Browse > Article List

논문
1 A Study on the Development of a Tool to Support Classification of Strategic Items Using Deep Learning
Cho, Jae-Young;Yoon, Ji-Won; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.967-973,
2 An Experimental Study on Pairwise Key Pre-distribution Schemes of Wireless Sensor Networks Considering 3D Environments
Yun, Hyemin;Shin, Sooyeon;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.975-980,
3 GDPR Compliant Blockchain Based Access Control(GCBAC)
Lim, Joon Ho;Chun, Ji Young;Noh, Geontae;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.981-997,
4 Verifiable Could-Based Personal Health Record with Recovery Functionality Using Zero-Knowledge Proof
Kim, Hunki;Kim, Jonghyun;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.999-1012,
5 Authorship Attribution Framework Using Survival Network Concept : Semantic Features and Tolerances
Hwang, Cheol-Hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1013-1021,
6 Automatic Detection and Analysis of Desktop Bus'(D-Bus) Privilege Bypass in Tizen
Kim, Dongsung;Choi, Hyoung-Kee; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1023-1030,
7 Extracting Neural Networks via Meltdown
Jeong, Hoyong;Ryu, Dohyun;Hur, Junbeom; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1031-1041,
8 Detecting Spectre Malware Binary through Function Level N-gram Comparison
Kim, Moon-Sun;Yang, Hee-Dong;Kim, Kwang-Jun;Lee, Man-Hee; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1043-1052,
9 A Method of Detection of Deepfake Using Bidirectional Convolutional LSTM
Lee, Dae-hyeon;Moon, Jong-sub; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1053-1065,
10 High-Speed Search for Pirated Content and Research on Heavy Uploader Profiling Analysis Technology
Hwang, Chan-Woong;Kim, Jin-Gang;Lee, Yong-Soo;Kim, Hyeong-Rae;Lee, Tae-Jin; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1067-1078,
11 A Study of Coverage Improvement for Library Fuzzing
Kim, Seoyoung;Cho, Mingi;Kim, Jongshin;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1079-1085,
12 A Study to Hierarchical Visualization of Firewall Access Control Policies
Kim, Tae-yong;Kwon, Tae-woong;Lee, Jun;Lee, Youn-su;Song, Jung-suk; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1087-1101,
13 Patient Information Transfer System Using OAuth 2.0 Delegation Token
Park, Jungsoo;Jung, Souhwan; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1103-1113,
14 An Efficient ECU Analysis Technology through Non-Random CAN Fuzzing
Kim, Hyunghoon;Jeong, Yeonseon;Choi, Wonsuk;Jo, Hyo Jin; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1115-1130,
15 A Study on the Improvement of Source Code Static Analysis Using Machine Learning
Park, Yang-Hwan;Choi, Jin-Young; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1131-1139,
16 A Empirical Study on the Patch Impact Assessment Method for Industrial Control Network Security Compliance
Choi, Inji; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1141-1149,
17 Evaluation Criteria for COVID-19 Contact Tracing Technology and Security Analysis
Lee, Hojun;Kim, Seungjoo;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1151-1166,
18 A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation
Hong, Soonjwa;Park, Hanjin;Choi, Younghan;Kang, Jungmin; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1167-1187,
19 Comparative Analysis on ICT Supply Chain Security Standards and Framework
Min, Seong-hyun;Son, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1189-1206,
20 Flush+Reload Cache Side-Channel Attack on Block Cipher ARIA
Bae, Daehyeon;Hwang, Jongbae;Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1207-1216,
21 High-Speed Implementation to CHAM-64/128 Counter Mode with Round Key Pre-Load Technique
Kwon, Hyeok-dong;Jang, Kyoung-bae;Park, Jae-hoon;Seo, Hwa-jeong; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1217-1223,
22 Security Verification of Korean Open Crypto Source Codes with Differential Fuzzing Analysis Method
Yoon, Hyung Joon;Seo, Seog Chung; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1225-1236,
23 Machine Learning-Based Detection of Cache Side Channel Attack Using Performance Counter Monitor of CPU
Hwang, Jongbae;Bae, Daehyeon;Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1237-1246,
24 Realistic Multiple Fault Injection System Based on Heterogeneous Fault Sources
Lee, JongHyeok;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1247-1254,
25 Real-Time Detection of Cache Side-Channel Attacks Using Non-Cache Hardware Events
Kim, Hodong;Hur, Junbeom; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1255-1261,
26 Novel Differential Fault Attack Using Function-Skipping on AES
Kim, Ju-Hwan;Lee, JongHyeok;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1263-1270,
27 Robust Deep Learning-Based Profiling Side-Channel Analysis for Jitter
Kim, Ju-Hwan;Woo, Ji-Eun;Park, So-Yeon;Kim, Soo-Jin;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1271-1278,
28 Design and Implementation of High-Speed Software Cryptographic Modules Using GPU
Song, JinGyo;An, SangWoo;Seo, Seog Chung; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1279-1289,
29 Design of an Effective Deep Learning-Based Non-Profiling Side-Channel Analysis Model
Han, JaeSeung;Sim, Bo-Yeon;Lim, Han-Seop;Kim, Ju-Hwan;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.30, no.6, pp.1291-1300,