Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kibom Kim is active.

Publication


Featured researches published by Kibom Kim.


information security and cryptology | 2013

A kernel memory collecting method for efficent disk encryption key search

Youngbok Kang; Hyunuk Hwang; Kibom Kim; Kyoungho Lee; Minsu Kim; Bong-Nam Noh

It is hard to extract original data from encrypted data before getting the password in encrypted data with disk encryption software. This encryption key of disk encryption software can be extract by using physical memory analysis. Searching encryption key time in the physical memory increases with the size of memory because it is intended for whole memory. But physical memory data includes a lot of data that is unrelated to encryption keys like system kernel objects and file data. Therefore, it needs the method that extracts valid data for searching keys by analysis. We provide a method that collect only saved memory parts of disk encrypting keys in physical memory by analyzing Windows kernel virtual address space. We demonstrate superiority because the suggested method experimentally reduces more of the encryption key searching space than the existing method.


information reuse and integration | 2016

Understanding Anti-forensic Techniques with Timestamp Manipulation (Invited Paper)

Dae-il Jang; Gail-Joon Ahn. Hyunuk Hwang; Kibom Kim

Numerous security incidents caused by malwares and hackers have recently utilized anti-forensic techniques to bypass analysis and detection. It is critical to build a knowledge base that would help understand such anti-forensic techniques. In this paper, we present a forensic analysis method to detect an anti-forensic technique which leverages timestamp manipulation in NTFS file system. Our approach analyzes how timestamp manipulation occurs in NTFS file system and also extracts some features to detect timestamp manipulation behaviors. We also evaluate our approach with several use cases and describe how our approach helps detect timestamp manipulation behaviors.


information security and cryptology | 2014

An improved extraction technique of executable file from physical memory by analyzing file object

Youngbok Kang; Hyunuk Hwang; Kibom Kim; Bong-Nam Noh

ABSTRACT According to the intelligence of the malicious code to extract the executable file in physical memory is emerging as an import researh issue. In previous physical memory studies on ex ecutable file extraction which is targeting running files, they are not extracted as same as original file saved in disc. Therefore, we need a method that can extract files as same as original one saved in disc and also can analyze file-information loaded in physical memory.In this paper, we provide a method that executable file extract ion by analyzing information of Windows kernel file object. Also we analyze the characteristic of physical memory loaded fi le data from the experiment and we demonstrate superiority because the suggested method can effectively extract more of or iginal file data than the existing method.Keywords: Physical Memory Forensic, File Mapped Data, File Object I.서 론 최근 디지털 포렌식 연구에서는 하드디스크를 이 접수일(2014년 8월 6일), 수정일(2014년 9월 11일) 게재확정일(2014년 9월 12일)†주저자, [email protected]‡교신저자, [email protected](Corresponding author)


Archive | 2013

APPARATUS AND METHOD FOR RECOVERING PARTITION USING BACKUP BOOT RECORD INFORMATION

Hyunuk Hwang; Kibom Kim; Seung-Yong Lee; Young-Chan Shin; Taejoo Chang


Digital Investigation | 2009

Lessons learned from the construction of a Korean software reference data set for digital forensics

Kibom Kim; Sangseo Park; Taejoo Chang; Cheolwon Lee; Sungjai Baek


information security and cryptology | 2012

Vulnerability Analysis Method of Software-based Secure USB

Minho Kim; Hyunuk Hwang; Kibom Kim; Taejoo Chang; Minsu Kim; Bong-Nam Noh


Archive | 2016

APPARATUS AND METHOD FOR PROTECTING DATA IN FLASH MEMORY BASED ON UNAUTHORIZED ACTIVITY ON SMART DEVICE

Seungjei Yang; Jungho Choi; Kibom Kim


Digital Investigation | 2016

Robust bootstrapping memory analysis against anti-forensics

Kyoungho Lee; Hyunuk Hwang; Kibom Kim; Bong-Nam Noh


Archive | 2015

Encoding and decoding apparatus for concealing error in video frame and method using same

Taewoo Oh; Kibom Kim


Archive | 2015

Forensic data acquisition apparatus and method for guaranteeing integrity of flash memory in smart device

Seungjei Yang; Jungho Choi; Kibom Kim; Taejoo Chang

Collaboration


Dive into the Kibom Kim's collaboration.

Top Co-Authors

Avatar

Hyunuk Hwang

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Bong-Nam Noh

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar

Taejoo Chang

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jungho Choi

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Kyoungho Lee

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar

Seung-Yong Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Seungjei Yang

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Cheolwon Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sangseo Park

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Taewoo Oh

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge