Digital Library
Search: "[ keyword: Vulnerability ]" (89)
웹 어셈블리 모듈 안전성 검증을 위한 퍼징 방법
박성현,
강상용,
김연수,
노봉남,
Vol. 29, No. 2, pp. 275-285,
4월.
2019
10.13089/JKIISC.2019.29.2.275
주제어: Web-assembly, Web-assembly Fuzzing, Vulnerability, Web-assembly, Web-assembly Fuzzing, Vulnerability
주제어: Web-assembly, Web-assembly Fuzzing, Vulnerability, Web-assembly, Web-assembly Fuzzing, Vulnerability
블록체인 소프트웨어의 취약점을 이용한 OS 커맨드 인젝션 공격에 대한 연구
김병국,
허준범,
Vol. 29, No. 2, pp. 309-320,
4월.
2019
10.13089/JKIISC.2019.29.2.309
주제어: Blockchain, Cryptocurrency, Static Analysis, software vulnerability, Blockchain, Cryptocurrency, Static Analysis, software vulnerability
주제어: Blockchain, Cryptocurrency, Static Analysis, software vulnerability, Blockchain, Cryptocurrency, Static Analysis, software vulnerability
동적 기호 실행을 이용한 힙 메모리 OOB 취약점 자동 탐지 방법
강상용,
노봉남,
박성현,
Vol. 28, No. 4, pp. 919-928,
8월.
2018
10.13089/JKIISC.2018.28.4.919
주제어: Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds, Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds
주제어: Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds, Dynamic Symbolic Execution, software vulnerability, Heap Memory Vulnerability, Out-of-bounds
기계학습 알고리즘을 이용한 소프트웨어 취약 여부 예측 시스템
최민준,
김주환,
윤주범,
Vol. 28, No. 3, pp. 635-642,
6월.
2018
10.13089/JKIISC.2018.28.3.635
주제어: Machine Learning, Fuzzing, prediction, Vulnerability, Confusion Matrix, Machine Learning, Fuzzing, prediction, Vulnerability, Confusion Matrix
주제어: Machine Learning, Fuzzing, prediction, Vulnerability, Confusion Matrix, Machine Learning, Fuzzing, prediction, Vulnerability, Confusion Matrix
공공기관 프린터 관리 시스템의 취약점 분석
지우중,
이경문,
이병천,
Vol. 28, No. 3, pp. 655-663,
6월.
2018
10.13089/JKIISC.2018.28.3.655
주제어: ARP Spoofing, MITM, printer vulnerability analysis, print spooling, meta data, ARP Spoofing, MITM, printer vulnerability analysis, print spooling, meta data
주제어: ARP Spoofing, MITM, printer vulnerability analysis, print spooling, meta data, ARP Spoofing, MITM, printer vulnerability analysis, print spooling, meta data
Erebus 랜섬웨어에 대한 암호학적 분석 연구
김소람,
김지훈,
박명서,
김대운,
김종성,
Vol. 28, No. 2, pp. 339-346,
4월.
2018
10.13089/JKIISC.2018.28.2.339
주제어: Ransomware, Erebus, Vulnerability, Ransomware, Erebus, Vulnerability
주제어: Ransomware, Erebus, Vulnerability, Ransomware, Erebus, Vulnerability
정보보안 투자가 침해사고에 미치는 영향에 대한 실증분석: 정보보안 교육 서비스 투자를 중심으로
이한솔,
채상미,
Vol. 28, No. 1, pp. 269-281,
2월.
2018
10.13089/JKIISC.2018.28.1.269
주제어: Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing, Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing
주제어: Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing, Information Security Investment, Information security product, information security service, security education, Training, and awareness (SETA) programs, security monitoring, vulnerability testing
산업제어시스템 취약성 분석을 위한 무작위성 기반 퍼징 테스트 케이스 평가 기법
김성진,
손태식,
Vol. 28, No. 1, pp. 179-186,
2월.
2018
10.13089/JKIISC.2018.28.1.179
주제어: vulnerability Analysis, Fuzzing Test, Test Case Evaluation, Industrial Control System, vulnerability Analysis, Fuzzing Test, Test Case Evaluation, Industrial Control System
주제어: vulnerability Analysis, Fuzzing Test, Test Case Evaluation, Industrial Control System, vulnerability Analysis, Fuzzing Test, Test Case Evaluation, Industrial Control System
RAG 기반 라이브러리 하네스 자동 생성 프레임워크
최지혁,
권태경,
원신영,
한상수,
Vol. 36, No. 1, pp. 139-145,
2월.
2026
10.13089/JKIISC.2026.36.1.139
주제어: library fuzzing, Harness, LLM, retrieval-augmented generation (RAG), Vulnerability discovery
주제어: library fuzzing, Harness, LLM, retrieval-augmented generation (RAG), Vulnerability discovery