Digital Library
Search: "[ author: 홍만표 ]" (7)
Emulation-Based Fuzzing Techniques for Identifying Web Interface Vulnerabilities in Embedded Device Firmware
허정민,
김지민,
지청민,
홍만표,
Vol. 29, No. 6, pp. 1225-1234,
Dec.
2019
10.13089/JKIISC.2019.29.6.1225
Keywords: Embedded Device, Dynamic Analysis, Firmware Emulation, Fuzzing, Embedded Device, Dynamic Analysis, Firmware Emulation, Fuzzing
10.13089/JKIISC.2019.29.6.1225
Keywords: Embedded Device, Dynamic Analysis, Firmware Emulation, Fuzzing, Embedded Device, Dynamic Analysis, Firmware Emulation, Fuzzing
A Study on the Method of Minimizing the Bit-Rate Overhead of H.264 Video when Encrypting the Region of Interest
Dongyeol Son,
Jimin Kim,
Cheongmin Ji,
Kangseok Kim,
Kihyung Kim,
Manpyo Hong,
Vol. 28, No. 2, pp. 311-325,
Apr.
2018
10.13089/JKIISC.2018.28.2.311
Keywords: H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead, H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead
10.13089/JKIISC.2018.28.2.311
Keywords: H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead, H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead
Method for Inferring Format Information of Data Field from CAN Trace
Cheongmin Ji,
Jimin Kim,
Manpyo Hong,
Vol. 28, No. 1, pp. 167-177,
Feb.
2018
10.13089/JKIISC.2018.28.1.167
Keywords: Vehicle Security, CAN, protocol reverse engineering, Vehicle Security, CAN, protocol reverse engineering
10.13089/JKIISC.2018.28.1.167
Keywords: Vehicle Security, CAN, protocol reverse engineering, Vehicle Security, CAN, protocol reverse engineering
Anomaly Detection Using Visualization-based Network Forensics
Woo-yeon Jo,
Myung-jong Kim,
Keun-ho Park,
Man-pyo Hong,
Jin Kwak,
Taeshik Shon,
Vol. 27, No. 1, pp. 25-38,
Feb.
2017
10.13089/JKIISC.2017.27.1.25
Keywords: Industrial Control System, Industrial IoT, Visualization, Network Forensics, DNP3
10.13089/JKIISC.2017.27.1.25
Keywords: Industrial Control System, Industrial IoT, Visualization, Network Forensics, DNP3
A Study on the Self-destructing Data for Information Privacy
Jonguk Kim,
Sukin Kang,
Manpyo Hong,
Vol. 23, No. 4, pp. 629-638,
Aug.
2013
10.13089/JKIISC.2013.23.4.629
Keywords: Information Privacy, information security, digital forensic, Data Privacy Model
10.13089/JKIISC.2013.23.4.629
Keywords: Information Privacy, information security, digital forensic, Data Privacy Model
Detecting a Relay Attack with a Background Noise
Jonguk Kim,
Sukin Kang,
Manpyo Hong,
Vol. 23, No. 4, pp. 617-628,
Aug.
2013
10.13089/JKIISC.2013.23.4.617
Keywords: authentication, Man-in-the-middle Attack, Relay Attack, NFC, Audio Fingerprinting
10.13089/JKIISC.2013.23.4.617
Keywords: authentication, Man-in-the-middle Attack, Relay Attack, NFC, Audio Fingerprinting
A Study on the Korean-Stroke based Graphical Password Approach
Tae-Hyoung Ko,
Tae-Shik Shon,
Man-Pyo Hong,
Vol. 22, No. 2, pp. 189-200,
Apr.
2012
10.13089/JKIISC.2012.22.2.189
Keywords: Graphical password, Shoulder Surfing Attack, stroke
10.13089/JKIISC.2012.22.2.189
Keywords: Graphical password, Shoulder Surfing Attack, stroke