Digital Library
Search: "[ keyword: EM ]" (592)
임베디드 디바이스 펌웨어의 웹 인터페이스 취약점 식별을 위한 에뮬레이션 기반 퍼징 기법
허정민,
김지민,
지청민,
홍만표,
Vol. 29, No. 6, pp. 1225-1234,
12월.
2019
10.13089/JKIISC.2019.29.6.1225
주제어: Embedded Device, Dynamic Analysis, Firmware Emulation, Fuzzing, Embedded Device, Dynamic Analysis, Firmware Emulation, Fuzzing
주제어: Embedded Device, Dynamic Analysis, Firmware Emulation, Fuzzing, Embedded Device, Dynamic Analysis, Firmware Emulation, Fuzzing
금융기관 클라우드 시스템 도입을 위한 의사결정 모델에 대한 연구
이희석,
김인석,
Vol. 28, No. 3, pp. 743-763,
6월.
2018
10.13089/JKIISC.2018.28.3.743
주제어: Cloud system, Decision making model. Financial institutions, Cloud system, Decision making model. Financial institutions
주제어: Cloud system, Decision making model. Financial institutions, Cloud system, Decision making model. Financial institutions
저사양 8-bit AVR 프로세서 상에서의 초경량 블록 암호 알고리즘 CHAM 메모리 최적화 구현
서화정,
Vol. 28, No. 3, pp. 545-550,
6월.
2018
10.13089/JKIISC.2018.28.3.545
주제어: Software Implementation, Internet of Things, block cipher, 8-bit AVR Processors, Software Implementation, Internet of Things, block cipher, 8-bit AVR Processors
주제어: Software Implementation, Internet of Things, block cipher, 8-bit AVR Processors, Software Implementation, Internet of Things, block cipher, 8-bit AVR Processors
NTRU 서명 시스템 구현에 대한 오류 주입 공격 및 대응 방안 연구
장호철,
오수현,
하재철,
Vol. 28, No. 3, pp. 551-561,
6월.
2018
10.13089/JKIISC.2018.28.3.551
주제어: Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure, Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure
주제어: Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure, Post-quantum cryptosystem, NTRU signature, Convolutional multiplication, Fault injection attack and countermeasure
무기체계의 사이버보안 시험평가체계 구축방안 연구
이지섭,
차성용,
백승수,
김승주,
Vol. 28, No. 3, pp. 765-774,
6월.
2018
10.13089/JKIISC.2018.28.3.765
주제어: cybersecurity, Test and Evaluation, Weapon Systems, cybersecurity, Test and Evaluation, Weapon Systems
주제어: cybersecurity, Test and Evaluation, Weapon Systems, cybersecurity, Test and Evaluation, Weapon Systems
SNS의 개인정보와 자기표현정보의 중요도 인지가 정보보호 행동의지에 미치는 영향에 관한 실험연구
임정호,
권순동,
Vol. 28, No. 3, pp. 681-694,
6월.
2018
10.13089/JKIISC.2018.28.3.681
주제어: Personal Information, Self-express information, Non-disclosure of information, Reduction of disclosure scope, Law institutionalization requirement, cognition, conation, Personal Information, Self-express information, Non-disclosure of information, Reduction of disclosure scope, Law institutionalization requirement, cognition, conation
주제어: Personal Information, Self-express information, Non-disclosure of information, Reduction of disclosure scope, Law institutionalization requirement, cognition, conation, Personal Information, Self-express information, Non-disclosure of information, Reduction of disclosure scope, Law institutionalization requirement, cognition, conation
CTI 모델 활용 제어시스템 보안정보 수집 방안 연구
최종원,
김예솔,
민병길,
Vol. 28, No. 2, pp. 471-484,
4월.
2018
10.13089/JKIISC.2018.28.2.471
주제어: Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log, Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log
주제어: Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log, Industrial Control System, Cyber Threat Intelligence, Cyber Security Monitoring, Security Information Collection, Security Event and Log
BubbleDoc: 클라우드 환경에서의 agent-free 파일시스템 분석을 통한 문서 위/변조 탐지
전우진,
홍도원,
박기웅,
Vol. 28, No. 2, pp. 429-436,
4월.
2018
10.13089/JKIISC.2018.28.2.429
주제어: Cloud computing, Disk Monitoring, File System, Cloud computing, Disk Monitoring, File System
주제어: Cloud computing, Disk Monitoring, File System, Cloud computing, Disk Monitoring, File System
파일 시스템 모니터링을 통한 클라우드 스토리지 기반 랜섬웨어 탐지 및 복구 시스템
김주환,
최민준,
윤주범,
Vol. 28, No. 2, pp. 357-367,
4월.
2018
10.13089/JKIISC.2018.28.2.357
주제어: Ransomware, data similarity, filter driver, File System, Cloud Storage, Ransomware, data similarity, filter driver, File System, Cloud Storage
주제어: Ransomware, data similarity, filter driver, File System, Cloud Storage, Ransomware, data similarity, filter driver, File System, Cloud Storage
RSA 문제와 동등한 안전성을 갖는 온라인/오프라인 서명 기법
최경용,
박종환,
Vol. 28, No. 2, pp. 327-338,
4월.
2018
10.13089/JKIISC.2018.28.2.327
주제어: On-line/off-line signature, RSA problem, tight security reduction, On-line/off-line signature, RSA problem, tight security reduction
주제어: On-line/off-line signature, RSA problem, tight security reduction, On-line/off-line signature, RSA problem, tight security reduction