Browse > Article List

논문
1 An Authority-Based Efficient Key Management Protocol for Cloud Environment
Choi, Jeong-hee;Lee, Sang-ho; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1035-1045,
2 Security of Password Vaults of Password Managers
Jeong, Hyera;So, Jaewoo; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1047-1057,
3 Key Recovery Attacks on Zorro Using Related-Key Differential Characteristics, and Collision Attacks on PGV-Zorro
Kim, Giyoon;Park, Eunhu;Lee, Jonghyeok;Jang, Sungwoo;Kim, Jihun;Kim, Hangi;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1059-1070,
4 Fault Injection Attack on Lightweight Block Cipher CHAM
Kwon, Hongpil;Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1071-1078,
5 Key Bit-dependent Attack on Side-Channel Analysis-Resistant Hardware Binary Scalar Multiplication Algorithm using a Single-Trace
Sim, Bo-Yeon;Kang, Junki;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1079-1087,
6 Single Trace Side Channel Analysis on NTRUEncrypt Implementation
An, Soojung;Kim, Suhri;Jin, Sunghyun;Kim, HanBit;Kim, HeeSeok;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1089-1098,
7 Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages
Park, ByeongGyu;Kim, Suhri;Kim, Hanbit;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1099-1112,
8 Smudge-Based Smart Device Fingerprint Authentication Attack Study
Kim, Seungyeon;Ku, Yeeun;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1113-1118,
9 A Study on Automatic Classification Technique of Malware Packing Type
Kim, Su-jeong;Ha, Ji-hee;Lee, Tae-jin; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1119-1127,
10 E-mail Header-Based Search and Seizure for Internet Portal Digital Forensics
Lee, Hae-Jin;Shon, Tae-Shik; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1129-1140,
11 DGA-DNS Similarity Analysis and APT Attack Detection Using N-gram
Kim, Donghyeon;Kim, Kangseok; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1141-1151,
12 Game Bot Detection Based on Action Time Interval
Kang, Yong Goo;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1153-1160,
13 Development Research of An Efficient Malware Classification System Using Hybrid Features And Machine Learning
Yu, Jung-Been;Oh, Sang-Jin;Park, Leo-Hyun;Kwon, Tae-Kyoung; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1161-1167,
14 Detection of Abnormal Traffic by Pre-Inflow Agent
Cho, Young Min;Kwon, Hun Yeong; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1169-1177,
15 A Study on Online Fraud and Abusing Detection Technology Using Web-Based Device Fingerprinting
Jang, Seok-eun;Park, Soon-tai;Lee, Sang-joon; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1179-1195,
16 PowerShell-based Malware Detection Method Using Command Execution Monitoring and Deep Learning
Lee, Seung-Hyeon;Moon, Jong-Sub; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1197-1207,
17 Study on Structure for Robust App Protection through Commercial Android App Hardening Service
Ha, Dongsoo;Oh, Heekuck; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1209-1223,
18 A Study on the BIL Bitstream Reverse-Engineering Tool-Chain Improvement
Yoon, Junghwan;Seo, Yezee;Jang, Jaedong;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1225-1231,
19 A Disassembly Technique of ARM Position-Independent Code with Value-Set Analysis Having Symbol-Form Domain
Ha, Dongsoo;Oh, Heekuck; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1233-1246,
20 A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations
Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1247-1258,
21 Cyber Security Governance Analysis in Major Countries and Policy Implications
Joo, Moon-ho;Kwon, Hun-Yeong;Lim, Jong-in; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1259-1277,
22 A Study on Improvement of Personal Information Protection in Apartment
Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon; / Korea Institute of Information Security and Cryptology , v.28, no.5, pp.1279-1292,