|
1 |
Improved SITM Attack on the PRESENT Blockcipher
Park, Jonghyun;Kim, Hangi;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.155-162,
|
|
2 |
Implementation of LEA Lightwegiht Block Cipher GCM Operation Mode on 32-Bit RISC-V
Eum, Si-Woo;Kwon, Hyeok-Dong;Kim, Hyun-Ji;Yang, Yu-Jin;Seo, Hwa-Jeong;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.163-170,
|
|
3 |
An LLVM-Based Implementation of Static Analysis for Detecting Self-Modifying Code and Its Evaluation
Yu, Jae-IL;Choi, Kwang-hoon;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.171-179,
|
|
4 |
A Study on Machine Learning Based Anti-Analysis Technique Detection Using N-gram Opcode
Kim, Hee Yeon;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.181-192,
|
|
5 |
Identification of Unknown Cryptographic Communication Protocol and Packet Analysis Using Machine Learning
Koo, Dongyoung;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.193-200,
|
|
6 |
Comparison of Anomaly Detection Performance Based on GRU Model Applying Various Data Preprocessing Techniques and Data Oversampling
Yoo, Seung-Tae;Kim, Kangseok;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.201-211,
|
|
7 |
BPFast: An eBPF/XDP-Based High-Performance Packet Payload Inspection System for Cloud Environments
You, Myoung-sung;Kim, Jin-woo;Shin, Seung-won;Park, Tae-june;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.213-225,
|
|
8 |
Side-Channel Attack of Android Pattern Screen Lock Exploiting Cache-Coherent Interface in ARM Processors
Kim, Youngpil;Lee, Kyungwoon;Yoo, Seehwan;Yoo, Chuck;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.227-242,
|
|
9 |
A Study on the Method of Vulnerability Analysis of Critical Infrastructure Facilities
Shin, Mi-joo;Yoon, Seong-su;Euom, Ieck-chae;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.243-253,
|
|
10 |
Study on Message Exposure to Administrator in Secure Messaging Protocol MLS
Kwon, Songhui;Choi, Hyoung-Kee;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.255-266,
|
|
11 |
Malicious Insider Detection Using Boosting Ensemble Methods
Park, Suyun;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.267-277,
|
|
12 |
A Comparative Study on Type Approval of Maritime Cyber Security and RMF in the View of System Development Lifecycle
Lee, Suwon;Hwang, Seyoung;Hong, Jina;Kim, Byeong-jin;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.279-287,
|
|
13 |
Proposals for GCI Indicators to Improve a National Cybersecurity Level
Kim, Dae kyung;Lee, Ju hyeon;Kim, Ye young;Hyeon, Da eun;Oh, Heung-Ryong;Chin, Byoung moon;Youm, Heung Youl;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.289-307,
|
|
14 |
A Study on the Supplementation of the Korea's National Information Security Manual from the Perspective of Cyber Supply Chain Security
You, Young-in;Bae, Sunha;Kim, So Jeong;Kim, Dong Hee;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.309-327,
|
|
15 |
A Study on the Principle of Application of Privacy by Design According to the Life Cycle of Pseudonymization Information
Kim, Dong-hyun;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.329-339,
|
|
16 |
Efficiency Analysis of Security Management System of Affiliates of Conglomerate Using DEA-SBM Model
Jung, Hyuk;Lee, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.341-353,
|
|
17 |
Impacts of Information Security Culture and Management Leadership Styles on Information Security Behaviors
Park, Sunghwan;Kim, Beomsoo;Park, Jaeyoung;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.355-370,
|
|
18 |
Darknet Traffic Detection and Classification Using Gradient Boosting Techniques
Kim, Jihye;Lee, Soo Jin;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.371-379,
|
|
19 |
Image Generation Method for Malware Detection Based on Machine Learning
Jeon, YeJin;Kim, Jin-e;Ahn, Joonseon;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.381-390,
|
|
20 |
Analysis of Gohr's Neural Distinguisher on Speck32/64 and its Application to Simon32/64
Seong, Hyoeun;Yoo, Hyeondo;Yeom, Yongjin;Kang, Ju-Sung;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.391-404,
|
|
21 |
Utility Analysis of Federated Learning Techniques through Comparison of Financial Data Performance
Jang, Jinhyeok;An, Yoonsoo;Choi, Daeseon;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.405-416,
|
|
22 |
A Fuzzing Seed Generation Technique Using Natural Language Processing Model
Kim, DongYonug;Jeon, SangHoon;Ryu, MinSoo;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.417-437,
|
|
23 |
MS Office Malicious Document Detection Based on CNN
Park, Hyun-su;Kang, Ah Reum;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.439-446,
|
|
24 |
Artificial Intelligence for Autonomous Ship: Potential Cyber Threats and Security
Yoo, Ji-Woon;Jo, Yong-Hyun;Cha, Young-Kyun;
/
Korea Institute of Information Security and Cryptology
, v.32, no.2, pp.447-463,
|
|