보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅
Vol. 22, No. 5, pp. 1191-1204,
10월.
2012
10.13089/JKIISC.2012.22.5.1191,
Full Text:
Keywords: Vulnerability, Security Testing, Threat Analysis, Penetration Testing, Self-protection, Non-bypassability
Abstract Statistics
Cite this article
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/pdficon_small.png)
Keywords: Vulnerability, Security Testing, Threat Analysis, Penetration Testing, Self-protection, Non-bypassability
Abstract Statistics
Cite this article
[IEEE Style]
D. Kim, Y. Jeong, G. Yun, H. Yoo, S. Cho, G. Kim, J. Lee, H. Kim, T. Lee, J. Lim, D. Won, "Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems," Journal of The Korea Institute of Information Security and Cryptology, vol. 22, no. 5, pp. 1191-1204, 2012. DOI: 10.13089/JKIISC.2012.22.5.1191.
[ACM Style]
Dongjin Kim, Youn-Sik Jeong, Gwangyeul Yun, Haeyoung Yoo, Seong-Je Cho, Giyoun Kim, Jinyoung Lee, Hong-Geun Kim, Taeseung Lee, Jae-Myung Lim, and Dongho Won. 2012. Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems. Journal of The Korea Institute of Information Security and Cryptology, 22, 5, (2012), 1191-1204. DOI: 10.13089/JKIISC.2012.22.5.1191.