Digital Library
Search: "[ keyword: Software ]" (55)
정적 오염 분석을 활용한 타입스크립트 코드의 보안 취약점 탐지
문태근,
김형식,
Vol. 31, No. 2, pp. 263-277,
4월.
2021
10.13089/JKIISC.2021.31.2.263
주제어: Taint Analysis, Static Analysis, Software Test, TypeScript, Javascript, Taint Analysis, Static Analysis, Software Test, TypeScript, Javascript
주제어: Taint Analysis, Static Analysis, Software Test, TypeScript, Javascript, Taint Analysis, Static Analysis, Software Test, TypeScript, Javascript
차분 퍼징을 이용한 국내 공개 암호소스코드 안전성 검증
윤형준,
서석충,
Vol. 30, No. 6, pp. 1225-1236,
12월.
2020
10.13089/JKIISC.2020.30.6.1225
주제어: Software Testing, Differential Fuzzing, Cryptographic Library, Vulnerability, Software Testing, Differential Fuzzing, Cryptographic Library, Vulnerability
주제어: Software Testing, Differential Fuzzing, Cryptographic Library, Vulnerability, Software Testing, Differential Fuzzing, Cryptographic Library, Vulnerability
CIA-Level 기반 보안내재화 개발 프레임워크
강수영,
김승주,
Vol. 30, No. 5, pp. 909-928,
10월.
2020
10.13089/JKIISC.2020.30.5.909
주제어: Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering, Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering
주제어: Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering, Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering
신경망을 이용한 소프트웨어 취약 여부 예측 시스템
최민준,
구동영,
윤수범,
Vol. 29, No. 3, pp. 557-564,
6월.
2019
10.13089/JKIISC.2019.29.3.557
주제어: Artificial intelligence, Neural Network, Machine Learning, Fuzzing, software vulnerability, Artificial intelligence, Neural Network, Machine Learning, Fuzzing, software vulnerability
주제어: Artificial intelligence, Neural Network, Machine Learning, Fuzzing, software vulnerability, Artificial intelligence, Neural Network, Machine Learning, Fuzzing, software vulnerability
블록체인 소프트웨어의 취약점을 이용한 OS 커맨드 인젝션 공격에 대한 연구
김병국,
허준범,
Vol. 29, No. 2, pp. 309-320,
4월.
2019
10.13089/JKIISC.2019.29.2.309
주제어: Blockchain, Cryptocurrency, Static Analysis, software vulnerability, Blockchain, Cryptocurrency, Static Analysis, software vulnerability
주제어: Blockchain, Cryptocurrency, Static Analysis, software vulnerability, Blockchain, Cryptocurrency, Static Analysis, software vulnerability
SDWSN 환경의 PUF 기반 그룹 키 분배 방법 개선
오정민,
정익래,
변진욱,
Vol. 29, No. 1, pp. 29-43,
2월.
2019
10.13089/JKIISC.2019.29.1.29
주제어: Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor, Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor
주제어: Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor, Wireless Sensor Networks, Software-Defined Networking, Key Distribution, physical unclonable functions, Fuzzy extractor
Variational Autoencoder를 활용한 필드 기반 그레이 박스 퍼징 방법
이수림,
문종섭,
Vol. 28, No. 6, pp. 1463-1474,
12월.
2018
10.13089/JKIISC.2018.28.6.1463
주제어: Software Testing, Fuzzing, Vulnerability, Deep Learning, VAE(Variational Autoencoder), Software Testing, Fuzzing, Vulnerability, Deep Learning, VAE(Variational Autoencoder)
주제어: Software Testing, Fuzzing, Vulnerability, Deep Learning, VAE(Variational Autoencoder), Software Testing, Fuzzing, Vulnerability, Deep Learning, VAE(Variational Autoencoder)
동적 기호 실행을 이용한 힙 메모리 OOB 취약점 자동 탐지 방법
강상용,
노봉남,
박성현,
Vol. 28, No. 4, pp. 919-928,
8월.
2018
10.13089/JKIISC.2018.28.4.919
주제어: Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds, Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds
주제어: Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds, Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds