키보드컨트롤러의 하드웨어 취약점에 대한 대응 방안
Vol. 18, No. 4, pp. 187-194,
8월.
2008
10.13089/JKIISC.2008.18.4.187, Full Text:
Keywords: scan codes, H/W vulnerability, sniffing, password expose, keyboard controller, internal memory
Abstract Statistics
Cite this article
10.13089/JKIISC.2008.18.4.187, Full Text:
Keywords: scan codes, H/W vulnerability, sniffing, password expose, keyboard controller, internal memory
Abstract Statistics
Cite this article
[IEEE Style]
T. Jeong and K. Yim, "Countermeasures to the Vulnerability of the Keyboard Hardware," Journal of The Korea Institute of Information Security and Cryptology, vol. 18, no. 4, pp. 187-194, 2008. DOI: 10.13089/JKIISC.2008.18.4.187.
[ACM Style]
Tae-Young Jeong and Kang-Bin Yim. 2008. Countermeasures to the Vulnerability of the Keyboard Hardware. Journal of The Korea Institute of Information Security and Cryptology, 18, 4, (2008), 187-194. DOI: 10.13089/JKIISC.2008.18.4.187.