Digital Library
Search: "[ keyword: CA ]" (792)
비 캐시 하드웨어 이벤트를 이용한 캐시 부채널 공격 실시간 탐지
김호동,
허준범,
Vol. 30, No. 6, pp. 1255-1261,
12월.
2020
10.13089/JKIISC.2020.30.6.1255
주제어: Real-time attack detection, Cache side-channel attack, PRIME+ABORT, Real-time attack detection, Cache side-channel attack, PRIME+ABORT
주제어: Real-time attack detection, Cache side-channel attack, PRIME+ABORT, Real-time attack detection, Cache side-channel attack, PRIME+ABORT
Performance Counter Monitor를 이용한 머신 러닝 기반 캐시 부채널 공격 탐지
황종배,
배대현,
하재철,
Vol. 30, No. 6, pp. 1237-1246,
12월.
2020
10.13089/JKIISC.2020.30.6.1237
주제어: Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP, Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP
주제어: Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP, Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP
블록 암호 ARIA에 대한 Flush+Reload 캐시 부채널 공격
배대현,
황종배,
하재철,
Vol. 30, No. 6, pp. 1207-1216,
12월.
2020
10.13089/JKIISC.2020.30.6.1207
주제어: Microarchitectural attack, Cache side-channel attack, FLUSH+RELOAD Attack, ARIA, Microarchitectural attack, Cache side-channel attack, FLUSH+RELOAD Attack, ARIA
주제어: Microarchitectural attack, Cache side-channel attack, FLUSH+RELOAD Attack, ARIA, Microarchitectural attack, Cache side-channel attack, FLUSH+RELOAD Attack, ARIA
Non-Random CAN Fuzzing을 통한 효율적인 ECU 분석 기술
김형훈,
정연선,
최원석,
조효진,
Vol. 30, No. 6, pp. 1115-1130,
12월.
2020
10.13089/JKIISC.2020.30.6.1115
주제어: ECU, CAN, Vehicle Hacking, CAN Fuzzing, Non-Random CAN Fuzzing, ECU, CAN, Vehicle Hacking, CAN Fuzzing, Non-Random CAN Fuzzing
주제어: ECU, CAN, Vehicle Hacking, CAN Fuzzing, Non-Random CAN Fuzzing, ECU, CAN, Vehicle Hacking, CAN Fuzzing, Non-Random CAN Fuzzing
방화벽 접근정책의 계층적 가시화 방법에 대한 연구
김태용,
권태웅,
이준,
이윤수,
송중석,
Vol. 30, No. 6, pp. 1087-1101,
12월.
2020
10.13089/JKIISC.2020.30.6.1087
주제어: firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly, firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly
주제어: firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly, firewall, Access Control List, Hierarchical Visualization, 3D Drill-Down User Interface, Policy Anomaly
서바이벌 네트워크 개념을 이용한 저자 식별 프레임워크: 의미론적 특징과 특징 허용 범위
황철훈,
신건윤,
김동욱,
한명묵,
Vol. 30, No. 6, pp. 1013-1021,
12월.
2020
10.13089/JKIISC.2020.30.6.1013
주제어: Authorship Atribution, Survial Network, Cal Graph, Cosine Simlarity, Suport Vector Machine, Authorship Atribution, Survial Network, Cal Graph, Cosine Simlarity, Suport Vector Machine
주제어: Authorship Atribution, Survial Network, Cal Graph, Cosine Simlarity, Suport Vector Machine, Authorship Atribution, Survial Network, Cal Graph, Cosine Simlarity, Suport Vector Machine
딥러닝을 활용한 전략물자 판정 지원도구 개발에 대한 연구
조재영,
윤지원,
Vol. 30, No. 6, pp. 967-973,
12월.
2020
10.13089/JKIISC.2020.30.6.967
주제어: Deep Learning, Classification, CNN, OCR, Dual-use Item, Deep Learning, Classification, CNN, OCR, Dual-use Item
주제어: Deep Learning, Classification, CNN, OCR, Dual-use Item, Deep Learning, Classification, CNN, OCR, Dual-use Item
내부정보 유출 시나리오와 Data Analytics 기법을 활용한 내부정보 유출징후 탐지 모형 개발에 관한 연구
박현출,
박진상,
김정덕,
Vol. 30, No. 5, pp. 957-966,
10월.
2020
10.13089/JKIISC.2020.30.5.957
주제어: Internal information leak, scenario, data analytics, Anomaly Detection, risk indicators, Internal information leak, scenario, data analytics, Anomaly Detection, risk indicators
주제어: Internal information leak, scenario, data analytics, Anomaly Detection, risk indicators, Internal information leak, scenario, data analytics, Anomaly Detection, risk indicators
안드로이드 애플리케이션 환경에서 CFI 우회 공격기법 연구
이주엽,
최형기,
Vol. 30, No. 5, pp. 881-893,
10월.
2020
10.13089/JKIISC.2020.30.5.881
주제어: Android, CFI(Control Flow Integrity), IFCC(Indirect Function Call Checks), SCS(Shadow Call Stack), Bypass, Android, CFI(Control Flow Integrity), IFCC(Indirect Function Call Checks), SCS(Shadow Call Stack), Bypass
주제어: Android, CFI(Control Flow Integrity), IFCC(Indirect Function Call Checks), SCS(Shadow Call Stack), Bypass, Android, CFI(Control Flow Integrity), IFCC(Indirect Function Call Checks), SCS(Shadow Call Stack), Bypass
AI를 통한 BEC (Business Email Compromise) 공격의 효과적인 대응방안 연구
이도경,
장건수,
이경호,
Vol. 30, No. 5, pp. 835-846,
10월.
2020
10.13089/JKIISC.2020.30.5.835
주제어: Business email compromise, BEC, SCAM, Social Engineering, email attack, Machine Learning, Business email compromise, BEC, SCAM, Social Engineering, email attack, Machine Learning
주제어: Business email compromise, BEC, SCAM, Social Engineering, email attack, Machine Learning, Business email compromise, BEC, SCAM, Social Engineering, email attack, Machine Learning