Digital Library


Search: "[ author: 허준 ]" (10)
    , , , Vol. 31, No. 4, pp. 715-729, Aug. 2021
    10.13089/JKIISC.2021.31.4.715

    Real-Time Detection of Cache Side-Channel Attacks Using Non-Cache Hardware Events
    김호동, 허준범, Vol. 30, No. 6, pp. 1255-1261, Dec. 2020
    10.13089/JKIISC.2020.30.6.1255
    Keywords: Real-time attack detection, Cache side-channel attack, PRIME+ABORT, Real-time attack detection, Cache side-channel attack, PRIME+ABORT

    Extracting Neural Networks via Meltdown
    정호용, 류도현, 허준범, Vol. 30, No. 6, pp. 1031-1041, Dec. 2020
    10.13089/JKIISC.2020.30.6.1031
    Keywords: Meltdown, neural network stealing, Cloud computing, Deep Learning, Meltdown, neural network stealing, Cloud computing, Deep Learning

    Perceptual Ad-Blocker Design For Adversarial Attack
    김민재, 김보민, 허준범, Vol. 30, No. 5, pp. 871-879, Oct. 2020
    10.13089/JKIISC.2020.30.5.871
    Keywords: Adversarial example, Perceptual Ad-Blocker, Defense-GAN, MagNet, Adversarial example, Perceptual Ad-Blocker, Defense-GAN, MagNet

    Analysis of Encryption Algorithm Performance by Workload in BigData Platform
    이선주, 허준범, Vol. 29, No. 6, pp. 1305-1317, Dec. 2019
    10.13089/JKIISC.2019.29.6.1305
    Keywords: MongoDB, Encryption, BigData, NoSQL, YCSB, MongoDB, Encryption, BigData, NoSQL, YCSB

    Analysis of Blockchain Software Vulnerability against OS Command Injection Attack
    김병국, 허준범, Vol. 29, No. 2, pp. 309-320, Mar. 2019
    10.13089/JKIISC.2019.29.2.309
    Keywords: Blockchain, Cryptocurrency, Static Analysis, software vulnerability, Blockchain, Cryptocurrency, Static Analysis, software vulnerability

    Mobile Application Privacy Leak Detection and Security Enhancement Research
    김성진, 허준범, Vol. 29, No. 1, pp. 195-203, Jan. 2019
    10.13089/JKIISC.2019.29.1.195
    Keywords: Mobile Application, Personal information leakage, Privacy, Security, Mobile Application, Personal information leakage, Privacy, Security

    Side-Channel Attack against Secure Data Deduplication over Encrypted Data in Cloud Storage
    Hyungjune Shin, Dongyoung Koo, Junbeom Hur, Vol. 27, No. 4, pp. 971-980, Aug. 2017
    10.13089/JKIISC.2017.27.4.971
    Keywords: Secure Data Outsourcing, Server-side Deduplication, Client-side deduplication

    A Study on Introducing Security Certification for Control Systems
    Hoyeol Choi, Daeyeong Kim, Hyungjune Shin, Changhee Hahn, Junbeom Hur, Vol. 26, No. 3, pp. 725-734, Jun. 2016
    10.13089/JKIISC.2016.26.3.725
    Keywords: SCADA, DNP3, EDSA-CRT, certification, Robustness Testing, Load Stress Testing

    Lightweight IP Traceback Mechanism on IPv6 Network Environment
    Joon Heo, Myung-Soo Kang, Choong-Seon Hong, Vol. 17, No. 2, pp. 93-102, Apr. 2007
    10.13089/JKIISC.2007.17.2.93
    Keywords: Traceback, IPv6, Probabilistic Packet Marking