|
1 |
Analyzing Trends of Commoditized Confidential Computing Frameworks for Implementing Trusted Execution Environment Applications
Kim, Seongmin;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.545-558,
|
|
2 |
Analysis of Malware Group Classification with eXplainable Artificial Intelligence
Kim, Do-yeon;Jeong, Ah-yeon;Lee, Tae-jin;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.559-571,
|
|
3 |
Analysis of Vulnerability in Electron Based Collaboration Tools
Lee, Hyomin;Jang, Yeonseok;Kwon, Yonghee;Lim, Eunji;Kim, Jongmin;Park, Jinwoo;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.573-586,
|
|
4 |
Automated Building Fuzzing Environment Using Test Framework
Ryu, Minsoo;Kim, Dong Young;Jeon Sanghoonn;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.587-604,
|
|
5 |
Malware Family Detection and Classification Method Using API Call Frequency
Joe, Woo-Jin;Kim, Hyong-Shik;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.605-616,
|
|
6 |
A Study on the High-Speed Malware Propagation Method for Verification of Threat Propagation Prevent Technology in IoT Infrastructure
Hwang, Song-yi;Kim, Jeong-Nyeo;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.617-635,
|
|
7 |
Quantitative Risk Assessment on a Decentralized Cryptocurrency Wallet with a Bayesian Network
Yoo, Byeongcheol;Kim, Seungjoo;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.637-659,
|
|
8 |
A study on Memory Analysis Bypass Technique and Kernel Tampering Detection
Lee, Haneol;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.661-674,
|
|
9 |
Analysis of Zero-Knowledge Protocols for Verifiable Computation and Its Applications
Ju, Chanyang;Lee, Hyeonbum;Chung, Heewon;Seo, Jae Hong;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.675-686,
|
|
10 |
A Out-of-Bounds Read Vulnerability Detection Method Based on Binary Static Analysis
Yoo, Dong-Min;Jin, Wen-Hui;Oh, Heekuck;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.687-699,
|
|
11 |
Detecting TOCTOU Race Condition on UNIX Kernel Based File System through Binary Analysis
Lee, SeokWon;Jin, Wen-Hui;Oh, Heekuck;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.701-713,
|
|
12 |
Multi-Layer Bitcoin Clustering through Off-Chain Data of Darkweb
Lee, Jin-hee;Kim, Min-jae;Hur, Junbeom;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.715-729,
|
|
13 |
Distributed Trust Management for Fog Based IoT Environment
Oh, Jungmin;Kim, Seungjoo;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.731-751,
|
|
14 |
WACFI: Code Instrumentation Technique for Protection of Indirect Call in WebAssembly
Chang, Yoonsoo;Kim, Youngju;Kwon, Donghyun;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.753-762,
|
|
15 |
Case Study Plan for Information Security SLA Performance System in Public Sector
Jeong, Jae Ho;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.763-777,
|
|
16 |
A Study on Web Vulnerability Risk Assessment Model Based on Attack Results: Focused on Cyber Kill Chain
Jin, Hui Hun;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.779-791,
|
|
17 |
A Study on the Establishment of Threat Hunting Concept and Comparative Analysis of Defense Techniques
Ryu, Ho Chan;Jeong, Ik Rae;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.793-799,
|
|
18 |
A Study on the Drift of Cybersecurity Law by Element Analysis of Political Gridlock
Bang, Hyu;Kwon, Hun-Yeong;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.801-816,
|
|
19 |
A Study on Proving RMF A&A in Real World for Weapon System Development
Cho, Kwangsoo;Kim, Seungjoo;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.817-839,
|
|
20 |
Secure Biometric Data Utilization and Protection
Song, Chang-kyu;Kim, Young-jin;Chun, Myung-geun;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.841-852,
|
|
21 |
Analysis of Efficiency of Major Information and Communication Infrastructure Analysis and Evaluation Methods Using DEA Model
Sun, Jong-wook;Lee, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.31, no.4, pp.853-862,
|
|