Digital Library
Search: "[ keyword: virtual ]" (28)
Themida TIGER 시리즈 가상 머신의 가상 명령어 추출 방안 연구
이재휘,
Vol. 34, No. 6, pp. 1297-1306,
12월.
2024
10.13089/JKIISC.2024.34.6.1297
주제어: Themida, Code virtualization, De-virtualization, Unpacking

주제어: Themida, Code virtualization, De-virtualization, Unpacking
가상키보드 비밀번호 유출 분석
양희동,
이만희,
Vol. 32, No. 5, pp. 827-835,
10월.
2022
10.13089/JKIISC.2022.32.5.827
주제어: virtual keyboard, Internet banking, Simple Payment Service, Password Leak

주제어: virtual keyboard, Internet banking, Simple Payment Service, Password Leak
신뢰 실행 환경의 안전한 TPM 활용을 위한 보안 기술
한승균,
장진수,
Vol. 31, No. 2, pp. 167-174,
4월.
2021
10.13089/JKIISC.2021.31.2.167
주제어: Trusted Execution Environment, Trusted Platform Module, Virtualization, Mobile Security, Trusted Execution Environment, Trusted Platform Module, Virtualization, Mobile Security

주제어: Trusted Execution Environment, Trusted Platform Module, Virtualization, Mobile Security, Trusted Execution Environment, Trusted Platform Module, Virtualization, Mobile Security
가상머신 내 mutex 공유 자원을 이용한 은닉 채널 구현
고기완,
최형기,
Vol. 29, No. 5, pp. 961-971,
10월.
2019
10.13089/JKIISC.2019.29.5.961
주제어: Cloud computing, Virtualization, Covert Channel, Cloud computing, Virtualization, Covert Channel

주제어: Cloud computing, Virtualization, Covert Channel, Cloud computing, Virtualization, Covert Channel
VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법
김광준,
황규호,
김인경,
오형근,
이만희,
Vol. 28, No. 2, pp. 449-456,
4월.
2018
10.13089/JKIISC.2018.28.2.449
주제어: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage

주제어: Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage, Virtual LAN, double encapsulation VLAN attack, Virtual Network, Network separation, Data leakage
VR 기기와 게임 시스템의 정보보증을 위한 VR 위협 분석
강태운,
김휘강,
Vol. 28, No. 2, pp. 437-447,
4월.
2018
10.13089/JKIISC.2018.28.2.437
주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security

주제어: Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security, Virtual reality, Virtual Reality Security, Threat modeling, Threat Analysis, STRIDE, DREAD, Attack tree, Attack Library, Game Security