Digital Library
Search: "[ keyword: Analysis ]" (305)
비프로파일링 기반 전력 분석의 성능 향상을 위한 오토인코더 기반 잡음 제거 기술
권동근,
진성현,
김희석,
홍석희,
Vol. 29, No. 3, pp. 491-501,
5월.
2019
10.13089/JKIISC.2019.29.3.491
주제어: Side-Channel Analysis, Non-Profiled Attack, Deep Learning, Auto-Encoder, Preprocessing, Side-Channel Analysis, Non-Profiled Attack, Deep Learning, Auto-Encoder, Preprocessing
10.13089/JKIISC.2019.29.3.491
주제어: Side-Channel Analysis, Non-Profiled Attack, Deep Learning, Auto-Encoder, Preprocessing, Side-Channel Analysis, Non-Profiled Attack, Deep Learning, Auto-Encoder, Preprocessing
GPGPU 기술을 활용한 차분 확률의 통계적 분석
조은지,
김성겸,
홍득조,
성재철,
홍석희,
Vol. 29, No. 3, pp. 477-489,
5월.
2019
10.13089/JKIISC.2019.29.3.477
주제어: GPGPU, CUDA, differential cryptanalysis, GIFT, PRESENT, Markov Cipher, statistical analysis, GPGPU, CUDA, differential cryptanalysis, GIFT, PRESENT, Markov Cipher, statistical analysis
10.13089/JKIISC.2019.29.3.477
주제어: GPGPU, CUDA, differential cryptanalysis, GIFT, PRESENT, Markov Cipher, statistical analysis, GPGPU, CUDA, differential cryptanalysis, GIFT, PRESENT, Markov Cipher, statistical analysis
더미 기반 부채널 분석 대응기법 신규 취약점- Case Study: XMEGA
이종혁,
한동국,
Vol. 29, No. 2, pp. 287-297,
3월.
2019
10.13089/JKIISC.2019.29.2.287
주제어: Side-Channel Analysis, Countermeasure, Hiding Scheme, dummy, Side-Channel Analysis, Countermeasure, Hiding Scheme, dummy
10.13089/JKIISC.2019.29.2.287
주제어: Side-Channel Analysis, Countermeasure, Hiding Scheme, dummy, Side-Channel Analysis, Countermeasure, Hiding Scheme, dummy
멀티모달 기반 악성코드 유사도 계산 기법
유정도,
김태규,
김인성,
김휘강,
Vol. 29, No. 2, pp. 347-363,
3월.
2019
10.13089/JKIISC.2019.29.2.347
주제어: similarity, Malware analysis, API call sequence, Nilsimsa, Jaccard, TF-IDF, similarity, Malware analysis, API call sequence, Nilsimsa, Jaccard, TF-IDF
10.13089/JKIISC.2019.29.2.347
주제어: similarity, Malware analysis, API call sequence, Nilsimsa, Jaccard, TF-IDF, similarity, Malware analysis, API call sequence, Nilsimsa, Jaccard, TF-IDF
블록체인 소프트웨어의 취약점을 이용한 OS 커맨드 인젝션 공격에 대한 연구
김병국,
허준범,
Vol. 29, No. 2, pp. 309-320,
3월.
2019
10.13089/JKIISC.2019.29.2.309
주제어: Blockchain, Cryptocurrency, Static Analysis, software vulnerability, Blockchain, Cryptocurrency, Static Analysis, software vulnerability
10.13089/JKIISC.2019.29.2.309
주제어: Blockchain, Cryptocurrency, Static Analysis, software vulnerability, Blockchain, Cryptocurrency, Static Analysis, software vulnerability
DEX와 ELF 바이너리 역공학 기반 안드로이드 어플리케이션 호출 관계 분석에 대한 연구
안진웅,
박정수,
응웬부렁,
정수환,
Vol. 29, No. 1, pp. 45-55,
1월.
2019
10.13089/JKIISC.2019.29.1.45
주제어: Android, Malware, Static Analysis, Android, Malware, Static Analysis
10.13089/JKIISC.2019.29.1.45
주제어: Android, Malware, Static Analysis, Android, Malware, Static Analysis
기계학습 기반 비트코인 채굴 난이도 예측 연구
이준원,
권태경,
Vol. 29, No. 1, pp. 225-234,
1월.
2019
10.13089/JKIISC.2019.29.1.225
주제어: Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning, Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning
10.13089/JKIISC.2019.29.1.225
주제어: Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning, Bitcoin, Mining difficulty, Time-series analysis, Predictive model, Machine Learning
사회공학 사이버작전 분석모델 정립연구
신규용,
김지원,
임현명,
김용주,
유진철,
Vol. 28, No. 6, pp. 1595-1606,
11월.
2018
10.13089/JKIISC.2018.28.6.1595
주제어: Social Engineering, Cyberspace Operations, Analysis Model, Social Engineering, Cyberspace Operations, Analysis Model
10.13089/JKIISC.2018.28.6.1595
주제어: Social Engineering, Cyberspace Operations, Analysis Model, Social Engineering, Cyberspace Operations, Analysis Model
DLCT를 활용한 향상된 차분선형 분석
김현우,
김성겸,
홍득조,
성재철,
홍석희,
Vol. 28, No. 6, pp. 1379-1392,
11월.
2018
10.13089/JKIISC.2018.28.6.1379
주제어: Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT, Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT
10.13089/JKIISC.2018.28.6.1379
주제어: Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT, Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT