Browse > Article List

논문
1 A User Authentication Model Based on Double Key for Secure Collusion Resistance in the Cloud Environment
Choi, Jeong-hee;Lee, Sang-ho; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.261-273,
2 Fuzzing Method for Web-Assembly Module Safety Validation
Park, Sunghyun;Kang, Sangyong;Kim, Yeonsu;Noh, Bongnam; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.275-285,
3 Novel Vulnerability against Dummy Based Side-Channel Countermeasures - Case Study: XMEGA
Lee, JongHyeok;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.287-297,
4 Personal Information Management System with Blockchain Using zk-SNARK
Lee, Jeong-hyuk;Hwang, Jung Yeon;Oh, Hyun-ok;Kim, Ji-hye; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.299-308,
5 Analysis of Blockchain Software Vulnerability against OS Command Injection Attack
Kim, Byoungkuk;Hur, Junbeom; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.309-320,
6 A Study on Anomaly Detection Model using Worker Access Log in Manufacturing Terminal PC
Ahn, Jong-seong;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.321-330,
7 Cyber-Threat Detection of ICS Using Sysmon and ELK
Kim, Yongjun;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.331-346,
8 Multi-Modal Based Malware Similarity Estimation Method
Yoo, Jeong Do;Kim, Taekyu;Kim, In-sung;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.347-363,
9 Executable Code Sanitizer to Strengthen Security of uC/OS Operating System for PLC
Choi, Gwang-jun;You, Geun-ha;Cho, Seong-je; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.365-375,
10 Token-Based IoT Access Control Using Distributed Ledger
Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.377-391,
11 Unauthorized Software Blocking Techniques in Software Defined Network (SDN) Environments
Kang, Nam-Gil;Kwon, TaeWook; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.393-399,
12 Oversea IP Ranges Blocking for Security Enhancement of Critical Infrastructures with Cyber Threats Analysis in Electric Industry
Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.401-415,
13 Efficient Wi-Fi Security Protocol Using Dual Tokens
Lee, Byoungcheon; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.417-429,
14 Proposal of Process Hollowing Attack Detection Using Process Virtual Memory Data Similarity
Lim, Su Min;Im, Eul Gyu; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.431-438,
15 On Physical Security Threat Breakdown Structure for Data Center Physical Security Level Up
Bae, Chun-sock;Goh, Sung-cheol; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.439-449,
16 A Study on the Organizational Conflict and Job Withdrawal Intention of the Information Security Workers
Kim, Geunhye;Park, Kyudong;Shim, Mina; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.451-463,
17 Design and Implementation of Simulation Tool for Cyber Battle Damage Assessment Using MOCE(Measure of Cyber Effectiveness)
Park, JinHo;Kim, DuHoe;Shin, DongIl;Shin, DongKyoo; / Korea Institute of Information Security and Cryptology , v.29, no.2, pp.465-472,