Digital Library

Journal of The Korea Institute of Information Security and Cryptology, Vol. 35, No. 2, Apr. 2025


Privacy-Preserving Biometric Matching Framework for IoT-Cloud Architecture
, , , Vol. 35, No. 2, pp. 167-176, Apr. 2025
10.13089/JKIISC.2025.35.2.167
Keywords:

SoulBound Token Recovery Mechanism and the Application of a Customer-Centric Guardian System
, , , , , Vol. 35, No. 2, pp. 177-188, Apr. 2025
10.13089/JKIISC.2025.35.2.177
Keywords:

Dynamic Detection of Atomicity Violation via Vector Clock-Based Partial Order of Three Memory Accesses in Heterogeneous System within SoC
, , Vol. 35, No. 2, pp. 189-204, Apr. 2025
10.13089/JKIISC.2025.35.2.189
Keywords:

Anti-Forensic Detection Methods in CUBRID Database
, , Vol. 35, No. 2, pp. 205-222, Apr. 2025
10.13089/JKIISC.2025.35.2.205
Keywords:

Automated Control Technique for Vulnerabilities in Node.js Dependency Modules: Utilizing GitHub Actions and npm Audit
, , Vol. 35, No. 2, pp. 223-240, Apr. 2025
10.13089/JKIISC.2025.35.2.223
Keywords:

Automatic Binary Lifting Based on Neural Machine Translation and Assembly Language Model
, , , , Vol. 35, No. 2, pp. 241-251, Apr. 2025
10.13089/JKIISC.2025.35.2.241
Keywords:

Typing Sound-Based Character Prediction Using ResNet and Multi-Head Attention
, , , Vol. 35, No. 2, pp. 253-264, Apr. 2025
10.13089/JKIISC.2025.35.2.253
Keywords:

Malware Detection Model Vulnerability Analysis and Defense Framework
, , , , , , Vol. 35, No. 2, pp. 265-275, Apr. 2025
10.13089/JKIISC.2025.35.2.265
Keywords:

Adversarial Attacks and Defense in ASV:a-DCF-Based Performance Evaluation
, , , Vol. 35, No. 2, pp. 277-286, Apr. 2025
10.13089/JKIISC.2025.35.2.277
Keywords:

Detecting Vulnerabilities in Symbol-Deprived Embedded Systems with Data Flow Analysis
, , , , , , Vol. 35, No. 2, pp. 287-298, Apr. 2025
10.13089/JKIISC.2025.35.2.287
Keywords:

Deepfake Image Detection via Multimodal Large Language Models
, , , Vol. 35, No. 2, pp. 299-311, Apr. 2025
10.13089/JKIISC.2025.35.2.299
Keywords:

Detection of Korean Profanity in Textual Data Using HSV Scale Image Processing
, , Vol. 35, No. 2, pp. 313-321, Apr. 2025
10.13089/JKIISC.2025.35.2.313
Keywords:

Research on SQL Injection Fuzzing Using LLM
, , Vol. 35, No. 2, pp. 323-334, Apr. 2025
10.13089/JKIISC.2025.35.2.323
Keywords:

Forgery Detection Methods for Smartphone Audio Files
, , , Vol. 35, No. 2, pp. 335-346, Apr. 2025
10.13089/JKIISC.2025.35.2.335
Keywords:

Adversarial Attacks on Autonomous Vehicles and Countermeasure Using Gradient Removal Method
, , Vol. 35, No. 2, pp. 347-358, Apr. 2025
10.13089/JKIISC.2025.35.2.347
Keywords:

PacGAN-Based VAEGAN Framework for Anomaly Detection in Vehicular Networks
, , , Vol. 35, No. 2, pp. 359-368, Apr. 2025
10.13089/JKIISC.2025.35.2.359
Keywords:

Electromagnetic and Acoustic Wave Data Transmissionin Air-Gapped Systems
, , , , , , , Vol. 35, No. 2, pp. 369-381, Apr. 2025
10.13089/JKIISC.2025.35.2.369
Keywords:

LLM-Based Information Security Management System(ISMS) Certification Management Automation System Using RAG and OCR
, , , , , , , Vol. 35, No. 2, pp. 383-396, Apr. 2025
10.13089/JKIISC.2025.35.2.383
Keywords:

Analysis of the Problems of Domestic Studies on Threat Modeling
, , , , Vol. 35, No. 2, pp. 397-413, Apr. 2025
10.13089/JKIISC.2025.35.2.397
Keywords:

Comparative Analysis of CycloneDX and SPDX from Vulnerability Metadata Perspective and Considerations for Interoperability
, , Vol. 35, No. 2, pp. 415-424, Apr. 2025
10.13089/JKIISC.2025.35.2.415
Keywords:

Key Factor Analysis for Enhancing Information Security in the Automotive Industry Using AHP Method: Focusing on TISAX Assessment
, , Vol. 35, No. 2, pp. 425-440, Apr. 2025
10.13089/JKIISC.2025.35.2.425
Keywords:

Comprehensive Evaluation Framework for Hardware and Software-Based Anti-Tampering Technologies
, , , , , , , , Vol. 35, No. 2, pp. 441-461, Apr. 2025
10.13089/JKIISC.2025.35.2.441
Keywords: