Digital Library
Search: "[ author: 김소람 ]" (8)
A Study on Decryption of Files Infected by Ragnar Locker Ransomware through Key Reuse Attack and Its Applications
강수진,
김종성,
김소람,
이세훈,
김대운,
김기문,
Vol. 31, No. 2, pp. 221-231,
Apr.
2021
10.13089/JKIISC.2021.31.2.221
Keywords: Ransomware, Ragnar Locker, Vulnerability, cryptography, Key Reuse Attack, Ransomware, Ragnar Locker, Vulnerability, cryptography, Key Reuse Attack
10.13089/JKIISC.2021.31.2.221
Keywords: Ransomware, Ragnar Locker, Vulnerability, cryptography, Key Reuse Attack, Ransomware, Ragnar Locker, Vulnerability, cryptography, Key Reuse Attack
Acquiring Credential and Analyzing Artifacts of Wire Messenger on Windows
신수민,
김소람,
윤병철,
김종성,
Vol. 31, No. 1, pp. 61-71,
Feb.
2021
10.13089/JKIISC.2021.31.1.61
Keywords: Instant messenger, Forensic Investigation, Credential, artifact, Instant messenger, Forensic Investigation, Credential, artifact
10.13089/JKIISC.2021.31.1.61
Keywords: Instant messenger, Forensic Investigation, Credential, artifact, Instant messenger, Forensic Investigation, Credential, artifact
Study on MalangMalang Talkafe Database Encryption Process and Recovering Its Deleted Messages on Windows
Byungchul Youn,
Soram Kim,
Jongsung Kim,
Vol. 30, No. 3, pp. 397-402,
Jun.
2020
10.13089/JKIISC.2020.30.3.397
Keywords: digital forensic, Messenger, Decryption, Reverse engineering, Memory Forensic
10.13089/JKIISC.2020.30.3.397
Keywords: digital forensic, Messenger, Decryption, Reverse engineering, Memory Forensic
A Study on Encryption Process and Decryption of Ransomware in 2019
이세훈,
윤병철,
김소람,
김기윤,
이영주,
김대운,
박해룡,
김종성,
Vol. 29, No. 6, pp. 1339-1350,
Dec.
2019
10.13089/JKIISC.2019.29.6.1339
Keywords: Ransomware, Decryption, Reverse engineering, Ransomware, Decryption, Reverse engineering
10.13089/JKIISC.2019.29.6.1339
Keywords: Ransomware, Decryption, Reverse engineering, Ransomware, Decryption, Reverse engineering
Study on Windows Event Log-Based Corporate Security Audit and Malware Detection
강세림,
김소람,
박명서,
김종성,
Vol. 28, No. 3, pp. 591-603,
May.
2018
10.13089/JKIISC.2018.28.3.591
Keywords: Windows Event Log, digital forensic, Anti-forensic, Windows Event Log, digital forensic, Anti-forensic
10.13089/JKIISC.2018.28.3.591
Keywords: Windows Event Log, digital forensic, Anti-forensic, Windows Event Log, digital forensic, Anti-forensic
Study on Cryptographic Analysis of Erebus Ransomware
Soram Kim,
Jihun Kim,
Myungseo Park,
Daeun Kim,
Jongsung Kim,
Vol. 28, No. 2, pp. 339-346,
Apr.
2018
10.13089/JKIISC.2018.28.2.339
Keywords: Ransomware, Erebus, Vulnerability, Ransomware, Erebus, Vulnerability
10.13089/JKIISC.2018.28.2.339
Keywords: Ransomware, Erebus, Vulnerability, Ransomware, Erebus, Vulnerability
Side Channel Attacks on SIMON Family with Reduced Masked Rounds
Jihun Kim,
Kiwon Hong,
Soram Kim,
Jaehyung Cho,
Jongsung Kim,
Vol. 27, No. 4, pp. 923-942,
Aug.
2017
10.13089/JKIISC.2017.27.4.923
Keywords: SIMON family, Side-Channel Attack, reduced-round masking method
10.13089/JKIISC.2017.27.4.923
Keywords: SIMON family, Side-Channel Attack, reduced-round masking method
Improved Data Concealing and Detecting Methods for OOXML Document
Kiwon Hong,
Jaehyung Cho,
Soram Kim,
Jongsung Kim,
Vol. 27, No. 3, pp. 489-500,
Jun.
2017
10.13089/JKIISC.2017.27.3.489
Keywords: Digital Forensics, OOXML, MS office, Data concealing, Detection of concealed data
10.13089/JKIISC.2017.27.3.489
Keywords: Digital Forensics, OOXML, MS office, Data concealing, Detection of concealed data