HW 보안 모듈을 활용한 탬퍼링 대응 기술의 검증 및 평가 방안 조사
Vol. 34, No. 2, pp. 335-345,
4월.
2024
10.13089/JKIISC.2024.34.2.335, Full Text:
Keywords: Hardware Security, Software Security, Trusted Platform Module, Anti Tampering
Abstract Statistics
Cite this article
10.13089/JKIISC.2024.34.2.335, Full Text:
Keywords: Hardware Security, Software Security, Trusted Platform Module, Anti Tampering
Abstract Statistics
Cite this article
[IEEE Style]
이동호, 반영훈, 임재덕, 조해현, "Investigation of Verification and Evaluation Methods for Tampering Response Techniques Using HW Security Modules," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 2, pp. 335-345, 2024. DOI: 10.13089/JKIISC.2024.34.2.335.
[ACM Style]
이동호, 반영훈, 임재덕, and 조해현. 2024. Investigation of Verification and Evaluation Methods for Tampering Response Techniques Using HW Security Modules. Journal of The Korea Institute of Information Security and Cryptology, 34, 2, (2024), 335-345. DOI: 10.13089/JKIISC.2024.34.2.335.