|
1 |
An Authority-Based Efficient Key Management Protocol for Cloud Environment
Choi, Jeong-hee;Lee, Sang-ho;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1035-1045,
|
|
2 |
Security of Password Vaults of Password Managers
Jeong, Hyera;So, Jaewoo;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1047-1057,
|
|
3 |
Key Recovery Attacks on Zorro Using Related-Key Differential Characteristics, and Collision Attacks on PGV-Zorro
Kim, Giyoon;Park, Eunhu;Lee, Jonghyeok;Jang, Sungwoo;Kim, Jihun;Kim, Hangi;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1059-1070,
|
|
4 |
Fault Injection Attack on Lightweight Block Cipher CHAM
Kwon, Hongpil;Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1071-1078,
|
|
5 |
Key Bit-dependent Attack on Side-Channel Analysis-Resistant Hardware Binary Scalar Multiplication Algorithm using a Single-Trace
Sim, Bo-Yeon;Kang, Junki;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1079-1087,
|
|
6 |
Single Trace Side Channel Analysis on NTRUEncrypt Implementation
An, Soojung;Kim, Suhri;Jin, Sunghyun;Kim, HanBit;Kim, HeeSeok;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1089-1098,
|
|
7 |
Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages
Park, ByeongGyu;Kim, Suhri;Kim, Hanbit;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1099-1112,
|
|
8 |
Smudge-Based Smart Device Fingerprint Authentication Attack Study
Kim, Seungyeon;Ku, Yeeun;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1113-1118,
|
|
9 |
A Study on Automatic Classification Technique of Malware Packing Type
Kim, Su-jeong;Ha, Ji-hee;Lee, Tae-jin;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1119-1127,
|
|
10 |
E-mail Header-Based Search and Seizure for Internet Portal Digital Forensics
Lee, Hae-Jin;Shon, Tae-Shik;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1129-1140,
|
|
11 |
DGA-DNS Similarity Analysis and APT Attack Detection Using N-gram
Kim, Donghyeon;Kim, Kangseok;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1141-1151,
|
|
12 |
Game Bot Detection Based on Action Time Interval
Kang, Yong Goo;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1153-1160,
|
|
13 |
Development Research of An Efficient Malware Classification System Using Hybrid Features And Machine Learning
Yu, Jung-Been;Oh, Sang-Jin;Park, Leo-Hyun;Kwon, Tae-Kyoung;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1161-1167,
|
|
14 |
Detection of Abnormal Traffic by Pre-Inflow Agent
Cho, Young Min;Kwon, Hun Yeong;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1169-1177,
|
|
15 |
A Study on Online Fraud and Abusing Detection Technology Using Web-Based Device Fingerprinting
Jang, Seok-eun;Park, Soon-tai;Lee, Sang-joon;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1179-1195,
|
|
16 |
PowerShell-based Malware Detection Method Using Command Execution Monitoring and Deep Learning
Lee, Seung-Hyeon;Moon, Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1197-1207,
|
|
17 |
Study on Structure for Robust App Protection through Commercial Android App Hardening Service
Ha, Dongsoo;Oh, Heekuck;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1209-1223,
|
|
18 |
A Study on the BIL Bitstream Reverse-Engineering Tool-Chain Improvement
Yoon, Junghwan;Seo, Yezee;Jang, Jaedong;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1225-1231,
|
|
19 |
A Disassembly Technique of ARM Position-Independent Code with Value-Set Analysis Having Symbol-Form Domain
Ha, Dongsoo;Oh, Heekuck;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1233-1246,
|
|
20 |
A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations
Shin, Kyuyong;Kim, Kyoung Min;Lee, Jongkwan;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1247-1258,
|
|
21 |
Cyber Security Governance Analysis in Major Countries and Policy Implications
Joo, Moon-ho;Kwon, Hun-Yeong;Lim, Jong-in;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1259-1277,
|
|
22 |
A Study on Improvement of Personal Information Protection in Apartment
Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon;
/
Korea Institute of Information Security and Cryptology
, v.28, no.5, pp.1279-1292,
|
|