Digital Library


Search: "[ author: 김소람 ]" (8)
    A Study on Decryption of Files Infected by Ragnar Locker Ransomware through Key Reuse Attack and Its Applications
    강수진, 김종성, 김소람, 이세훈, 김대운, 김기문, Vol. 31, No. 2, pp. 221-231, Apr. 2021
    10.13089/JKIISC.2021.31.2.221
    Keywords: Ransomware, Ragnar Locker, Vulnerability, cryptography, Key Reuse Attack, Ransomware, Ragnar Locker, Vulnerability, cryptography, Key Reuse Attack

    Acquiring Credential and Analyzing Artifacts of Wire Messenger on Windows
    신수민, 김소람, 윤병철, 김종성, Vol. 31, No. 1, pp. 61-71, Feb. 2021
    10.13089/JKIISC.2021.31.1.61
    Keywords: Instant messenger, Forensic Investigation, Credential, artifact, Instant messenger, Forensic Investigation, Credential, artifact

    Study on MalangMalang Talkafe Database Encryption Process and Recovering Its Deleted Messages on Windows
    Byungchul Youn, Soram Kim, Jongsung Kim, Vol. 30, No. 3, pp. 397-402, Jun. 2020
    10.13089/JKIISC.2020.30.3.397
    Keywords: digital forensic, Messenger, Decryption, Reverse engineering, Memory Forensic

    A Study on Encryption Process and Decryption of Ransomware in 2019
    이세훈, 윤병철, 김소람, 김기윤, 이영주, 김대운, 박해룡, 김종성, Vol. 29, No. 6, pp. 1339-1350, Dec. 2019
    10.13089/JKIISC.2019.29.6.1339
    Keywords: Ransomware, Decryption, Reverse engineering, Ransomware, Decryption, Reverse engineering

    Study on Windows Event Log-Based Corporate Security Audit and Malware Detection
    강세림, 김소람, 박명서, 김종성, Vol. 28, No. 3, pp. 591-603, May. 2018
    10.13089/JKIISC.2018.28.3.591
    Keywords: Windows Event Log, digital forensic, Anti-forensic, Windows Event Log, digital forensic, Anti-forensic

    Study on Cryptographic Analysis of Erebus Ransomware
    Soram Kim, Jihun Kim, Myungseo Park, Daeun Kim, Jongsung Kim, Vol. 28, No. 2, pp. 339-346, Apr. 2018
    10.13089/JKIISC.2018.28.2.339
    Keywords: Ransomware, Erebus, Vulnerability, Ransomware, Erebus, Vulnerability

    Side Channel Attacks on SIMON Family with Reduced Masked Rounds
    Jihun Kim, Kiwon Hong, Soram Kim, Jaehyung Cho, Jongsung Kim, Vol. 27, No. 4, pp. 923-942, Aug. 2017
    10.13089/JKIISC.2017.27.4.923
    Keywords: SIMON family, Side-Channel Attack, reduced-round masking method

    Improved Data Concealing and Detecting Methods for OOXML Document
    Kiwon Hong, Jaehyung Cho, Soram Kim, Jongsung Kim, Vol. 27, No. 3, pp. 489-500, Jun. 2017
    10.13089/JKIISC.2017.27.3.489
    Keywords: Digital Forensics, OOXML, MS office, Data concealing, Detection of concealed data