Digital Library


Search: "[ author: 홍만표 ]" (7)
    Emulation-Based Fuzzing Techniques for Identifying Web Interface Vulnerabilities in Embedded Device Firmware
    허정민, 김지민, 지청민, 홍만표, Vol. 29, No. 6, pp. 1225-1234, Dec. 2019
    10.13089/JKIISC.2019.29.6.1225
    Keywords: Embedded Device, Dynamic Analysis, Firmware Emulation, Fuzzing, Embedded Device, Dynamic Analysis, Firmware Emulation, Fuzzing

    A Study on the Method of Minimizing the Bit-Rate Overhead of H.264 Video when Encrypting the Region of Interest
    Dongyeol Son, Jimin Kim, Cheongmin Ji, Kangseok Kim, Kihyung Kim, Manpyo Hong, Vol. 28, No. 2, pp. 311-325, Apr. 2018
    10.13089/JKIISC.2018.28.2.311
    Keywords: H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead, H.264/AVC, Privacy Protection, ROI Encryption, Drift of Video, Minimization of Bit-Rate Overhead

    Method for Inferring Format Information of Data Field from CAN Trace
    Cheongmin Ji, Jimin Kim, Manpyo Hong, Vol. 28, No. 1, pp. 167-177, Feb. 2018
    10.13089/JKIISC.2018.28.1.167
    Keywords: Vehicle Security, CAN, protocol reverse engineering, Vehicle Security, CAN, protocol reverse engineering

    Anomaly Detection Using Visualization-based Network Forensics
    Woo-yeon Jo, Myung-jong Kim, Keun-ho Park, Man-pyo Hong, Jin Kwak, Taeshik Shon, Vol. 27, No. 1, pp. 25-38, Feb. 2017
    10.13089/JKIISC.2017.27.1.25
    Keywords: Industrial Control System, Industrial IoT, Visualization, Network Forensics, DNP3

    A Study on the Self-destructing Data for Information Privacy
    Jonguk Kim, Sukin Kang, Manpyo Hong, Vol. 23, No. 4, pp. 629-638, Aug. 2013
    10.13089/JKIISC.2013.23.4.629
    Keywords: Information Privacy, information security, digital forensic, Data Privacy Model

    Detecting a Relay Attack with a Background Noise
    Jonguk Kim, Sukin Kang, Manpyo Hong, Vol. 23, No. 4, pp. 617-628, Aug. 2013
    10.13089/JKIISC.2013.23.4.617
    Keywords: authentication, Man-in-the-middle Attack, Relay Attack, NFC, Audio Fingerprinting

    A Study on the Korean-Stroke based Graphical Password Approach
    Tae-Hyoung Ko, Tae-Shik Shon, Man-Pyo Hong, Vol. 22, No. 2, pp. 189-200, Apr. 2012
    10.13089/JKIISC.2012.22.2.189
    Keywords: Graphical password, Shoulder Surfing Attack, stroke