Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Surya Michrandi Nasution is active.

Publication


Featured researches published by Surya Michrandi Nasution.


2015 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC) | 2015

Implementation of host card emulation mode over Android smartphone as alternative ISO 14443A for Arduino NFC shield

Rochman Saefulloh Basyari; Surya Michrandi Nasution; Burhanuddin Dirgantara

The development of todays technology is increasing technology became more sophisticated and easier for all human activities. Some human activities such as accessing open/lock rooms door which is usually done manually or with a smartcard, so we must always carry all sorts of lock (lock house, garage locks, office locks, lock the car) or a smart card these in our daily activities. But sometimes we often forget to bring or keep essential items like that because many of these items and also this time we are more comfortable and behavior can never escape bring smartphones everywhere. Based on those problem, there is an idea to replace of a regular key or smartcard with a smartphone. It can be done if we implemented the key into the smartphone that already used Near Field Communication(NFC) technology module. Implementation of these kind of technology will make possibilities to get rid of carrying many things in our pocket. And it will help people whom easly forget an important things such as keys and smartcard. The role of the key and smartcard can be subtituted if Host-based Card Emulation(HCE) mode implemented on NFC enable smartphone which is introduced in android OS 4.4(KitKat), HCE mode will make smartphones with NFC module can be work act as a smart card that lets people use only one item device in some of its activities. To emulate smart cards and to exchange data between smartphone enable NFC and NFC reader built from components of the microcontroller are Arduino UNO and NFC shield PN532, using a smartcard standard ISO14443A.


international conference on information technology systems and innovation | 2015

Modified kleptodata for spying soft-input keystroke and location based on Android mobile device

Surya Michrandi Nasution; Yudha Purwanto; Agus Virgono; M. Faris Ruriawan

Soft keyboard is perhaps the most common human input device on smartphone. This study designed and implemented a proof-of-concept soft keyboard keylogger in Android. The soft keyboard app was designed to have the capability to capture keystrokes from user and save it. It also can record the GPS location of user at the time of typing and sent it to a remote server. From our testing, the app was capable of recording the keystroke from user and their location. Since a keyboard app is normally used for typing message and email, filling confidential information, filling username and password, and so on, a soft keyboard application has the potential to be used for malicious activities.


international conference on telecommunication systems services and applications | 2014

Integration of kleptoware as keyboard keylogger for input recorder using teensy USB development board

Surya Michrandi Nasution; Yudha Purwanto; Agus Virgono; Girindra Chandra Alam

Operating a computer to perform everyday tasks is sure to require input devices. The common human interface devices for operating a computer are mouse and keyboard. It means that modifying input devices can be alternative way to do monitoring and logging activity from a user. A keylogger is able to do such functions, but various hardware and software keylogger on the market are easily detectable either physically or by antivirus software. Those limitations can be avoided by hiding a keylogger directly into the keyboard. This key logger is implemented using Teensy 2.0 USB development board, which differs between the PS/2 and USB variant. Results of analysis shows that the keylogger in undetectable physically and works correctly just like any normal keyboard. The drawbacks are reduced performance as in increasing delay between held keystrokes, key ghosting and key jamming.


IOP Conference Series: Materials Science and Engineering | 2017

Realization and Addressing Analysis In Blockchain Bitcoin

Raja Sakti Arief Daulay; Surya Michrandi Nasution; Marisa W. Paryasto

The implementation research and analyze address blockchain on this bitcoin will have the results that refers to making address bitcoin a safe and boost security of address the bitcoin. The working mechanism of blockchain in making address bitcoin which is already in the blockchain system.


2015 1st International Conference on Wireless and Telematics (ICWT) | 2015

Integration of autonomous sender for hidden log data on kleptoware for supporting physical penetration testing

Surya Michrandi Nasution; Yudha Purwanto; Agus Virgono; M. Rifqi Y. Tambunan

Keylogger is a dangerous device that can capture all word that typed on the keyboard. There are two kinds of keylogger, it is hardware and software keylogger. It is very easy to detect them because both of them already listed as a malware. There are a lot of antivirus application that can detect software keylogger and for the hardware keylogger, it is easily can be seen if there is a strange thing that attached to our computer. Kleptoware is one of the solutions to hardware keylogger main problem. Another problem comes when we want to take all data had been capture on the device, we must take the keylogger first. This paper discuss about how to gain data from a kleptoware autonomously with client-server design on a local area network. Result in this paper shows that data must be send at least had same file size with the buffer that already determine first.


IOP Conference Series: Materials Science and Engineering | 2017

Implementation and Analysis of the use of the Blockchain Transactions on the Workings of the Bitcoin

Muhammad Reza Rizky Fauzi; Surya Michrandi Nasution; Marisa W. Paryasto

The present study discusses the workings of blockchain bitcoin in the transactions sector, on the development of todays emerging computers in the financial sector of blockchain bitcoin traction. In this case the author analyzes how the transaction is running, as well as how blockchain bitcoin is doing work in transactions on the system to make transactions. Transaction is a data structure that encodes the transfer of values between users with in a bitcoin system. Every transaction is a public entry in this bitcoin blockchain. And become a large transaction bookkeeping global.


IOP Conference Series: Materials Science and Engineering | 2017

Dragon Stream Cipher for Secure Blackbox Cockpit Voice Recorder

Fadira Akmal; Surya Michrandi Nasution; Fairuz Azmi

Aircraft blackbox is a device used to record all aircraft information, which consists of Flight Data Recorder (FDR) and Cockpit Voice Recorder (CVR). Cockpit Voice Recorder contains conversations in the aircraft during the flight.Investigations on aircraft crashes usually take a long time, because it is difficult to find the aircraft blackbox. Then blackbox should have the ability to send information to other places. Aircraft blackbox must have a data security system, data security is a very important part at the time of information exchange process. The system in this research is to perform the encryption and decryption process on Cockpit Voice Recorder by people who are entitled by using Dragon Stream Cipher algorithm. The tests performed are time of data encryption and decryption, and avalanche effect. Result in this paper show us time encryption and decryption are 0,85 seconds and 1,84 second for 30 seconds Cockpit Voice Recorder data witn an avalanche effect 48,67 %.


2016 International Conference on Informatics and Computing (ICIC) | 2016

Okamoto-Uchiyama homomorphic encryption algorithm implementation in e-voting system

Rifki Suwandi; Surya Michrandi Nasution; Fairuz Azmi

Nowadays, the use of electronic voting in an election has been widely adopted as a replacement for conventional voting system. Apart from the benefits of using this system, in fact, there are still many problems that can occur, such as system errors, network security, data confidentiality, and others. One of the main problems is it does not guarantee the confidentiality and accuracy of the data that to be stored and used. Cryptography is the science of mathematical techniques to secure the message offer solutions for the related problems. This research implements Okamoto-Uchiyama algorithm as the offered solutions that utilize cryptography on the security of e-voting system to ensure the security and confidentiality of the voting data, as well as utilizing the homomorphic properties of this algorithm to do the counting. This algorithm will hide the data by encrypting the votes that chosen by the voters and the system can perform calculations using the data that still encrypted without having to be decrypted first.


2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC) | 2016

Prototype of Kleptocharger for Android device

Fahmi Siddiq; Surya Michrandi Nasution; Fairuz Azmi

Power bank is a device used to support charging up a device battery, especially a mobile phones battery. Since design of common power bank contain of battery cell and power controller, it will have some empty space to create a modified power bank. We could implement a tiny Micro controller named teensy. Teensy will create power bank detected as a storage media and all the selected data will be copied into media card in the power bank. Beside of teensy implement, we could also implement SD card shield for storing all the captured data. This concept is a proof concept that modified power bank could be implemented. The results of this research prove that a modified power bank only works one mode at a time.


2016 International Conference on Informatics and Computing (ICIC) | 2016

Advanced e-voting system using Paillier homomorphic encryption algorithm

Shifa Manaruliesya Anggriane; Surya Michrandi Nasution; Fairuz Azmi

Collaboration


Dive into the Surya Michrandi Nasution's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge