Digital Library


Search: "[ keyword: Cache ]" (10)
    , , , , Vol. 32, No. 2, pp. 227-242, Apr. 2022
    10.13089/JKIISC.2022.32.2.227

    Real-Time Detection of Cache Side-Channel Attacks Using Non-Cache Hardware Events
    김호동, 허준범, Vol. 30, No. 6, pp. 1255-1261, Dec. 2020
    10.13089/JKIISC.2020.30.6.1255
    Keywords: Real-time attack detection, Cache side-channel attack, PRIME+ABORT, Real-time attack detection, Cache side-channel attack, PRIME+ABORT

    Machine Learning-Based Detection of Cache Side Channel Attack Using Performance Counter Monitor of CPU
    황종배, 배대현, 하재철, Vol. 30, No. 6, pp. 1237-1246, Dec. 2020
    10.13089/JKIISC.2020.30.6.1237
    Keywords: Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP, Cache-based Side Channel Attack, Spectre Attack, AES, Performance Counter Monitor, SVM, RF, MLP

    Flush+Reload Cache Side-Channel Attack on Block Cipher ARIA
    배대현, 황종배, 하재철, Vol. 30, No. 6, pp. 1207-1216, Dec. 2020
    10.13089/JKIISC.2020.30.6.1207
    Keywords: Microarchitectural attack, Cache side-channel attack, FLUSH+RELOAD Attack, ARIA, Microarchitectural attack, Cache side-channel attack, FLUSH+RELOAD Attack, ARIA

    A Study on Copyright Infringement over Online Streaming Services by Reconstructing Web Cache
    Yirang Lim, Hyunji Chung, Sangjin Lee, Vol. 30, No. 4, pp. 559-572, Aug. 2020
    10.13089/JKIISC.2020.30.4.559
    Keywords: Copyright Protection Technology, Online Streaming Service, Video Stream Forensics, Web Browser, Cache

    A Practical Design and Implementation of Android App Cache Manipulation Attacks
    홍석, 김동욱, 김형식, Vol. 29, No. 1, pp. 205-214, Jan. 2019
    10.13089/JKIISC.2019.29.1.205
    Keywords: ART, app cache, app integrity attack, ART, app cache, app integrity attack

    Method of estimating the deleted time of applications using Amcache.hve
    Moon-Ho Kim, Sang-jin Lee, Vol. 25, No. 3, pp. 573-584, Jun. 2015
    10.13089/JKIISC.2015.25.3.573
    Keywords: Digital Forensics, Amcache.hve, User Behavior

    The analysis of Windows 7¡¤8 IconCache.db and its application
    Chan-Youn Lee, Sang-Jin Lee, Vol. 24, No. 1, pp. 135-144, Feb. 2014
    10.13089/JKIISC.2014.24.1.135
    Keywords: IconCache.db, Antiforensic, digital forensic, User Behavior, Icon

    A Method for Tracing Internet Usage in Multi-use Web browser Environment and Non-English Speaking Countries
    Seung-Bong Lee, Sang-Jin Lee, Vol. 20, No. 5, pp. 125-132, Oct. 2010
    10.13089/JKIISC.2010.20.5.125
    Keywords: Web Browser, Cache, History, Cookies, keyword, URL Decoding

    Authenticated Handoff with Low Latency and Traffic Management in WLAN
    Choi Jae-woo, Nyang Dae-hun, Kang Jeon-il, Vol. 15, No. 2, pp. 81-94, Apr. 2005
    10.13089/JKIISC.2005.15.2.81
    Keywords: Handoff, proactive caching, traffic, cache-hit, WLRU(Weighted Least Recently Used)