|
1 |
A Study on the Development of a Tool to Support Classification of Strategic Items Using Deep Learning
Cho, Jae-Young;Yoon, Ji-Won;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.967-973,
|
|
2 |
An Experimental Study on Pairwise Key Pre-distribution Schemes of Wireless Sensor Networks Considering 3D Environments
Yun, Hyemin;Shin, Sooyeon;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.975-980,
|
|
3 |
GDPR Compliant Blockchain Based Access Control(GCBAC)
Lim, Joon Ho;Chun, Ji Young;Noh, Geontae;Jeong, Ik Rae;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.981-997,
|
|
4 |
Verifiable Could-Based Personal Health Record with Recovery Functionality Using Zero-Knowledge Proof
Kim, Hunki;Kim, Jonghyun;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.999-1012,
|
|
5 |
Authorship Attribution Framework Using Survival Network Concept : Semantic Features and Tolerances
Hwang, Cheol-Hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1013-1021,
|
|
6 |
Automatic Detection and Analysis of Desktop Bus'(D-Bus) Privilege Bypass in Tizen
Kim, Dongsung;Choi, Hyoung-Kee;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1023-1030,
|
|
7 |
Extracting Neural Networks via Meltdown
Jeong, Hoyong;Ryu, Dohyun;Hur, Junbeom;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1031-1041,
|
|
8 |
Detecting Spectre Malware Binary through Function Level N-gram Comparison
Kim, Moon-Sun;Yang, Hee-Dong;Kim, Kwang-Jun;Lee, Man-Hee;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1043-1052,
|
|
9 |
A Method of Detection of Deepfake Using Bidirectional Convolutional LSTM
Lee, Dae-hyeon;Moon, Jong-sub;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1053-1065,
|
|
10 |
High-Speed Search for Pirated Content and Research on Heavy Uploader Profiling Analysis Technology
Hwang, Chan-Woong;Kim, Jin-Gang;Lee, Yong-Soo;Kim, Hyeong-Rae;Lee, Tae-Jin;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1067-1078,
|
|
11 |
A Study of Coverage Improvement for Library Fuzzing
Kim, Seoyoung;Cho, Mingi;Kim, Jongshin;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1079-1085,
|
|
12 |
A Study to Hierarchical Visualization of Firewall Access Control Policies
Kim, Tae-yong;Kwon, Tae-woong;Lee, Jun;Lee, Youn-su;Song, Jung-suk;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1087-1101,
|
|
13 |
Patient Information Transfer System Using OAuth 2.0 Delegation Token
Park, Jungsoo;Jung, Souhwan;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1103-1113,
|
|
14 |
An Efficient ECU Analysis Technology through Non-Random CAN Fuzzing
Kim, Hyunghoon;Jeong, Yeonseon;Choi, Wonsuk;Jo, Hyo Jin;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1115-1130,
|
|
15 |
A Study on the Improvement of Source Code Static Analysis Using Machine Learning
Park, Yang-Hwan;Choi, Jin-Young;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1131-1139,
|
|
16 |
A Empirical Study on the Patch Impact Assessment Method for Industrial Control Network Security Compliance
Choi, Inji;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1141-1149,
|
|
17 |
Evaluation Criteria for COVID-19 Contact Tracing Technology and Security Analysis
Lee, Hojun;Kim, Seungjoo;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1151-1166,
|
|
18 |
A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation
Hong, Soonjwa;Park, Hanjin;Choi, Younghan;Kang, Jungmin;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1167-1187,
|
|
19 |
Comparative Analysis on ICT Supply Chain Security Standards and Framework
Min, Seong-hyun;Son, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1189-1206,
|
|
20 |
Flush+Reload Cache Side-Channel Attack on Block Cipher ARIA
Bae, Daehyeon;Hwang, Jongbae;Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1207-1216,
|
|
21 |
High-Speed Implementation to CHAM-64/128 Counter Mode with Round Key Pre-Load Technique
Kwon, Hyeok-dong;Jang, Kyoung-bae;Park, Jae-hoon;Seo, Hwa-jeong;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1217-1223,
|
|
22 |
Security Verification of Korean Open Crypto Source Codes with Differential Fuzzing Analysis Method
Yoon, Hyung Joon;Seo, Seog Chung;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1225-1236,
|
|
23 |
Machine Learning-Based Detection of Cache Side Channel Attack Using Performance Counter Monitor of CPU
Hwang, Jongbae;Bae, Daehyeon;Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1237-1246,
|
|
24 |
Realistic Multiple Fault Injection System Based on Heterogeneous Fault Sources
Lee, JongHyeok;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1247-1254,
|
|
25 |
Real-Time Detection of Cache Side-Channel Attacks Using Non-Cache Hardware Events
Kim, Hodong;Hur, Junbeom;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1255-1261,
|
|
26 |
Novel Differential Fault Attack Using Function-Skipping on AES
Kim, Ju-Hwan;Lee, JongHyeok;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1263-1270,
|
|
27 |
Robust Deep Learning-Based Profiling Side-Channel Analysis for Jitter
Kim, Ju-Hwan;Woo, Ji-Eun;Park, So-Yeon;Kim, Soo-Jin;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1271-1278,
|
|
28 |
Design and Implementation of High-Speed Software Cryptographic Modules Using GPU
Song, JinGyo;An, SangWoo;Seo, Seog Chung;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1279-1289,
|
|
29 |
Design of an Effective Deep Learning-Based Non-Profiling Side-Channel Analysis Model
Han, JaeSeung;Sim, Bo-Yeon;Lim, Han-Seop;Kim, Ju-Hwan;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.30, no.6, pp.1291-1300,
|
|