Digital Library
Search: "[ author: 허준 ]" (10)
Real-Time Detection of Cache Side-Channel Attacks Using Non-Cache Hardware Events
김호동,
허준범,
Vol. 30, No. 6, pp. 1255-1261,
Dec.
2020
10.13089/JKIISC.2020.30.6.1255
Keywords: Real-time attack detection, Cache side-channel attack, PRIME+ABORT, Real-time attack detection, Cache side-channel attack, PRIME+ABORT
10.13089/JKIISC.2020.30.6.1255
Keywords: Real-time attack detection, Cache side-channel attack, PRIME+ABORT, Real-time attack detection, Cache side-channel attack, PRIME+ABORT
Extracting Neural Networks via Meltdown
정호용,
류도현,
허준범,
Vol. 30, No. 6, pp. 1031-1041,
Dec.
2020
10.13089/JKIISC.2020.30.6.1031
Keywords: Meltdown, neural network stealing, Cloud computing, Deep Learning, Meltdown, neural network stealing, Cloud computing, Deep Learning
10.13089/JKIISC.2020.30.6.1031
Keywords: Meltdown, neural network stealing, Cloud computing, Deep Learning, Meltdown, neural network stealing, Cloud computing, Deep Learning
Perceptual Ad-Blocker Design For Adversarial Attack
김민재,
김보민,
허준범,
Vol. 30, No. 5, pp. 871-879,
Oct.
2020
10.13089/JKIISC.2020.30.5.871
Keywords: Adversarial example, Perceptual Ad-Blocker, Defense-GAN, MagNet, Adversarial example, Perceptual Ad-Blocker, Defense-GAN, MagNet
10.13089/JKIISC.2020.30.5.871
Keywords: Adversarial example, Perceptual Ad-Blocker, Defense-GAN, MagNet, Adversarial example, Perceptual Ad-Blocker, Defense-GAN, MagNet
Analysis of Encryption Algorithm Performance by Workload in BigData Platform
이선주,
허준범,
Vol. 29, No. 6, pp. 1305-1317,
Dec.
2019
10.13089/JKIISC.2019.29.6.1305
Keywords: MongoDB, Encryption, BigData, NoSQL, YCSB, MongoDB, Encryption, BigData, NoSQL, YCSB
10.13089/JKIISC.2019.29.6.1305
Keywords: MongoDB, Encryption, BigData, NoSQL, YCSB, MongoDB, Encryption, BigData, NoSQL, YCSB
Analysis of Blockchain Software Vulnerability against OS Command Injection Attack
김병국,
허준범,
Vol. 29, No. 2, pp. 309-320,
Mar.
2019
10.13089/JKIISC.2019.29.2.309
Keywords: Blockchain, Cryptocurrency, Static Analysis, software vulnerability, Blockchain, Cryptocurrency, Static Analysis, software vulnerability
10.13089/JKIISC.2019.29.2.309
Keywords: Blockchain, Cryptocurrency, Static Analysis, software vulnerability, Blockchain, Cryptocurrency, Static Analysis, software vulnerability
Mobile Application Privacy Leak Detection and Security Enhancement Research
김성진,
허준범,
Vol. 29, No. 1, pp. 195-203,
Jan.
2019
10.13089/JKIISC.2019.29.1.195
Keywords: Mobile Application, Personal information leakage, Privacy, Security, Mobile Application, Personal information leakage, Privacy, Security
10.13089/JKIISC.2019.29.1.195
Keywords: Mobile Application, Personal information leakage, Privacy, Security, Mobile Application, Personal information leakage, Privacy, Security
Side-Channel Attack against Secure Data Deduplication over Encrypted Data in Cloud Storage
Hyungjune Shin,
Dongyoung Koo,
Junbeom Hur,
Vol. 27, No. 4, pp. 971-980,
Aug.
2017
10.13089/JKIISC.2017.27.4.971
Keywords: Secure Data Outsourcing, Server-side Deduplication, Client-side deduplication
10.13089/JKIISC.2017.27.4.971
Keywords: Secure Data Outsourcing, Server-side Deduplication, Client-side deduplication
A Study on Introducing Security Certification for Control Systems
Hoyeol Choi,
Daeyeong Kim,
Hyungjune Shin,
Changhee Hahn,
Junbeom Hur,
Vol. 26, No. 3, pp. 725-734,
Jun.
2016
10.13089/JKIISC.2016.26.3.725
Keywords: SCADA, DNP3, EDSA-CRT, certification, Robustness Testing, Load Stress Testing
10.13089/JKIISC.2016.26.3.725
Keywords: SCADA, DNP3, EDSA-CRT, certification, Robustness Testing, Load Stress Testing
Lightweight IP Traceback Mechanism on IPv6 Network Environment
Joon Heo,
Myung-Soo Kang,
Choong-Seon Hong,
Vol. 17, No. 2, pp. 93-102,
Apr.
2007
10.13089/JKIISC.2007.17.2.93
Keywords: Traceback, IPv6, Probabilistic Packet Marking
10.13089/JKIISC.2007.17.2.93
Keywords: Traceback, IPv6, Probabilistic Packet Marking