Digital Library
Search: "[ keyword: Attack ]" (297)
안드로이드 앱 캐시 변조 공격의 설계 및 구현
홍석,
김동욱,
김형식,
Vol. 29, No. 1, pp. 205-214,
2월.
2019
10.13089/JKIISC.2019.29.1.205
주제어: ART, app cache, app integrity attack, ART, app cache, app integrity attack
주제어: ART, app cache, app integrity attack, ART, app cache, app integrity attack
전투기 데이터 변조 공격행위에 대한 탐지모듈 제안
홍병진,
김완주,
김호근,
임재성,
Vol. 29, No. 1, pp. 5-16,
2월.
2019
10.13089/JKIISC.2019.29.1.5
주제어: RTOS, Data Modulation Attack, True-Airspeed, Air Data Computer, Detection Module, RTOS, Data Modulation Attack, True-Airspeed, Air Data Computer, Detection Module
주제어: RTOS, Data Modulation Attack, True-Airspeed, Air Data Computer, Detection Module, RTOS, Data Modulation Attack, True-Airspeed, Air Data Computer, Detection Module
무인 복합 출력기 솔루션의 취약성 분석
지우중,
김형식,
Vol. 29, No. 1, pp. 165-174,
2월.
2019
10.13089/JKIISC.2019.29.1.165
주제어: Printer kiosk, HTTP, URL meta data, URL guessing attack, Printer kiosk, HTTP, URL meta data, URL guessing attack
주제어: Printer kiosk, HTTP, URL meta data, URL guessing attack, Printer kiosk, HTTP, URL meta data, URL guessing attack
악성코드 유포 사이트 특성 분석 및 대응방안 연구
김홍석,
김인석,
Vol. 29, No. 1, pp. 93-103,
2월.
2019
10.13089/JKIISC.2019.29.1.93
주제어: Malicious web site, Drive by download Attack, Exploit site, Malware, Malicious web site, Drive by download Attack, Exploit site, Malware
주제어: Malicious web site, Drive by download Attack, Exploit site, Malware, Malicious web site, Drive by download Attack, Exploit site, Malware
NTRU 서명 시스템 구현에 대한 오류 주입 공격 및 대응 방안 연구
장호철,
오수현,
하재철,
Vol. 28, No. 3, pp. 551-561,
6월.
2018
10.13089/JKIISC.2018.28.3.551
주제어: Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure, Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure
주제어: Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure, Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure
동적 네트워크 환경에 적용 가능한 Attack Graph 모델 연구
문주연,
김태규,
김인성,
김휘강,
Vol. 28, No. 2, pp. 485-500,
4월.
2018
10.13089/JKIISC.2018.28.2.485
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
주제어: Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security, Attack Graph, Network Topology, Dynamic Network, Moving Target Defense, Network Security
VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법
김광준,
황규호,
김인경,
오형근,
이만희,
Vol. 28, No. 2, pp. 449-456,
4월.
2018
10.13089/JKIISC.2018.28.2.449
주제어: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage
주제어: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage
VR 기기와 게임 시스템의 정보보증을 위한 VR 위협 분석
강태운,
김휘강,
Vol. 28, No. 2, pp. 437-447,
4월.
2018
10.13089/JKIISC.2018.28.2.437
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security
중간자 PLC를 이용한 CPS 은닉형 공격 실험환경 구축 방안
장 엽,
이우묘,
신혁기,
김신규,
Vol. 28, No. 1, pp. 123-133,
2월.
2018
10.13089/JKIISC.2018.28.1.123
주제어: Cyber Physical System, Stealthy Deception Attack, PLCitM (PLC in the Middle), Cyber Physical System, Stealthy Deception Attack, PLCitM (PLC in the Middle)
주제어: Cyber Physical System, Stealthy Deception Attack, PLCitM (PLC in the Middle), Cyber Physical System, Stealthy Deception Attack, PLCitM (PLC in the Middle)
선형 판별 분석 및 k-means 알고리즘을 이용한 적대적 공격 유형 분류 방안
최석환,
김형건,
최윤호,
Vol. 31, No. 6, pp. 1215-1225,
12월.
2021
10.13089/JKIISC.2021.31.6.1215
주제어: Deep Learning, Adversarial example, Adversarial attack, clustering
주제어: Deep Learning, Adversarial example, Adversarial attack, clustering