Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kyungroul Lee is active.

Publication


Featured researches published by Kyungroul Lee.


Computers & Mathematics With Applications | 2012

A secure framework of the surveillance video network integrating heterogeneous video formats and protocols

Kyungroul Lee; Kangbin Yim; Mohammad A. Mikki

Recently, IT technologies are becoming focused on different traditional industries. The large scaled intelligent video surveillance system is one of them and it integrates a large number of digitalized CCTV [1] devices through the Web. However, existing video devices have been deployed for many years by different vendors as different models with different specifications. To integrate these heterogeneous devices, the centralized management server (CMS) and its clients need a specialized architecture to deal with different types of media encodings and connection protocols etc. In particular, well-defined access control mechanism is required for a large scaled surveillance video network. In this paper, we designed and implemented a server that incorporates the architecture integrating and delivering multiple video streams from different types of video devices to multiple clients and securing the access to the video streams.


innovative mobile and internet services in ubiquitous computing | 2013

Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation)

Kyungroul Lee; Youngjun Lee; Junyoung Park; Kangbin Yim; Ilsun You

This paper introduces structure, features, and programming techniques of CNG (Cryptography API: Next Generation), which was released as a substitute of the previous CAPI (Cryptography API) library from Microsoft. Because it is constructed with individual modules based on plug-in architecture, we can reconfigure the incorporated functions in CNG at any time. This means CNG is exceedingly helpful in the cost of development as well as the facility of extension. In addition, specific characteristics of recent new cryptography algorithms and audit policies can be easily embedded into existing library and even supported by the kernel mode expansion for cryptographic services at all points in companies, public government and so on. On the opposite side of these advantages, considerations on security issues are quite insufficient. Therefore, research on security assurance is strongly required in the environment of distributing and utilizing the CNG library. In this paper, we introduce current security issues of CNG and the related considerations on it.


innovative mobile and internet services in ubiquitous computing | 2011

Keyboard Security: A Technological Review

Kyungroul Lee; Kangbin Yim

The keyboard is the most widely used input device in the computing environment. Authentication systems also usually need keyboards to acquire user passwords. Even though a perfect crypto technology is deployed into the authentication system, it becomes useless if the password from the keyboard is stolen as a plain text form. Therefore, several solutions have been introduced to protect passwords from keyboard. However, these solutions have not been sustainable to protect passwords, due to some compromising vulnerabilities. This paper explores recent critical vulnerabilities to the keyboard security and technologically analyzes various offensive and defensive aspects of the keyboard interfaces and their security mechanisms.


broadband and wireless computing, communication and applications | 2010

A Solution to Protecting USB Keyboard Data

Kyungroul Lee; Wansoo Kim; Kwangjin Bae; Kangbin Yim

This paper analyzes security vulnerability to the USB keyboard data, which are transferred between the host and the USB keyboard, and proposes a solution that randomly inserts noise characters among data from the keyboard. Through the research work, the USB host-related data structures, with which the host uses to communicate with a USB keyboard based on the UHCI, are sophisticatedly analyzed and the vulnerability is revealed by implementing the sniffing software utilizing the vulnerability. Additionally, it is proved that the proposed noise mingling approach can be a reasonable solution to the vulnerability by implementing and applying the idea. It is recommended to apply this approach to real transactions to enhance security characteristics for Internet-based financial environment.


broadband and wireless computing, communication and applications | 2017

Vulnerability Analysis of Secure Disk: Based on Backup Feature of Product A

Myoungsu Kim; Kyungroul Lee; Kangbin Yim

Secure disks protect user data by applying security features such as data access prevention through access control, user identification through authentication, and data leakage prevention through encryption and decryption. However, data exposure can still be caused by security threats such as malicious users bypassing authentication and the exposure of encryption and decryption keys. Therefore, we analyze a potential vulnerability in the backup feature of product A and draw practical and empirical results to verify the analyzed vulnerability by implementing a proof-of-concept tool.


broadband and wireless computing, communication and applications | 2016

Security Assessment of Keyboard Data Based on Kaspersky Product

Seungho Lee; Kyungroul Lee; Kangbin Yim

To protect keyboard data that includes sensitive information such as authentication data, secure keyboard programs preempt the extraction of the keyboard data before they are stolen by an attacker. Although these programs are operated at a variety of defense levels, some secure keyboard programs are still vulnerable to hardware-level attacks; therefore, in this paper, the security of keyboard data is evaluated according to the functionality of the Kaspersky “Internet Security” product, whereby secure information is inputted into a variety of websites that comprises SNSs, an email account, and a banking service.


broadband and wireless computing, communication and applications | 2016

Security Assessment on the Mouse Data using Mouse Loggers

Hyeji Lee; Yeunsu Lee; Kyungroul Lee; Kangbin Yim

The mouse device, one of the computer peripherals, is an input device that recognizes mouse movements on the two-dimensional plane of a monitor, and it is possible to use it conveniently or inputting and editing during the running of application programs. The existing password-based authentication methods are vulnerable to keyboard-data exposure, so a new authentication method that is based on the mouse input has emerged. Nevertheless, a security assessment of the mouse-based authentication method has not been practically analyzed; for this reason, the exposure of mouse data is evaluated in this paper based on the mouse loggers that can be easily obtained from Web sites. It will be possible to utilize the analyzed result to formulate a security guideline to prevent the exposure of authentication information that is based on the image-based authentication.


Computer Standards & Interfaces | 2016

An efficient key management solution for privacy masking, restoring and user authentication for video surveillance servers

Kyungroul Lee; Hyeungjun Yeuk; Jaein Kim; Hyungjoon Park; Kangbin Yim

In this paper, we surveyed technical elements of video surveillance systems and proposed several countermeasures to effectively manage a number of keys for image encryption, privacy protection and user authentication. In addition, we proposed several solutions for potential problems that could arise when the system adopts a privacy masking policy for each user. The proposed solutions selectively implement a Kerberos approach, a round keys approach and a double hash chain approach. For secure video surveillance systems, protecting privacy and providing accessibility through strong user authentication and prioritized authorization is expected. This paper proposes a key distribution scheme for distributed video surveillance servers.The scheme introduces security protocols to authenticate multiple privileged users.The scheme also includes privacy masking and restoration strategies used in case of crimes.Hierarchical restoration of the privacy masks with different privileges is possible using the proposed scheme.Security evaluation on the proposed protocols is included in a new section.


innovative mobile and internet services in ubiquitous computing | 2011

Architecture to Support Heterogeneous Devices for Video Surveillance System

Mohammad A. Mikki; Kyungroul Lee; Wansoo Kim; Kangbin Yim

Recently, IT technologies are getting focused indifferent traditional industries. The large scaled intelligent video surveillance system is one of them and it integrates large number of digitalized CCTV [1] devices through the Web. However, existing video devices have been deployed for several dozens of years by different vendors as different models with different specifications. To integrate these heterogeneous devices, the centralized management server (CMS) and its clients need a specialized architecture to deal with different types of mediacodings and connection protocols etc. In this paper, we designed and implemented a server that incorporates the architecture to deliver video streams from different types of video devices to multiple clients.


Concurrency and Computation: Practice and Experience | 2018

Ransomware prevention technique using key backup.

Kyungroul Lee; Kangbin Yim; Jung Taek Seo

In this paper, a key backup technique for the recovery of files encrypted by ransomware is proposed. Ransomware interferes with the victims system through abnormal behavior such as locking of the victims system or encryption of the system or files. Ransomware writers demand money from the victims as a condition for the recovery of the encrypted files and systems that have been seized; systems infected by ransomware cannot be repaired without a decryption key, making the employment of detection and recovery methods urgent. This paper proposes a prevention technique for backing up encryption keys in a secure repository which enables the recovery of ransomware‐infected systems and ransomware‐encrypted files. The proposed technique can be used to repair systems infected by ransomware, thereby ensuring safety against such malicious codes.

Collaboration


Dive into the Kyungroul Lee's collaboration.

Top Co-Authors

Avatar

Kangbin Yim

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Sun-Young Lee

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Ilsun You

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Insu Oh

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Hyeji Lee

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Yeunsu Lee

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Hyeungjun Yeuk

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Jaein Kim

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Junyoung Park

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Kwangjin Bae

Soonchunhyang University

View shared research outputs
Researchain Logo
Decentralizing Knowledge