Browse > Article List

논문
1 Analyzing Trends of Commoditized Confidential Computing Frameworks for Implementing Trusted Execution Environment Applications
Kim, Seongmin; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.545-558,
2 Analysis of Malware Group Classification with eXplainable Artificial Intelligence
Kim, Do-yeon;Jeong, Ah-yeon;Lee, Tae-jin; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.559-571,
3 Analysis of Vulnerability in Electron Based Collaboration Tools
Lee, Hyomin;Jang, Yeonseok;Kwon, Yonghee;Lim, Eunji;Kim, Jongmin;Park, Jinwoo; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.573-586,
4 Automated Building Fuzzing Environment Using Test Framework
Ryu, Minsoo;Kim, Dong Young;Jeon Sanghoonn;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.587-604,
5 Malware Family Detection and Classification Method Using API Call Frequency
Joe, Woo-Jin;Kim, Hyong-Shik; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.605-616,
6 A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure
Hwang, Song-yi;Kim, Jeong-Nyeo; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.617-635,
7 Quantitative Risk Assessment on a Decentralized Cryptocurrency Wallet with a Bayesian Network
Yoo, Byeongcheol;Kim, Seungjoo; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.637-659,
8 A study on Memory Analysis Bypass Technique and Kernel Tampering Detection
Lee, Haneol;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.661-674,
9 Analysis of Zero-Knowledge Protocols for Verifiable Computation and Its Applications
Ju, Chanyang;Lee, Hyeonbum;Chung, Heewon;Seo, Jae Hong; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.675-686,
10 A Out-of-Bounds Read Vulnerability Detection Method Based on Binary Static Analysis
Yoo, Dong-Min;Jin, Wen-Hui;Oh, Heekuck; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.687-699,
11 Detecting TOCTOU Race Condition on UNIX Kernel Based File System through Binary Analysis
Lee, SeokWon;Jin, Wen-Hui;Oh, Heekuck; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.701-713,
12 Multi-Layer Bitcoin Clustering through Off-Chain Data of Darkweb
Lee, Jin-hee;Kim, Min-jae;Hur, Junbeom; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.715-729,
13 Distributed Trust Management for Fog Based IoT Environment
Oh, Jungmin;Kim, Seungjoo; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.731-751,
14 WACFI: Code Instrumentation Technique for Protection of Indirect Call in WebAssembly
Chang, Yoonsoo;Kim, Youngju;Kwon, Donghyun; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.753-762,
15 Case Study Plan for Information Security SLA Performance System in Public Sector
Jeong, Jae Ho;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.763-777,
16 A Study on Web Vulnerability Risk Assessment Model Based on Attack Results: Focused on Cyber Kill Chain
Jin, Hui Hun;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.779-791,
17 A Study on the Establishment of Threat Hunting Concept and Comparative Analysis of Defense Techniques
Ryu, Ho Chan;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.793-799,
18 A Study on the Drift of Cybersecurity Law by Element Analysis of Political Gridlock
Bang, Hyu;Kwon, Hun-Yeong; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.801-816,
19 A Study on Proving RMF A&A in Real World for Weapon System Development
Cho, Kwangsoo;Kim, Seungjoo; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.817-839,
20 Secure Biometric Data Utilization and Protection
Song, Chang-kyu;Kim, Young-jin;Chun, Myung-geun; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.841-852,
21 Analysis of Efficiency of Major Information and Communication Infrastructure Analysis and Evaluation Methods Using DEA Model
Sun, Jong-wook;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.31, no.4, pp.853-862,