························································15
3.2.7. 블루투스 취약점 공격 ····························································16
3.2.8. 외부자에 의한 Linking 공격 ················································16
3.2.9. Tracking 공격 ··········································································16
3.2.10. 어깨너머공격 ··········································································16
3.3. 사용자 위협 ···························································································17
3.3.1. Trolling 공격 ···········································································17
3.3.2. GPS 조작 ··················································································17
3.3.3. 시스템 시간 조작 ····································································18
3.3.4. 접촉 가능성 무시 ····································································18
3.3.5. 사용자에 의한 거짓 감염 공격 ············································18
4. 접촉자 추적 기술에 대한 보안 위협 모델링 ··········································19
4.1. 블루투스 기반 중앙집중형 방식 ·······················································19
4.1.1. 데이터 흐름도 ··········································································19
4.1.2. STRIDE 보안 위협 분석 ·······················································20
4.1.3. LINDDUN 보안 위협 분석 ···················································22
4.2. 블루투스 기반 탈중앙형 방식 ···························································22
4.1.1. 데이터 흐름도 ··········································································24
4.1.2. STRIDE 보안 위협 분석 ·······················································24
4.1.3. LINDDUN 보안 위협 분석 ···················································26
4.3. 위치정보 기반 방식 ·············································································27
4.3.1. 데이터 흐름도 ··········································································28
4.3.2. STRIDE 보안 위협 분석 ·······················································28
4.3.3. LINDDUN 보안 위협 분석 ···················································30
5. 접촉자 추적 기술에 대한 평가 기준 제안 및 비교 분석 ····················31
6. 결론 ··················································································································38
참고문헌 ···············································································································39

최근 본 자료

전체보기

댓글(0)

0